Archive for the ‘Lavon Affair’ Category

Truth Under Tyranny – Catastrophe of Ethics

WHAT “WAR ON TERROR”?

Israel Butchering Peace Activists in International Waters

Headline from the English language version of the Russian report on the latest act of Israeli state terrorism in attacking the vessels carrying relief supplies to Gaza. In a typically courageous and principled stand, a spokesperson for the European Union nations who will doubtless blather impotently and do nothing lamented, “We strongly urge that all involved act with a sense of restraint and responsibility and work for a constructive resolution.” Imagine the reaction if Iran had perpetrated anything comparable.

The United States has been turning itself into a police state and leading its stooge Western governments into unprovoked aggression and invasions in the name of waging a “war on terror.” Well, here is open, undisguised terror being conducted against victims who were not even armed, with the contempt for international law and all the principles of civlized behaviour that the world is coming to accept as normal. So where is the “war”? Why isn’t Israel being bombed, and invaded, and all diplomatic relations severed?

It’s not as if it were the first time. The state was founded by terror on stolen lands and has existed ever since through terrorism backed by limitless U.S. political, military, and financial support. Those for whom this is news might try searches on “Goldstone Report,” the “Lavon affair” (1954), the U.S.S. Liberty (1967), “Sabra and Shatila” (1982), “Qana” (1996), “Jenin” (2002), not to mention the Gaza invasion of 2009, for examples.

Yet we are told that Iran, which has never attacked anyone in over 100 years, is the threat, as the world is being geared up for another attack on a small country with virtually a repeat of the same lies that were told about Iraq. Warnings are rife that at any time now another “incident” can be expected somewhere in the U.S., with Iran being blamed as the instigator (I was skeptical of the official 9/11 story on the day it happened, and I still am), which will provide all the justification needed. A moment’s thought makes it obvious that Iran has nothing to gain from such an act, and everything to lose. The only ones who stand to gain are those who seek its destruction. After all, false flag operations are hardly new in the course of history as a means for supplying demagogues and governments the pretexts for enacting policies they have already decided.

It seems to me that it would probably be better for the stability of the region if Iran did acquire nuclear weapons. Few situations could surely be worse than the present nuclear arsenal monopolized in such fanatical and dangerous hands.

MANYWORLDS ORDERING PAGE REINSTATED Posted on January 20, 2010 The “ManyWorlds” page is finally up again for mail or electronic ordering of JPH titles direct from the site. To browse what’s available, go to “Bookstore” from the menu bar at the side of the page, select “JPH Titles,” and click on any edition showing a ManyWorlds link. Or go directly to the page by clicking here. Some interesting additions expected during the months ahead.

NEW NOVEL COMPLETED Posted on August 25, 2009 After some delay this year, caused mainly by my taking advantage of a comparatively dry summer to catch up on all the outside work that had backed up through the ghastly wet winter, The Migration is finally finished and scheduled by Baen Books as a hardback release for next May. A generation ship departs from a curiously pluralistic post-calamity world to found a new, idealistic culture elsewhere, and a former traveling illusionist becomes the key player in finding a lost robot that has discovered religion. Further information here, including background and sample excerpts.

The Migration — After Earth’s first attempt at a technological civilization was destroyed in a global conflict, the new culture that emerges sets out to build a new world elsewhere, where the influences of the old order cannot reach. But human nature has a way of asserting itself wherever humans exist

Moon Flower — A peculiarity of quantum mechanics and strange alien botany give prospects for a better future on Earth.

The Two Worlds — Single-volume reissue of the third and fouth novels in the Giants series.

Echoes of an Alien Sky — Colonists from another world are already making homes on Earth, while scientists and archeologists reconstruct the story of the extinct race that once inhabited it

The Two Moons — Single-volume reissue of the first two novels in the Giants series.

Catastrophes, Chaos & Convolutions — Third collection of short fiction, nonfiction essays, biographical anecdotes, and other oddments.

Kicking The Sacred Cow — A Collection of nonfiction essays questioning scientific issues that I believe have become dogmatized, where institutionalized science rejects or ignores evidence inconvenient to preconceptions and established theory.

Mission to Minerva — Fifth book in the Giants series. Unraveling of the mysterious physics that governs transfer between the alternate realities of the Multiverse enables a mission to be sent back to the time of ancient Minerva in an attempt to alter its history.

Global Warming False Alarm — By Ralph Alexander — The Bad Science Behind the United Nations’ Assertion that Man-made CO2 Causes Global Warming

The Real Global Warming Disaster — By Christopher Booker — Is the Obsession with “Climate Change” Turning Out to Be the Most Costly Scientific Blunder in History?

Heaven and Earth — By Ian Plimer — Global Warming, the Missing Science

Nuclear Energy in the 21st Century — By Ian Hore-Lacy — An authoritative primer on all aspects of nuclear energy and its role in the 21st century

A Case for Nuclear-Generated Electricity — By Scott W. Heaberlin — Why nuclear power is “Cool”

Power to Save the World — By Gwyneth Cravens — Reappraisal of nuclear energy by a former antinuclear activist

Terrestrial Energy — By William Tucker — How Nuclear Energy Will Lead the Green Revolution and End America’s Energy Odyssey

The Body Electric — By Robert O. Becker & Gary Selden — Electromagnetism and the foundation of life

One Of The Perils Of Life On The Farm

Issue 56 January 12, 2010 — Bookstore, Bulletin Board, Heretics Catalog, New Projects

Issue 55 September 21, 2009 — Nuclear energy article in Lew Rockwell Column

Issue 54 August 31, 2009 — New Novel Completed, On The Road and in the Air, Unearthing the Hoover Dam

Issue 53 March 16, 2009 — Web Site, Giants Series Movie?, Mind Matters, U.S. Convention Attendances, Current Novel, Bulletin Board, Heretics Books, Mad Goat Attack

See the article here:

Truth Under Tyranny – Catastrophe of Ethics

Fair Usage Law

February 8, 2017   Posted in: Lavon Affair  Comments Closed

Carrie Fisher Regrets Revealing Harrison Ford Affair: It …

Carrie Fisher Regrets Revealing Harrison Ford Affair: It Was a Mistake (Video)

By now, we all know that Carrie Fisher and Harrison Ford had an affair on the set of Star Wars. How? Well, the woman who played Princess Leia wrote all about it in her new memoir, The Princess Diarist.

The cleverly titled book is a compilation of her journal entries from her days filming the 1977 film. And some of those clearly got quite steamy.

I would probably get early-onset Alzheimers and forget, and then youd never know, Fisher told Stephen Colbert Tuesday on why she revealed the tryst 40 years later. No, I found the diaries, and I decided to publish them, and it was a mistake.

Also Read: Stephen Colbert to Return as Host for 39th Kennedy Center Honors

It was a mistake, really? Colbert asked.

No, but it is too big of a story, kind of, that I cant handle, the actress said.

Can you not handle it or can Harrison Ford not handle it? her Late Show host asked.

Im sure he cant handle it at all, she replied, head in hand.

Also Read: New ‘Rogue One’ TV Spot Is a ‘Dream’ for ‘Star Wars’ Fans (Video)

The duo and Fishers dog, Gary then got into the nitty-gritty of the relationship.

Theres a lot of sexual details, Fisher promised. The ion cannon will fire several blasts.

Watch the video above.

Read original story Carrie Fisher Regrets Revealing Harrison Ford Affair: It Was a Mistake (Video) At TheWrap

View original post here:

Carrie Fisher Regrets Revealing Harrison Ford Affair: It …

Fair Usage Law

December 25, 2016   Posted in: Lavon Affair  Comments Closed

NWO World Map | Illuminati Rex

NWO World Map includes details of over 70 conspiracies that are leading the us towards a New World Order 33X23 NWO poster FREE Download

POSTER 33 X 23 (85 X 60CM)

OVER 70 CONSPIRACIES LEADING THE WORLD TOWARDS A NWO

The City

The Square Mile or the City of London, is a small area within Greater London. The City has been the nucleus of the worlds financial elite and their agents for several centuries.

Washington, DC

The military arm of the New World Order. Ensures that corporate rights are maintained and expanded around the world. To be replaced by a UN One World Army.

Vatican

The Catholic Church has wielded power for over a millennium and remains an important center of religion and spirituality.

MK-ULTRA, 1957-64 Mad Science Canada Dr. Donald Cameron conducts experiments for the CIAs Project MK-ULTRA at McGill University. Drugs (including LSD) are used to research mind control. In 1973, CIA director Richard Helms orders the destruction of all related files.

Monsanto vs. Schmeiser, 2004 Corporation Canada Monsanto sues farmer for patent infringement after genetically modified seeds accidently contaminate his fields. The Supreme Court of Canada upholds the decision.

Attack on Pearl Harbor, 1941 Casus Belli Pearl Harbor, HI Despite warnings of an attack on Pearl Harbor, FDR keeps Pacific Fleet commanders in the dark. The attack gives the US a pretext to enter WWII.

Ruby Ridge, 1992 Police State Ruby Ridge, ID ATF agents trump-up charges against Randy Weaver after he refuses to act as an informant. US Marshals armed with M16 rifles fire on Weavers family, shooting his young son in the back. FBI sniper team shoots his wife and their 10-month old baby.

9/11 Attacks, 2001 Casus Belli

New York City, NY Two hijacked commercial flights crash into the World Trade Centers Twin Towers causing their complete collapse. Another plane hits the Pentagon and a third crashes in Pennsylvania. Within hours US Defense Secretary is making plans for the invasion of Iraq.

Ludlow Massacre, 1914 Police State

Ludlow, CO Soldiers of the Colorado National Guard open fire on 1,200 strikers at Rockefeller-owned coal mine, Colorado Fuel & Iron Company. Twenty people, including 11 children are killed.

Bohemian Grove, 1872 Secret Society Monte Rio, CA The Bohemian Grove is a 2700-acre enclave in the midst of ancient Redwood trees. Every summer power brokers meet for 3 weeks at The Owl Shrine for informal Lakeside Talks.

United Nations, 1945 One World Government

San Francisco, CA The UN Charter is signed. US, France, UK, Soviet-Union, and Republic of China wield veto power. UN Headquarters built on land donated by the Rockefellers. The UN currently has 192 member nations.

NAFTA, 1992 One World Government

San Antonio, TX US President George HW Bush, Canadian PM Brian Mulroney and Mexican President Carlos Salina de Gortari sign NAFTA. The new trilateral trade bloc brings North America a step closer to a North American Union.

WACO, 1993 Police State Waco, TX Seventy-five agents and three National Guard helicopters attempt to raid the Branch Davidians, a Christian sect. The FBI begins a 51-day siege eventually killing 76 people.

Operation MOCKINGBIRD, 1950s Police State Langley, VA The CIA recruits over 400 journalists from news organizations, including ABC, CBS, NBC, Reuters, Associated Press, Washington Post, New York Times, Newsweek, Time and Life Magazines. The op finances the 1954 animated version of Orwells Animal Farm.

Operation Northwoods, 1962 Casus Belli Arlington, VA The Joint Chiefs of Staff plan for the CIA to conduct a series of hijackings and bombings in U.S. cities on both military and civilian targets. These false-flag terrorist acts would be blamed on a foreign government.

JFK Assassination, 1963 Assassination Dallas, TX President John F. Kennedy is shot dead. Despite evidence suggesting a high-level government conspiracy, Lee Harvey Oswald is declared the lone gunmen.

MLK Assassination, 1968 Assassination Memphis, TN Martin Luther King is shot dead. James Earl Ray is declared a lone nut, ignoring indications of a Mafia hit. Special Forces sniper team is present at the scene as backup for the hit.

RFK Assassination, 1968 Assassination Los Angeles, CA Robert Kennedy, poised to become the next US President, is determined to find his brothers murderers. Bobby is shot dead by lone gunman, Sirhan Sirhan.

GM Criminal Conspiracy, 1949 Corporation Chicago, IL General Motors, Firestone and Standard Oil use a front company, NLC, to secretly buy and destroy more than 100 electric streetcars in 45 cities including New York, Los Angeles and Philadelphia.

Tuskegee Experiment, 1932 1972 Mad Science Tuskegee, AL US Public Health Service conducts experiments on 339 poor African-Americans in advance stages of syphilis. Patients think they are receiving treatment doctors study the effects of not treating the disease.

HAARP, 1993 Mad Science Gakona, AK Pentagon funds the worlds largest array of antennas, aimed upward and capable of heating the ionosphere causing changes in weather patterns. Other such facilities exist throughout the world.

Federal Reserve, 1910 Corporation Jekyll Island, GA Under strict secrecy, seven representatives of Rockefeller and J.P. Morgan banks meet at Morgans Jekyll Island. They plan the creation of a privately owned central bank, the Federal Reserve.

Georgia Guidestones, 1979 One World Government Elbert County, GA Someone using the Rosicrucian-inspired pseudonym R.C. Christian commissions six huge granite slabs inscribed with 10 rules, including the creation of a World Court / global population under 500 million people.

Crack and the CIA, 1986 Drug Trafficking Los Angeles, CA The CIA smuggles cocaine into the US from Central America. Its made into crack for distribution in Los Angeles causing an epidemic. Proceeds support CIA black ops.

Diamond vs. Chakrabarty, 1980 Corporation Washington, DC The US Supreme Court upholds GEs patent for a microorganism created in their labs. Life can be owned.

COINTELPRO, 1956-1971s Police State Washington, DC The FBIs Counter Intelligence Program infiltrates dissident groups within the US. J Edgar Hoover orders agents to expose, disrupt, misdirect, discredit, or otherwise neutralize the groups and its leaders. Agents often incite violence.

The Business Plot, 1933 coup dtat

Washington, DC Major General Butler exposes a plot to overthrow President Franklin D. Roosevelt. Prominent business leaders from DuPont and Morgan Banks are involved.

Trilateral Commission, 1973 Secret Society New York, NY David Rockefeller founds the Trilateral Commission. Includes ruling elite from the US, Europe and Japan. In 1974 they publish The Crisis of Democracy calling for democracy in moderation.

Bretton Woods, 1944 One World Government Bretton Woods, NH The 44 Allied nations meet to plan the post-war world. US exploits position as sole superpower to create the World Bank (WB) and the International Monetary Fund. (IMF)

CIA Operation PBSUCCESS, 1954 Assassination Guatemala After nationalizing unused United Fruit Company land, popularly elected President Jacobo rbenz is assassinated by the CIA. United Fruit rules the banana republic with its monopoly on banana exports and ownership of its communication industry.

Iran Contra Affair, 1980s War Games Nicaragua The US sells weapons via Israel to Iran in exchange for hostages and cash. The CIA uses the proceeds from the sale to fund rebel Contras who seek to overthrow the elected Sandinista government.

Panama Canal Zone, 1903 War Games Panama Two weeks after backing Panamas independence from Columbia, The US signs the Hay-Bunau Varilla Treaty gaining control of the canal and land on each side. The US military doesnt return control of the canal until 1999.

Jonestown Massacre, 1993 Mad Science Guyana Over 900 members of the Peoples Temple allegedly commit mass suicide by drinking cyanide-laced juice. First coroner at the scene, Dr Mootoo, observes 100s of needle puncture marks and numerous gunshot wounds. Only 7 bodies are autopsied.

Assassination of Che Guevara, 1967 Assassination Bolivia CIA leads the search for infamous revolutionary Che Guevara. Two days after his capture Che is executed. CIA man at the scene steals his Rolex. Guevara becomes a symbol of anti-imperialism.

Nazi Ratlines, 1951 War Games Argentina US intelligence and the Catholic Church help Nazis including Klaus Barbie, the Butcher of Lyon, escape to South America. Hundreds of war criminals escape. ODESSA is the most well known ratline.

CIA Project FUBELT, 1973 coup dtat Chile CIA overthrows democratically elected Salvador Allende and installs the military junta of General Pinochet. Telecommunication giant ITT offers CIA $1 million to get rid of Allende. Pinochet rules as dictator until 1990 later escapes trial for war crimes.

Seven Sisters Oil Cartel, 1928 Corporation Scotland Shell Oils Sir Henry Deterding hosts other top oilmen at Achnacarry Castle. The Seven Sisters agree on specific production quotas to set the worlds oil prices. They vow to control outside competition at all cost.

Nazi Gold, 1945 War Games Switzerland Nazis loot gold reserves of Austria, Czechoslovakia, Belgium and the Netherlands. By the end of WWII, the gold disappeared somewhere within the European banking system. In 2005, the World Jewish congress successfully sues Swiss banks.

Potato Famine, 1845-1847 Corporation Ireland The Irish population is reduced by 25% as potato crops fail. Despite widespread hunger, trade agreements take precedence over human life. Ireland continues to export wheat to England.

European Union, 1992 One World Government Netherlands Members of the European Community sign the Maastricht Treaty, creating the European Union. The EU has 27 member states and the Euro () is the worlds second largest reserve currency.

Bilderberg Group, 1954 Secret Society Netherlands At the invitation of Prince Bernhard, the crme of the elite crop meet at the Hotel de Bilderberg near Amsterdam. They discuss the creation of a European Union with its own currency. The Bilderberger meet yearly at locations around the world.

GATT, 1947 One World Government Switzerland Following the Bretton Woods Conference, 23 countries sign the General Agreement on Tariffs and Trade affecting about half the worlds trade. The GATT evolves into todays World Trade Organization. (WTO)

CFR and Chatham House, 1919 Secret Society France At the Paris Peace Conference, powerful members of the elite attend a private gathering at the Majestic Hotel. Round Table member Lionel Curtis suggests the creation a Royal Institute for International Affair in London and the Council of Foreign Relations, its US counterpart in New York.

Operation PAPERCLIP, 1945 War Games Germany The CIAs ancestor, the Office of Strategic Service (OSS) secretly recruits German Nazi scientists. President forbids Nazi recruitment, OSS agents denazify ineligible recruits, wiping their records of connections to the Nazis.

P2 Masonic Lodge, 1982 Secret Society Italy A day after the collapse of Vatican majority-owned Banco Ambrosiano, Gods banker, Roberto Calvi is found hanging under Londons Black Friars Bridge with $15,000 cash in his pockets. Calvi is a brother of the Mafia dominated P2 Masonic lodge.

Operation Gladio, 1940s- 1990s War Games Italy (and many other NATO/neutral countries) Following the end of WWII the US and the UK establish networks of stay behind troops to fight any communist takeover. In Italy, Gladio operatives are involved in domestic terrorism linked to the P2 Masonic Lodge.

Greek Premier is CIA coup dtat Greece George Papandreou objects to the US plans for Cyprus. President Johnson replies, F*ck your Parliament and your Constitution. CIA-backed King Constantine dismisses Papandreou, installing military dictatorship of Papadopoulos the first CIA agent to become a European premier.

Suez Crisis, 1956 War Games Egypt Three months after President Nasser nationalizes the Suez Canal, France, Britain and Israel meet secretly in Svres. Israel attacks Egypt then France and Britain broker peace, taking control of the canal.

Lavon Affair, 1954 Casus Belli Egypt Israeli Intelligence Unit 131 conducts Operation Susannah. They plant bombs in British and American buildings in Cairo and frame Arabs. The false flag operation fails when a bomb goes off prematurely. Israel calls the accusations anti-Semitic until 2005, then confesses.

Water Privatization Scheme, 2001 Corporation Ghana In order to access IMF and World Bank loans, Ghana is forced to privatize water supply. Tariffs immediately double leaving many without access. Similar conditions are also imposed on at least 12 other African countries.

Private Oil, 2000s Corporation Nigeria The IMF force the largest oil producer in Africa to privatize production, including the largest refineries on the continent. The World Bank determines that the now largely foreign-owned oil industry benefits 1% of the local population.

Operation Barracuda, 1961 Assassination Congo CIA sends a lethal virus via diplomatic pouch to assassinate democratically-elected Patrice Lumumba. Opting not to use the virus, the CIA helps Belgium assassinate and dispose of Lumumba. Mobutu, the epitome of African kleptocracy, rules brutally for the next 35 years.

Blood Diamonds, 2002 Corporation Angola 70% of Angolas diamonds are of gem quality. The Diamond Cartel, to restrict world production, creates the Kimberley Process making Angolas diamond exports illegal.

Round Table Group, 1891 Secret Society South Africa Industrialist Cecil Rhodes and journalist William T. Stead organize a secret society with a Circle of Initiate executive committee and an Association of Helpers outer circle. Lord Milner eventually reorganizes the Association as the Round Table Group.

Diamond Cartel, 1888 Corporation South Africa With the help of NM Rothschild in London, Cecil Rhodes consolidates smaller mines and launches the De Beers Mining Company. De Beers and Londons Diamond Syndicate establish a worldwide monopoly.

Lee Harvey Oswald, 1957 Mad Science Japan 17-year-old Lee Harvey Oswald arrives at Atsugi naval air base, home to the top secret U-2 spy plane vital to the Korean and Vietnam War. At the time, the CIA uses the base to test LSD on unsuspecting marines as part of project MK-Ultra.

Hiroshima Bombing, 1945 War Games Japan Despite obvious signs of Japanese surrender, US President Truman drops atomic bombs on Hiroshima and Nagasaki.

Forbidden City, 1949 War Games Taiwan As Mao Zedongs communist troops advance, the CIA-backed KMT loses control over the opium trade and retreats to Taiwan where they set up martial law. Chiang Kai-Shek and his KMT loot over 600,000 artifacts from the Forbidden City Palace.

Yamashitas Gold, 1943-46 War Games Philippines Unable to bring looted gold stolen from all over Southeast Asia, Japanese forces hide the loot in the Philippines. The secretive Golden Lily organization oversees the building of complex underground tunnels. The engineers along with slave POW workers are buried alive with the treasure.

Opium War, 1839 Drug Trafficking Hong Kong After the British East India Trading Company floods China with opium addicting millions, the ruling Qing Dynasty bans its sale. In defense of free trade, British forces attack Canton (present day Hong Kong). Opium is legalized and the British take Hong Kong.

Coca-Cola, 2000s Corporation India Despite widespread water shortages, Coca-Colas bottling plants continue to use and contaminate local water supply. The disposal of toxic waste pollutes soil and destroys farming communities who cant afford soft drinks.

Gulf of Tonkin Incident, 1964 Casus Belli Vietnam The USS Maddox intentionally enters South Vietnamese waters and fires at patrol boats. Two days later, 2 US destroyers engage non-existent South Vietnamese targets. President Johnson escalates US involvement in Vietnam.

Golden Crescent, 2001 Drug Trafficking Afghanistan, Iran & Pakistan US ends the Taliban and its ban on opium. The Golden Crescent becomes the worlds largest opium producer. By 2007, Afghanistan produces 93% of the worlds opium.

Air America, 1959-1975 Drug Trafficking Laos CIA owned Air America transports food and weapons to local tribes helping fight the North Vietnamese. The airline also smuggles opium and heroin for Hmong drug lord, Van Pao. At the time most of the worlds opium supply comes from the Golden Triangle.

CIA Operation Hike, 1965 coup dtat Indonesia For Indonesias oil fields, the CIA overthrows democratically elected Sukarno. His replacement, General Suharto, murders 500,000 to 1 million communists. The US embassy supplies names of suspected communists to the regime.

Berlin- Baghdad Railway, 1903 Casus Belli Iraq The German-controlled Baghdad Railway Company gains permission from the Ottoman to build a railway from Konya, Turkey to Baghdad, Iraq. The project would give Germans access to rich Iraqi oil fields as well as bypass the British-controlled Suez Canal. The railway becomes a major cause of WW1.

Nurse Nayirah, 1990 Casus Belli Iraq A Kuwaiti girl testifies to the U.S. Congress that Iraqi soldiers pulled babies out of their incubators, leaving them to die. The incident helps gain support for war in Iraq. It is revealed that the nurse was hired by public relations firm Hill and Knowlton.

Creation of Kuwait, 1913 War Games

Kuwait In 1901, British warships force the Ottoman Empire to consider the Gulf port ruled by Sheikh Mubarak to be a British protectorate. The Anglo-Ottoman Convention of 1913 splits Kuwait into a separate sheikdom, permanently constricting Iraqs access to the Persian Gulf.

Operation AJAX, 1953 coup dtat Iran After moving to nationalize the only oil company in Iran, British-owned Anglo-Iranian Oil, CIA/MI6 overthrow Prime Minister Mohammed Mossadegh. The Shah of Iran and his CIA-trained SAVAK brutally rule for the next 26 years.

IMF Shock Therapy, 1991 Corporation

Russia Under pressure from the IMF, Russia adopts a series of dramatic policies causing the collapse of the economy and a depression twice as severe as the Great Depression of 1929. Hyperinflation is rampant and healthcare and life expectancy drop. GDP falls by 50%.

Rise of the Russian Mafia, 1991 Secret Society Russia Following the fall of the Soviet Union, the Russian Mafia takes control of the economy. The Mob controls 40% of private enterprises and 60% of Russias state-owned companies.

KAL 007, 1983 War Games Russia A Korean Airline flight enters restricted air space of the USSR and is shot down by Soviet Interceptors killing all 269 passengers. The plane may have been on a ferret mission, gathering information on Soviet radar installations.

Pine Gap, 1966 Police State Australia At the very center of Australia a satellite tracking station is one of the largest ECHELON ground stations. The joint US-Australian facility appears to be the source of missiles fired at UFOs in the STS-48 NASA footage.

Whitlam Dismissal, 1975 coup dtat Australia Prime Minister Gough Whitlam enrages the CIA by cancelling joint CIA-ASIS ops in Chile and demanding a list of CIA operatives in Australia. CIA-man Sir John Kerr, in his largely ceremonial position of Governor General, dismisses Whitlams government.

Here is the original post:

NWO World Map | Illuminati Rex

Fair Usage Law

December 21, 2016   Posted in: Lavon Affair  Comments Closed

False flag operation – RationalWiki

A false flag operation is an operation conducted by one party or government and made to appear as though it were sponsored by another party or government. The term (although not the tactic) has its origins in the traditions of “honourable” naval warfare, where ships were required to sail under their own national flag in order that they could be identified. As people learned that being a sneaky bastard was much more fun much more effective than playing by the rules, ships began sailing under “false” colours, i.e. flying their enemy’s flag in order to get close to their enemy, before swapping to their true colours and opening fire.[1]

In the modern use of false flag tactics and operations, this final step is avoided entirely, making it difficult to identify what is really a false flag operation, and what is just some conspiracy nuts not trusting their own government.

A list of such attacks either determined or widely held to be false flag attacks follows:

Conspiracy theorists have claimed that the terrorist attacks of September 11, 2001 were a false flag operation by the United States Government, notably in the “documentary” Loose Change. Their claims are not seen as credible by most investigators. It is interesting that the concept of a false flag operation is a staple of almost all conspiracy theories – that a government would attack their own people to justify something is appropriately dramatic and evil to be attractive to anyone already predisposed to the idea that the world is secretly being controlled by dark hidden forces. Similar claims were launched within an hour after the Boston Marathon bombing of 15 April 2013, and, two days later, after the West, TX fertiliser plant explosion, citing the monkey that jumps up and down in Alex Jones’ head.[4]

On 11 January 2015, in the Project Camelot Portal blog, Kerry Cassidy wrote that the Charlie Hebdo massacre was obviously a False Flag operation by the French government.[5]

In fact, since the arrival of 9/11 truthers, no tragedy goes[6]by[7]without someone claiming it was a false flag.

Paranoids on both the left [8] and the right [9] have argued that Edward Snowden is, or likely is, a limited hangout or a false flag operation. Which is especially ironic given that Snowden’s NSA documents have revealed actual false flag capabilities by the Canadian government, [10] and a British “dirty tricks” program — including false flag operations — shared with the U.S., New Zealand and Australian (and Canadian) governments.[11]

False flag attacks have been used as an attempt to discredit the opposition in a political campaign. For instance, in 2008, a woman claimed to have been attacked and mutilated (having ‘B’ for ‘Barack’ carved into her face) by a black man for being a McCain supporter. Eventually however she confessed that she had mutilated herself and made the whole incident up [12]. Not helping her story was that the B was backwards and looked like it had been made by a fingernail not a knife.

Here is the original post:

False flag operation – RationalWiki

Fair Usage Law

December 7, 2016   Posted in: Lavon Affair  Comments Closed

Earth Timeline | The age of the Earth is 4.54 billion …

This image describes earth in its earliest form

Biological Events Timeline: (Ma = Million years before present)

First bacteria 3500 Ma Early eukaryotes 1900-1700 Ma Trace animal fossils 1000 Ma Abundant soft-bodied animals 700 Ma First fish 505 Ma Early land plants 438 Ma First amphibians 370 Ma First reptiles 310 Ma End Permian mass extinction event (destroyed 82% of all genera) 245 Ma Dinosaurs appear 240 Ma First mammals 225 Ma First birds 200 Ma Flowering plants appear 140 Ma End Cretaceous mass extinction event (including last dinosaurs); age of mammals begins 66 to 65 Ma Early horses adn other familiar animals 37 Ma Earliest humans 2 Ma Humans dominant 0 Ma (now)

Geological Events Timeline:

Formation of Earth 4600 Ma Oldest rocks yet discovered 3950 Ma Significant oxygen in atmosphere 1500 Ma Start of formation of Appalachian Mountains 450 Ma Start of supercontinent Pangaea (all continents pushed together) 360 Ma Abundant coal-forming swamps 320 Ma Break-up of Pangaea begins 225 Ma Massive volcanic activity marking opening of north Atlantic Ocean 60 Ma Formation of Rocky Mountains 60 Ma Major deformation of Alps and Himalayas 50 Ma Ice Age which covered much of Ohio 1.6 Ma to 10,000 years Hawaii (big island) eruptions start 0.7 Ma Eruption of Mount St. Helens 0 Ma (May 1980)

Geological Eras Information:

Archaean Era 3600-4600 Ma(origin of life, beginning of photosynthesis, increaed abundance of oxygen in atmosphere, diversification of prokaryotes) Proterozoic Era 2500-3600 Ma(earliest eukaryotes, trace animal fossils, first multicellular fossils) Paleozoic Era 290-2500 Ma Cambrian Period 543-2500 Ma(marine animals diversify, diverse algae) Ordovician Period 500-543 Ma(diversification of invertebrates, mass extinction at the end of this period) Sulurian Period 439-500 Ma(earliest terrestrial vascular plants) Devonian Period 409-439 Ma(diversification of boney fishes, mass extinction at the end of this period) Carboniferous Period 354-409 Ma(Gondwanaland and small northern continents form, early winged insects, first reptiles) Permian Period 290-354 Ma(Pangaea, glaciations, major mass extinction of marine life at end of this period) Mesozoic Era 144-290 Ma Triassic Period 251-290 Ma(continents begin to separate, first dinosaurs, first mammals) Jurassic Period 206-251 Ma(first birds, gymnosperms dominate, evolution of angiosperms) Cretaceous Period 144-206 Ma(most continents separated, mass extinction at end of period including dinosaurs) Cenozoic Era 0.01-144 Ma Tertiary Period 5.2-144 Ma (continentss near modern positions, climate cools, radiation of mammals, birds, snakes, pollinating insects, angiosperms) Paleocene Epoch 65-144 Ma Eocene Epoch 55.6-65 Ma Oligocene Epoch 33.5-55.6 Ma Miocene Epoch 23.8-33.5 Ma Pliocene Epoch 5.2-23.8 Ma Quaternary Period 0.01-5.2 Ma (continents in modern positions, repeated glaciations, lowering of sea level, extinctions of large mammals, evolution ofHomo erectus and Homo sapiens, rise of agriculture) Pleistocene Epoch 1.8-5.2 Ma Recent (Holocene) Epoch 0.01-1.8 Ma

Read the original here:

Earth Timeline | The age of the Earth is 4.54 billion …

Fair Usage Law

November 29, 2016   Posted in: Lavon Affair  Comments Closed

Ben-Gurion resigns over Lavon Affair | CIE

January 31, 1961

Prime Minister David Ben-Gurion resigns, setting the stage for new elections in the summer of 1961.

Ben-Gurions resignation was tied to a botched Israeli operation in 1954. In that year, concerned that Great Britains planned withdrawal from the Suez Canal would have a negative impact on Israeli trade, Israel launched Operation Susannah, a secret plan to discredit Egypts government, then headed by Gamal Abdel Nasser.Nassers Egypt was clearly becoming Israels leading political nemesis in the Arab world. The plan included having a spy network comprised mostly of Egyptian Jews, bomb Western targets and make it appear as though Egypt was behind the bombings.

The operation was foiled by poor planning as well as a betrayal by one of the operators. Thirteen of the spies were arrested by the Egyptians. Two committed suicide and Moshe Marzouk and Shmuel Azar were hanged. Marzouk claimed that he had organized the ring and took full responsibility, apparently to reduce the guilt of the others, most of whom were given prison sentences.

In Israel, the episode was blamed on Pinchas Lavon (shown in the photo) who was then serving as Defense Minister, and who ultimately resigned. A special committee was set up by then Prime Minister Moshe Sharett to investigate what had gone wrong but its results were inconclusive.

The event resurfaced in 1960 when new information surfaced that two senior officers had given false testimony implicating Lavon in 1954. As a result, a new committee cleared Lavon of any wrongdoing. Ben-Gurion, who had returned to the office of Prime Minister, questioned the legality and objectivity of the new inquiry and resigned. In his letter of resignation, he wrote, My understanding of my obligations forbid me to bear responsibility for the Cabinet decision on December 25 (the decision to accept the report that exonerated Lavon), as this would be incompatible with fundamental principles of justice and the basic laws of the State.

Ben-Gurion was unable to form a new government and in March the Knesset was dissolved. New elections were held in August 1961 with Mapai winning 42 seats and Ben-Gurion returning as Prime Minister. Ben-Gurion would remain Prime Minister until 1963 and leave political life in 1970 after half a century of Zionist and Israeli leadership.

See original here:

Ben-Gurion resigns over Lavon Affair | CIE

Fair Usage Law

November 27, 2016   Posted in: Lavon Affair  Comments Closed

Hart Of Dixie – Dizi 2011 – Beyazperde

Bu diziyi izlemek istiyor musun?

Evet Hayr

Bu diziyi izledin mi? Puan ver ve yorum yap.

0.5 : Bo

1.0 : ok kt

1.5 : Kt

2.0 : yi deil

2.5 : Eh ite

3.0 : Fena deil

3.5 : yi

4.0 : ok iyi

4.5 : Muhteem

5.0 : Bayapt

Bu dizinin hayran msn?

Hayranym!

Tp Fakltesi’nden mezun olduu gn, cerrah olma hayalleri kuran Zoe Hart’n umutlar, staj yapt hastanenin kendisine burs vermemesiyle suya der. Mezuniyet Gn, yalca bir doktorun eline tututurduu kartvizit artk onun son aresidir.

Her ne art altnda olursa olsun, doktorluk yapmak iin yanp tutuan Zoe Hart, kendisine yaplan teklifi kabul etmek zere; New York’tan kalkp Alabama’ya kadar gider. Bluebell denilen kk bir kasabada noktalanan yolculuk, Dr. Zoe Hart’n hayatn da kkten deitirecektir.

Yeni sezonda ekranda gremeyeceimiz iki dizi daha… Devamn oku

The Flash, Supernatural, The Vampire Diaries ve dierleri…

The Tomorrow People, Star-Crossed ve The Carrie Diaries iptal edildi.

Visit link:

Hart Of Dixie – Dizi 2011 – Beyazperde

Fair Usage Law

November 26, 2016   Posted in: Lavon Affair  Comments Closed

False flag – Wikipedia

“False colors” redirects here. For the imaging technique, see False-color.

The contemporary term false flag describes covert operations that are designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them.[1]

Historically, the term “false flag” has its origins in naval warfare where the use of a flag other than the belligerent’s true battle flag before (but not while) engaging the enemy has long been accepted as a permissible ruse de guerre; by contrast, flying a false flag while engaging the enemy constitutes perfidy.[1]

Operations carried out during peace-time by civilian organizations, as well as covert government agencies, can (by extension) also be called false flag operations if they seek to hide the real organization behind an operation.[citation needed]

In land warfare such operations are generally deemed acceptable in certain circumstances, such as to deceive enemies providing that the deception is not perfidious and all such deceptions are discarded before opening fire upon the enemy. Similarly in naval warfare such a deception is considered permissible provided the false flag is lowered and the true flag raised before engaging in battle:[2]auxiliary cruisers operated in such a fashion in both World Wars, as did Q-ships, while merchant vessels were encouraged to use false flags for protection.

Such masquerades promoted confusion not just of the enemy but of historical accounts: in 1914 the Battle of Trindade was fought between the British auxiliary cruiser RMS Carmania and the German auxiliary cruiser SMS Cap Trafalgar which had been altered to look like Carmania. (Contrary to some possibly mendacious accounts, the RMS Carmania had not been altered to resemble the Cap Trafalgar.)

Another notable example was the World War II German commerce raider Kormoran which surprised and sank the Australian light cruiser HMAS Sydney in 1941 while disguised as a Dutch merchant ship, causing the greatest recorded loss of life on an Australian warship. While Kormoran was fatally damaged in the engagement and its crew captured the outcome represented a considerable psychological victory for the Germans.[3]

Other examples from WWII included a Kriegsmarine ensign in the St Nazaire Raid and captured a German code book: the old destroyer Campbeltown, which the British planned to sacrifice in the operation, was provided with cosmetic modifications that involved cutting the ship’s funnels and chamfering the edges to resemble a German Type 23 torpedo boat.

By this ruse the British were able to get within two miles (3km) of the harbour before the defences responded, where the explosive-rigged Campbeltown and commandos successfully disabled or destroyed the key dock structures of the port.[4][5]

In December 1922February 1923, Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare, drafted by a commission of jurists at the Hague regulates:[6]

This draft was never adopted as a legally binding treaty, but the ICRC states in its introduction on the draft that ‘To a great extent, [the draft rules] correspond to the customary rules and general principles underlying treaties on the law of war on land and at sea’,[7] and as such these two noncontroversial articles were already part of customary law.[8]

In land warfare, the use of a false flag is similar to that of naval warfare: the trial of Otto Skorzeny, who planned and commanded Operation Greif, by a U.S. military tribunal at the Dachau Trials included a finding that Skorzeny was not guilty of a crime by ordering his men into action in American uniforms. He had relayed to his men the warning of German legal experts: that if they fought in American uniforms, they would be breaking the laws of war; however, they probably were not doing so simply by wearing the American uniforms. During the trial, a number of arguments were advanced to substantiate this position and the German and U.S. military seem to have been in agreement.

In the transcript of the trial,[9] it is mentioned that Paragraph 43 of the Field Manual published by the War Department, United States Army, on 1 October 1940, under the entry Rules of Land Warfare states “National flags, insignias and uniforms as a ruse in practice it has been authorized to make use of these as a ruse. The foregoing rule (Article 23 of the Annex of the IVth Hague Convention), does not prohibit such use, but does prohibit their improper use. It is certainly forbidden to make use of them during a combat. Before opening fire upon the enemy, they must be discarded’.”

The American Soldiers’ Handbook, was also quoted by Defense Counsel: “The use of the enemy flag, insignia, and uniform is permitted under some circumstances. They are not to be used during actual fighting, and if used in order to approach the enemy without drawing fire, should be thrown away or removed as soon as fighting begins.” Subsequently the outcome of the trial has been codified in the 1977 Protocol Additional to the Geneva Conventions of 12 August 1949 (Protocol I):

Article 37. Prohibition of perfidy

Article 38. Recognized emblems

Article 39. Emblems of nationality

A false flag in the cyber domain is slightly different and easier to perpetrate than in other physical theaters of war. Cyber false flags refer to tactics used in covert cyber attacks by a perpetrator to deceive or misguide attribution attempts including the attackers origin, identity, movement, and/or code/exploitation. This misdirection tactic can cause misattribution (permitting response and/or counterattack as a condicio sine qua non under international law) or misperception which can lead to retaliation against the wrong adversary.

Cyber false flags can exist in the cyber domain when:

In 1788, the head tailor at the Royal Swedish Opera received an order to sew a number of Russian military uniforms. These were then used by the Swedes to stage an attack on Puumala, a Swedish outpost on the Russo-Swedish border, on 27 June 1788. This caused an outrage in Stockholm and impressed the Riksdag of the Estates, the Swedish national assembly, who until then had refused to agree to an offensive war against Russia. The Puumala incident allowed King GustavIII of Sweden, who lacked the constitutional authority to initiate unprovoked hostilities without the Estates’ consent, to launch the Russo-Swedish War (17881790).

In September 1931, Japanese officers fabricated a pretext for invading Manchuria by blowing up a section of railway. Though the explosion was too weak to disrupt operations on the rail line, the Japanese nevertheless used this Mukden incident to seize Manchuria and create a puppet government for what they termed the “independent” state of Manchukuo.[11]

The Gleiwitz incident in 1939 involved Reinhard Heydrich fabricating evidence of a Polish attack against Germany to mobilize German public opinion for war and to justify the war with Poland. Alfred Naujocks was a key organiser of the operation under orders from Heydrich. It led to the deaths of Nazi concentration camp victims who were dressed as German soldiers and then shot by the Gestapo to make it seem that they had been shot by Polish soldiers. This, along with other false flag operations in Operation Himmler, would be used to mobilize support from the German population for the start of World WarII in Europe.[12]

The operation failed to convince international public opinion of the German claims, and both Britain and FrancePoland’s alliesdeclared war two days after Germany invaded Poland.[13]

On November 26, 1939, the Soviet army shelled Mainila, a Russian village near the Finnish border. Soviet authorities blamed Finland for the attack and used the incident as a pretext to invade Finland, starting the Winter War, four days later.[14]

The proposed, but never executed, 1962 Operation Northwoods plot by the U.S. Department of Defense for a war with Cuba involved scenarios such as fabricating the hijacking or shooting down of passenger and military planes, sinking a U.S. ship in the vicinity of Cuba, burning crops, sinking a boat filled with Cuban refugees, attacks by alleged Cuban infiltrators inside the United States, and harassment of U.S. aircraft and shipping and the destruction of aerial drones by aircraft disguised as Cuban MiGs.[16] These actions would be blamed on Cuba, and would be a pretext for an invasion of Cuba and the overthrow of Fidel Castro’s communist government. It was authored by the Joint Chiefs of Staff, but then rejected by President John F. Kennedy. The surprise discovery of the documents relating to Operation Northwoods was a result of the comprehensive search for records related to the assassination of President John F. Kennedy by the Assassination Records Review Board in the mid-1990s.[17] Information about Operation Northwoods was later publicized by James Bamford.[18]

The Reichstag fire was an arson attack on the Reichstag building in Berlin on 27 February 1933. The fire started in the Session Chamber,[19] and, by the time the police and firemen arrived, the main Chamber of Deputies was engulfed in flames. Police searched the building and found Marinus van der Lubbe, a young Dutch council communist and unemployed bricklayer, who had recently arrived in Germany to carry out political activities.[citation needed]

The fire was used as evidence by the Nazis that the Communists were beginning a plot against the German government. Van der Lubbe and four Communist leaders were subsequently arrested. Adolf Hitler, who was sworn in as Chancellor of Germany four weeks before, on 30 January, urged President Paul von Hindenburg to pass an emergency decree to counter the “ruthless confrontation of the Communist Party of Germany”.[20] With civil liberties suspended, the government instituted mass arrests of Communists, including all of the Communist parliamentary delegates. With their bitter rival Communists gone and their seats empty, the National Socialist German Workers Party went from being a plurality party to the majority; subsequent elections confirmed this position and thus allowed Hitler to consolidate his power.[citation needed]

Historians disagree as to whether Van der Lubbe acted alone, as he said, to protest the condition of the German working class, or whether the arson was planned and ordered by the Nazis, then dominant in the government themselves, as a false flag operation.[21][22]

On 4 April 1953, the CIA was ordered to undermine the government of Iran over a four-month period, as a precursor to overthrowing Prime Minister Mohammad Mosaddegh.[23] One tactic used to undermine Mosaddegh was to carry out false flag attacks “on mosques and key public figures”, to be blamed on Iranian communists loyal to the government.[23]

The CIA project was code-named TP-Ajax, and the tactic of a “directed campaign of bombings by Iranians posing as members of the Communist party”,[24] involved the bombing of “at least” one well known Muslim’s house by CIA agents posing as Communists.[24] The CIA determined that the tactic of false flag attacks added to the “positive outcome” of Project TPAJAX.[23]

However, as “[t]he C.I.A. burned nearly all of its files on its role in the 1953 coup in Iran”, the true extent of the tactic has been difficult for historians to discern.[25]

In 2008 there was a shooting against two minibuses driving along in a volatile area right on the border between Abkhazia and the republic of Georgia. The buses were carrying Georgians who lived in Abkhazia and wanted to cross the border so they could go and vote in the parliamentary election that day.[citation needed]

The country had been experiencing internal political turmoil for the last year, and in an attempt to calm the situation, president Mikheil Saakashvili moved forward both presidential and parliamentary elections. However the presidential election in January that year was strongly contested, with hundreds of thousands attending protest rallies. When the parliamentary election came up in May, the mood was still tense.[citation needed]

On mid day 21 May the two minibuses came under attack with small arms and grenades, and though there were no casualties, three people were taken to a hospital in Zugdidi, where president Saakashvili later arrived and was filmed by TV at the patients’ bedside.[citation needed]

In his comments on TV, which dominated the news during election day, Saakashvili indicated that the attack had been an attempt to disrupt the election, implying that it had been Abkhaz or Russian forces who had been behind it. This provided for a favorable opportunity for the president to focus the nation’s attention on an external enemy, thereby leading attention away from his domestic critics, as well as making use of his position as leader to rally the Georgians around his candidates in the election.[citation needed]

An investigation by the United Nations Observer Mission in Georgia found that the attackers were located on the Georgian side of the ceasefire line, about 100m from the buses, and that although hard evidence of the attackers’ identities was lacking, inconsistencies merited further investigation, particularly the suggestion that the filming of the attack seemed anticipatory.[26]

A Georgian investigative TV documentary later found that camera crew from the government-friendly channel Rustavi 2 had been in position with their equipment before the shooting took place.[citation needed]

Pseudo-operations are those in which forces of one power disguise themselves as enemy forces. For example, a state power may disguise teams of operatives as insurgents and, with the aid of defectors, infiltrate insurgent areas.[27] The aim of such pseudo-operations may be to gather short or long-term intelligence or to engage in active operations, in particular assassinations of important enemies. However, they usually involve both, as the risks of exposure rapidly increase with time and intelligence gathering eventually leads to violent confrontation. Pseudo-operations may be directed by military or police forces, or both. Police forces are usually best suited to intelligence tasks; however, military provide the structure needed to back up such pseudo-ops with military response forces. According to US military expert Lawrence Cline (2005), “the teams typically have been controlled by police services, but this largely was due to the weaknesses in the respective military intelligence systems.”[citation needed]

The State Political Directorate (OGPU) of the Soviet Union set up such an operation from 1921 to 1926. During Operation Trust, they used loose networks of White Army supporters and extended them, creating the pseudo-“Monarchist Union of Central Russia” (MUCR) in order to help the OGPU identify real monarchists and anti-Bolsheviks.[citation needed]

An example of a successful assassination was United States Marine Sergeant Herman H. Hanneken leading a patrol of his Haitian Gendarmerie disguised as enemy guerrillas in 1919. The Patrol successfully passed several enemy checkpoints in order to assassinate the guerilla leader Charlemagne Pralte near Grande-Rivire-du-Nord. Hanneken was awarded the Medal of Honor and was commissioned a Second Lieutenant for his deed.[citation needed]

During the Mau Mau uprising in the 1950s, captured Mau Mau members who switched sides and specially trained British troops initiated the pseudo-gang concept to successfully counter Mau Mau. In 1960 Frank Kitson, (who was later involved in the Northern Irish conflict and is now a retired British General), published Gangs and Counter-gangs, an account of his experiences with the technique in Kenya; information included how to counter gangs and measures of deception, including the use of defectors, which brought the issue a wider audience.[citation needed]

Another example of combined police and military oversight of pseudo-operations include the Selous Scouts in the former country Rhodesia (now Zimbabwe), governed by white minority rule until 1980. The Selous Scouts were formed at the beginning of Operation Hurricane, in November 1973, by Major (later Lieutenant Colonel) Ronald Reid-Daly. As with all Special Forces in Rhodesia, by 1977 they were controlled by COMOPS (Commander, Combined Operations) Commander Lieutenant General Peter Walls. The Selous Scouts were originally composed of 120 members, with all officers being white and the highest rank initially available for black soldiers being colour sergeant. They succeeded in turning approximately 800 insurgents who were then paid by Special Branch, ultimately reaching the number of 1,500 members. Engaging mainly in long-range reconnaissance and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination of Zimbabwe People’s Revolutionary Army leader Joshua Nkomo in Zambia. This mission was finally aborted by the Selous Scouts, and attempted again, unsuccessfully, by the Rhodesian Special Air Service.[28]

Some offensive operations attracted international condemnation, in particular the Selous Scouts’ raid on a Zimbabwe African National Liberation Army (ZANLA) camp at Nyadzonya Pungwe, Mozambique in August 1976. ZANLA was then led by Josiah Tongogara. Using Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 people in the camp-the camp was registered as a refugee camp by the United Nations (UN). Even according to Reid-Daly, most of those killed were unarmed guerrillas standing in formation for a parade. The camp hospital was also set ablaze by the rounds fired by the Scouts, killing all patients.[29] According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was only a refugee camp that did not host any guerrillas. It was staged for UN approval.[30]

According to a 1978 study by the Directorate of Military Intelligence, 68% of all insurgent deaths inside Rhodesia could be attributed to the Selous Scouts, who were disbanded in 1980.[31]

If the action is a police action, then these tactics would fall within the laws of the state initiating the pseudo, but if such actions are taken in a civil war or during a belligerent military occupation then those who participate in such actions would not be privileged belligerents. The principle of plausible deniability is usually applied for pseudo-teams. (See the above section Laws of war). Some false flag operations have been described by Lawrence E. Cline, a retired US Army intelligence officer, as pseudo-operations, or “the use of organized teams which are disguised as guerrilla groups for long- or short-term penetration of insurgent-controlled areas.”[citation needed]

Pseudo Operations should be distinguished, notes Cline, from the more common police or intelligence infiltration of guerrilla or criminal organizations. In the latter case, infiltration is normally done by individuals. Pseudo teams, on the other hand, are formed as needed from organized units, usually military or paramilitary. The use of pseudo teams has been a hallmark of a number of foreign counterinsurgency campaigns.”[27]

Similar false flag tactics were also employed during the Algerian civil war, starting in the middle of 1994. Death squads composed of Dpartement du Renseignement et de la Scurit (DRS) security forces disguised themselves as Islamist terrorists and committed false flag terror attacks. Such groups included the Organisation of Young Free Algerians (OJAL) or the Secret Organisation for the Safeguard of the Algerian Republic (OSSRA)[32] According to Roger Faligot and Pascal Kropp (1999), the OJAL was reminiscent of “the Organization of the French Algerian Resistance (ORAF), a group of counter-terrorists created in December 1956 by the Direction de la surveillance du territoire (Territorial Surveillance Directorate, or DST) whose mission was to carry out terrorist attacks with the aim of quashing any hopes of political compromise”.[33]

In espionage the term “false flag” describes the recruiting of agents by operatives posing as representatives of a cause the prospective agents are sympathetic to, or even the agents’ own government. For example, during the Cold War, several female West German civil servants were tricked into stealing classified documents by agents of the East German Stasi intelligence service, pretending to be members of West German peace advocacy groups (the Stasi agents were also described as “Romeos,” indicating that they also used their sex appeal to manipulate their targets, making this operation a combination of the false flag and “honey trap” techniques).[34]

The technique can also be used to expose enemy agents in one’s own service, by having someone approach the suspect and pose as an agent of the enemy. Earl Edwin Pitts, a 13-year veteran of the U.S. Federal Bureau of Investigation and an attorney, was caught when he was approached by FBI agents posing as Russian agents.[citation needed]

British intelligence officials in World War II allowed double agents to fire-bomb a power station and a food dump in the UK to protect their cover, according to declassified documents. The documents stated the agents took precautions to ensure they did not cause serious damage. One of the documents released also stated: “It should be recognised that friends as well as enemies must be completely deceived.”[35]

While false flag operations originate in warfare and government, they also can occur in civilian settings among certain factions, such as businesses, special interest groups, religions, political ideologies and campaigns for office.[citation needed]

In business and marketing, similar operations are being employed in some public relations campaigns (see Astroturfing). Telemarketing firms practice false flag type behavior when they pretend to be a market research firm (referred to as “sugging”). In some rare cases, members of an unsuccessful business will destroy some of their own property to conceal an unrelated crime (e.g., safety violations, embezzlement) but make it appear as though the destruction was done by a rival company.[citation needed]

Political campaigning has a long history of this tactic in various forms, including in person, print media and electronically in recent years. This can involve when supporters of one candidate pose as supporters of another, or act as straw men for their preferred candidate to debate against. This can happen with or without the candidate’s knowledge. The Canuck letter is an example of one candidate creating a false document and attributing it as coming from another candidate in order to discredit that candidate.[citation needed]

In the final days of Florida’s 1994 gubernatorial campaign, Democratic Governor Lawton Chiles ran a false flag operation that paid for tens of thousands of calls to elderly voters using false organization names. The calls purported to be from Republican groups and told voters that Jeb Bush was against Social Security and seniors. Chiles denied his campaign was behind the calls. After winning re-election and facing an investigation, Chiles admitted the truth in November 1995.[36]

In 2006, individuals practicing false flag behavior were discovered and “outed” in New Hampshire[37][38] and New Jersey[39] after blog comments claiming to be from supporters of a political candidate were traced to the IP address of paid staffers for that candidate’s opponent.

On 19 February 2011, Indiana Deputy Prosecutor Carlos Lam sent a private email to Wisconsin Governor Scott Walker suggesting that he run a “‘false flag’ operation” to counter the protests against Walker’s proposed restrictions on public employees’ collective bargaining rights:

If you could employ an associate who pretends to be sympathetic to the unions’ cause to physically attack you (or even use a firearm against you), you could discredit the unions … Employing a false flag operation would assist in undercutting any support that the media may be creating in favor of the unions.[40][41]

The press had acquired a court order to access all of Walker’s emails and Lam’s email was exposed. At first, Lam vehemently denied it, but eventually admitted it and resigned.[41]

Proponents of political or religious ideologies will sometimes use false flag tactics. This can be done to discredit or implicate rival groups, create the appearance of enemies when none exist, or create the illusion of organized and directed persecution. This can be used to gain attention and sympathy from outsiders, in particular the media, or to convince others within the group that their beliefs are under attack and in need of protection.

In retaliation for writing The Scandal of Scientology, some members of the Church of Scientology stole stationery from author Paulette Cooper’s home and then used that stationery to forge bomb threats and have them mailed to a Scientology office. The Guardian’s Office also had a plan for further operations to discredit Cooper known as Operation Freakout, but several Scientology operatives were arrested in a separate investigation and the plan was exposed.[42]

View original post here:

False flag – Wikipedia

Fair Usage Law

November 24, 2016   Posted in: Lavon Affair  Comments Closed

Spies Against Armageddon by Dan Raviv and Yossi Melman

By Dan Raviv originally posted in June 2012

Here in Washington, Israels PresidentShimon Peresis enjoying the highest possible American government accolades receiving the Medal of Freedom Award from President Barack Obama.

Peres also has been an active peacemaker, whenever peace efforts seem possible in the Middle East, and he calls on the current coalition government in his country to make stronger efforts at re-starting peace talks with the Palestinians.

In remarks prepared for delivery on Wednesday evening at the White House, President Obama praises the newest Medal of Freedom honoree:

The United States is fortunate to have many allies and partners around the world. Of course, one of our strongest allies, and one of our closest friends, is the State of Israel. And no individual has done so much over so many years to build our alliance and bring our two nations closer as the leader we honor tonightour friend, Shimon Peres.

in him we see the essence of Israel itselfan indomitable spirit that will not be denied. Shimon knows the necessity of strength. As Ben-Gurion said, an Israel capable of defending herselfwhich cannot be destroyedcan bring peace nearer.

And so hes worked with every American President since John F. Kennedy. And its why Ive worked with Prime Minister Netanyahu to ensure that the security cooperation between the United States and Israel is closer and stronger than it has ever been. Because the security of the State of Israel is non-negotiable. And the bonds between us are unbreakable.

And yet, Shimon knows that a nations security depends, not just on the strength of its arms, but upon the righteousness of its deedsits moral compass. He knows, as Scripture teaches, that we must not only seek peace, we must pursue it. And so it has been the cause of his lifepeace, security and dignity, for Israelis and Palestinians and all Israels Arab neighbors.

September 27, 2016

In his latest documentary, Zero Days, the award-winning Alex Gibney reveals that the Obama Administration believed an Israeli attack on Irans nuclear facilities which seemed in 2012 to be a very real prospect would draw the United States into war. To prepare, the NSA created a set of cyberattacks code named Nitro Zeus which could have crippled Iranian industry, transport, and other modern services.

Zero Days was the opening feature of the AFI Docs festival in Washington, DC, on June 22. Gibney was interviewed by Dan Raviv for the CBS News Weekend Roundup radio magazine; and Yossi Melman is seen in the film as an expert commenting on Israeli motivations in confronting Irans nuclear program. Melman also credited in the film as a consultant.

Raviv and Melman are co-authors of five books, including the current history of Israeli intelligence Spies Against Armageddon.

Here is part of an article Melman wrote forThe Jerusalem Postin February 2016, when the documentary was first screened at the Berlin Film Festival.

Michael Hayden, former head of both the CIA and the NSA, is in the film and claims the goal of a potential Israeli strike on Iran would be to drag the U.S. into war. The film also quotes other sources in the US intelligence community who accuse Israel of disrupting a joint covert operation to sabotage computers used in Irans nuclear program by acting rashly and in opposition to agreed-upon plans. As a result, hundreds of millions of dollars that were invested in the operation went to waste.

A graphic from the documentary Zero Days

The film contains testimony from NSA and CIA operatives who worked together with Israeli colleagues from the 8200 Military Intelligence Unit and Mossad to develop several versions of a deadly virus that penetrated computers at the uranium enrichment facility at Natanz in Iran. The testimony is delivered anonymously by an actress whose face remains hidden.

We spent millions on this operation to sabotage all of the computers of the Iranian infrastructure in the instance of a war, a source quoted in the film said. We penetrated the government, electricity lines, power stations and most of the infrastructure in Iran.

The deadly virus that was implanted at Natanz was named Stuxnet by computer security experts, but it had a different name among the Israeli and American intelligence communities: Olympic Games as revealed byNew York Times journalist David E. Sanger.

Conventional wisdom holds that the implanting of the virus marked the first time that a country, or two countries in this case (the U.S. and Israel), engaged in cyber warfare against another country (Iran). Up until then, the majority of attacks were carried out by individual hackers for their own enjoyment or for political purposes, by criminals for the purposes of fraud and thievery, or by companies engaged in industrial and commercial espionage.

Vice President Joe Biden is quoted in the film as saying in a meeting that the Israelis changed the code of the deadly viruss software. As a result, the virus spread from nuclear program computers to many other computers in Iran, and from there to computers around the world even harming the computers of American companies.

According to the film, the premature exposure of the operation caused by Israels actions also caused the virus software, which was among the most classified and most advanced in the world, to leak to Russian and Iranian intelligence.

Ironically, it is said in the film, the secret formula for writing the code for the virus software fell into the hands of Russia and Iran the country against which it was developed.

June 23, 2016

[This post is based on an article in Hebrew by Yossi Melman, co-author of Spies Against Armageddon: Inside Israels Secret Wars and other books, in the newspaperMaariv.]

The Mossad Israels famed foreign intelligence agency placed unusual advertisements in several Israeli newspapers on Wednesday. It is not the first time that the Mossad published want ads, announcing that jobs are available for the right men and women. This one also seems to be polishing the secret agencys image as a cutting-edge, entirely modern and exciting place to work.

The ad shows rows of numbers, apparently meant to represent computer code on a screen and among the digits are English letters that read: ARE YOU READY FOR A CHALLENGE?

At the bottom, in Hebrew, is the official symbol of the Mossad with its motto quoting the Bible: Where there is no counsel, the nation falls; but there is salvation in a multitude of counsel. (Proverbs 11:14)

And intriguingly at the bottom is apparently the name of the Mossad department looking for brilliant employees: The Operational Cyber Arm.

The agencys website also invites job applications.

Mossad.gov.il came into existence only about 15 years ago. In part that was part of a new wave of relative openness: acknowledging that the Mossad exists and making it legal to publish the name of its director (Yossi Cohen this year replaced Tamir Pardo). Also, the website is part of a recruitment effort in Hebrew, English, Russian, Arabic, and Farsi (Persian) which suggests that working for Israeli intelligence can give a person amazing experiences.

It was also, in the past 10 to 15 years, that the Mossad instructed by Prime Ministers Ariel Sharon and Ehud Olmert stepped up its efforts to derail and sabotage Irans nuclear program.

May 11, 2016

Israeli hastiness blew operation to sabotage Irans computers, U.S. officials say:

Zero Days, Alex Gibneys film premiering at the Berlin International Film Festival, explores the joint U.S.-Israeli operation to develop the Stuxnet virus and sabotage Irans nuclear program

If Israel were ever to bomb Iran and its nuclear facilities according to Gen. Michael Hayden, former head of both the CIA and the NSA Israels goal would be to drag the United States into war.

MIchael Hayden, in the film Zero Days

Hayden makes the remark in a documentary film premiering this week at the Berlin International Film Festival. The film also quotes other sources in the U.S. intelligence community who accuse Israel of disrupting a joint covert operation to sabotage computers used in Irans nuclear program by acting rashly. The sources say Israel did not stick with the agreed-upon plan.

As a result, hundreds of millions of dollars that were invested in the operation went to waste.

The film, Zero Days, was directed by Alex Gibney, whose film Taxi to the Dark Side won the Academy Award for Best Documentary Feature in 2008.

His new film includes testimony from NSA and CIA operatives who worked together with Israeli colleagues from the 8200 Military Intelligence Unit and Mossad to develop several versions of a deadly virus that penetrated computers at the uranium enrichment facility at Natanz in Iran. The testimony is delivered anonymously by an actress whose face remains hidden.

Filmmaker Alex Gibney

According to the claims in the film, the hasty Israeli action prevented the carrying out of a number of further planned actions that were intended to sabotage computers at a second, more fortified uranium enrichment facility at Fordow.

The film also reveals another planned cyber unit covert operation code-named NZ (Nitro Zeus).

We spent millions on this operation to sabotage all of the computers of the Iranian infrastructure in the instance of a war, a source quoted in the film said. We penetrated the government, electricity lines, power stations and most of the infrastructure in Iran.

As seen in Zero Days

The deadly virus that was implanted at Natanz was named Stuxnet by computer security experts, but it had a different name among the Israeli and American intelligence communities that was not revealed in the film. The code-name of the entire operation, as was revealed by New York Timesjournalist David Sanger, was Olympic Games.

Conventional wisdom holds that the implanting of the virus marked the first time that a country, or two countries in this case (the U.S. and Israel), engaged in cyber warfare against another country (Iran).

Up until then, the majority of attacks were carried out by individual hackers for their own enjoyment or for political purposes, by criminals for the purposes of fraud and thievery, or by companies engaged in industrial and commercial espionage.

Americas Vice President Joe Biden is quoted in the film as saying in a meeting that the Israelis changed the code of the deadly viruss software. As a result, in contravention of the plan, the virus spread from nuclear program computers to many other computers in Iran, and from there, to computers around the world even harming the computers of American companies.

LInes of code of Stuxnet, seen in the film

The unplanned spread of the virus led to the exposure of the operation. That enabled the Iranians, with the help of information security experts from Belarus and Russia, to invent a vaccine for their computers to better defend the nuclear program.

According to the film, the premature exposure of the operation due to Israels actions also caused the virus software, which was among the most classified and most advanced in the world, to leak to Russian and Iranian intelligence.

Ironically, it is said in the film, the secret formula for writing the code for the virus software fell into the hands of Russia and of Iran the country against which it was developed.

The development of Stuxnet and the planning of Operation Olympic Games began in 2006, during George W. Bushs term as president. He fervently wanted to thwart the Iranian nuclear program.

Hayden, with his long experience in both the CIA and the NSA, declares in the film that President Bush did not want to be left with the choice of to bomb or be bombed.

Revealed too much: Ahmadinejads Visit to Natanz

According to the film, experts from both countries came up with the idea of trying to sabotage Irans nuclear facilities, and in particular their computers. News photographs of then-Iranian president Mahmoud Ahmadinejads visit to the Natanz facility helped the experts obtain needed intelligence on the computers. The computers, their configuration and their rear connections can be seen clearly in the pictures. Eventually, these entry and exit points served as portals to implant the virus.

Iranian nuclear experts accompanied Ahmadinejad on his tour of the facility. One of those photographed at Ahmadinejads side was assassinated a few years later, in an operation that was attributed to the Mossad.

On Bushs orders, exact replicas of the centrifuges were built at the national laboratory in Oak Ridge, Tennessee, which is also used to produce nuclear weapons, and at Israels nuclear reactor in Dimona. The deadly virus was implanted in the centrifuges and their rotors were damaged and broken.

Intelligence operatives brought the broken rotors to the White House situation room, showed them to President Bush and explained what the sabotage could do. Bush was impressed, saying, Go and try.

He ordered a greater investment in offensive, covert cyber warfare and approved the operation.

According to the film, offensive cyber warfare against Iran was increased even more during Barack Obamas term. A key reason was his concern that Israel under the leadership of Prime Minister Benjamin Netanyahu and then-defense minister Ehud Barak would take military action against Iran.

Hayden reveals in the film that Americas fear was that the real goal of an Israeli attack [against the nuclear facilities in Iran], would be to drag us into war, because Israels own attack capabilities were limited.

Hayden continues: Israel has an excellent air force, but its small. The distance is great and the facilities are spread throughout Iran.

In order to calm Israel down, and to prove that the administration was working diligently to thwart an Iranian nuclear weapon, Obama ordered the intelligence community to increase its efforts and its cooperation with the Mossad and Unit 8200.

He did so despite having some doubts about the operation. Obama expressed concern that the Chinese and the Russians will do the same thing to us, and insert viruses into nuclear facilities and other strategic sites in the United States.

However, Obamas greater fear was of an Israeli attack. The goal was to gain time, Hayden added, in order to force Iran to come to the negotiating table.

According to the film, British intelligence also secretly took part in the operation through GCHQ, its unit responsible for telephone surveillance, communications interception, code-breaking, and cyber warfare.

But the main partner was Israel, the film says. And in Israel the Mossad ran the show. 8200 provided technical help. Israel was the key to the whole story.

In the beginning, the virus succeeded at its mission, according to the film.

As far as we knew, but they werent telling us everything, an NSA source told Alex Gibneys team. The virus was implanted in the computers, probably by the Mossad, through its infiltration of two software companies in Taiwan that were working with the Iranians.

The plan was for the virus to harm the digital and computerized electric boxes made by the German company Siemens, which were hooked up to the computers that operated the centrifuges. About a thousand of the 5,000 centrifuges were damaged without the Iranians discovering the cause of the problem.

The plan did what it was supposed to do, an anonymous American intelligence operative said. The centrifuges blew up without leaving a trace.

The sabotage operation also had a psychological goal: to instill in the Iranian leadership and in the community of scientists a feeling that they were helpless and did not understand what was happening. An additional goal was to drive a wedge between the scientists on one side and Irans political and military leadership.

It did turn out that Iranian authorities accused their experts of failure and began firing them and threatened them.

According to testimony gathered by the filmmakers, several hundred programmers, mathematicians, and computer engineers worked in Tailored Access Operations (TAO) teams at CIA headquarters and the cyber command in Fort Meade, Maryland. Only these teams were authorized to infiltrate computers outside of the U.S., including those in Iran.

The sources quoted in the film say the U.S. and Israel developed a few different versions of the Stuxnet virus. Each new version was more powerful than its predecessor. The idea was to gradually implant increasingly stronger versions of the virus.

In addition, it was established that each country had the right to act independently, as long as it informed the other of its actions. However, according to the film, as a result of pressure from Netanyahu on the chief of the Mossad to show results, it was decided in Israel to use the most deadly version of the virus prematurely.

We operated at a low profile, an NSA source said. The Israelis, on the other hand, constantly pushed to be more aggressive.

In this way, after the strongest version of the virus was implanted in order to increase the force of the damage to the centrifuges at Natanz, the virus, according to German information security expert Ralph Langer, began to jump from computer to computer, until it was out of control and unintentionally spread to thousands of computers, networks and systems, including computers in the United States.

Our friends from Israel took a weapon that we developed jointly, among other things in order to defend Israel, and did something crazy with it, and actually blew the operation. We were very furious, an American source said.

The film reveals that the presidential orders of Bush and Obama to activate the cyber weapon were based on their authority to use nuclear weapons.

As a result of this American-Israeli cyber warfare, Iran began to develop and to enhance its own attack tools. A few years ago, in revenge and as a message of deterrence, it attacked 30,000 computers belonging to the Saudi oil company Aramco and computers belonging to American banks.

Against this backdrop, the film also delves into the philosophical-theoretical issue of the worlds need to establish international treaties and rules of whats legal and illegal in cyber warfare, like the international conventions that govern the laws of conventional warfare.

In addition to Hayden, other U.S. officials are interviewed in the film, including Richard Clarke, an anti-terrorism and cyber warfare consultant in the Bush, Clinton and Bush administrations; John C. Inglis, former deputy NSA chief; Gary Samore, formerly with the Obama National Security Council; and the head of information and computer security branch of the Department of Homeland Security. The New York Times Sanger also served as consultant to the films director and producers.

On the Israeli side, interviews were conducted with former Military Intelligence chief Amos Yadlin, current National Infrastructure, Energy and Water and former Intelligence Minister Yuval Steinitz, as well as the writer of this article, who also served as a consultant to the filmmakers.

Computer security experts from the American firm Symantec appear in the film, as well as the German expert Ralph Langer and Eugene Kaspersky, who is considered one of the best-known computer security experts in the world. Kaspersky was formerly a Russian intelligence operative and is considered to have close ties to the Kremlin.

February 16, 2016

[This article was written forThe Jerusalem Report, a magazine published byThe Jerusalem Post, by Yossi Melman, co-author of the best sellerEvery Spy a Prince and other books, including the current history of the Mossad and Israeli security agencies:Spies Against Armageddon: Inside Israels Secret Wars.]

Yossi Cohen is taking over (on January 6) at Mossad headquarters in Glilot, north of Tel Aviv, as the intelligence organizations twelfth director. He is replacing Tamir Pardo who retires after 35 year in the agency, five of them as its head.

Yossi Cohen, Israels new top spymaster

For the last two and half years Cohen served as national security adviser to the prime minister and as head of the National Security Council. This capacity and proximity to Benjamin Netanyahu gave him the edge over two other senior Mossad officials in the running for the job.

Netanyahu trusts Cohen and assigned him secret and sensitive missions; among them mending relations with Turkey; improving ties with the Obama administration, which he did via his good contacts with his American counterpart Susan Rice; and clandestine meetings with Arab leaders and officials.

Cohen is 54 years old. He is a typical product of the Mossad, where he has served in various operational and managerial capacities since 1983; but he was not a typical recruit. He was born in Jerusalem in 1961 to a right-wing religious family with roots going back eight generations in the city. He graduated from schools affiliated with the National Religious movement, which is today represented by the right-wing Bayit Yehudi party.

When Cohen joined the Mossad as a young cadet it was rare to see a religious candidate wearing a kippa (yarmulka). Cohen, who later stoppedwearing a head covering, was the only religious cadet in his class and as a result was the brunt of many jokes.

The Mossad, at the time, was practically off limits to people like him.

As years went by, hewas labelled The Model by journalists for his dapper suits with headline writers recently dubbing him James Bond 007 in stark contrast to the typically informal Israeli dress sense.

Go here to read the rest:

Spies Against Armageddon by Dan Raviv and Yossi Melman

Fair Usage Law

November 24, 2016   Posted in: Lavon Affair  Comments Closed

Truth Under Tyranny – Catastrophe of Ethics

WHAT “WAR ON TERROR”? Israel Butchering Peace Activists in International Waters Headline from the English language version of the Russian report on the latest act of Israeli state terrorism in attacking the vessels carrying relief supplies to Gaza. In a typically courageous and principled stand, a spokesperson for the European Union nations who will doubtless blather impotently and do nothing lamented, “We strongly urge that all involved act with a sense of restraint and responsibility and work for a constructive resolution.” Imagine the reaction if Iran had perpetrated anything comparable. The United States has been turning itself into a police state and leading its stooge Western governments into unprovoked aggression and invasions in the name of waging a “war on terror.” Well, here is open, undisguised terror being conducted against victims who were not even armed, with the contempt for international law and all the principles of civlized behaviour that the world is coming to accept as normal. So where is the “war”? Why isn’t Israel being bombed, and invaded, and all diplomatic relations severed? It’s not as if it were the first time. The state was founded by terror on stolen lands and has existed ever since through terrorism backed by limitless U.S. political, military, and financial support. Those for whom this is news might try searches on “Goldstone Report,” the “Lavon affair” (1954), the U.S.S. Liberty (1967), “Sabra and Shatila” (1982), “Qana” (1996), “Jenin” (2002), not to mention the Gaza invasion of 2009, for examples. Yet we are told that Iran, which has never attacked anyone in over 100 years, is the threat, as the world is being geared up for another attack on a small country with virtually a repeat of the same lies that were told about Iraq. Warnings are rife that at any time now another “incident” can be expected somewhere in the U.S., with Iran being blamed as the instigator (I was skeptical of the official 9/11 story on the day it happened, and I still am), which will provide all the justification needed. A moment’s thought makes it obvious that Iran has nothing to gain from such an act, and everything to lose. The only ones who stand to gain are those who seek its destruction. After all, false flag operations are hardly new in the course of history as a means for supplying demagogues and governments the pretexts for enacting policies they have already decided. It seems to me that it would probably be better for the stability of the region if Iran did acquire nuclear weapons. Few situations could surely be worse than the present nuclear arsenal monopolized in such fanatical and dangerous hands. MANYWORLDS ORDERING PAGE REINSTATED Posted on January 20, 2010 The “ManyWorlds” page is finally up again for mail or electronic ordering of JPH titles direct from the site. To browse what’s available, go to “Bookstore” from the menu bar at the side of the page, select “JPH Titles,” and click on any edition showing a ManyWorlds link. Or go directly to the page by clicking here. Some interesting additions expected during the months ahead. NEW NOVEL COMPLETED Posted on August 25, 2009 After some delay this year, caused mainly by my taking advantage of a comparatively dry summer to catch up on all the outside work that had backed up through the ghastly wet winter, The Migration is finally finished and scheduled by Baen Books as a hardback release for next May. A generation ship departs from a curiously pluralistic post-calamity world to found a new, idealistic culture elsewhere, and a former traveling illusionist becomes the key player in finding a lost robot that has discovered religion. Further information here, including background and sample excerpts. The Migration — After Earth’s first attempt at a technological civilization was destroyed in a global conflict, the new culture that emerges sets out to build a new world elsewhere, where the influences of the old order cannot reach. But human nature has a way of asserting itself wherever humans exist Moon Flower — A peculiarity of quantum mechanics and strange alien botany give prospects for a better future on Earth. The Two Worlds — Single-volume reissue of the third and fouth novels in the Giants series. Echoes of an Alien Sky — Colonists from another world are already making homes on Earth, while scientists and archeologists reconstruct the story of the extinct race that once inhabited it The Two Moons — Single-volume reissue of the first two novels in the Giants series. Catastrophes, Chaos & Convolutions — Third collection of short fiction, nonfiction essays, biographical anecdotes, and other oddments. Kicking The Sacred Cow — A Collection of nonfiction essays questioning scientific issues that I believe have become dogmatized, where institutionalized science rejects or ignores evidence inconvenient to preconceptions and established theory. Mission to Minerva — Fifth book in the Giants series. Unraveling of the mysterious physics that governs transfer between the alternate realities of the Multiverse enables a mission to be sent back to the time of ancient Minerva in an attempt to alter its history. Global Warming False Alarm — By Ralph Alexander — The Bad Science Behind the United Nations’ Assertion that Man-made CO2 Causes Global Warming The Real Global Warming Disaster — By Christopher Booker — Is the Obsession with “Climate Change” Turning Out to Be the Most Costly Scientific Blunder in History? Heaven and Earth — By Ian Plimer — Global Warming, the Missing Science Nuclear Energy in the 21st Century — By Ian Hore-Lacy — An authoritative primer on all aspects of nuclear energy and its role in the 21st century A Case for Nuclear-Generated Electricity — By Scott W. Heaberlin — Why nuclear power is “Cool” Power to Save the World — By Gwyneth Cravens — Reappraisal of nuclear energy by a former antinuclear activist Terrestrial Energy — By William Tucker — How Nuclear Energy Will Lead the Green Revolution and End America’s Energy Odyssey The Body Electric — By Robert O. Becker & Gary Selden — Electromagnetism and the foundation of life One Of The Perils Of Life On The Farm Issue 56 January 12, 2010 — Bookstore, Bulletin Board, Heretics Catalog, New Projects Issue 55 September 21, 2009 — Nuclear energy article in Lew Rockwell Column Issue 54 August 31, 2009 — New Novel Completed, On The Road and in the Air, Unearthing the Hoover Dam Issue 53 March 16, 2009 — Web Site, Giants Series Movie?, Mind Matters, U.S. Convention Attendances, Current Novel, Bulletin Board, Heretics Books, Mad Goat Attack

Fair Usage Law

February 8, 2017   Posted in: Lavon Affair  Comments Closed

Carrie Fisher Regrets Revealing Harrison Ford Affair: It …

Carrie Fisher Regrets Revealing Harrison Ford Affair: It Was a Mistake (Video) By now, we all know that Carrie Fisher and Harrison Ford had an affair on the set of Star Wars. How? Well, the woman who played Princess Leia wrote all about it in her new memoir, The Princess Diarist. The cleverly titled book is a compilation of her journal entries from her days filming the 1977 film. And some of those clearly got quite steamy. I would probably get early-onset Alzheimers and forget, and then youd never know, Fisher told Stephen Colbert Tuesday on why she revealed the tryst 40 years later. No, I found the diaries, and I decided to publish them, and it was a mistake. Also Read: Stephen Colbert to Return as Host for 39th Kennedy Center Honors It was a mistake, really? Colbert asked. No, but it is too big of a story, kind of, that I cant handle, the actress said. Can you not handle it or can Harrison Ford not handle it? her Late Show host asked. Im sure he cant handle it at all, she replied, head in hand. Also Read: New ‘Rogue One’ TV Spot Is a ‘Dream’ for ‘Star Wars’ Fans (Video) The duo and Fishers dog, Gary then got into the nitty-gritty of the relationship. Theres a lot of sexual details, Fisher promised. The ion cannon will fire several blasts. Watch the video above. Read original story Carrie Fisher Regrets Revealing Harrison Ford Affair: It Was a Mistake (Video) At TheWrap

Fair Usage Law

December 25, 2016   Posted in: Lavon Affair  Comments Closed

NWO World Map | Illuminati Rex

NWO World Map includes details of over 70 conspiracies that are leading the us towards a New World Order 33X23 NWO poster FREE Download POSTER 33 X 23 (85 X 60CM) OVER 70 CONSPIRACIES LEADING THE WORLD TOWARDS A NWO The City The Square Mile or the City of London, is a small area within Greater London. The City has been the nucleus of the worlds financial elite and their agents for several centuries. Washington, DC The military arm of the New World Order. Ensures that corporate rights are maintained and expanded around the world. To be replaced by a UN One World Army. Vatican The Catholic Church has wielded power for over a millennium and remains an important center of religion and spirituality. MK-ULTRA, 1957-64 Mad Science Canada Dr. Donald Cameron conducts experiments for the CIAs Project MK-ULTRA at McGill University. Drugs (including LSD) are used to research mind control. In 1973, CIA director Richard Helms orders the destruction of all related files. Monsanto vs. Schmeiser, 2004 Corporation Canada Monsanto sues farmer for patent infringement after genetically modified seeds accidently contaminate his fields. The Supreme Court of Canada upholds the decision. Attack on Pearl Harbor, 1941 Casus Belli Pearl Harbor, HI Despite warnings of an attack on Pearl Harbor, FDR keeps Pacific Fleet commanders in the dark. The attack gives the US a pretext to enter WWII. Ruby Ridge, 1992 Police State Ruby Ridge, ID ATF agents trump-up charges against Randy Weaver after he refuses to act as an informant. US Marshals armed with M16 rifles fire on Weavers family, shooting his young son in the back. FBI sniper team shoots his wife and their 10-month old baby. 9/11 Attacks, 2001 Casus Belli New York City, NY Two hijacked commercial flights crash into the World Trade Centers Twin Towers causing their complete collapse. Another plane hits the Pentagon and a third crashes in Pennsylvania. Within hours US Defense Secretary is making plans for the invasion of Iraq. Ludlow Massacre, 1914 Police State Ludlow, CO Soldiers of the Colorado National Guard open fire on 1,200 strikers at Rockefeller-owned coal mine, Colorado Fuel & Iron Company. Twenty people, including 11 children are killed. Bohemian Grove, 1872 Secret Society Monte Rio, CA The Bohemian Grove is a 2700-acre enclave in the midst of ancient Redwood trees. Every summer power brokers meet for 3 weeks at The Owl Shrine for informal Lakeside Talks. United Nations, 1945 One World Government San Francisco, CA The UN Charter is signed. US, France, UK, Soviet-Union, and Republic of China wield veto power. UN Headquarters built on land donated by the Rockefellers. The UN currently has 192 member nations. NAFTA, 1992 One World Government San Antonio, TX US President George HW Bush, Canadian PM Brian Mulroney and Mexican President Carlos Salina de Gortari sign NAFTA. The new trilateral trade bloc brings North America a step closer to a North American Union. WACO, 1993 Police State Waco, TX Seventy-five agents and three National Guard helicopters attempt to raid the Branch Davidians, a Christian sect. The FBI begins a 51-day siege eventually killing 76 people. Operation MOCKINGBIRD, 1950s Police State Langley, VA The CIA recruits over 400 journalists from news organizations, including ABC, CBS, NBC, Reuters, Associated Press, Washington Post, New York Times, Newsweek, Time and Life Magazines. The op finances the 1954 animated version of Orwells Animal Farm. Operation Northwoods, 1962 Casus Belli Arlington, VA The Joint Chiefs of Staff plan for the CIA to conduct a series of hijackings and bombings in U.S. cities on both military and civilian targets. These false-flag terrorist acts would be blamed on a foreign government. JFK Assassination, 1963 Assassination Dallas, TX President John F. Kennedy is shot dead. Despite evidence suggesting a high-level government conspiracy, Lee Harvey Oswald is declared the lone gunmen. MLK Assassination, 1968 Assassination Memphis, TN Martin Luther King is shot dead. James Earl Ray is declared a lone nut, ignoring indications of a Mafia hit. Special Forces sniper team is present at the scene as backup for the hit. RFK Assassination, 1968 Assassination Los Angeles, CA Robert Kennedy, poised to become the next US President, is determined to find his brothers murderers. Bobby is shot dead by lone gunman, Sirhan Sirhan. GM Criminal Conspiracy, 1949 Corporation Chicago, IL General Motors, Firestone and Standard Oil use a front company, NLC, to secretly buy and destroy more than 100 electric streetcars in 45 cities including New York, Los Angeles and Philadelphia. Tuskegee Experiment, 1932 1972 Mad Science Tuskegee, AL US Public Health Service conducts experiments on 339 poor African-Americans in advance stages of syphilis. Patients think they are receiving treatment doctors study the effects of not treating the disease. HAARP, 1993 Mad Science Gakona, AK Pentagon funds the worlds largest array of antennas, aimed upward and capable of heating the ionosphere causing changes in weather patterns. Other such facilities exist throughout the world. Federal Reserve, 1910 Corporation Jekyll Island, GA Under strict secrecy, seven representatives of Rockefeller and J.P. Morgan banks meet at Morgans Jekyll Island. They plan the creation of a privately owned central bank, the Federal Reserve. Georgia Guidestones, 1979 One World Government Elbert County, GA Someone using the Rosicrucian-inspired pseudonym R.C. Christian commissions six huge granite slabs inscribed with 10 rules, including the creation of a World Court / global population under 500 million people. Crack and the CIA, 1986 Drug Trafficking Los Angeles, CA The CIA smuggles cocaine into the US from Central America. Its made into crack for distribution in Los Angeles causing an epidemic. Proceeds support CIA black ops. Diamond vs. Chakrabarty, 1980 Corporation Washington, DC The US Supreme Court upholds GEs patent for a microorganism created in their labs. Life can be owned. COINTELPRO, 1956-1971s Police State Washington, DC The FBIs Counter Intelligence Program infiltrates dissident groups within the US. J Edgar Hoover orders agents to expose, disrupt, misdirect, discredit, or otherwise neutralize the groups and its leaders. Agents often incite violence. The Business Plot, 1933 coup dtat Washington, DC Major General Butler exposes a plot to overthrow President Franklin D. Roosevelt. Prominent business leaders from DuPont and Morgan Banks are involved. Trilateral Commission, 1973 Secret Society New York, NY David Rockefeller founds the Trilateral Commission. Includes ruling elite from the US, Europe and Japan. In 1974 they publish The Crisis of Democracy calling for democracy in moderation. Bretton Woods, 1944 One World Government Bretton Woods, NH The 44 Allied nations meet to plan the post-war world. US exploits position as sole superpower to create the World Bank (WB) and the International Monetary Fund. (IMF) CIA Operation PBSUCCESS, 1954 Assassination Guatemala After nationalizing unused United Fruit Company land, popularly elected President Jacobo rbenz is assassinated by the CIA. United Fruit rules the banana republic with its monopoly on banana exports and ownership of its communication industry. Iran Contra Affair, 1980s War Games Nicaragua The US sells weapons via Israel to Iran in exchange for hostages and cash. The CIA uses the proceeds from the sale to fund rebel Contras who seek to overthrow the elected Sandinista government. Panama Canal Zone, 1903 War Games Panama Two weeks after backing Panamas independence from Columbia, The US signs the Hay-Bunau Varilla Treaty gaining control of the canal and land on each side. The US military doesnt return control of the canal until 1999. Jonestown Massacre, 1993 Mad Science Guyana Over 900 members of the Peoples Temple allegedly commit mass suicide by drinking cyanide-laced juice. First coroner at the scene, Dr Mootoo, observes 100s of needle puncture marks and numerous gunshot wounds. Only 7 bodies are autopsied. Assassination of Che Guevara, 1967 Assassination Bolivia CIA leads the search for infamous revolutionary Che Guevara. Two days after his capture Che is executed. CIA man at the scene steals his Rolex. Guevara becomes a symbol of anti-imperialism. Nazi Ratlines, 1951 War Games Argentina US intelligence and the Catholic Church help Nazis including Klaus Barbie, the Butcher of Lyon, escape to South America. Hundreds of war criminals escape. ODESSA is the most well known ratline. CIA Project FUBELT, 1973 coup dtat Chile CIA overthrows democratically elected Salvador Allende and installs the military junta of General Pinochet. Telecommunication giant ITT offers CIA $1 million to get rid of Allende. Pinochet rules as dictator until 1990 later escapes trial for war crimes. Seven Sisters Oil Cartel, 1928 Corporation Scotland Shell Oils Sir Henry Deterding hosts other top oilmen at Achnacarry Castle. The Seven Sisters agree on specific production quotas to set the worlds oil prices. They vow to control outside competition at all cost. Nazi Gold, 1945 War Games Switzerland Nazis loot gold reserves of Austria, Czechoslovakia, Belgium and the Netherlands. By the end of WWII, the gold disappeared somewhere within the European banking system. In 2005, the World Jewish congress successfully sues Swiss banks. Potato Famine, 1845-1847 Corporation Ireland The Irish population is reduced by 25% as potato crops fail. Despite widespread hunger, trade agreements take precedence over human life. Ireland continues to export wheat to England. European Union, 1992 One World Government Netherlands Members of the European Community sign the Maastricht Treaty, creating the European Union. The EU has 27 member states and the Euro () is the worlds second largest reserve currency. Bilderberg Group, 1954 Secret Society Netherlands At the invitation of Prince Bernhard, the crme of the elite crop meet at the Hotel de Bilderberg near Amsterdam. They discuss the creation of a European Union with its own currency. The Bilderberger meet yearly at locations around the world. GATT, 1947 One World Government Switzerland Following the Bretton Woods Conference, 23 countries sign the General Agreement on Tariffs and Trade affecting about half the worlds trade. The GATT evolves into todays World Trade Organization. (WTO) CFR and Chatham House, 1919 Secret Society France At the Paris Peace Conference, powerful members of the elite attend a private gathering at the Majestic Hotel. Round Table member Lionel Curtis suggests the creation a Royal Institute for International Affair in London and the Council of Foreign Relations, its US counterpart in New York. Operation PAPERCLIP, 1945 War Games Germany The CIAs ancestor, the Office of Strategic Service (OSS) secretly recruits German Nazi scientists. President forbids Nazi recruitment, OSS agents denazify ineligible recruits, wiping their records of connections to the Nazis. P2 Masonic Lodge, 1982 Secret Society Italy A day after the collapse of Vatican majority-owned Banco Ambrosiano, Gods banker, Roberto Calvi is found hanging under Londons Black Friars Bridge with $15,000 cash in his pockets. Calvi is a brother of the Mafia dominated P2 Masonic lodge. Operation Gladio, 1940s- 1990s War Games Italy (and many other NATO/neutral countries) Following the end of WWII the US and the UK establish networks of stay behind troops to fight any communist takeover. In Italy, Gladio operatives are involved in domestic terrorism linked to the P2 Masonic Lodge. Greek Premier is CIA coup dtat Greece George Papandreou objects to the US plans for Cyprus. President Johnson replies, F*ck your Parliament and your Constitution. CIA-backed King Constantine dismisses Papandreou, installing military dictatorship of Papadopoulos the first CIA agent to become a European premier. Suez Crisis, 1956 War Games Egypt Three months after President Nasser nationalizes the Suez Canal, France, Britain and Israel meet secretly in Svres. Israel attacks Egypt then France and Britain broker peace, taking control of the canal. Lavon Affair, 1954 Casus Belli Egypt Israeli Intelligence Unit 131 conducts Operation Susannah. They plant bombs in British and American buildings in Cairo and frame Arabs. The false flag operation fails when a bomb goes off prematurely. Israel calls the accusations anti-Semitic until 2005, then confesses. Water Privatization Scheme, 2001 Corporation Ghana In order to access IMF and World Bank loans, Ghana is forced to privatize water supply. Tariffs immediately double leaving many without access. Similar conditions are also imposed on at least 12 other African countries. Private Oil, 2000s Corporation Nigeria The IMF force the largest oil producer in Africa to privatize production, including the largest refineries on the continent. The World Bank determines that the now largely foreign-owned oil industry benefits 1% of the local population. Operation Barracuda, 1961 Assassination Congo CIA sends a lethal virus via diplomatic pouch to assassinate democratically-elected Patrice Lumumba. Opting not to use the virus, the CIA helps Belgium assassinate and dispose of Lumumba. Mobutu, the epitome of African kleptocracy, rules brutally for the next 35 years. Blood Diamonds, 2002 Corporation Angola 70% of Angolas diamonds are of gem quality. The Diamond Cartel, to restrict world production, creates the Kimberley Process making Angolas diamond exports illegal. Round Table Group, 1891 Secret Society South Africa Industrialist Cecil Rhodes and journalist William T. Stead organize a secret society with a Circle of Initiate executive committee and an Association of Helpers outer circle. Lord Milner eventually reorganizes the Association as the Round Table Group. Diamond Cartel, 1888 Corporation South Africa With the help of NM Rothschild in London, Cecil Rhodes consolidates smaller mines and launches the De Beers Mining Company. De Beers and Londons Diamond Syndicate establish a worldwide monopoly. Lee Harvey Oswald, 1957 Mad Science Japan 17-year-old Lee Harvey Oswald arrives at Atsugi naval air base, home to the top secret U-2 spy plane vital to the Korean and Vietnam War. At the time, the CIA uses the base to test LSD on unsuspecting marines as part of project MK-Ultra. Hiroshima Bombing, 1945 War Games Japan Despite obvious signs of Japanese surrender, US President Truman drops atomic bombs on Hiroshima and Nagasaki. Forbidden City, 1949 War Games Taiwan As Mao Zedongs communist troops advance, the CIA-backed KMT loses control over the opium trade and retreats to Taiwan where they set up martial law. Chiang Kai-Shek and his KMT loot over 600,000 artifacts from the Forbidden City Palace. Yamashitas Gold, 1943-46 War Games Philippines Unable to bring looted gold stolen from all over Southeast Asia, Japanese forces hide the loot in the Philippines. The secretive Golden Lily organization oversees the building of complex underground tunnels. The engineers along with slave POW workers are buried alive with the treasure. Opium War, 1839 Drug Trafficking Hong Kong After the British East India Trading Company floods China with opium addicting millions, the ruling Qing Dynasty bans its sale. In defense of free trade, British forces attack Canton (present day Hong Kong). Opium is legalized and the British take Hong Kong. Coca-Cola, 2000s Corporation India Despite widespread water shortages, Coca-Colas bottling plants continue to use and contaminate local water supply. The disposal of toxic waste pollutes soil and destroys farming communities who cant afford soft drinks. Gulf of Tonkin Incident, 1964 Casus Belli Vietnam The USS Maddox intentionally enters South Vietnamese waters and fires at patrol boats. Two days later, 2 US destroyers engage non-existent South Vietnamese targets. President Johnson escalates US involvement in Vietnam. Golden Crescent, 2001 Drug Trafficking Afghanistan, Iran & Pakistan US ends the Taliban and its ban on opium. The Golden Crescent becomes the worlds largest opium producer. By 2007, Afghanistan produces 93% of the worlds opium. Air America, 1959-1975 Drug Trafficking Laos CIA owned Air America transports food and weapons to local tribes helping fight the North Vietnamese. The airline also smuggles opium and heroin for Hmong drug lord, Van Pao. At the time most of the worlds opium supply comes from the Golden Triangle. CIA Operation Hike, 1965 coup dtat Indonesia For Indonesias oil fields, the CIA overthrows democratically elected Sukarno. His replacement, General Suharto, murders 500,000 to 1 million communists. The US embassy supplies names of suspected communists to the regime. Berlin- Baghdad Railway, 1903 Casus Belli Iraq The German-controlled Baghdad Railway Company gains permission from the Ottoman to build a railway from Konya, Turkey to Baghdad, Iraq. The project would give Germans access to rich Iraqi oil fields as well as bypass the British-controlled Suez Canal. The railway becomes a major cause of WW1. Nurse Nayirah, 1990 Casus Belli Iraq A Kuwaiti girl testifies to the U.S. Congress that Iraqi soldiers pulled babies out of their incubators, leaving them to die. The incident helps gain support for war in Iraq. It is revealed that the nurse was hired by public relations firm Hill and Knowlton. Creation of Kuwait, 1913 War Games Kuwait In 1901, British warships force the Ottoman Empire to consider the Gulf port ruled by Sheikh Mubarak to be a British protectorate. The Anglo-Ottoman Convention of 1913 splits Kuwait into a separate sheikdom, permanently constricting Iraqs access to the Persian Gulf. Operation AJAX, 1953 coup dtat Iran After moving to nationalize the only oil company in Iran, British-owned Anglo-Iranian Oil, CIA/MI6 overthrow Prime Minister Mohammed Mossadegh. The Shah of Iran and his CIA-trained SAVAK brutally rule for the next 26 years. IMF Shock Therapy, 1991 Corporation Russia Under pressure from the IMF, Russia adopts a series of dramatic policies causing the collapse of the economy and a depression twice as severe as the Great Depression of 1929. Hyperinflation is rampant and healthcare and life expectancy drop. GDP falls by 50%. Rise of the Russian Mafia, 1991 Secret Society Russia Following the fall of the Soviet Union, the Russian Mafia takes control of the economy. The Mob controls 40% of private enterprises and 60% of Russias state-owned companies. KAL 007, 1983 War Games Russia A Korean Airline flight enters restricted air space of the USSR and is shot down by Soviet Interceptors killing all 269 passengers. The plane may have been on a ferret mission, gathering information on Soviet radar installations. Pine Gap, 1966 Police State Australia At the very center of Australia a satellite tracking station is one of the largest ECHELON ground stations. The joint US-Australian facility appears to be the source of missiles fired at UFOs in the STS-48 NASA footage. Whitlam Dismissal, 1975 coup dtat Australia Prime Minister Gough Whitlam enrages the CIA by cancelling joint CIA-ASIS ops in Chile and demanding a list of CIA operatives in Australia. CIA-man Sir John Kerr, in his largely ceremonial position of Governor General, dismisses Whitlams government.

Fair Usage Law

December 21, 2016   Posted in: Lavon Affair  Comments Closed

False flag operation – RationalWiki

A false flag operation is an operation conducted by one party or government and made to appear as though it were sponsored by another party or government. The term (although not the tactic) has its origins in the traditions of “honourable” naval warfare, where ships were required to sail under their own national flag in order that they could be identified. As people learned that being a sneaky bastard was much more fun much more effective than playing by the rules, ships began sailing under “false” colours, i.e. flying their enemy’s flag in order to get close to their enemy, before swapping to their true colours and opening fire.[1] In the modern use of false flag tactics and operations, this final step is avoided entirely, making it difficult to identify what is really a false flag operation, and what is just some conspiracy nuts not trusting their own government. A list of such attacks either determined or widely held to be false flag attacks follows: Conspiracy theorists have claimed that the terrorist attacks of September 11, 2001 were a false flag operation by the United States Government, notably in the “documentary” Loose Change. Their claims are not seen as credible by most investigators. It is interesting that the concept of a false flag operation is a staple of almost all conspiracy theories – that a government would attack their own people to justify something is appropriately dramatic and evil to be attractive to anyone already predisposed to the idea that the world is secretly being controlled by dark hidden forces. Similar claims were launched within an hour after the Boston Marathon bombing of 15 April 2013, and, two days later, after the West, TX fertiliser plant explosion, citing the monkey that jumps up and down in Alex Jones’ head.[4] On 11 January 2015, in the Project Camelot Portal blog, Kerry Cassidy wrote that the Charlie Hebdo massacre was obviously a False Flag operation by the French government.[5] In fact, since the arrival of 9/11 truthers, no tragedy goes[6]by[7]without someone claiming it was a false flag. Paranoids on both the left [8] and the right [9] have argued that Edward Snowden is, or likely is, a limited hangout or a false flag operation. Which is especially ironic given that Snowden’s NSA documents have revealed actual false flag capabilities by the Canadian government, [10] and a British “dirty tricks” program — including false flag operations — shared with the U.S., New Zealand and Australian (and Canadian) governments.[11] False flag attacks have been used as an attempt to discredit the opposition in a political campaign. For instance, in 2008, a woman claimed to have been attacked and mutilated (having ‘B’ for ‘Barack’ carved into her face) by a black man for being a McCain supporter. Eventually however she confessed that she had mutilated herself and made the whole incident up [12]. Not helping her story was that the B was backwards and looked like it had been made by a fingernail not a knife.

Fair Usage Law

December 7, 2016   Posted in: Lavon Affair  Comments Closed

Earth Timeline | The age of the Earth is 4.54 billion …

This image describes earth in its earliest form Biological Events Timeline: (Ma = Million years before present) First bacteria 3500 Ma Early eukaryotes 1900-1700 Ma Trace animal fossils 1000 Ma Abundant soft-bodied animals 700 Ma First fish 505 Ma Early land plants 438 Ma First amphibians 370 Ma First reptiles 310 Ma End Permian mass extinction event (destroyed 82% of all genera) 245 Ma Dinosaurs appear 240 Ma First mammals 225 Ma First birds 200 Ma Flowering plants appear 140 Ma End Cretaceous mass extinction event (including last dinosaurs); age of mammals begins 66 to 65 Ma Early horses adn other familiar animals 37 Ma Earliest humans 2 Ma Humans dominant 0 Ma (now) Geological Events Timeline: Formation of Earth 4600 Ma Oldest rocks yet discovered 3950 Ma Significant oxygen in atmosphere 1500 Ma Start of formation of Appalachian Mountains 450 Ma Start of supercontinent Pangaea (all continents pushed together) 360 Ma Abundant coal-forming swamps 320 Ma Break-up of Pangaea begins 225 Ma Massive volcanic activity marking opening of north Atlantic Ocean 60 Ma Formation of Rocky Mountains 60 Ma Major deformation of Alps and Himalayas 50 Ma Ice Age which covered much of Ohio 1.6 Ma to 10,000 years Hawaii (big island) eruptions start 0.7 Ma Eruption of Mount St. Helens 0 Ma (May 1980) Geological Eras Information: Archaean Era 3600-4600 Ma(origin of life, beginning of photosynthesis, increaed abundance of oxygen in atmosphere, diversification of prokaryotes) Proterozoic Era 2500-3600 Ma(earliest eukaryotes, trace animal fossils, first multicellular fossils) Paleozoic Era 290-2500 Ma Cambrian Period 543-2500 Ma(marine animals diversify, diverse algae) Ordovician Period 500-543 Ma(diversification of invertebrates, mass extinction at the end of this period) Sulurian Period 439-500 Ma(earliest terrestrial vascular plants) Devonian Period 409-439 Ma(diversification of boney fishes, mass extinction at the end of this period) Carboniferous Period 354-409 Ma(Gondwanaland and small northern continents form, early winged insects, first reptiles) Permian Period 290-354 Ma(Pangaea, glaciations, major mass extinction of marine life at end of this period) Mesozoic Era 144-290 Ma Triassic Period 251-290 Ma(continents begin to separate, first dinosaurs, first mammals) Jurassic Period 206-251 Ma(first birds, gymnosperms dominate, evolution of angiosperms) Cretaceous Period 144-206 Ma(most continents separated, mass extinction at end of period including dinosaurs) Cenozoic Era 0.01-144 Ma Tertiary Period 5.2-144 Ma (continentss near modern positions, climate cools, radiation of mammals, birds, snakes, pollinating insects, angiosperms) Paleocene Epoch 65-144 Ma Eocene Epoch 55.6-65 Ma Oligocene Epoch 33.5-55.6 Ma Miocene Epoch 23.8-33.5 Ma Pliocene Epoch 5.2-23.8 Ma Quaternary Period 0.01-5.2 Ma (continents in modern positions, repeated glaciations, lowering of sea level, extinctions of large mammals, evolution ofHomo erectus and Homo sapiens, rise of agriculture) Pleistocene Epoch 1.8-5.2 Ma Recent (Holocene) Epoch 0.01-1.8 Ma

Fair Usage Law

November 29, 2016   Posted in: Lavon Affair  Comments Closed

Ben-Gurion resigns over Lavon Affair | CIE

January 31, 1961 Prime Minister David Ben-Gurion resigns, setting the stage for new elections in the summer of 1961. Ben-Gurions resignation was tied to a botched Israeli operation in 1954. In that year, concerned that Great Britains planned withdrawal from the Suez Canal would have a negative impact on Israeli trade, Israel launched Operation Susannah, a secret plan to discredit Egypts government, then headed by Gamal Abdel Nasser.Nassers Egypt was clearly becoming Israels leading political nemesis in the Arab world. The plan included having a spy network comprised mostly of Egyptian Jews, bomb Western targets and make it appear as though Egypt was behind the bombings. The operation was foiled by poor planning as well as a betrayal by one of the operators. Thirteen of the spies were arrested by the Egyptians. Two committed suicide and Moshe Marzouk and Shmuel Azar were hanged. Marzouk claimed that he had organized the ring and took full responsibility, apparently to reduce the guilt of the others, most of whom were given prison sentences. In Israel, the episode was blamed on Pinchas Lavon (shown in the photo) who was then serving as Defense Minister, and who ultimately resigned. A special committee was set up by then Prime Minister Moshe Sharett to investigate what had gone wrong but its results were inconclusive. The event resurfaced in 1960 when new information surfaced that two senior officers had given false testimony implicating Lavon in 1954. As a result, a new committee cleared Lavon of any wrongdoing. Ben-Gurion, who had returned to the office of Prime Minister, questioned the legality and objectivity of the new inquiry and resigned. In his letter of resignation, he wrote, My understanding of my obligations forbid me to bear responsibility for the Cabinet decision on December 25 (the decision to accept the report that exonerated Lavon), as this would be incompatible with fundamental principles of justice and the basic laws of the State. Ben-Gurion was unable to form a new government and in March the Knesset was dissolved. New elections were held in August 1961 with Mapai winning 42 seats and Ben-Gurion returning as Prime Minister. Ben-Gurion would remain Prime Minister until 1963 and leave political life in 1970 after half a century of Zionist and Israeli leadership.

Fair Usage Law

November 27, 2016   Posted in: Lavon Affair  Comments Closed

Hart Of Dixie – Dizi 2011 – Beyazperde

Bu diziyi izlemek istiyor musun? Evet Hayr Bu diziyi izledin mi? Puan ver ve yorum yap. 0.5 : Bo 1.0 : ok kt 1.5 : Kt 2.0 : yi deil 2.5 : Eh ite 3.0 : Fena deil 3.5 : yi 4.0 : ok iyi 4.5 : Muhteem 5.0 : Bayapt Bu dizinin hayran msn? Hayranym! Tp Fakltesi’nden mezun olduu gn, cerrah olma hayalleri kuran Zoe Hart’n umutlar, staj yapt hastanenin kendisine burs vermemesiyle suya der. Mezuniyet Gn, yalca bir doktorun eline tututurduu kartvizit artk onun son aresidir. Her ne art altnda olursa olsun, doktorluk yapmak iin yanp tutuan Zoe Hart, kendisine yaplan teklifi kabul etmek zere; New York’tan kalkp Alabama’ya kadar gider. Bluebell denilen kk bir kasabada noktalanan yolculuk, Dr. Zoe Hart’n hayatn da kkten deitirecektir. Yeni sezonda ekranda gremeyeceimiz iki dizi daha… Devamn oku The Flash, Supernatural, The Vampire Diaries ve dierleri… The Tomorrow People, Star-Crossed ve The Carrie Diaries iptal edildi.

Fair Usage Law

November 26, 2016   Posted in: Lavon Affair  Comments Closed

False flag – Wikipedia

“False colors” redirects here. For the imaging technique, see False-color. The contemporary term false flag describes covert operations that are designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them.[1] Historically, the term “false flag” has its origins in naval warfare where the use of a flag other than the belligerent’s true battle flag before (but not while) engaging the enemy has long been accepted as a permissible ruse de guerre; by contrast, flying a false flag while engaging the enemy constitutes perfidy.[1] Operations carried out during peace-time by civilian organizations, as well as covert government agencies, can (by extension) also be called false flag operations if they seek to hide the real organization behind an operation.[citation needed] In land warfare such operations are generally deemed acceptable in certain circumstances, such as to deceive enemies providing that the deception is not perfidious and all such deceptions are discarded before opening fire upon the enemy. Similarly in naval warfare such a deception is considered permissible provided the false flag is lowered and the true flag raised before engaging in battle:[2]auxiliary cruisers operated in such a fashion in both World Wars, as did Q-ships, while merchant vessels were encouraged to use false flags for protection. Such masquerades promoted confusion not just of the enemy but of historical accounts: in 1914 the Battle of Trindade was fought between the British auxiliary cruiser RMS Carmania and the German auxiliary cruiser SMS Cap Trafalgar which had been altered to look like Carmania. (Contrary to some possibly mendacious accounts, the RMS Carmania had not been altered to resemble the Cap Trafalgar.) Another notable example was the World War II German commerce raider Kormoran which surprised and sank the Australian light cruiser HMAS Sydney in 1941 while disguised as a Dutch merchant ship, causing the greatest recorded loss of life on an Australian warship. While Kormoran was fatally damaged in the engagement and its crew captured the outcome represented a considerable psychological victory for the Germans.[3] Other examples from WWII included a Kriegsmarine ensign in the St Nazaire Raid and captured a German code book: the old destroyer Campbeltown, which the British planned to sacrifice in the operation, was provided with cosmetic modifications that involved cutting the ship’s funnels and chamfering the edges to resemble a German Type 23 torpedo boat. By this ruse the British were able to get within two miles (3km) of the harbour before the defences responded, where the explosive-rigged Campbeltown and commandos successfully disabled or destroyed the key dock structures of the port.[4][5] In December 1922February 1923, Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare, drafted by a commission of jurists at the Hague regulates:[6] This draft was never adopted as a legally binding treaty, but the ICRC states in its introduction on the draft that ‘To a great extent, [the draft rules] correspond to the customary rules and general principles underlying treaties on the law of war on land and at sea’,[7] and as such these two noncontroversial articles were already part of customary law.[8] In land warfare, the use of a false flag is similar to that of naval warfare: the trial of Otto Skorzeny, who planned and commanded Operation Greif, by a U.S. military tribunal at the Dachau Trials included a finding that Skorzeny was not guilty of a crime by ordering his men into action in American uniforms. He had relayed to his men the warning of German legal experts: that if they fought in American uniforms, they would be breaking the laws of war; however, they probably were not doing so simply by wearing the American uniforms. During the trial, a number of arguments were advanced to substantiate this position and the German and U.S. military seem to have been in agreement. In the transcript of the trial,[9] it is mentioned that Paragraph 43 of the Field Manual published by the War Department, United States Army, on 1 October 1940, under the entry Rules of Land Warfare states “National flags, insignias and uniforms as a ruse in practice it has been authorized to make use of these as a ruse. The foregoing rule (Article 23 of the Annex of the IVth Hague Convention), does not prohibit such use, but does prohibit their improper use. It is certainly forbidden to make use of them during a combat. Before opening fire upon the enemy, they must be discarded’.” The American Soldiers’ Handbook, was also quoted by Defense Counsel: “The use of the enemy flag, insignia, and uniform is permitted under some circumstances. They are not to be used during actual fighting, and if used in order to approach the enemy without drawing fire, should be thrown away or removed as soon as fighting begins.” Subsequently the outcome of the trial has been codified in the 1977 Protocol Additional to the Geneva Conventions of 12 August 1949 (Protocol I): Article 37. Prohibition of perfidy Article 38. Recognized emblems Article 39. Emblems of nationality A false flag in the cyber domain is slightly different and easier to perpetrate than in other physical theaters of war. Cyber false flags refer to tactics used in covert cyber attacks by a perpetrator to deceive or misguide attribution attempts including the attackers origin, identity, movement, and/or code/exploitation. This misdirection tactic can cause misattribution (permitting response and/or counterattack as a condicio sine qua non under international law) or misperception which can lead to retaliation against the wrong adversary. Cyber false flags can exist in the cyber domain when: In 1788, the head tailor at the Royal Swedish Opera received an order to sew a number of Russian military uniforms. These were then used by the Swedes to stage an attack on Puumala, a Swedish outpost on the Russo-Swedish border, on 27 June 1788. This caused an outrage in Stockholm and impressed the Riksdag of the Estates, the Swedish national assembly, who until then had refused to agree to an offensive war against Russia. The Puumala incident allowed King GustavIII of Sweden, who lacked the constitutional authority to initiate unprovoked hostilities without the Estates’ consent, to launch the Russo-Swedish War (17881790). In September 1931, Japanese officers fabricated a pretext for invading Manchuria by blowing up a section of railway. Though the explosion was too weak to disrupt operations on the rail line, the Japanese nevertheless used this Mukden incident to seize Manchuria and create a puppet government for what they termed the “independent” state of Manchukuo.[11] The Gleiwitz incident in 1939 involved Reinhard Heydrich fabricating evidence of a Polish attack against Germany to mobilize German public opinion for war and to justify the war with Poland. Alfred Naujocks was a key organiser of the operation under orders from Heydrich. It led to the deaths of Nazi concentration camp victims who were dressed as German soldiers and then shot by the Gestapo to make it seem that they had been shot by Polish soldiers. This, along with other false flag operations in Operation Himmler, would be used to mobilize support from the German population for the start of World WarII in Europe.[12] The operation failed to convince international public opinion of the German claims, and both Britain and FrancePoland’s alliesdeclared war two days after Germany invaded Poland.[13] On November 26, 1939, the Soviet army shelled Mainila, a Russian village near the Finnish border. Soviet authorities blamed Finland for the attack and used the incident as a pretext to invade Finland, starting the Winter War, four days later.[14] The proposed, but never executed, 1962 Operation Northwoods plot by the U.S. Department of Defense for a war with Cuba involved scenarios such as fabricating the hijacking or shooting down of passenger and military planes, sinking a U.S. ship in the vicinity of Cuba, burning crops, sinking a boat filled with Cuban refugees, attacks by alleged Cuban infiltrators inside the United States, and harassment of U.S. aircraft and shipping and the destruction of aerial drones by aircraft disguised as Cuban MiGs.[16] These actions would be blamed on Cuba, and would be a pretext for an invasion of Cuba and the overthrow of Fidel Castro’s communist government. It was authored by the Joint Chiefs of Staff, but then rejected by President John F. Kennedy. The surprise discovery of the documents relating to Operation Northwoods was a result of the comprehensive search for records related to the assassination of President John F. Kennedy by the Assassination Records Review Board in the mid-1990s.[17] Information about Operation Northwoods was later publicized by James Bamford.[18] The Reichstag fire was an arson attack on the Reichstag building in Berlin on 27 February 1933. The fire started in the Session Chamber,[19] and, by the time the police and firemen arrived, the main Chamber of Deputies was engulfed in flames. Police searched the building and found Marinus van der Lubbe, a young Dutch council communist and unemployed bricklayer, who had recently arrived in Germany to carry out political activities.[citation needed] The fire was used as evidence by the Nazis that the Communists were beginning a plot against the German government. Van der Lubbe and four Communist leaders were subsequently arrested. Adolf Hitler, who was sworn in as Chancellor of Germany four weeks before, on 30 January, urged President Paul von Hindenburg to pass an emergency decree to counter the “ruthless confrontation of the Communist Party of Germany”.[20] With civil liberties suspended, the government instituted mass arrests of Communists, including all of the Communist parliamentary delegates. With their bitter rival Communists gone and their seats empty, the National Socialist German Workers Party went from being a plurality party to the majority; subsequent elections confirmed this position and thus allowed Hitler to consolidate his power.[citation needed] Historians disagree as to whether Van der Lubbe acted alone, as he said, to protest the condition of the German working class, or whether the arson was planned and ordered by the Nazis, then dominant in the government themselves, as a false flag operation.[21][22] On 4 April 1953, the CIA was ordered to undermine the government of Iran over a four-month period, as a precursor to overthrowing Prime Minister Mohammad Mosaddegh.[23] One tactic used to undermine Mosaddegh was to carry out false flag attacks “on mosques and key public figures”, to be blamed on Iranian communists loyal to the government.[23] The CIA project was code-named TP-Ajax, and the tactic of a “directed campaign of bombings by Iranians posing as members of the Communist party”,[24] involved the bombing of “at least” one well known Muslim’s house by CIA agents posing as Communists.[24] The CIA determined that the tactic of false flag attacks added to the “positive outcome” of Project TPAJAX.[23] However, as “[t]he C.I.A. burned nearly all of its files on its role in the 1953 coup in Iran”, the true extent of the tactic has been difficult for historians to discern.[25] In 2008 there was a shooting against two minibuses driving along in a volatile area right on the border between Abkhazia and the republic of Georgia. The buses were carrying Georgians who lived in Abkhazia and wanted to cross the border so they could go and vote in the parliamentary election that day.[citation needed] The country had been experiencing internal political turmoil for the last year, and in an attempt to calm the situation, president Mikheil Saakashvili moved forward both presidential and parliamentary elections. However the presidential election in January that year was strongly contested, with hundreds of thousands attending protest rallies. When the parliamentary election came up in May, the mood was still tense.[citation needed] On mid day 21 May the two minibuses came under attack with small arms and grenades, and though there were no casualties, three people were taken to a hospital in Zugdidi, where president Saakashvili later arrived and was filmed by TV at the patients’ bedside.[citation needed] In his comments on TV, which dominated the news during election day, Saakashvili indicated that the attack had been an attempt to disrupt the election, implying that it had been Abkhaz or Russian forces who had been behind it. This provided for a favorable opportunity for the president to focus the nation’s attention on an external enemy, thereby leading attention away from his domestic critics, as well as making use of his position as leader to rally the Georgians around his candidates in the election.[citation needed] An investigation by the United Nations Observer Mission in Georgia found that the attackers were located on the Georgian side of the ceasefire line, about 100m from the buses, and that although hard evidence of the attackers’ identities was lacking, inconsistencies merited further investigation, particularly the suggestion that the filming of the attack seemed anticipatory.[26] A Georgian investigative TV documentary later found that camera crew from the government-friendly channel Rustavi 2 had been in position with their equipment before the shooting took place.[citation needed] Pseudo-operations are those in which forces of one power disguise themselves as enemy forces. For example, a state power may disguise teams of operatives as insurgents and, with the aid of defectors, infiltrate insurgent areas.[27] The aim of such pseudo-operations may be to gather short or long-term intelligence or to engage in active operations, in particular assassinations of important enemies. However, they usually involve both, as the risks of exposure rapidly increase with time and intelligence gathering eventually leads to violent confrontation. Pseudo-operations may be directed by military or police forces, or both. Police forces are usually best suited to intelligence tasks; however, military provide the structure needed to back up such pseudo-ops with military response forces. According to US military expert Lawrence Cline (2005), “the teams typically have been controlled by police services, but this largely was due to the weaknesses in the respective military intelligence systems.”[citation needed] The State Political Directorate (OGPU) of the Soviet Union set up such an operation from 1921 to 1926. During Operation Trust, they used loose networks of White Army supporters and extended them, creating the pseudo-“Monarchist Union of Central Russia” (MUCR) in order to help the OGPU identify real monarchists and anti-Bolsheviks.[citation needed] An example of a successful assassination was United States Marine Sergeant Herman H. Hanneken leading a patrol of his Haitian Gendarmerie disguised as enemy guerrillas in 1919. The Patrol successfully passed several enemy checkpoints in order to assassinate the guerilla leader Charlemagne Pralte near Grande-Rivire-du-Nord. Hanneken was awarded the Medal of Honor and was commissioned a Second Lieutenant for his deed.[citation needed] During the Mau Mau uprising in the 1950s, captured Mau Mau members who switched sides and specially trained British troops initiated the pseudo-gang concept to successfully counter Mau Mau. In 1960 Frank Kitson, (who was later involved in the Northern Irish conflict and is now a retired British General), published Gangs and Counter-gangs, an account of his experiences with the technique in Kenya; information included how to counter gangs and measures of deception, including the use of defectors, which brought the issue a wider audience.[citation needed] Another example of combined police and military oversight of pseudo-operations include the Selous Scouts in the former country Rhodesia (now Zimbabwe), governed by white minority rule until 1980. The Selous Scouts were formed at the beginning of Operation Hurricane, in November 1973, by Major (later Lieutenant Colonel) Ronald Reid-Daly. As with all Special Forces in Rhodesia, by 1977 they were controlled by COMOPS (Commander, Combined Operations) Commander Lieutenant General Peter Walls. The Selous Scouts were originally composed of 120 members, with all officers being white and the highest rank initially available for black soldiers being colour sergeant. They succeeded in turning approximately 800 insurgents who were then paid by Special Branch, ultimately reaching the number of 1,500 members. Engaging mainly in long-range reconnaissance and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination of Zimbabwe People’s Revolutionary Army leader Joshua Nkomo in Zambia. This mission was finally aborted by the Selous Scouts, and attempted again, unsuccessfully, by the Rhodesian Special Air Service.[28] Some offensive operations attracted international condemnation, in particular the Selous Scouts’ raid on a Zimbabwe African National Liberation Army (ZANLA) camp at Nyadzonya Pungwe, Mozambique in August 1976. ZANLA was then led by Josiah Tongogara. Using Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 people in the camp-the camp was registered as a refugee camp by the United Nations (UN). Even according to Reid-Daly, most of those killed were unarmed guerrillas standing in formation for a parade. The camp hospital was also set ablaze by the rounds fired by the Scouts, killing all patients.[29] According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was only a refugee camp that did not host any guerrillas. It was staged for UN approval.[30] According to a 1978 study by the Directorate of Military Intelligence, 68% of all insurgent deaths inside Rhodesia could be attributed to the Selous Scouts, who were disbanded in 1980.[31] If the action is a police action, then these tactics would fall within the laws of the state initiating the pseudo, but if such actions are taken in a civil war or during a belligerent military occupation then those who participate in such actions would not be privileged belligerents. The principle of plausible deniability is usually applied for pseudo-teams. (See the above section Laws of war). Some false flag operations have been described by Lawrence E. Cline, a retired US Army intelligence officer, as pseudo-operations, or “the use of organized teams which are disguised as guerrilla groups for long- or short-term penetration of insurgent-controlled areas.”[citation needed] Pseudo Operations should be distinguished, notes Cline, from the more common police or intelligence infiltration of guerrilla or criminal organizations. In the latter case, infiltration is normally done by individuals. Pseudo teams, on the other hand, are formed as needed from organized units, usually military or paramilitary. The use of pseudo teams has been a hallmark of a number of foreign counterinsurgency campaigns.”[27] Similar false flag tactics were also employed during the Algerian civil war, starting in the middle of 1994. Death squads composed of Dpartement du Renseignement et de la Scurit (DRS) security forces disguised themselves as Islamist terrorists and committed false flag terror attacks. Such groups included the Organisation of Young Free Algerians (OJAL) or the Secret Organisation for the Safeguard of the Algerian Republic (OSSRA)[32] According to Roger Faligot and Pascal Kropp (1999), the OJAL was reminiscent of “the Organization of the French Algerian Resistance (ORAF), a group of counter-terrorists created in December 1956 by the Direction de la surveillance du territoire (Territorial Surveillance Directorate, or DST) whose mission was to carry out terrorist attacks with the aim of quashing any hopes of political compromise”.[33] In espionage the term “false flag” describes the recruiting of agents by operatives posing as representatives of a cause the prospective agents are sympathetic to, or even the agents’ own government. For example, during the Cold War, several female West German civil servants were tricked into stealing classified documents by agents of the East German Stasi intelligence service, pretending to be members of West German peace advocacy groups (the Stasi agents were also described as “Romeos,” indicating that they also used their sex appeal to manipulate their targets, making this operation a combination of the false flag and “honey trap” techniques).[34] The technique can also be used to expose enemy agents in one’s own service, by having someone approach the suspect and pose as an agent of the enemy. Earl Edwin Pitts, a 13-year veteran of the U.S. Federal Bureau of Investigation and an attorney, was caught when he was approached by FBI agents posing as Russian agents.[citation needed] British intelligence officials in World War II allowed double agents to fire-bomb a power station and a food dump in the UK to protect their cover, according to declassified documents. The documents stated the agents took precautions to ensure they did not cause serious damage. One of the documents released also stated: “It should be recognised that friends as well as enemies must be completely deceived.”[35] While false flag operations originate in warfare and government, they also can occur in civilian settings among certain factions, such as businesses, special interest groups, religions, political ideologies and campaigns for office.[citation needed] In business and marketing, similar operations are being employed in some public relations campaigns (see Astroturfing). Telemarketing firms practice false flag type behavior when they pretend to be a market research firm (referred to as “sugging”). In some rare cases, members of an unsuccessful business will destroy some of their own property to conceal an unrelated crime (e.g., safety violations, embezzlement) but make it appear as though the destruction was done by a rival company.[citation needed] Political campaigning has a long history of this tactic in various forms, including in person, print media and electronically in recent years. This can involve when supporters of one candidate pose as supporters of another, or act as straw men for their preferred candidate to debate against. This can happen with or without the candidate’s knowledge. The Canuck letter is an example of one candidate creating a false document and attributing it as coming from another candidate in order to discredit that candidate.[citation needed] In the final days of Florida’s 1994 gubernatorial campaign, Democratic Governor Lawton Chiles ran a false flag operation that paid for tens of thousands of calls to elderly voters using false organization names. The calls purported to be from Republican groups and told voters that Jeb Bush was against Social Security and seniors. Chiles denied his campaign was behind the calls. After winning re-election and facing an investigation, Chiles admitted the truth in November 1995.[36] In 2006, individuals practicing false flag behavior were discovered and “outed” in New Hampshire[37][38] and New Jersey[39] after blog comments claiming to be from supporters of a political candidate were traced to the IP address of paid staffers for that candidate’s opponent. On 19 February 2011, Indiana Deputy Prosecutor Carlos Lam sent a private email to Wisconsin Governor Scott Walker suggesting that he run a “‘false flag’ operation” to counter the protests against Walker’s proposed restrictions on public employees’ collective bargaining rights: If you could employ an associate who pretends to be sympathetic to the unions’ cause to physically attack you (or even use a firearm against you), you could discredit the unions … Employing a false flag operation would assist in undercutting any support that the media may be creating in favor of the unions.[40][41] The press had acquired a court order to access all of Walker’s emails and Lam’s email was exposed. At first, Lam vehemently denied it, but eventually admitted it and resigned.[41] Proponents of political or religious ideologies will sometimes use false flag tactics. This can be done to discredit or implicate rival groups, create the appearance of enemies when none exist, or create the illusion of organized and directed persecution. This can be used to gain attention and sympathy from outsiders, in particular the media, or to convince others within the group that their beliefs are under attack and in need of protection. In retaliation for writing The Scandal of Scientology, some members of the Church of Scientology stole stationery from author Paulette Cooper’s home and then used that stationery to forge bomb threats and have them mailed to a Scientology office. The Guardian’s Office also had a plan for further operations to discredit Cooper known as Operation Freakout, but several Scientology operatives were arrested in a separate investigation and the plan was exposed.[42]

Fair Usage Law

November 24, 2016   Posted in: Lavon Affair  Comments Closed

Spies Against Armageddon by Dan Raviv and Yossi Melman

By Dan Raviv originally posted in June 2012 Here in Washington, Israels PresidentShimon Peresis enjoying the highest possible American government accolades receiving the Medal of Freedom Award from President Barack Obama. Peres also has been an active peacemaker, whenever peace efforts seem possible in the Middle East, and he calls on the current coalition government in his country to make stronger efforts at re-starting peace talks with the Palestinians. In remarks prepared for delivery on Wednesday evening at the White House, President Obama praises the newest Medal of Freedom honoree: The United States is fortunate to have many allies and partners around the world. Of course, one of our strongest allies, and one of our closest friends, is the State of Israel. And no individual has done so much over so many years to build our alliance and bring our two nations closer as the leader we honor tonightour friend, Shimon Peres. in him we see the essence of Israel itselfan indomitable spirit that will not be denied. Shimon knows the necessity of strength. As Ben-Gurion said, an Israel capable of defending herselfwhich cannot be destroyedcan bring peace nearer. And so hes worked with every American President since John F. Kennedy. And its why Ive worked with Prime Minister Netanyahu to ensure that the security cooperation between the United States and Israel is closer and stronger than it has ever been. Because the security of the State of Israel is non-negotiable. And the bonds between us are unbreakable. And yet, Shimon knows that a nations security depends, not just on the strength of its arms, but upon the righteousness of its deedsits moral compass. He knows, as Scripture teaches, that we must not only seek peace, we must pursue it. And so it has been the cause of his lifepeace, security and dignity, for Israelis and Palestinians and all Israels Arab neighbors. September 27, 2016 In his latest documentary, Zero Days, the award-winning Alex Gibney reveals that the Obama Administration believed an Israeli attack on Irans nuclear facilities which seemed in 2012 to be a very real prospect would draw the United States into war. To prepare, the NSA created a set of cyberattacks code named Nitro Zeus which could have crippled Iranian industry, transport, and other modern services. Zero Days was the opening feature of the AFI Docs festival in Washington, DC, on June 22. Gibney was interviewed by Dan Raviv for the CBS News Weekend Roundup radio magazine; and Yossi Melman is seen in the film as an expert commenting on Israeli motivations in confronting Irans nuclear program. Melman also credited in the film as a consultant. Raviv and Melman are co-authors of five books, including the current history of Israeli intelligence Spies Against Armageddon. Here is part of an article Melman wrote forThe Jerusalem Postin February 2016, when the documentary was first screened at the Berlin Film Festival. Michael Hayden, former head of both the CIA and the NSA, is in the film and claims the goal of a potential Israeli strike on Iran would be to drag the U.S. into war. The film also quotes other sources in the US intelligence community who accuse Israel of disrupting a joint covert operation to sabotage computers used in Irans nuclear program by acting rashly and in opposition to agreed-upon plans. As a result, hundreds of millions of dollars that were invested in the operation went to waste. A graphic from the documentary Zero Days The film contains testimony from NSA and CIA operatives who worked together with Israeli colleagues from the 8200 Military Intelligence Unit and Mossad to develop several versions of a deadly virus that penetrated computers at the uranium enrichment facility at Natanz in Iran. The testimony is delivered anonymously by an actress whose face remains hidden. We spent millions on this operation to sabotage all of the computers of the Iranian infrastructure in the instance of a war, a source quoted in the film said. We penetrated the government, electricity lines, power stations and most of the infrastructure in Iran. The deadly virus that was implanted at Natanz was named Stuxnet by computer security experts, but it had a different name among the Israeli and American intelligence communities: Olympic Games as revealed byNew York Times journalist David E. Sanger. Conventional wisdom holds that the implanting of the virus marked the first time that a country, or two countries in this case (the U.S. and Israel), engaged in cyber warfare against another country (Iran). Up until then, the majority of attacks were carried out by individual hackers for their own enjoyment or for political purposes, by criminals for the purposes of fraud and thievery, or by companies engaged in industrial and commercial espionage. Vice President Joe Biden is quoted in the film as saying in a meeting that the Israelis changed the code of the deadly viruss software. As a result, the virus spread from nuclear program computers to many other computers in Iran, and from there to computers around the world even harming the computers of American companies. According to the film, the premature exposure of the operation caused by Israels actions also caused the virus software, which was among the most classified and most advanced in the world, to leak to Russian and Iranian intelligence. Ironically, it is said in the film, the secret formula for writing the code for the virus software fell into the hands of Russia and Iran the country against which it was developed. June 23, 2016 [This post is based on an article in Hebrew by Yossi Melman, co-author of Spies Against Armageddon: Inside Israels Secret Wars and other books, in the newspaperMaariv.] The Mossad Israels famed foreign intelligence agency placed unusual advertisements in several Israeli newspapers on Wednesday. It is not the first time that the Mossad published want ads, announcing that jobs are available for the right men and women. This one also seems to be polishing the secret agencys image as a cutting-edge, entirely modern and exciting place to work. The ad shows rows of numbers, apparently meant to represent computer code on a screen and among the digits are English letters that read: ARE YOU READY FOR A CHALLENGE? At the bottom, in Hebrew, is the official symbol of the Mossad with its motto quoting the Bible: Where there is no counsel, the nation falls; but there is salvation in a multitude of counsel. (Proverbs 11:14) And intriguingly at the bottom is apparently the name of the Mossad department looking for brilliant employees: The Operational Cyber Arm. The agencys website also invites job applications. Mossad.gov.il came into existence only about 15 years ago. In part that was part of a new wave of relative openness: acknowledging that the Mossad exists and making it legal to publish the name of its director (Yossi Cohen this year replaced Tamir Pardo). Also, the website is part of a recruitment effort in Hebrew, English, Russian, Arabic, and Farsi (Persian) which suggests that working for Israeli intelligence can give a person amazing experiences. It was also, in the past 10 to 15 years, that the Mossad instructed by Prime Ministers Ariel Sharon and Ehud Olmert stepped up its efforts to derail and sabotage Irans nuclear program. May 11, 2016 Israeli hastiness blew operation to sabotage Irans computers, U.S. officials say: Zero Days, Alex Gibneys film premiering at the Berlin International Film Festival, explores the joint U.S.-Israeli operation to develop the Stuxnet virus and sabotage Irans nuclear program If Israel were ever to bomb Iran and its nuclear facilities according to Gen. Michael Hayden, former head of both the CIA and the NSA Israels goal would be to drag the United States into war. MIchael Hayden, in the film Zero Days Hayden makes the remark in a documentary film premiering this week at the Berlin International Film Festival. The film also quotes other sources in the U.S. intelligence community who accuse Israel of disrupting a joint covert operation to sabotage computers used in Irans nuclear program by acting rashly. The sources say Israel did not stick with the agreed-upon plan. As a result, hundreds of millions of dollars that were invested in the operation went to waste. The film, Zero Days, was directed by Alex Gibney, whose film Taxi to the Dark Side won the Academy Award for Best Documentary Feature in 2008. His new film includes testimony from NSA and CIA operatives who worked together with Israeli colleagues from the 8200 Military Intelligence Unit and Mossad to develop several versions of a deadly virus that penetrated computers at the uranium enrichment facility at Natanz in Iran. The testimony is delivered anonymously by an actress whose face remains hidden. Filmmaker Alex Gibney According to the claims in the film, the hasty Israeli action prevented the carrying out of a number of further planned actions that were intended to sabotage computers at a second, more fortified uranium enrichment facility at Fordow. The film also reveals another planned cyber unit covert operation code-named NZ (Nitro Zeus). We spent millions on this operation to sabotage all of the computers of the Iranian infrastructure in the instance of a war, a source quoted in the film said. We penetrated the government, electricity lines, power stations and most of the infrastructure in Iran. As seen in Zero Days The deadly virus that was implanted at Natanz was named Stuxnet by computer security experts, but it had a different name among the Israeli and American intelligence communities that was not revealed in the film. The code-name of the entire operation, as was revealed by New York Timesjournalist David Sanger, was Olympic Games. Conventional wisdom holds that the implanting of the virus marked the first time that a country, or two countries in this case (the U.S. and Israel), engaged in cyber warfare against another country (Iran). Up until then, the majority of attacks were carried out by individual hackers for their own enjoyment or for political purposes, by criminals for the purposes of fraud and thievery, or by companies engaged in industrial and commercial espionage. Americas Vice President Joe Biden is quoted in the film as saying in a meeting that the Israelis changed the code of the deadly viruss software. As a result, in contravention of the plan, the virus spread from nuclear program computers to many other computers in Iran, and from there, to computers around the world even harming the computers of American companies. LInes of code of Stuxnet, seen in the film The unplanned spread of the virus led to the exposure of the operation. That enabled the Iranians, with the help of information security experts from Belarus and Russia, to invent a vaccine for their computers to better defend the nuclear program. According to the film, the premature exposure of the operation due to Israels actions also caused the virus software, which was among the most classified and most advanced in the world, to leak to Russian and Iranian intelligence. Ironically, it is said in the film, the secret formula for writing the code for the virus software fell into the hands of Russia and of Iran the country against which it was developed. The development of Stuxnet and the planning of Operation Olympic Games began in 2006, during George W. Bushs term as president. He fervently wanted to thwart the Iranian nuclear program. Hayden, with his long experience in both the CIA and the NSA, declares in the film that President Bush did not want to be left with the choice of to bomb or be bombed. Revealed too much: Ahmadinejads Visit to Natanz According to the film, experts from both countries came up with the idea of trying to sabotage Irans nuclear facilities, and in particular their computers. News photographs of then-Iranian president Mahmoud Ahmadinejads visit to the Natanz facility helped the experts obtain needed intelligence on the computers. The computers, their configuration and their rear connections can be seen clearly in the pictures. Eventually, these entry and exit points served as portals to implant the virus. Iranian nuclear experts accompanied Ahmadinejad on his tour of the facility. One of those photographed at Ahmadinejads side was assassinated a few years later, in an operation that was attributed to the Mossad. On Bushs orders, exact replicas of the centrifuges were built at the national laboratory in Oak Ridge, Tennessee, which is also used to produce nuclear weapons, and at Israels nuclear reactor in Dimona. The deadly virus was implanted in the centrifuges and their rotors were damaged and broken. Intelligence operatives brought the broken rotors to the White House situation room, showed them to President Bush and explained what the sabotage could do. Bush was impressed, saying, Go and try. He ordered a greater investment in offensive, covert cyber warfare and approved the operation. According to the film, offensive cyber warfare against Iran was increased even more during Barack Obamas term. A key reason was his concern that Israel under the leadership of Prime Minister Benjamin Netanyahu and then-defense minister Ehud Barak would take military action against Iran. Hayden reveals in the film that Americas fear was that the real goal of an Israeli attack [against the nuclear facilities in Iran], would be to drag us into war, because Israels own attack capabilities were limited. Hayden continues: Israel has an excellent air force, but its small. The distance is great and the facilities are spread throughout Iran. In order to calm Israel down, and to prove that the administration was working diligently to thwart an Iranian nuclear weapon, Obama ordered the intelligence community to increase its efforts and its cooperation with the Mossad and Unit 8200. He did so despite having some doubts about the operation. Obama expressed concern that the Chinese and the Russians will do the same thing to us, and insert viruses into nuclear facilities and other strategic sites in the United States. However, Obamas greater fear was of an Israeli attack. The goal was to gain time, Hayden added, in order to force Iran to come to the negotiating table. According to the film, British intelligence also secretly took part in the operation through GCHQ, its unit responsible for telephone surveillance, communications interception, code-breaking, and cyber warfare. But the main partner was Israel, the film says. And in Israel the Mossad ran the show. 8200 provided technical help. Israel was the key to the whole story. In the beginning, the virus succeeded at its mission, according to the film. As far as we knew, but they werent telling us everything, an NSA source told Alex Gibneys team. The virus was implanted in the computers, probably by the Mossad, through its infiltration of two software companies in Taiwan that were working with the Iranians. The plan was for the virus to harm the digital and computerized electric boxes made by the German company Siemens, which were hooked up to the computers that operated the centrifuges. About a thousand of the 5,000 centrifuges were damaged without the Iranians discovering the cause of the problem. The plan did what it was supposed to do, an anonymous American intelligence operative said. The centrifuges blew up without leaving a trace. The sabotage operation also had a psychological goal: to instill in the Iranian leadership and in the community of scientists a feeling that they were helpless and did not understand what was happening. An additional goal was to drive a wedge between the scientists on one side and Irans political and military leadership. It did turn out that Iranian authorities accused their experts of failure and began firing them and threatened them. According to testimony gathered by the filmmakers, several hundred programmers, mathematicians, and computer engineers worked in Tailored Access Operations (TAO) teams at CIA headquarters and the cyber command in Fort Meade, Maryland. Only these teams were authorized to infiltrate computers outside of the U.S., including those in Iran. The sources quoted in the film say the U.S. and Israel developed a few different versions of the Stuxnet virus. Each new version was more powerful than its predecessor. The idea was to gradually implant increasingly stronger versions of the virus. In addition, it was established that each country had the right to act independently, as long as it informed the other of its actions. However, according to the film, as a result of pressure from Netanyahu on the chief of the Mossad to show results, it was decided in Israel to use the most deadly version of the virus prematurely. We operated at a low profile, an NSA source said. The Israelis, on the other hand, constantly pushed to be more aggressive. In this way, after the strongest version of the virus was implanted in order to increase the force of the damage to the centrifuges at Natanz, the virus, according to German information security expert Ralph Langer, began to jump from computer to computer, until it was out of control and unintentionally spread to thousands of computers, networks and systems, including computers in the United States. Our friends from Israel took a weapon that we developed jointly, among other things in order to defend Israel, and did something crazy with it, and actually blew the operation. We were very furious, an American source said. The film reveals that the presidential orders of Bush and Obama to activate the cyber weapon were based on their authority to use nuclear weapons. As a result of this American-Israeli cyber warfare, Iran began to develop and to enhance its own attack tools. A few years ago, in revenge and as a message of deterrence, it attacked 30,000 computers belonging to the Saudi oil company Aramco and computers belonging to American banks. Against this backdrop, the film also delves into the philosophical-theoretical issue of the worlds need to establish international treaties and rules of whats legal and illegal in cyber warfare, like the international conventions that govern the laws of conventional warfare. In addition to Hayden, other U.S. officials are interviewed in the film, including Richard Clarke, an anti-terrorism and cyber warfare consultant in the Bush, Clinton and Bush administrations; John C. Inglis, former deputy NSA chief; Gary Samore, formerly with the Obama National Security Council; and the head of information and computer security branch of the Department of Homeland Security. The New York Times Sanger also served as consultant to the films director and producers. On the Israeli side, interviews were conducted with former Military Intelligence chief Amos Yadlin, current National Infrastructure, Energy and Water and former Intelligence Minister Yuval Steinitz, as well as the writer of this article, who also served as a consultant to the filmmakers. Computer security experts from the American firm Symantec appear in the film, as well as the German expert Ralph Langer and Eugene Kaspersky, who is considered one of the best-known computer security experts in the world. Kaspersky was formerly a Russian intelligence operative and is considered to have close ties to the Kremlin. February 16, 2016 [This article was written forThe Jerusalem Report, a magazine published byThe Jerusalem Post, by Yossi Melman, co-author of the best sellerEvery Spy a Prince and other books, including the current history of the Mossad and Israeli security agencies:Spies Against Armageddon: Inside Israels Secret Wars.] Yossi Cohen is taking over (on January 6) at Mossad headquarters in Glilot, north of Tel Aviv, as the intelligence organizations twelfth director. He is replacing Tamir Pardo who retires after 35 year in the agency, five of them as its head. Yossi Cohen, Israels new top spymaster For the last two and half years Cohen served as national security adviser to the prime minister and as head of the National Security Council. This capacity and proximity to Benjamin Netanyahu gave him the edge over two other senior Mossad officials in the running for the job. Netanyahu trusts Cohen and assigned him secret and sensitive missions; among them mending relations with Turkey; improving ties with the Obama administration, which he did via his good contacts with his American counterpart Susan Rice; and clandestine meetings with Arab leaders and officials. Cohen is 54 years old. He is a typical product of the Mossad, where he has served in various operational and managerial capacities since 1983; but he was not a typical recruit. He was born in Jerusalem in 1961 to a right-wing religious family with roots going back eight generations in the city. He graduated from schools affiliated with the National Religious movement, which is today represented by the right-wing Bayit Yehudi party. When Cohen joined the Mossad as a young cadet it was rare to see a religious candidate wearing a kippa (yarmulka). Cohen, who later stoppedwearing a head covering, was the only religious cadet in his class and as a result was the brunt of many jokes. The Mossad, at the time, was practically off limits to people like him. As years went by, hewas labelled The Model by journalists for his dapper suits with headline writers recently dubbing him James Bond 007 in stark contrast to the typically informal Israeli dress sense.

Fair Usage Law

November 24, 2016   Posted in: Lavon Affair  Comments Closed


Fair Use Disclaimer

"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances."

Under the 'fair use' rule of copyright law, an author may make limited use of another author's work without asking permission. Fair use is based on the belief that the public is entitled to freely use portions of copyrighted materials for purposes of commentary and criticism. The fair use privilege is perhaps the most significant limitation on a copyright owner's exclusive rights.

Fair use as described at 17 U.S.C. Section 107:

"Notwithstanding the provisions of section 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phono-records or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.

In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include:

  • (1) the purpose and character of the use, including whether such use is of a commercial nature or is for or nonprofit educational purposes,
  • (2) the nature of the copyrighted work,
  • (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole, and
  • (4) the effect of the use upon the potential market for or value of the copyrighted work."