Archive | C.I.A

America in Turmoil: From Deep State Insurgency to Deep State Spying – WikiLeaks’ Vault 7


Even those not following the latest evidence of the tyrannical noose tightening around our necks, know something has gone terribly wrong in America.

Through NSA whistleblower Edward Snowden’s revelations four years ago, we learned that US citizens as well as foreign countries are the most spied upon in human history. But this week’s latest massive WikiLeaks’ release, aka Vault 7, amounts to almost 9,000 pages of CIA documents collected from 2013 through 2016 that disclose highly classified hacking secrets.

With this largest dump of confidential CIA files ever published, the world is beginning to realize just how far gone our privacy rights are, becoming virtually nonexistent under traitor Obama’s second term in office.

On the heels of last week’s bombshell revelations that outgoing president Obama illegally wiretapped and surveilled all of President Trump’s communications (both domestic and overseas) including his pre-administration officials, now we’re learning that the Orwellian nightmare of myopic control over us as a national population is far worse than ever imagined.

These back-to-back, very much related unfolding events only demonstrate that not only is the legitimately elected American president apparently in the process of an overthrow attempt by treasonous subversive forces for the first time in US history, but through the ruling elite’s private army – the CIA, it has extended its technologically invasive beta test control over the most spied upon population ever on its way to imprisoning every human on earth with a one world crime cabal government.

Americans are not the only victims of deep state cyber aggression. The CIA data dump also reveals that the NSA and CIA have been conducting a large scale covert operation out of the Frankfurt, Germany American Consulate, largest in the world, busily hacking targeted individuals, groups and national entities throughout Europe, the Middle East and China. Granted immunity and top secret identities, individuals comprising deep state America employed in Frankfurt have developed a massive digital hacking arsenal smack dab in the middle of Europe as Empire’s vassal.

In recent years during the Bush-Obama regime, US citizens have witnessed their civil rights – once guaranteed under their no longer upheld Constitution, eroded away into complete oblivion. Under the nefarious pretense of national security, the powers-that-shouldn’t-be have opportunistically stolen both our legal rights as well as literally our property rights in the form of our homes, our cars, our cash, and bank account assets under the grossly unlawfulcivil forfeiture laws regardless of whether any crimes have been committed. Currently US law enforcement steals more annually from us than the totality of all burglars. Also with bail-in laws now well in place, personal life savings will be devoured by large banks, falling like dominos when the global economy collapses. Theft by a predatory elitenever ends.

Rampant violation of our Fifth Amendment right that protect citizens from unreasonable government seizure of private property has also been additionally abused under eminent domain law, where again increasingly our homes are being illegally confiscated by local, state and federal governments. A dozen years ago the US Supreme Court made the decision granting government the right to steal our property based on land use for “economic development” even by a private developer.

The landmark Kelo vs. New London, Connecticut case enabled the Big Pharma giant Pfizer to land grab without the consent of the private citizen as the legal property owner. At the government and pharmaceutical company’s disgrace after millions of taxpayer dollars unjustly displaced private citizens from what was rightfully theirs, all these years later the 90-acre property remains a desolate, vacant lot.

From our stolen constitutional property rights to our freedom of movement and travel now being usurped, increasingly US citizens flying from one domestic location to another are being asked to show “their papers,” reminding us how the German populace must have felt under Nazi authoritarian control.

Increasing military and law enforcement “random” checkpoints are rapidly popping up all over the United States to monitor and restrict our right to navigable access. Microchipped drivers licenses, passports, credit cards as well as backdoor installed GPS monitoring and spying devices in our cell phones have illicitly, secretly been in place for years now. Biometrics like facial and voice recognition and implanted microchips are all New World Order population control mechanisms.

But the latest CIA crimes constitute an unprecedented assault allowing deep state to infiltrate and attack us through malware embedded in our iPhones, Android computer applications as well as smart TVs in order to listen in and shockingly violate every last vestige of our decimated privacy.

Even while Samsung Smart TVs are turned off, the monitoring device is still secretly turned on and eavesdropping on our conversations. Another insidiously dangerous feature to this CIA malware is that it can extract usernames, passwords, and Wi-Fi keys expanding invasive access to the victim’s shared network and other connected devices.

As far back as a half decade ago, then CIA Director retired General David Petraeus was touting how hi tech advances facilitated a myriad of ways Americans can be spied on in a Wired article entitled “CIA Chief: We’ll Spy on You through Your Dishwasher.”

With the rise of the “smart home,” you’d be sending tagged, geo-located data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.

You can easily see where the centralized controllers envision smart meters, smart phones, smart TVs and a plethora of smart household devices installed in every hopelessly dumbed down American’s home to permit voyeuristic deep state criminals complete invasive access to raping you in your un-private, unsafe sanctuary you call home.

With Big Government both watching and listening wherever we are and go nowadays, virtually nothing escapes totalitarian reach and absolute control anymore.

Additionally, the massive proliferation of closed circuit TV cameras shooting us from every angle at virtually every urban street corner traffic light and every business location, along with the global deployment of countless surveillance drones of all shapes and sizes, invasively capable of covertly observing and recording our every move and even armed to kill us from both inside and outside our own no longer private homes, conclusively confirm that we are living within the nightmarish horror of “you can run but cannot hide” from the diabolical authoritarian state. And thanks to Obama, the alarming precedent’s been set for a US president to engage in extrajudicial killing of his own citizens on or off American soil.

On a minor positive note, the Oklahoma state legislature has recently introduced a bill making it legal for homeowners to destroy drones flying less than 400 feet over their private property, as long as it’s not an aircraft regulated by the Federal Aviation Administration (FAA). So in other words, if it’s Big Government invading your privacy by operating a drone (predator or otherwise), violating and endangering your personal space, apparently by law you must simply remain a targeted passive victim. But if it’s your nosy neighbor, then in Oklahoma you’ll be authorized to neutralize it when flying too low over your private property residence. Although 45 states are considering laws that restrict unmanned aerial vehicles (UAV’s), especially when risking safety of first responders or the public, the FAA maintains jurisdiction over all US airspace.

Growing conflict between citizens’ personal and privacy rights, violated at the expense of authoritarian government overreach, will no doubt be played out on a far larger scale as divided America continues to fracture, be it over property rightsgun rights, bodily rights vs. mandatory vaccines, microchips or potentially outlawed abortion, or basic 1st Amendment free speech, free press, protest and religious rights. Right now the United States is a powder keg with anti-Trump opposition forces determined to trigger a violent US insurrection that could easily lead to civil war.

The WikiLeaks Vault 7 dump strengthens the case against John Brennan, the CIA director that Stratfor stated was on a witch hunt against journalists when Rolling Stone reporter Michael Hastings was suspiciously killed after his late model car was almost certainly remote controlled to speed up to near 100 MPH prior to it exploding in June 2013. Hastings had been under surveillance by intelligence agencies while working on his latest project exposing their crimes.

With the simultaneous breaking news story that Obama was on the warpath against truth telling journalists as well, directing the FBI to monitor press phone records and remotely hack Sharyl Attkisson’s computer, the likely Hastings assassination and blatant aggression against the free press were tyrannical shots across the bow, overtly threatening any and all whistleblowers and journalists who dared exposing Obama’s crimes. The just released CIA documents prove beyond all question or doubt that all modern vehicles driven today can easily be electronically hacked and remote controlled for sinister murderous purposes, leaving virtually no evidence of a crime ever committed.

No doubt to head off the usual disinfo shills and left-leaning morons at the pass from issuing yet more groundless, mindless “the Russians did it” accusations, WikiLeaks specified that a whistleblowing insider from within the CIA leaked the latest documents. WikiLeaks also stated that the CIA is no longer in control of its own hacking arsenal, as the huge “archive appears to have been circulating among former US government hackers and contractors in an unauthorized manner,” one of them handing a portion over to WikiLeaks.

But rather than immediately launch an investigation on the crimes committed by the CIA’s illegal spying on every American, the culprits themselves – the CIA and FBI – are reflexively announcing that they will begin a criminal probe into the WikiLeaks dump in order to go after and punish the whistleblowing messenger and not the real criminals, similar to chomping at the bit to fry Snowden for bravely doing America the invaluable service of alerting citizens of deep state’s unconstitutional crimes and gross wrongdoing.

Let’s look at another response from an important government insider. Vice chair of the Senate Select Committee on Intelligence Diane Feinstein whose very job function is to exercise much needed oversight over deep state America, feebly muttered on CNN the obvious “duh” response – “maybe there should be more” congressional oversight limiting the CIA spying on Americans.

Essentially she’s admitting her own incompetence at failing to reel in the CIA’s long known, abusively out of control power. But with the CIA in actuality the ruling elite’s private army and Congress its public servant puppets, the bottom line is Congress only allows, promotes and protects crime cabal tyranny and abuse in this classic “fox guarding the henhouse” case. And so is that CIA/FBI probe.

As an integral part of the treasonous cabal, senators like Feinstein are the last persons to expect to act in the genuine best interests of American citizens. Recall three years ago her going through a similarly disingenuous, feeble motion when reacting to illegal CIA torture propagated by the Cheney-Bush administration and then only seamlessly continued under Obama and her “oversight” watch. Feinstein epitomizes the lackey, impotently dishonest role of Congress never really standing up for human rights of anyone on the planet in this age of over-the-top oppression. Instead, she expressed her hypocritical outrage toward her previously coddled CIA only after learning the CIA was secretly monitoring her private communications as well.

Additionally, this latest batch of documents providing indisputable proof that deep state America’s gone awry, renders the Democrats’ nonstop mantra that “the Russians did it” a complete farce, since the CIA has developed the devious means to pull off false flag cyberattacks that can then be conveniently blamed on designated enemies like Putin. Because the Central Intelligence Agency stole malware from other countries, CIA malware under the codename Weeping Angel absolves the Criminals In Action of all guilt, leaving no fingerprints behind, thus delivering false evidence then used to deceitfully charge foreign nations of cyberwarfare crimes and deceptively justify war against any targeted opponent.

And with virtually every war in American history the result of a false flag, and more false flags being perpetrated by the CIA and FBI now than ever before, at some point in the relative near future, you can bet that the US government will claim a false flag scenario, one probable example being an enemy launching a devastating cyberattack against the US banking industry, posing a serious breach to our national security. Suddenly a banker’s holiday is declared and you cannot withdraw cash from your local ATM or for that matter even pump gas into your car. Deep state headed by Homeland Security has been quietly drumming up and prepping for this type of false flag operation for well over a decade.

And as US deep state’s egregious crimes against humanity have never been more exposed than right now, the increasing likelihood of this kind of manufactured crisis and national emergency to occur sooner than later at the behest of demonic planetary controllers, growing desperate to hang onto their centralized power and control, is more imminent now than ever. But armed with truth, an empowered world citizenry can ultimately hold the evildoers accountable. The global masses must awaken and begin rejecting the lies and start thinking for themselves, and for their own survival, actively opposing the deep state’s matrix.

Constitutional attorney John Whitehead expressed his sobering yet truthful conclusion regarding our stolen liberties:

Not only do we no longer have dominion over our bodies, our families, our property and our lives, but the government continues to chip away at what few rights we still have to speak freely and think for ourselves. If the government can control speech, it can control thought and, in turn, it can control the minds of the citizenry.

It’s time to seek, speak and share the truth. Before all our freedoms are permanently lost, including all access to the truth (i.e., Facebook just began flagging “disputed” fake news), and humanity is victimized by the brutal killing force of globalized genocide, shake off the shackles of enslavement and destructive doom and let your voice and conviction be counted, heard and demonstrated through nonviolent civil disobedient action.

Posted in USA, C.I.A0 Comments

Wikileaks Reveals: CIA’s UMBRAGE Allows Agency to Carry out ‘False Flag’ Cyber Attacks


A new release of CIA documents by Wikileaks indicates that the intelligence agency has the means and the intent to mask the cyber-attacks it commits by making them seem as if they originated from a foreign power.

Earlier today, Wikileaks once again made headlines following its release of the “largest ever publication of U.S. Central Intelligence Agency (CIA) documents.” The massive release – just the first batch in a trove of documents code-named “Vault 7” by Wikileaks – details the CIA’s global covert hacking program and its arsenal of weaponized exploits.

While most coverage thus far has focused on the CIA’s ability to infiltrate and hack smartphones, smart TVs and several encrypted messaging applications, another crucial aspect of this latest leak has been skimmed over – one with potentially far-reaching geopolitical implications.

According to a Wikileaks press release, the 8,761 newly published files came from the CIA’s Center for Cyber Intelligence (CCI) in Langley, Virginia. The release says that the UMBRAGE group, a subdivision of the center’s Remote Development Branch (RDB), has been collecting and maintaining a “substantial library of attack techniques ‘stolen’ from malware produced in other states, including the Russian Federation.”

As Wikileaks notes, the UMBRAGE group and its related projects allow the CIA to misdirect the attribution of cyber attacks by “leaving behind the ‘fingerprints’ of the very groups that the attack techniques were stolen from.”

In other words, the CIA’s sophisticated hacking tools all have a “signature” marking them as originating from the agency. In order to avoid arousing suspicion as to the true extent of its covert cyber operations, the CIA has employed UMBRAGE’s techniques in order to create signatures that allow multiple attacks to be attributed to various entities – instead of the real point of origin at the CIA – while also increasing its total number of attack types.

Other parts of the release similarly focus on avoiding the attribution of cyberattacks or malware infestations to the CIA during forensic reviews of such attacks. In a document titled Development Tradecraft DOs and DON’Ts,” hackers and code writers are warned “DO NOT leave data in a binary file that demonstrates CIA, U.S. [government] or its witting partner companies’ involvement in the creation or use of the binary/tool.” It then states that “attribution of binary/tool/etc. by an adversary can cause irreversible impacts to past, present and future U.S. [government] operations and equities.”

While a major motivating factor in the CIA’s use of UMBRAGE is to cover its tracks, events over the past few months suggest that UMBRAGE may have been used for other, more nefarious purposes. After the outcome of the 2016 U.S. presidential election shocked many within the U.S. political establishment and corporate-owned media, the CIA emerged claiming that Russia mounted a “covert intelligence operation” to help Donald Trump edge out his rival Hillary Clinton.

Prior to the election, Clinton’s campaign had also accused Russia of being behind the leak of John Podesta’s emails, as well as the emails of employees of the Democratic National Committee (DNC).

Last December, Director of National Intelligence James Clapper – a man known for lying under oath about NSA surveillance – briefed senators in a closed-door meeting where he described findings on Russian government “hacks and other interference” in the election.

Following the meeting, Rep. Adam Schiff (D-CA), a ranking member of the House Intelligence Committee,remarked: “After many briefings by our intelligence community, it is clear to me that the Russians hacked our democratic institutions and sought to interfere in our elections and sow discord.”

Incidentally, the U.S. intelligence community’s assertions that Russia used cyber-attacks to interfere with the election overshadowed reports that the U.S. government had actually been responsible for several hacking attempts that targeted state election systems. For instance, the state of Georgia reported numerous hacking attempts on its election agencies’ networks, nearly all of which were traced back to the U.S. Department of Homeland Security.

Now that the CIA has been shown to not only have the capability but also the express intention of replacing the “fingerprint” of cyber-attacks it conducts with those of another state actor, the CIA’s alleged evidence that Russia hacked the U.S. election – or anything else for that matter – is immediately suspect. There is no longer any way to determine if the CIA’s proof of Russian hacks on U.S. infrastructure is legitimate, as it could very well be a “false flag” attack.

Given that accusations of Russian government cyber-attacks also coincide with a historic low in diplomatic relations between Russia and the U.S., the CIA’s long history of using covert means to justify hostile actions against foreign powers – typically in the name of national security – once again seems to be in play.

Posted in USA, C.I.A0 Comments

CIA Leak Shows We’re “Sliding Down the Slippery Slope Toward Totalitarianism, Where Private Lives Do Not Exist”: Dennis Kucinich


16-year congressman Dennis Kucinich writes:

That the CIA has reached into the lives of all Americans through its wholesale gathering of the nation’s “haystack” of information has already been reported.

It is bad enough that the government spies on its own people. It is equally bad that the CIA, through its incompetence, has opened the cyberdoor to anyone with the technological skills and connections to spy on anyone else.

The constant erosion of privacy at the hands of the government and corporations has annihilated the concept of a “right to privacy,” which is embedded in the rationale of the First, Third, Fourth, Ninth and Fourteenth Amendments to the U.S. Constitution.

It is becoming increasingly clear that we are sliding down the slippery slope toward totalitarianism, where private lives do not exist.

We have entered a condition of constitutional crisis that requires a full-throated response from the American people.

Before you label Kucinich as being overly-dramatic, you may want to note that  Bill Binney – the high-level NSA executive who created the agency’s mass surveillance program for digital information, the 36-year NSA veteran widely who was the senior technical director within the agency and managed thousands of NSA employees – told Washington’s Blog that America has already become a police state.

And Thomas Drake – one of the top NSA executives, and Senior Change Leader within the NSA – told us the same thing.

And Kirk Wiebe – a 32-year NSA veteran who received the Director CIA’s Meritorious Unit Award and the NSA’s Meritorious Civilian Service Award – agrees (tweet via Jesselyn Radack, attorney for many national security whistleblowers, herself a Department of Justice whistleblower):

: we are no longer afraid of the police state happening. It’s here. In small ways and big ways. @xposefacts

It’s not just NSA officials …  Two former U.S. Supreme Court Justices have warned that America is sliding into tyranny.   A former U.S. President, and many other high-level American officials agree.

Posted in C.I.A0 Comments

WikiLeaks, “Year Zero” and the CIA Hacking Files


It is now up to the device and OS manufacturers, like Apple, Google, or Samsung, to fix their volcanoes back into mountains. -Telegram Statement, Mar 8, 2017

The paradox with information releases that expose a supposedly grand internal stratagem is that they merely provide the food of confirmation otherwise lacking.  Such food is potent.  It blows the lid off the suggestion that a conspiracy theorist was merely a Cassandra in the wilderness chewing fingernails in fear that something hideous was afoot. It provides nutrients for those seeking greater scrutiny over the way state security, otherwise deemed the domain of closeted experts, is policed.

The entire profession (for it has now become one) of mass disclosures of secret or classified documentation has reached a point where its normality can hardly be questioned.  Be it the juicy revelations of Edward Snowden in 2013, the work of WikiLeaks in this decade and the last, and the Panama Papers, whistleblowing, still punished and frowned upon, remains indispensable to the conversation about transparency and the inner operations of the Dark State and its accessories.

That Dark State was given a further lighting up on Tuesday with the release, by WikiLeaks, of its CIA Vault 7 and Year Zero series that has caused the usual flutter in the intelligence community and governments.

These comprise the machinery of hacking and cyber war tactics, an overview of methods that suggest, according to WikiLeaks, a loss of control by the agency over a good deal of its hacking arsenal (“malware, viruses, Trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation”).[1]

The releases reveal aspects of the internal functions of the organisation, including the works of its Engineering Development Group (EDG), dedicated to the development of software within the Center for Cyber Intelligence.

As WikiLeaks revealed, the sophisticated nature of surveillance is now such as to draw comparisons with George Orwell’s 1984 “but ‘Weeping Angel’, developed by the Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.”[2]Samsung has figured prominently in such attacks jointly conducted with Britain’s MI5/BTSS.

Even of more concern is that such methods, similar to the hoovering techniques of trawler surveillance, tend to hamper, rather than sharpen, discrimination regarding targets of value. Malware, in making its way into a range of devices (iPhones, Android, smart TVs), lingers like an innocuous, odourless smell.

This makes suggestions of ‘targeted’ surveillance, or surveillance against countries other than those of the Five Eyes, absurd. (Vide the opinions of Australia’s insipid Christopher Pyne, who assumes with school boy innocence that Washington would never have an interest in spying on Australian subjects.)

Controls over the nature of who receives or uses such devices or operating systems are less relevant than the nature of the devices, adjusted and cooked to the right level of surveillance. So called “smart” devices are hardly discerning in that regard.

The releases have also seen a rapid scramble on the part of app companies to claim that the Vault and Zero Year coverage by WikiLeaks reveals a crude reality: you simply cannot rely on the security of your messaging format.

“To put ‘Year Zero’ into familiar terms,” the statement from Telegram instructs with confidence piercing clarity, “imagine a castle on a mountainside.  That castle is a secure messaging app. The device and its OS are the mountain.  Your castle can be strong, but if the mountain below is an active volcano, there’s little your engineers can do.”[3]

The statement by Telegram goes on to charmingly remind users that it would not matter “which messenger you use. No app can stop your keyboard from knowing what keys you press.  The focus, then, is on “devices and operating systems like iOS and Android” not on the level of apps.  “For this reason,” the app company insists, “naming any particular app in this context is misleading.”

What is not misleading is the effect of such surveillance, the insecurity it inflicts on customers, and the rampant breach of privacy. The intelligence agencies find themselves running out of breath, bloated and spread.  Their outsourcing of services through less secure channels – namely contractors – has also unleased a demon they can barely control.

Defenders of such methods spring back into a default mode that assumes WikiLeaks has done something terrible, emboldening enemies of the United States as defender of the now poorly described “free world”.  Pundits and former members of the security coven fear that the disclosure of the CIA playbook on this is somehow tantamount to giving away the family silver to a suicide bomber in search of martyrdom.   The pertinent question here, surely, is defending that world from within as a matter of course.

Even the most dyed-in-the-wool establishment type has to concede that the intelligence community, puffing and out of breath, is there for the trimming, a vigorous pruning that just might ensure its reinvigoration and relevance.

The CIA is a beast in maturation, adjusting, and flexing its muscles in accordance with circumstance.  It is to be watched, accordingly cleaned and overseen by diligent groundsmen and women.  Sadly, the members of Congress are not necessarily the most able, or willing, to do that watching.  An external impetus, miraculously supplied, might well do the trick.





Posted in USA, C.I.A0 Comments

The WikiLeaks Revelations and the Crimes of US Imperialism


With increasing frequency, aggressive foreign policy moves by Washington have been palmed off by the media and political establishment as defensive responses to “hacking” and “cyber-espionage” by US imperialism’s geopolitical adversaries: Russia and China.

For months, news programs have been dominated by hysterical allegations that Russia “hacked” the Democratic National Committee in order to subvert the 2016 election. As the print and broadcast media were engaged in feverish denunciations of Russia, the US and its NATO allies moved thousands of troops and hundreds of tanks to the Russian border.

Not content to allege interference only in the American election, the US media and its international surrogates have alleged Russian meddling in elections in France, Germany and other far-flung countries. Prior to the current furor over Russian “hacking” of the election, the Obama administration used allegations of “hacking” and “intellectual property theft” to justify the trade sanctions and military escalation against China that accompanied its “pivot to Asia.”

Whenever the State Department, the CIA or unnamed “intelligence officials” proclaim another alleged “cyber” provocation by Washington’s geopolitical rivals, news anchors breathlessly regurgitate the allegations as fact, accompanying them with potted infographics and footage of masked men in darkened rooms aggressively typing away at computer keyboards.

But the official narrative of a benevolent and well-intentioned US government coming under attack from hordes of Russian and Chinese hackers, spies and “internet trolls” was upended Tuesday with the publication by WikiLeaks of some 9,000 documents showing the methods used by the Central Intelligence Agency to carry out criminal cyber-espionage, exploitation, hacking and disinformation operations all over the world.

The documents reveal that the CIA possesses the ability to exploit and control any internet-connected device, including mobile phones and “smart” televisions. These tools, employed by an army of 5,000 CIA hackers, give the agency the means to spy on virtually anyone, whether inside or outside the United States, including foreign governments, “friend” and foe alike, as well as international organizations such as the United Nations.

The WikiLeaks documents expose the United States as the world’s greatest “rogue state” and “cyber criminal.” The monstrous US espionage network, paid for with hundreds of billions in tax dollars, uses diplomatic posts to hide its activities from its “allies,” spies on world leaders, organizes kidnappings and assassinations and aims to influence or overturn elections all over the world.

On Tuesday, former CIA director Michael Hayden replied to the revelations by boasting, “But there are people out there that you want us to spy on. You want us to have the ability to actually turn on that listening device inside the TV to learn that person’s intentions.”

One can only imagine the howls of indignation such statements would evoke in the American press if they were uttered by a former Russian spymaster. In his comments, Hayden barely attempts to cover up the fact that the United States runs a spying and political disruption operation the likes of which Russian President Vladimir Putin or Chinese President Xi Jinping could only dream of.

The WikiLeaks documents show that the United States seeks to cover up its illicit operations by planting false flags indicating that its geopolitical adversaries, including Russia and China, bear responsibility for its crimes.

Cybersecurity expert Robert Graham noted in a blog post, for example, that

“one anti-virus researcher has told me that a virus they once suspected came from the Russians or Chinese can now be attributed to the CIA, as it matches the description perfectly to something in the leak.”

The revelations have already begun to reverberate around the world. German Foreign Ministry spokesman Sebastian Fischer said Wednesday that Berlin was taking the revelations “very seriously,” adding, “issues of this kind emerge again and again.” Meanwhile Germany’s chief prosecutor has announced an investigation into the contents of the documents, with a spokesperson telling Reuters,

“We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators…We’re looking at it very carefully.”

The documents expose the CIA’s use of the US consulate in Frankfurt, Germany as a base for its spying and cyber operations throughout Europe, employing a network of intelligence personnel including CIA agents, NSA spies, military secret service personnel and US Department of Homeland Security employees. Many of these operatives were provided with cover identities and diplomatic passports in order to hide their operations from the German and European governments.

Wednesday’s rebuke by the German government followed the revelations in 2013 by Edward Snowden that “unknown members of the US intelligence services spied on the mobile phone of Chancellor Angela Merkel,” as Germany’s top prosecutor put it in 2015.

The US media, true to its function as a propaganda arm of the CIA and other intelligence agencies, immediately sprang into action to minimize the significance of the revelations and to accuse Russia, entirely without substantiation, of having released the documents in an effort to subvert US interests.

NPR quoted favorably the statements of Hayden, who declared, “I can tell you that these tools would not be used against an American,” while the Washington Post quoted a bevy of security experts who said there is nothing to worry about in the documents. It favorably cited one such “expert,” Jan Dawson, who declared, “For the vast majority of us, this does not apply to us at all … There’s no need to worry for any normal law-abiding citizen.”

Such absurd statements, made about a security apparatus that was proven by Snowden’s revelations to have spied on the private communications of millions of Americans, and then lied about it to the public and Congress, were taken as good coin by the US media.

Just one day after the WikiLeaks revelations, the media spin machine was already busy portraying them as part of a Russian conspiracy against the United States, and indicting WikiLeaks for acting as an agent of foreign powers. “Could Russia have hacked the CIA?” asked NBC’s evening news program on Wednesday, while another segment was titled “Could there be a [Russian] mole inside the CIA?”

The types of spying and disruption mechanisms revealed in the documents constitute a key instrument US foreign policy, which works to subvert the democratic rights of people all over the planet in the interest of US imperialism. No methods, whether spying, hacking, blackmail, murder, torture, or, when need be, bombings and invasion, are off the table.

Posted in USA, C.I.A0 Comments

Forty years ago, the CIA had its eye on Jamaica—and Bob Marley got shot


Two nights before a much awaited national show, two carloads of armed men drove into Marley’s Hope Road yard and shot up the place. Whether the CIA was connected to the attack is unclear. But Marley was stirring up the populace with lyrics of resistance and revolution, inciting the people to think breaking from “the system” was a good idea.

Forty years ago, on Dec. 3, 1976, Bob Marley was shot in a gangland assassination attempt in the heat of a contentious Jamaican election campaign pitting the United States’ favorite (Edward Seaga) against the incumbent prime minister (Michael Manley). The shooting in Marley’s Kingston home—which also wounded his wife, Rita, and at least two others—occurred 12 days before the scheduled elections and two days before a free concert Marley had agreed to play in hopes of bringing the people together and cooling the violence that had been occurring.

The events surrounding the “Smile Jamaica” concert make it one of the 20th century’s key moments in developing countries of the Third World. There are indications that the United States was running a destabilization program against the democratic socialist administration of Michael Manley—Manley writes about it and former CIA case officers Philip Agee and John Stockwell have said explicitly that such a program existed. Agee even named the CIA case officers stationed in the U.S. Embassy in Kingston. (My novel “Stir It Up” comprehensively summarizes in narrative form the evidence for the destabilization program, including typical CIA methods described by Agee.)

Cuba, the United States’ archenemy in the Western Hemisphere, had been invaded with U.S. backing and subjected to a crippling embargo that would continue to the present moment. Now here was Manley buddying up to Fidel Castro and implementing socialist programs that were benefiting the Jamaican people rather than American companies and investors—interests to which Manley’s challenger, the Harvard-educated Seaga, was more favorably disposed.

A destabilization program, in the immortal words of Richard Nixon, who was directing CIA efforts (via Henry Kissinger) to undermine Salvador Allende in Chile, is intended to “make the economy scream” so the people will suffer and rise up to vote, or otherwise boot out, the culprit—such as an Allende or a Manley. It’s not a Nobel Peace Prize-worthy endeavor, and if it doesn’t work, more serious action might be considered, such as assassination or military invasion (see the Agee hyperlink).

For various reasons in Jamaica—including poverty and political cronyism after four centuries of colonial rule—street gangs became affiliated with the two major political parties: Manley’s Peoples National Party (PNP) and Seaga’s Jamaica Labor Party (JLP). To call the gang lords unofficial enforcers for the parties would not be much of a stretch. As the 1976 elections neared, the rivalry between PNP and JLP toughs escalated. The streets and tenement yards of Kingston ran red with blood, causing international airlines to cancel flights to the island.

Bob Marley and the Wailers were riding the crest of international fame on the strength of the “Rastaman Vibration” album and tour. Rolling Stone named the group the band of the year, and Time called Marley “a political force to rival the government.” The former barefoot country boy and big-city “rudeboy” had become a populist champion of human rights and an international symbol of struggle against the lingering structures of colonialism. His growing fame put him in danger. The gang lords on both sides desperately wanted him as their own.

‘Smile Jamaica’ and the assassination attempt on Bob Marley

It was of utmost importance to Marley that “Smile Jamaica” be seen as a symbol of unification rather than an attempt to stump for Manley. A date and venue were chosen: Dec. 5, 1976, in Kingston’s National Heroes Park. Manley called the national elections for 10 days later, and Marley’s neutrality was cast into serious doubt.

On Dec. 3, two nights before “Smile Jamaica,” two carloads of armed men drove into Marley’s Hope Road yard and shot up the place. The wounded Marley was evacuated to Island Records magnate Chris Blackwell’s estate in the hills, protected by police guard and machete-wielding Rastas. Marley pondered the wisdom of playing “Smile Jamaica” in a nighttime, open-skies venue with the shooters still at large.

Whether the CIA was connected to the attack is unclear. But Marley was stirring up the populace with lyrics of resistance and revolution, inciting the people to think breaking from “the system” was a good idea. Marley was too much aware not to understand this—as he sang, “Rasta don’t work for no CIA” in “Rat Race.”

Marley decided to play. Political violence was tearing the country apart, and he dearly wanted to send a message of unity to the population. Although he did not relish the idea of going onstage with a figurative bull’s-eye on his back, Marley would trust his fate to Jah and carry forth with his mission, gang lords and the CIA notwithstanding.

As darkness fell Dec. 5, Marley was driven down from the hills to Heroes Park at breakneck speed under police escort. The rest of the band straggled in from their hideouts, Rita Marley arriving in her hospital gown, her head wound hidden beneath her Rasta cap. Eighty thousand people had waited for hours in hopes that Marley would play, and here he was, wading through the crowd, greeting the prime minister—Manley also risked his life by showing up—and being boosted up onstage. Marley couldn’t play his guitar, because a bullet had nicked his chest and lodged in his left forearm, where it would remain the rest of his life. But by all reports, he and the Wailers put on a phenomenal show.

In the morning Marley fled into exile, staying in the Bahamas briefly before going on to London, where he worked on the “Exodus” album, which would be chosen by Time as the greatest album of the 20th century.

Meanwhile, Manley was re-elected. The glow of humanity Marley sparked with “Smile Jamaica” was short-lived, however, and the blood feud in the streets soon resumed. In 1978, again in the hope of promoting unity, the “One Love Peace Concert” was held, for which Marley returned from London to play. Marley even dragged Manley and Seaga up onstage and literally made them clasp hands.

As the 1980 elections approached—a rematch between Manley and Seaga—violence rose to truly appalling levels. Manley’s programs had been doggedly undermined by U.S. and CIA machinations, and some feared that under the looming shadow of Ronald Reagan’s election another Manley term would bring even harsher treatment, possibly military invasion. Seaga won in a bigger landslide than Manley had enjoyed four years earlier.

Adhering to his U.S.-approved neoliberal leanings, Seaga went the route of borrowing heavily from the World Bank and international lending institutions. Soon, Jamaica was buried under a mountain of debt from which it has never recovered.

The wisdom of Bob Marley

For an understanding of the U.S.-dominated world system, we gain far more insight from Bob Marley than from the entirety of the mainstream media, with its jingoistic cheering of American interventions overseas and uncritical swallowing of the approved U.S. version of events. Marley knew the system was a vampire “sucking the blood of the children” (“Babylon System”). He lived it every day of his life.

It was a system that forced “lifelong insecurity” (“Survival / Black Survivor”) in which the “big fish” ate the small fish in order to “materialize their every wish” (“Guiltiness”).

It was a system that resorted to “divide and rule” (“Zimbabwe”) and tactics like “bribing with their guns, spare parts and money” (“Ambush in the Night”).

A system run not by renegades and rogues, but the best and brightest the West could offer: “graduating thieves and murderers” (“Babylon System”).

A system in which, Marley knew, Jamaicans and black people in general were not invited to the party: “They don’t want to see us live together/ all they want us to do is keep on killing one another” (“Top Ranking”).

A system in which what was in plain view would be rationalized away: “Everyone sees what’s taking place/ another page in history” (“Trench Town”).

Marley, Pinter, Chomsky and Bernie Sanders

It’s stunning to see the overlap and parallel between Marley’s lyrics and the commentary of two major 20th century thinkers, Harold Pinter and Noam Chomsky. As Pinter articulated in his acceptance speech for the 2005 Nobel Prize in Literature:

“The United States supported and in many cases engendered every right-wing military dictatorship in the world after the end of the Second World War. I refer to Indonesia, Greece, Uruguay, Brazil, Paraguay, Haiti, Turkey, the Philippines, Guatemala, El Salvador, and, of course, Chile. The horror the United States inflicted upon Chile in 1973 can never be purged and can never be forgiven.

“Hundreds of thousands of deaths took place throughout these countries. Did they take place? And are they in all cases attributable to U.S. foreign policy? The answer is, yes, they did take place, and they are attributable to American foreign policy. But you wouldn’t know it.

“It never happened. Nothing ever happened. Even while it was happening, it wasn’t happening. It didn’t matter. It was of no interest. The crimes of the United States have been systematic, constant, vicious, remorseless, but very few people have actually talked about them. You have to hand it to America. It has exercised a quite clinical manipulation of power worldwide while masquerading as a force for universal good. It’s a brilliant, even witty, highly successful act of hypnosis.”

With his vast erudition, Chomsky confirms what Marley divined through firsthand experience: The world system is set up so that the few rich may profit from the many poor, both domestically and internationally, and great suffering will be exacted to keep things that way.

The evils Marley struggled against remain crucially important issues in the lives of hundreds of millions around the world—evils typically decried only on the periphery, by independent media not beholden to corporate funding.

Neither candidate in the 2016 U.S. presidential election showed the slightest inkling that the United States ought to own up to its blood-drenched foreign policy, beyond those peccadilloes conveniently attributable to the other party. Hillary Clinton waxed glowingly about an American exceptionalism that has done nothing but good around the world. Donald Trump wants to lock the gates and go back to the good old days before all this civil rights and multiculturalism hullabaloo.

Marley’s One Love vibe calling for the unity of all peoples of good faith was far more inclusive than anything American politics have brought forth. It has always been too easy to write Marley off as a ganja-smoking Caribbean radical and ignore his message—a similar fate meted out to the marginalized and dismissed Chomsky (and Pinter’s scorching comments). Much the same might be said about Bernie Sanders, whose questioning of such sacrosanct matters as United States support for Israel’s treatment of the Palestinians was widely hammered down in the mainstream.

But for those with the will to look, the system is there to see. As the “Sanders Revolution” shows, the clamoring of the people for real democracy and change is growing strong. The system, for so long hidden behind a thick cloud of jingoism and propaganda, is emerging. In these dismal times, this is cause for hope and fighting on.

Posted in C.I.AComments Off on Forty years ago, the CIA had its eye on Jamaica—and Bob Marley got shot

Shoah’s pages


March 2017
« Feb