Given the close ties between the government and large corporations, I can’t say I’m surprised that Amazon, PayPal, Mastercard, Visa, and Bank of America took action to make sure that WikiLeaks could no longer receive any money through their channels. And I can’t say I’m upset that a group of young “hacktavists” calling themselves Anonymous have taken retaliatory action against some of those same companies. They call it Operation Payback. “Websites that are bowing down to government pressure have become targets,” a fellow named Coldblood posted. “As an organization we have always taken a strong stance on censorship and freedom of expression on the internet and come out against those who seek to destroy it by any means. We feel that WikiLeaks has become more than just about leaking of documents, it has become a war ground, the people vs. the government.”
More than 500 “mirror sites” now possess all the cables, and Assange has said we ain’t seen nothin’ yet if he meets an untimely demise. As I write this a couple of weeks before the New Year in 2011, he’s living in a friend’s mansion in England and fighting extradition charges. I’m sure a whole lot more will have developed by the time this book is published. I say let the chips fall where they may as WikiLeaks puts the truth out there. If our State Department is asking diplomats to steal personal information from UN officials and human rights groups, in violation of international laws, then shouldn’t the world know about it and demand corrective action? Maybe if they know they’re potentially going to be exposed, the powers that hide behind a cloak of secrecy will think twice before they plot the next Big Lie.
I agree with Daniel Ellsberg, the former military analyst who leaked the Pentagon Papers during the Vietnam War. He faced charges, too, back in 1971, but they were thrown out by a judge. He’s called Private Manning a “brother” who committed “a very admirable act” if he’s the one who provided the documents to WikiLeaks. “To call them terrorists is not only mistaken, it’s absurd,” Ellsberg said.
The book you’re about to read is undertaken in the same spirit. I’ve divided the book into five parts, starting out first to show links between deeds our government perpetrated in the past and what’s going on today. If you don’t know your own history, you’re doomed to repeat it. Part One focuses on postwar deceptions, revealing some pretty scandalous behavior, including:
• The CIA’s secret assassination manual and experiments to control human behavior with hypnosis, drugs, and other methods.
• The military’s Operation Northwoods, a chilling attempt by the Joint Chiefs of Staff to stage a terror attack on our own citizens and make it look like Cuba was behind it—using a hijacked airliner, no less!
• After President Kennedy was trying to get our troops out of Vietnam, the military faked the Gulf of Tonkin attacks in order to expand the war.
• Our chemical and biological warfare capability back in 1969, leading you to wonder about the real origin of things like AIDS and lyme disease.
Part Two delves into a series of government, military, and corporate secrets, opening with excerpts from two recent reports on how our military and intelligence outfits put Nazi war criminals to work after World War Two. From there, you’ll see some eye-opening documents, including:
• The CIA’s “Propaganda Notes” designed to shore up the Warren Commission’s lone-gunman conclusion.
• How Oliver North collaborated with Panama’s drug-running dictator Manuel Noriega.
• What America knew, and ignored, about the genocide happening in Rwanda in the mid-1990s.
• How we still turn a blind eye to Gulf War Illness and our veterans.
• The frightening background for our military to intervene in domestic affairs, set up “emergency relocation facilities” for our citizens, and establish a Civilian Inmate Labor Program.
• How failed inspections and ignored science are impacting our food supply and our bees, while we push to promote Monsanto’s biotech agenda.
• What our military really knows about the dangers of climate change.
• How companies like Koch Industries promote their political agendas at the expense of the rest of us.
Part Three I’ve called Shady White Houses, starting with “Tricky Dick” Nixon and his astounding plan to bring peace to Vietnam by pretending to nuke the Soviet Union! You’ll also learn about:
• How the Bush White House stole the presidential elections in 2000 and again in 2004.
• The Obama State Department’s call for our own diplomats to spy on the United Nations.
• Whether “cybersecurity” could mean the end of the Internet as we know it.
Part Four focuses in on a subject I’ve explored a great deal in recent years, and that’s whether we’ve been told the truth about the terrible events of September 11, 2001.
• A think tank called the Project for a New American Century anticipating “a new Pearl Harbor” to promote its agenda for “Rebuilding America’s Defenses.”
• Clear warnings the Bush administration ignored that something was coming.
• The “Stand Down” order that kept our military from responding on 9/11.
• Evidence that Building 7 was taken down by a controlled demolition.
• The role of insider stock trading in advance of 9/11.
And finally, Part Five examines the so-called “war on terror” and the terrible price we’re paying in terms of our liberties and the lives being lost in Iraq and Afghanistan. You’ll first read excerpts from a long memo by Bush’s Justice Department that subverts the Constitution by shredding a number of civil rights, followed by Bush’s justification for America’s torture of “unlawful combatants.”
• The “Media Ground Rules” that keep the truth hidden at Guantanamo.
• The torture techniques, and medical experiments, being conducted there and the paper trail on the CIA’s destruction of ninety-two torture videos.
• Decapitation of a detainee in Iraq, by our own troops!
• How the CIA “spins” the war in Afghanistan, and the fact that drugs are fueling that country’s economy.
• A report by the Rand Corporation showing that military force has never worked in combating terrorism.
Following the 63 documents, you’ll find an epilogue of Internet resources to use in your own pursuit of the truth about what’s going on behind the scenes.
Here’s what should concern us all: if you look back at the U.S. Patriot Act that Congress passed almost unanimously in the wake of 9/11, the Bill of Rights was already in peril. Let me offer a brief outline of how things changed:
The First Amendment is about freedom of speech, freedom of the press, and the right to assemble. The Patriot Act says that the government is free to monitor religious and political institutions without any suspicion of criminal activity. The government can also prosecute librarians or the keepers of any other records (including journalists) related to a “terror investigation.”
The Fourth Amendment speaks to our right to be secure “against unreasonable searches and seizures.” The Patriot Act says the government can search and seize Americans’ papers and effects without probable cause.
The Sixth Amendment entitles anyone accused of a crime to “a speedy and public trial, by an impartial jury.” The Patriot Act says the government can jail Americans indefinitely without a trial.
The Sixth Amendment says an accused person has “compulsory process for obtaining witnesses in his favor, and to have the assistance of counsel for his defense.” The Patriot Act says the government can monitor conversations between attorneys and clients in federal prisons and even deny lawyers to Americans accused of crimes.
The Sixth Amendment also says an accused criminal must “be confronted with the witnesses against him.” The Patriot Act says Americans can be jailed without even being charged, let alone face any witnesses.
What troubles me more than anything is how Congress can simply vote to supersede the Constitution. They’re not allowed to do that, to vote in new rules
arbitrarily. Changing the Constitution requires you to go through many hoops. How can we allow this kind of unprecedented change to happen? Now in response to WikiLeaks, Congress is considering a so-called Shield Bill, which would make it a crime for anybody to “knowingly and willfully” disseminate classified information “in any manner prejudicial to the safety or interest of the United States.” That includes not just the leaker, but anybody who publishes it! First Amendment, so long!
At the same time, it’s recently been reported that our government is building up a huge domestic spying network to collect information on us all, involving local police, state and military authorities feeding information into a database on people who’ve never been accused of wrongdoing. Homeland Security has given billions of dollars in grants to state governments since 9/11, and there are now more than 4,000 organizations in the domestic apparatus. The FBI keeps the ultimate file, with profiles on tens of thousands of Americans reported to be “acting suspiciously.” (I’m sure I’m one of them.) Also the technologies we’ve developed for the Iraq and Afghanistan wars are now being used by law enforcement agencies at home—handheld fingerprint scanners, biometric data devices, unmanned aircraft monitoring our borders with Mexico and Canada. And there are now 440,000 people on the goverment’s secret terrorist watch list, with no recourse to petition to get yourself taken off it or even find out if you’re listed on it.
In other words, we the taxpayers are funding our own government to keep tabs on what we do! This is outrageous, but it’s been a long time coming. Our tax dollars have paid for mind control experiments and assassination attempts and fake attacks to draw us into war. Our tax dollars have funded drug runners and “extraordinary rendition” of detainees. And they’ve not been used in places where they should be going—like to help our veterans cope with Gulf War Syndrome and to keep the nation of Rwanda from mass genocide. What right does the government have to abuse our money like that? This is diabolical!
I’ve put together this book because it’s become crystal clear that our democracy has been undermined from within and it’s been going on for a long time. We the people have got to wake up and start demanding accountability! Let’s never forget the words of Patrick Henry: “The liberties of a people never were, nor ever will be, secure, when the transactions of their rulers may be concealed from them.”
PART ONE
OUR SCANDALOUS POSTWAR HISTORY
1
ASSASSINATIONS
The CIA’s Secret Assassination Manual
What follows are excerpts from a nineteen-page CIA document that was prepared as part of a coup against the Guatemalan government in 1954 and declassified in 1997. Maybe they should change the name to the CIA’s “secret-first degree murder manual.” How is that we are allowed to kill other people if we’re not in a declared war with them? Clearly this is a premeditated conspiracy involving more than one person. My big question is, who makes the call on this? To arbitrarily go out in the world and kill someone without their being charged with a crime!
The thought of taking out another country’s leadership is so despicable, it makes me ashamed that I’m an American. But it later was revealed that, during the Cold War, the CIA plotted against eight foreign leaders, and five of them died violent deaths. The CIA’s “Executive Action” arm was involved for years in planning with the Mob and others to murder Fidel Castro.
Are we all to believe this is simply James Bond, where agents can arbitrarily knock off people and walk away? They actually had a manual that promotes throwing people from high buildings, with “plausible denial” ! One paragraph in particular gives me pause, when I think back to what happened in Dallas on November 22, 1963. “Public figures or guarded officials may be killed with great reliability and some safety if a firing point can be established prior to an official occasion,” the manual instructed.
Here is the original document.
Here is a transcript of the most frightening excerpts:
CLASSIFICATIONS
The techniques employed will vary according to whether the subject is unaware of his danger, aware but unguarded, or guarded. They will also be affected by whether or not the assassin is to be killed with the subject. Hereafter, assassinations in which the subject is unaware will be termed “simple”; those where the subject is aware but unguarded will be termed “chase”; those where the victim is guarded will be termed “guarded.”
If the assassin is to die with the subject, the act will be called “lost.” If the assassin is to escape, the adjective will be “safe.” It should be noted that no compromises should exist here. The assassin must not fall alive into enemy hands.
A further type division is caused by the need to conceal the fact that the subject was actually the victim of assassination, rather than an accident or natural causes. If such concealment is desirable the operation will be called “secret”; if concealment is immaterial, the act will be called “open”; while if the assassination requires publicity to be effective it will be termed “terroristic.”
Following these definitions, the assassination of Julius Caesar was safe, simple, and terroristic, while that of Huey Long was lost, guarded and open. Obviously, successful secret assassinations are not recorded as assassination at all. [llleg] of Thailand and Augustus Caesar may have been the victims of safe, guarded and secret assassination. Chase assassinations usually involve clandestine agents or members of criminal organizations.
THE ASSASSIN
In safe assassinations, the assassin needs the usual qualities of a clandestine agent. He should be determined, courageous, intelligent, resourceful, and physically active. If special equipment is to be used, such as firearms or drugs, it is clear that he must have outstanding skill with such equipment.
Except in terroristic assassinations, it is desirable that the assassin be transient in the area. He should have an absolute minimum of contact with the rest of the organization and his instructions should be given orally by one person only. His safe evacuation after the act is absolutely essential, but here again contact should be as limited as possible. It is preferable that the person issuing instructions also conduct any withdrawal or covering action which may be necessary.
In lost assassination, the assassin must be a fanatic of some sort. Politics, religion, and revenge are about the only feasible motives. Since a fanatic is unstable psychologically, he must be handled with extreme care. He must not know the identities of the other members of the organization, for although it is intended that he die in the act, something may go wrong. While the assassin of Trotsky has never revealed any significant information, it was unsound to depend on this when the act was planned.
PLANNING
When the decision to assassinate has been reached, the tactics of the operation must be planned, based upon an estimate of the situation similar to that used in military operations. The preliminary estimate will reveal gaps in information and possibly indicate a need for special equipment which must be procured or constructed. When all necessary data has been collected, an effective tactical plan can be prepared. All planning must be mental; no papers should ever contain evidence of the operation.
In resistance situations, assassination may be used as a counter-reprisal. Since this requires advertising to be effective, the resistance organization must be in a position to warn high officials publicly that their lives will be the price of reprisal action against innocent people. Such a threat is of no value unless it can be carried out, so it may be necessary to plan the assassination of various responsible officers of the oppressive regime and hold such plans in readiness to be used only if provoked by excessive brutality. Such plans must be modified frequently to meet changes in the tactical situation.
TECHNIQUES
The essential point of assassination is the death of the subject. A human being may be killed in many ways but sureness is often overlooked by those who may be emotionally unstrung by the seriousness of this act they intend to commit. The specific technique emplo
yed will depend upon a large number of variables, but should be constant in one point: Death must be absolutely certain. The attempt on Hitler’s life failed because the conspiracy did not give this matter proper attention.
Techniques may be considered as follows:
1. Manual.
It is possible to kill a man with the bare hands, but very few are skillful enough to do it well. Even a highly trained Judo expert will hesitate to risk killing by hand unless he has absolutely no alternative.
However, the simplest local tools are often much the most efficient means of assassination. A hammer, axe, wrench, screwdriver, fire poker, kitchen knife, lamp stand, or anything hard, heavy and handy will suffice. A length of rope or wire or a belt will do if the assassin is strong and agile. All such improvised weapons have the important advantage of availability and apparent innocence. The obviously lethal machine gun failed to kill Trotsky where an item of sporting goods succeeded.
63 Documents the Government Doesn't Want You to Read Page 2