The Iraqi National Congress (INC), an Iraqi exile group, provided exaggerated and fabricated intelligence on Iraq's weapons programs and ties to al-Qaeda to U.S. officials and major news media in the lead up to the Iraq war. This false information helped foster the impression that there were multiple sources confirming the threat from Iraq. In reality, the allegations came from just a few Iraqi defectors and were disputed by intelligence professionals. Many of the claims made by the defectors have not been substantiated since the fall of Saddam Hussein's regime. The INC played a key role in spreading false information that contributed to the public and political support for the U.S. invasion of Iraq.
Rmc intelligence and analysis division open source update march 2019ChadCogan
In the March 2019 Open Source Update, an internal security review discovered Chinese hackers are exploiting critical vulnerabilities in the U.S. Navy’s and its security partners cyber networks. Additionally, an active duty Coast Guardsman plotting a terror attack was foiled by an insider threat detection program.
1. The US colluded with the Bolivian military behind the back of President Eduardo Rodriguez to remove 28 outdated Chinese surface-to-air missiles from Bolivia. The missiles were part of a weapons purchase from China in 1986.
2. In September 2005, while President Rodriguez was away, the Bolivian military loaded the missiles onto a truck and transferred them to a US military aircraft to be taken out of the country. Rodriguez was not informed of this operation.
3. The US Pentagon also left behind a $400,000 "thank you" payment agreement for the Bolivian military, raising suspicions about US motives. This has led to questions about why the US acted without notifying the democratic
Benjamin fulford february 23, 2015 cia put under lockdown by pentagon to st...PublicLeaks
The Pentagon raided the CIA headquarters to stop nuclear terrorism and seize 3 rogue nuclear weapons threatened to be detonated in Ukraine. An explosion near a CIA facility in West Virginia may have been connected. The raid has weakened cabal resistance in the US and allowed a deal to keep the US government operating. However, cabalist factions still remain in parts of the US, UK, Italy and the Vatican working to undermine peace efforts. Ongoing purges in China have targeted cabal-linked billionaires and factions there. The cabal is now threatening new "terrorist" attacks against Western shopping malls for insurance fraud purposes and to preserve homeland security funding. Events are expected to slow in Asia during holiday periods but the campaign
1) A newly declassified State Department cable from shortly after Jaime Garzón's 1999 assassination in Colombia supports the allegation that Colombian military officials ordered the killing of the beloved journalist.
2) Garzón was a popular television personality and advocate for peace talks who was gunned down, and the cable implies retired general Rito Alejo del Río Rojas may have lied about meeting with Garzón.
3) The cable is part of the evidence that Garzón's family is using in an attempt to hold the Colombian state responsible for his murder through an international human rights hearing.
The document summarizes the political events in Iran that led up to the 1979 Iranian Revolution and subsequent hostage crisis at the US embassy. It describes how the US-backed Shah's oppressive rule and close ties with the West alienated many Iranians, despite economic growth under his regime. Widespread poverty, corruption, and suppression of dissent by the Shah's secret police strengthened the revolution led by Ayatollah Khomeini against the Shah's regime. The revolution overthrew the Shah in 1979, leading to the hostage crisis at the US embassy by revolutionary students.
The document summarizes an article that discusses forged documents alleging that Iraq attempted to purchase uranium from Niger. Key points:
1) The CIA and other US intelligence officials cited the documents in briefings to Congress as evidence of Iraq's nuclear ambitions, which helped gain support for authorizing war.
2) The documents were later exposed as forgeries by the UN's nuclear watchdog agency, embarrassing the US.
3) Questions remain about how such obvious fakes could have been endorsed by US intelligence and the White House without proper vetting, and whether the administration deliberately misled the public.
The document discusses attempts by governments to curb press freedom through various means such as attacking journalists, intimidating media owners, enacting laws to restrict reporting, and in some cases murdering reporters. It provides examples from India and other countries where governments have issued gag orders or propaganda to control media narratives and restrict criticism. However, such attempts often backfire as the public values independent media and constitutional protections of free speech. Reporters playing key roles in countering fake news and holding leaders accountable.
Rmc intelligence and analysis division open source update march 2019ChadCogan
In the March 2019 Open Source Update, an internal security review discovered Chinese hackers are exploiting critical vulnerabilities in the U.S. Navy’s and its security partners cyber networks. Additionally, an active duty Coast Guardsman plotting a terror attack was foiled by an insider threat detection program.
1. The US colluded with the Bolivian military behind the back of President Eduardo Rodriguez to remove 28 outdated Chinese surface-to-air missiles from Bolivia. The missiles were part of a weapons purchase from China in 1986.
2. In September 2005, while President Rodriguez was away, the Bolivian military loaded the missiles onto a truck and transferred them to a US military aircraft to be taken out of the country. Rodriguez was not informed of this operation.
3. The US Pentagon also left behind a $400,000 "thank you" payment agreement for the Bolivian military, raising suspicions about US motives. This has led to questions about why the US acted without notifying the democratic
Benjamin fulford february 23, 2015 cia put under lockdown by pentagon to st...PublicLeaks
The Pentagon raided the CIA headquarters to stop nuclear terrorism and seize 3 rogue nuclear weapons threatened to be detonated in Ukraine. An explosion near a CIA facility in West Virginia may have been connected. The raid has weakened cabal resistance in the US and allowed a deal to keep the US government operating. However, cabalist factions still remain in parts of the US, UK, Italy and the Vatican working to undermine peace efforts. Ongoing purges in China have targeted cabal-linked billionaires and factions there. The cabal is now threatening new "terrorist" attacks against Western shopping malls for insurance fraud purposes and to preserve homeland security funding. Events are expected to slow in Asia during holiday periods but the campaign
1) A newly declassified State Department cable from shortly after Jaime Garzón's 1999 assassination in Colombia supports the allegation that Colombian military officials ordered the killing of the beloved journalist.
2) Garzón was a popular television personality and advocate for peace talks who was gunned down, and the cable implies retired general Rito Alejo del Río Rojas may have lied about meeting with Garzón.
3) The cable is part of the evidence that Garzón's family is using in an attempt to hold the Colombian state responsible for his murder through an international human rights hearing.
The document summarizes the political events in Iran that led up to the 1979 Iranian Revolution and subsequent hostage crisis at the US embassy. It describes how the US-backed Shah's oppressive rule and close ties with the West alienated many Iranians, despite economic growth under his regime. Widespread poverty, corruption, and suppression of dissent by the Shah's secret police strengthened the revolution led by Ayatollah Khomeini against the Shah's regime. The revolution overthrew the Shah in 1979, leading to the hostage crisis at the US embassy by revolutionary students.
The document summarizes an article that discusses forged documents alleging that Iraq attempted to purchase uranium from Niger. Key points:
1) The CIA and other US intelligence officials cited the documents in briefings to Congress as evidence of Iraq's nuclear ambitions, which helped gain support for authorizing war.
2) The documents were later exposed as forgeries by the UN's nuclear watchdog agency, embarrassing the US.
3) Questions remain about how such obvious fakes could have been endorsed by US intelligence and the White House without proper vetting, and whether the administration deliberately misled the public.
The document discusses attempts by governments to curb press freedom through various means such as attacking journalists, intimidating media owners, enacting laws to restrict reporting, and in some cases murdering reporters. It provides examples from India and other countries where governments have issued gag orders or propaganda to control media narratives and restrict criticism. However, such attempts often backfire as the public values independent media and constitutional protections of free speech. Reporters playing key roles in countering fake news and holding leaders accountable.
This document summarizes Hemant Hemant's paper on understanding why individuals stay religious extremists through cognitive dissonance and self-affirmation theories. It begins by providing context on the history of terrorism and its various waves. It then discusses Leon Festinger's cognitive dissonance theory, which posits that individuals resolve mental conflicts between beliefs and actions by reducing conflicting beliefs, increasing existing beliefs, or changing beliefs/actions. The document applies this to explain how extremists rationalize staying in terrorist organizations. It also discusses self-affirmation theory and how extremists use it to justify their beliefs even when given conflicting evidence of harm. Lastly, it proposes recommendations for deradicalization efforts combining these theories' insights with soci
This document summarizes a speech given by Michael Mukasey, former U.S. Attorney General, about executive power during wartime. Some key points:
1) Mukasey argues that the President has broad executive powers during wartime according to the Constitution, including powers over intelligence gathering and detention of enemy combatants.
2) However, President Obama has taken actions like closing Guantanamo and ending enhanced interrogation that Mukasey believes undermine these executive powers and reduce intelligence gathering.
3) Mukasey traces the roots of Islamist ideology back to Sayyid Qutb and the Muslim Brotherhood in Egypt in the 1920s-1960s, and their influence on Osama
Obama suspicious death lists... body countsRepentSinner
This document discusses several suspicious deaths of individuals connected to controversial political issues or who possessed sensitive information. It mentions the deaths of Warren Weinstein, Adam Gadahn, and Ahmed Farouq who were killed in a US drone strike; Hugo Chavez's speculation that the CIA gave him cancer; the murdered children of a CNBC producer who reported on a $43 trillion money laundering lawsuit; and others. It raises questions about whether their deaths may have been targeted assassinations intended to silence them.
The document discusses several topics related to the future of homeland security including:
1) Janet Napolitano encouraging citizens to report suspicious activities through a new Spanish language public service campaign.
2) Alec Baldwin blaming post-9/11 security measures for an incident where he was kicked off a flight for being disruptive.
3) Two politicians calling for passenger advocates at airports after complaints from elderly women about intrusive security screenings.
Obama suspicious death lists ... body countsRepentSinner
The document discusses several suspicious deaths of individuals connected to controversial political issues or having sensitive information. It mentions the deaths of Warren Weinstein, Adam Gadahn, and Ahmed Farouq who were killed in a US drone strike; Hugo Chavez's speculation that the CIA gave him cancer; the murdered children of a CNBC producer who reported on a $43 trillion money laundering lawsuit; and others. It raises questions about whether some of the deaths could have been assassinations rather than accidents or suicides.
Ideology An Interdisciplinary Study in Literature and Politicsshafieyan
This document summarizes an academic essay that analyzes the influence of Thomas Hobbes' work Leviathan on neoconservative policies during George W. Bush's presidency. It discusses how Hobbes viewed humans as artificial animals and compared them to machines driven by instincts. It argues that practices in Abu Ghraib and Guantanamo prisons treated detainees in dehumanizing ways resembling how animals are treated. It also contends that the US government used the 9/11 attacks to justify invading Afghanistan and Iraq for reasons other than national security, such as controlling oil resources, as Hobbes believed the purpose of the state was to pursue power and wealth. The document examines how Hobbes' concepts of the Leviathan state and commonwealth resulted in
This document provides an introduction and summary of unsealed court documents related to the case of Mohammed Junaid Babar, who cooperated with authorities as an informant in terrorism cases in the UK and US. It outlines Babar's background and involvement with extremist groups after 9/11. It notes several inconsistencies and questions around Babar, including his ability to travel freely despite public statements about committing violence, as well as his sudden and complete cooperation with authorities. The document reviews court filings and timelines related to Babar's testimony against defendants in Operation Crevice and the July 7, 2005 London bombings case. It raises the possibility that Babar may have been a double agent working for intelligence services from the beginning
This document provides background information on the rise of the Islamic State (IS). It discusses how IS proclaimed itself a caliphate in 2014 and Abu Bakr al-Baghdadi as its caliph. It details IS's extreme interpretation of Islam and crimes against civilians in Iraq and Syria, including genocide against Yazidis. It also examines IS's use of propaganda to recruit foreign fighters and how their territorial control has expanded. In conclusion, the High Commissioner for Human Rights encouraged Iraq to accept ICC jurisdiction over IS crimes.
Obama suspicious death lists... body countsRepentSinner
This document discusses several suspicious deaths that have occurred involving individuals connected to President Obama or controversial topics. It mentions:
1) The killing of three U.S. citizens, including Warren Weinstein, in a U.S. drone strike in Afghanistan along with suspicions around their knowledge of sensitive topics.
2) Speculation by Hugo Chavez that the CIA gave him and other Latin American leaders cancer as a political weapon.
3) The unsolved murders of the children and nanny of a CNBC producer shortly after CNBC reported on a $43 trillion money laundering lawsuit against major banks and government officials.
4) Other deaths of individuals such as a Secret Service agent and US diplomats that are
(S//NF) Detainee is assessed to be an al-Qaida associated passport forger and key travel facilitator supporting senior al-Qaida facilitator Zayn al-Abidin Muhammed Husayn aka (Abu Zubaydah), ISN US9GZ-010016DP (GZ-10016), and the Global Jihad Support Network. Detainee has additional ties to the Lashkar-e-Tayyiba (LT) and the Libyan Islamic Fighting Group (LIFG). Detainee is also a suspected bomb maker and former commander of a special al-Qaida training camp, and he was identified as a front line
The bombing of the World Trade Center (WTC) in February 1993 was a landmark act of terrorism. At least officially, it was the first major strike in the US by radical Islamic militants and as such pre-empted the attacks of 9/11. The perpetrators were a group of men based out of the Al-Kifah refugee center in the Al Farooq mosque in Brooklyn, New York. This was the local branch of the Maktab al-Khidamat or Mujahideen Services Office that funnelled money and people to Afghanistan during the war with the Soviets.
The bombing resulted in several trials ? US vs Salameh et al in 1994, US vs Rahman et al in 1995, and US vs Yousef et al in 1997. The first trial prosecuted several of those in New York who had assisted in building and delivering the bomb. The second trial prosecuted the Blind Sheikh Omar Abdel Rahman and some of his followers for a ?seditious conspiracy? that included the WTC bombing, the ?Day of Terror? plot and several solicitations to murder Hosni Mubarek. The third trial prosecuted Ramzi Yousef, the man primarily responsible for choosing the target and building the bomb.
Nonetheless, the case is still subject to a swirl of conspiracy theories, mostly revolving around the FBI informant Emad Salem, who infiltrated the group at the Al-Kifah both before and after the bombing. The idea that Salem built the bomb is misleading, as he was actually sacked by the FBI in the summer of 1992 and wasn?t involved with the Al-Kifah group from then until after the bombing.
The more substantive theories are based on the issue of the Bind Sheikh being some kind of CIA asset, the legends created around Ramzi Yousef and also the possible involvement of triple agent Ali Mohamed. The forensic science investigation of the bombing was also particularly bad. This document collection includes files that shed light on these questions and provide a basis for establishing a more subtle view of exactly who was responsible for the bombing and why they did what they did.
Obama suspicious death lists ... body countsRepentSinner
This document discusses several suspicious deaths of individuals connected to controversial political issues or investigations. It mentions:
1) The deaths of three U.S. citizens in a drone strike, including Warren Weinstein, who may have had information about 9/11 and Bin Laden's death.
2) Speculation by Hugo Chavez that the CIA gave him and other Latin American leaders cancer as a political weapon.
3) The unsolved murders of the children and nanny of a CNBC producer shortly after CNBC reported on a $43 trillion money laundering lawsuit against major banks.
4) Other suspicious deaths including a Secret Service agent and a Obama campaign worker.
This document summarizes key global risks and events from October 2016 based on a risk bulletin. It discusses several topics:
- Ethiopia declared a 6-month state of emergency following civil unrest. Foreign diplomats face travel restrictions.
- In Indonesia, an IS supporter stabbed 3 police officers with pipe bombs that failed to detonate. Security forces remain on high alert since 2016 Jakarta attacks.
- The US election faces risks of cyberattacks aiming to influence the outcome through information theft, disruption of websites/infrastructure, and disinformation campaigns, particularly from Russia. This could undermine public confidence in election results and democratic institutions.
The crash of a US drone in Iran has revealed the intense US spying efforts taking place in Iran, where the US has no official presence. While the drone is believed to have crashed due to a malfunction rather than being shot down, Iran displayed the largely intact drone on television. US surveillance of Iran through drones and other means has been ongoing for years to gain intelligence on activities inside Iran's borders. However, the recent drone crash has unmasked these secret intelligence operations.
This document provides background on U.S. military support to Colombia in combating drug cartels and insurgent groups like the FARC. It summarizes efforts from the 1980s through the 2000s to help Colombia restore security and government control of its territory. It focuses on operations to rescue three U.S. contractors taken hostage by the FARC in 2003. These efforts included intelligence sharing, special forces training of Colombian forces, and joint operations, but the hostages were not located for several years despite some close calls. Plans and authorities for rescue operations gradually expanded over time.
Jeb bush the early years - jeb bush's cia 'noc' work in venezuelaRepentSinner
Jeb Bush worked for the CIA in Venezuela in the late 1970s, posing as a banker for Texas Commerce Bank. As a CIA non-official cover agent, he helped the CIA launder money from Colombian drug cartels to fund anti-leftist groups in Latin America. After leaving Venezuela, Jeb maintained relationships with CIA-connected figures and used business dealings to support his father's political career, setting the stage for his own future presidential run that would continue CIA influence in the White House.
UNLEARNED LESSONS OF HISTORY : AFGHANISTAN, IRAQ, SYRIA, LEBANON, AND SOME O...Keshav Prasad Bhattarai
The document discusses the ongoing conflicts and instability in the Middle East and Afghanistan. It argues that the wars in Iraq, Afghanistan and Syria are interlinked and risk destabilizing the entire region. Despite huge costs and casualties, the global war on terror has failed to defeat al-Qaeda and terrorist groups, and insurgencies are expanding into new areas like North Africa and the Sahel region. The withdrawal of US troops from Afghanistan risks al-Qaeda and the Taliban regaining control and undermining stability.
SeenPay is a third-party online payment system developed by an executive team to address problems with e-commerce and consumer-to-consumer transactions in Asia. It aims to provide a secure payment solution for online marketplaces and private sellers across Asia by holding funds in escrow until buyers have inspected items and release payments to sellers. SeenPay's features are designed to protect both buyers and sellers by allowing inspection of items, quality checks, and dispute resolution, while establishing trust in online transactions through profile and review systems. The startup sees significant potential to expand in Southeast Asia's large e-commerce market as online and mobile purchasing increases in the region.
This document summarizes Hemant Hemant's paper on understanding why individuals stay religious extremists through cognitive dissonance and self-affirmation theories. It begins by providing context on the history of terrorism and its various waves. It then discusses Leon Festinger's cognitive dissonance theory, which posits that individuals resolve mental conflicts between beliefs and actions by reducing conflicting beliefs, increasing existing beliefs, or changing beliefs/actions. The document applies this to explain how extremists rationalize staying in terrorist organizations. It also discusses self-affirmation theory and how extremists use it to justify their beliefs even when given conflicting evidence of harm. Lastly, it proposes recommendations for deradicalization efforts combining these theories' insights with soci
This document summarizes a speech given by Michael Mukasey, former U.S. Attorney General, about executive power during wartime. Some key points:
1) Mukasey argues that the President has broad executive powers during wartime according to the Constitution, including powers over intelligence gathering and detention of enemy combatants.
2) However, President Obama has taken actions like closing Guantanamo and ending enhanced interrogation that Mukasey believes undermine these executive powers and reduce intelligence gathering.
3) Mukasey traces the roots of Islamist ideology back to Sayyid Qutb and the Muslim Brotherhood in Egypt in the 1920s-1960s, and their influence on Osama
Obama suspicious death lists... body countsRepentSinner
This document discusses several suspicious deaths of individuals connected to controversial political issues or who possessed sensitive information. It mentions the deaths of Warren Weinstein, Adam Gadahn, and Ahmed Farouq who were killed in a US drone strike; Hugo Chavez's speculation that the CIA gave him cancer; the murdered children of a CNBC producer who reported on a $43 trillion money laundering lawsuit; and others. It raises questions about whether their deaths may have been targeted assassinations intended to silence them.
The document discusses several topics related to the future of homeland security including:
1) Janet Napolitano encouraging citizens to report suspicious activities through a new Spanish language public service campaign.
2) Alec Baldwin blaming post-9/11 security measures for an incident where he was kicked off a flight for being disruptive.
3) Two politicians calling for passenger advocates at airports after complaints from elderly women about intrusive security screenings.
Obama suspicious death lists ... body countsRepentSinner
The document discusses several suspicious deaths of individuals connected to controversial political issues or having sensitive information. It mentions the deaths of Warren Weinstein, Adam Gadahn, and Ahmed Farouq who were killed in a US drone strike; Hugo Chavez's speculation that the CIA gave him cancer; the murdered children of a CNBC producer who reported on a $43 trillion money laundering lawsuit; and others. It raises questions about whether some of the deaths could have been assassinations rather than accidents or suicides.
Ideology An Interdisciplinary Study in Literature and Politicsshafieyan
This document summarizes an academic essay that analyzes the influence of Thomas Hobbes' work Leviathan on neoconservative policies during George W. Bush's presidency. It discusses how Hobbes viewed humans as artificial animals and compared them to machines driven by instincts. It argues that practices in Abu Ghraib and Guantanamo prisons treated detainees in dehumanizing ways resembling how animals are treated. It also contends that the US government used the 9/11 attacks to justify invading Afghanistan and Iraq for reasons other than national security, such as controlling oil resources, as Hobbes believed the purpose of the state was to pursue power and wealth. The document examines how Hobbes' concepts of the Leviathan state and commonwealth resulted in
This document provides an introduction and summary of unsealed court documents related to the case of Mohammed Junaid Babar, who cooperated with authorities as an informant in terrorism cases in the UK and US. It outlines Babar's background and involvement with extremist groups after 9/11. It notes several inconsistencies and questions around Babar, including his ability to travel freely despite public statements about committing violence, as well as his sudden and complete cooperation with authorities. The document reviews court filings and timelines related to Babar's testimony against defendants in Operation Crevice and the July 7, 2005 London bombings case. It raises the possibility that Babar may have been a double agent working for intelligence services from the beginning
This document provides background information on the rise of the Islamic State (IS). It discusses how IS proclaimed itself a caliphate in 2014 and Abu Bakr al-Baghdadi as its caliph. It details IS's extreme interpretation of Islam and crimes against civilians in Iraq and Syria, including genocide against Yazidis. It also examines IS's use of propaganda to recruit foreign fighters and how their territorial control has expanded. In conclusion, the High Commissioner for Human Rights encouraged Iraq to accept ICC jurisdiction over IS crimes.
Obama suspicious death lists... body countsRepentSinner
This document discusses several suspicious deaths that have occurred involving individuals connected to President Obama or controversial topics. It mentions:
1) The killing of three U.S. citizens, including Warren Weinstein, in a U.S. drone strike in Afghanistan along with suspicions around their knowledge of sensitive topics.
2) Speculation by Hugo Chavez that the CIA gave him and other Latin American leaders cancer as a political weapon.
3) The unsolved murders of the children and nanny of a CNBC producer shortly after CNBC reported on a $43 trillion money laundering lawsuit against major banks and government officials.
4) Other deaths of individuals such as a Secret Service agent and US diplomats that are
(S//NF) Detainee is assessed to be an al-Qaida associated passport forger and key travel facilitator supporting senior al-Qaida facilitator Zayn al-Abidin Muhammed Husayn aka (Abu Zubaydah), ISN US9GZ-010016DP (GZ-10016), and the Global Jihad Support Network. Detainee has additional ties to the Lashkar-e-Tayyiba (LT) and the Libyan Islamic Fighting Group (LIFG). Detainee is also a suspected bomb maker and former commander of a special al-Qaida training camp, and he was identified as a front line
The bombing of the World Trade Center (WTC) in February 1993 was a landmark act of terrorism. At least officially, it was the first major strike in the US by radical Islamic militants and as such pre-empted the attacks of 9/11. The perpetrators were a group of men based out of the Al-Kifah refugee center in the Al Farooq mosque in Brooklyn, New York. This was the local branch of the Maktab al-Khidamat or Mujahideen Services Office that funnelled money and people to Afghanistan during the war with the Soviets.
The bombing resulted in several trials ? US vs Salameh et al in 1994, US vs Rahman et al in 1995, and US vs Yousef et al in 1997. The first trial prosecuted several of those in New York who had assisted in building and delivering the bomb. The second trial prosecuted the Blind Sheikh Omar Abdel Rahman and some of his followers for a ?seditious conspiracy? that included the WTC bombing, the ?Day of Terror? plot and several solicitations to murder Hosni Mubarek. The third trial prosecuted Ramzi Yousef, the man primarily responsible for choosing the target and building the bomb.
Nonetheless, the case is still subject to a swirl of conspiracy theories, mostly revolving around the FBI informant Emad Salem, who infiltrated the group at the Al-Kifah both before and after the bombing. The idea that Salem built the bomb is misleading, as he was actually sacked by the FBI in the summer of 1992 and wasn?t involved with the Al-Kifah group from then until after the bombing.
The more substantive theories are based on the issue of the Bind Sheikh being some kind of CIA asset, the legends created around Ramzi Yousef and also the possible involvement of triple agent Ali Mohamed. The forensic science investigation of the bombing was also particularly bad. This document collection includes files that shed light on these questions and provide a basis for establishing a more subtle view of exactly who was responsible for the bombing and why they did what they did.
Obama suspicious death lists ... body countsRepentSinner
This document discusses several suspicious deaths of individuals connected to controversial political issues or investigations. It mentions:
1) The deaths of three U.S. citizens in a drone strike, including Warren Weinstein, who may have had information about 9/11 and Bin Laden's death.
2) Speculation by Hugo Chavez that the CIA gave him and other Latin American leaders cancer as a political weapon.
3) The unsolved murders of the children and nanny of a CNBC producer shortly after CNBC reported on a $43 trillion money laundering lawsuit against major banks.
4) Other suspicious deaths including a Secret Service agent and a Obama campaign worker.
This document summarizes key global risks and events from October 2016 based on a risk bulletin. It discusses several topics:
- Ethiopia declared a 6-month state of emergency following civil unrest. Foreign diplomats face travel restrictions.
- In Indonesia, an IS supporter stabbed 3 police officers with pipe bombs that failed to detonate. Security forces remain on high alert since 2016 Jakarta attacks.
- The US election faces risks of cyberattacks aiming to influence the outcome through information theft, disruption of websites/infrastructure, and disinformation campaigns, particularly from Russia. This could undermine public confidence in election results and democratic institutions.
The crash of a US drone in Iran has revealed the intense US spying efforts taking place in Iran, where the US has no official presence. While the drone is believed to have crashed due to a malfunction rather than being shot down, Iran displayed the largely intact drone on television. US surveillance of Iran through drones and other means has been ongoing for years to gain intelligence on activities inside Iran's borders. However, the recent drone crash has unmasked these secret intelligence operations.
This document provides background on U.S. military support to Colombia in combating drug cartels and insurgent groups like the FARC. It summarizes efforts from the 1980s through the 2000s to help Colombia restore security and government control of its territory. It focuses on operations to rescue three U.S. contractors taken hostage by the FARC in 2003. These efforts included intelligence sharing, special forces training of Colombian forces, and joint operations, but the hostages were not located for several years despite some close calls. Plans and authorities for rescue operations gradually expanded over time.
Jeb bush the early years - jeb bush's cia 'noc' work in venezuelaRepentSinner
Jeb Bush worked for the CIA in Venezuela in the late 1970s, posing as a banker for Texas Commerce Bank. As a CIA non-official cover agent, he helped the CIA launder money from Colombian drug cartels to fund anti-leftist groups in Latin America. After leaving Venezuela, Jeb maintained relationships with CIA-connected figures and used business dealings to support his father's political career, setting the stage for his own future presidential run that would continue CIA influence in the White House.
UNLEARNED LESSONS OF HISTORY : AFGHANISTAN, IRAQ, SYRIA, LEBANON, AND SOME O...Keshav Prasad Bhattarai
The document discusses the ongoing conflicts and instability in the Middle East and Afghanistan. It argues that the wars in Iraq, Afghanistan and Syria are interlinked and risk destabilizing the entire region. Despite huge costs and casualties, the global war on terror has failed to defeat al-Qaeda and terrorist groups, and insurgencies are expanding into new areas like North Africa and the Sahel region. The withdrawal of US troops from Afghanistan risks al-Qaeda and the Taliban regaining control and undermining stability.
SeenPay is a third-party online payment system developed by an executive team to address problems with e-commerce and consumer-to-consumer transactions in Asia. It aims to provide a secure payment solution for online marketplaces and private sellers across Asia by holding funds in escrow until buyers have inspected items and release payments to sellers. SeenPay's features are designed to protect both buyers and sellers by allowing inspection of items, quality checks, and dispute resolution, while establishing trust in online transactions through profile and review systems. The startup sees significant potential to expand in Southeast Asia's large e-commerce market as online and mobile purchasing increases in the region.
This document summarizes an upcoming exhibition and book about the costumes from the Star Wars films. It discusses how the costumes in the original trilogy were more simplistic but how George Lucas brought richer designs to the prequel trilogy to reflect the diverse cultures and histories of the Star Wars universe. The exhibition will showcase costumes like Padme Amidala's elaborate outfits and Princess Leia's iconic slave bikini costume and run from September to December at the Fashion Institute of Design & Merchandising museum in Los Angeles.
The document provides information about the World Green Economy Summit (WGES) taking place in Dubai from October 5-6, 2016. The summit aims to discuss and facilitate the transition to a green economy through partnerships between government, business and civil society. It will include sessions on green finance, solar energy, smart cities, and other topics. The summit seeks to strengthen Dubai's position as a hub for green business and support the UAE's economic and sustainability goals. It is organized under the patronage of Dubai's ruler with participation from international organizations and businesses.
Indiana Jones is a fictional archaeologist and adventurer created by George Lucas. He was born in 1899 in Princeton, New Jersey and traveled the world as a child with his parents. He studied archaeology at the University of Chicago but preferred adventure over teaching. As an archaeologist, he has traveled to many historic sites and locations to obtain rare artifacts, though his methods are not always approved of by real archaeologists. The upcoming fourth Indiana Jones film will provide more details about his character.
Peter Capaldi discussed his first year playing the Doctor in Doctor Who. He enjoys waking up early to film scenes of fighting Daleks and running through corridors, calling it a great way to live his life at his age. Though he is older than previous Doctors, fans have accepted him in the role. Over 2.5 million viewers tuned in to see his first episode as the Doctor. Capaldi says he is still learning how to play the Doctor and that the character continues to evolve, and he is always relieved when told he will continue playing the Doctor for another season.
Pasien laki-laki berusia 61 tahun didiagnosis menderita sirosis hati berat dengan gejala demam, jaundice, ascites, dan hasil laboratorium menunjukkan peningkatan SGOT, SGPT, dan penurunan albumin serta Hb. Riwayat makan menunjukkan asupan energi, protein, karbohidrat, dan zat besi kurang, sedangkan asupan lemak berlebih.
This thesis analyzes how the adoption of the European Commission's targets for transitioning to a circular economy will affect countries in the Baltic Sea Region. It estimates that overall raw material consumption in the region will continue increasing through 2030, with changes only occurring later. Countries will be impacted differently depending on factors like resource productivity. Poland and Estonia face challenges with consumption depending less on productivity. Germany, Finland, Sweden and Denmark need more efforts to meet targets as targets will have little effect. Lithuania and Latvia will see consumption rises capped by productivity gains. The region needs stronger policies to close resource loops and more sustainable use of materials, along with improved regional cooperation.
Brembo is a world leader in braking systems for automotive and motorbike applications. The document provides an investment analysis on Brembo with a recommendation to increase investment and a target price of €57.30, representing a 22.14% upside. Key points include Brembo's history growing from a small workshop in 1961 to a global leader, its focus on high performance braking solutions, and growth opportunities from expanding capacity in North America and China despite market volatility. Risks to the target price include lower than expected revenues, higher costs, and slowing markets in Brazil and China.
Terrorist attacks prior to 9/11 had already begun changing architectural design, with a focus on safety and security. The 1983 bombing of the Marine barracks in Lebanon and the 1995 Oklahoma City bombing demonstrated vulnerabilities and led to changes like barriers around buildings. However, these changes did not prevent 9/11, leading to further revisions like harder-to-access stairwells and evacuation procedures in the new 7 World Trade Center to improve occupant escape. Building codes have historically tightened after tragedies to enhance security.
Solomon Kassahun is a Java developer with over 5 years of experience designing and developing software modules and leading development projects. He has extensive knowledge of networking protocols and software development lifecycles. His experience includes developing enterprise resource planning modules, analyzing requirements, designing databases, and performing unit testing. He is proficient in languages such as Java, C++, Python, and technologies including Spring, Hibernate, MySQL, and more.
9-11 HIJACKERS BROUGHT TO USA BY CIA...VogelDenise
17 USC § 107 Limitations on Exclusive Rights – FAIR USE
12/28/18 VIDEO: END OF THE YEAR Utica International Embassy Interim Prime Minister Vogel Denise Newsome’s TELEPHONE CONFERENCE WITH Moorish Science Temple of America:
YouTube: https://youtu.be/69Vdtzme0eA
Vimeo: https://vimeo.com/309670714
Provides an UPDATE of the Agenda of the Utica International Embassy and the EFFECTIVENESS of work done by Interim Prime Minister Vogel Denise Newsome regarding:
(1) The COLLAPSE Of The United States of America’s – a/k/a Confederate States of America’s DESPOTISM Government
(2) The COLLAPSE Of The USA’s WHITE Jews/Zionists’ WALL STREET
(3) The WHITE Jews/Zionists/Supremacists CONTINUED efforts to TAKE CREDIT for WORK of Newsome in:
(a) EXPOSURE of USA’s Legal Counsel Baker Donelson Bearman Caldwell & Berkowitz PLANNING, ORCHESTRATING and CARRYING OUT The 9/11 World Trade Center Terrorist Attacks/Bombings
(b) EXPOSURE of USA’s Legal Counsel Baker Donelson Bearman Caldwell & Berkowitz ROLE in PONZI SCHEMES/SCAMS and FRAUDULENT Wall Street Scams STEALING/EMBEZZLING Monies From INVESTORS….
UTICA INTERNTIONAL EMBASSY WEBSITE: https://uticainternationalembassy.website
SLIDESHARE.NET: www.Slideshare.net/VogelDenise
The top 5 most damaging national security leaks of the past yearAEI
The document summarizes several news stories from major publications like The New York Times and The Washington Post that revealed details about classified US intelligence programs and operations. These included stories about US involvement in cyberattacks on Iran's nuclear program, CIA efforts to arm Syrian rebels, Obama's oversight of drone strikes, the unmasking of a British intelligence asset, and the outing of a Pakistani doctor who helped the CIA locate Osama bin Laden. Many of the revelations compromised intelligence sources and methods.
RAND Corporation Chapter Title The U.S. Invasion of .docxaudeleypearl
RAND Corporation
Chapter Title: The U.S. Invasion of Iraq, 2003
Book Title: Blinders, Blunders, and Wars
Book Subtitle: What America and China Can Learn
Book Author(s): David C. Gompert, Hans Binnendijk and Bonny Lin
Published by: RAND Corporation. (2014)
Stable URL: https://www.jstor.org/stable/10.7249/j.ctt1287m9t.21
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
RAND Corporation is collaborating with JSTOR to digitize, preserve and extend access to
Blinders, Blunders, and Wars
This content downloaded from 80.227.100.60 on Sun, 03 Nov 2019 12:25:27 UTC
All use subject to https://about.jstor.org/terms
161
ChAPter FOUrteen
The U.S. Invasion of Iraq, 2003
States like [Iraq, Iran, and North Korea] and their terrorist allies constitute an axis of
evil. . . . By seeking weapons of mass destruction, these regimes pose a grave and growing
danger. . . . I will not wait on events while dangers gather.
—President George W. Bush, State of the Union, January 29, 2002
For us, war is always the proof of failure and the worst of solutions, so everything must
be done to avoid it.
—President Jacques Chirac to a joint session of the French and German parlia-
ments, January 2003
Dividends of Misjudgment
President George W. Bush’s decision to invade Iraq on March 20, 2003, was not a
blunder on the scale of those of Napoleon, Hitler, and Tojo.1 There was a case to be
made on several grounds for operations against Saddam Hussein. The initial phase of
combat was highly successful, and some still argue that the American investment was
worth the cost of toppling the Saddam regime. Bush was reelected in November of
2004 as much because of as despite his invasion of Iraq. His subsequent 2007 decision
to launch the “surge” did limit some of the damage.
The main premise for the war was that Saddam had weapons of mass destruction
(WMDs) and that these were at risk of falling into the hands of terrorists. In the end,
however, there were no such weapons, and Saddam’s links to al Qaeda were unproven.2
This robbed the invasion of legitimacy. The insurgency that ensued after initial combat
operation robbed the invasion of success. Today, the United States has less influence
in Baghdad than Iran does. Iraq is a Shia-dominated state with an alienated Sunni
minority, rampant violence, and virtually no control over the Kurdish north. At least
134,000 Iraqis died as a direct result of the American invasion, and the violence there
continues.
This content downloaded from 80.227.100.60 on Sun, 03 Nov 2019 12:25:27 UTC
Al ...
The document summarizes key findings from a Senate Intelligence Committee report on the CIA's use of torture. It finds that the CIA's enhanced interrogation techniques did not provide useful intelligence and that the CIA misled Congress and the White House about the program. The report also notes that the four main detainees interrogated were from Middle Eastern countries allied with the US and that the torture damaged US relations and standing internationally.
The document discusses terrorism and 9/11, providing background on the war in Afghanistan and Al Qaeda. It then discusses the 9/11 attacks in detail, including how hijackers flew planes into the World Trade Center towers. It also discusses Osama Bin Laden claiming responsibility and his background. Further sections discuss the impact of terrorism on Americans abroad like Daniel Pearl, as well as terrorist attacks in other countries like England, Russia, and Kuwait. It concludes by discussing the US tactic of waterboarding to interrogate terrorism suspects.
- The document discusses intelligence warnings prior to the September 11th attacks, including warnings from foreign governments about an imminent al Qaeda attack on the United States using aircraft as weapons. It also discusses the 1995 Bojinka Plot, where terrorists planned to hijack commercial airliners and fly them into buildings.
- The document discusses warnings that the US intelligence community received prior to the September 11th attacks from various foreign governments about an imminent al Qaeda attack on US soil using airplanes as weapons. These warnings were not properly investigated or acted upon. The document argues that the attacks may have been preventable if intelligence officials had properly heeded and investigated these many warnings.
DARK OVERLORD 9-11 TERRORIST BLACKMAILERSVogelDenise
17 USC § 107 Limitations on Exclusive Rights – FAIR USE
12/28/18 VIDEO: END OF THE YEAR Utica International Embassy Interim Prime Minister Vogel Denise Newsome’s TELEPHONE CONFERENCE WITH Moorish Science Temple of America:
YouTube: https://youtu.be/69Vdtzme0eA
Vimeo: https://vimeo.com/309670714
Provides an UPDATE of the Agenda of the Utica International Embassy and the EFFECTIVENESS of work done by Interim Prime Minister Vogel Denise Newsome regarding:
(1) The COLLAPSE Of The United States of America’s – a/k/a Confederate States of America’s DESPOTISM Government
(2) The COLLAPSE Of The USA’s WHITE Jews/Zionists’ WALL STREET
(3) The WHITE Jews/Zionists/Supremacists CONTINUED efforts to TAKE CREDIT for WORK of Newsome in:
(a) EXPOSURE of USA’s Legal Counsel Baker Donelson Bearman Caldwell & Berkowitz PLANNING, ORCHESTRATING and CARRYING OUT The 9/11 World Trade Center Terrorist Attacks/Bombings
(b) EXPOSURE of USA’s Legal Counsel Baker Donelson Bearman Caldwell & Berkowitz ROLE in PONZI SCHEMES/SCAMS and FRAUDULENT Wall Street Scams STEALING/EMBEZZLING Monies From INVESTORS….
(c) NOW WHITE Zionist/Supremacist LUNATIC Groups (as Dark Overlord, etc.) seek to PROFIT through BLACKMAIL Scams, etc.
UTICA INTERNTIONAL EMBASSY WEBSITE: https://uticainternationalembassy.website
SLIDESHARE.NET: www.Slideshare.net/VogelDenise
This document discusses the history and ethics of whistleblowing and organizations like Wikileaks that publish leaked classified documents. It describes several prominent whistleblowers throughout history like Daniel Ellsberg who leaked the Pentagon Papers and Mark Felt aka "Deep Throat" who helped expose the Watergate scandal. More recently, it discusses Wikileaks' publication of documents exposing abuses in the Iraq and Afghanistan wars provided by Bradley Manning, as well as Edward Snowden's leaks of NSA surveillance programs. There is debate around whether such leaks serve the public interest or damage national security, and if individuals like Julian Assange and these whistleblowers can be prosecuted under the Espionage Act.
Rothschild's Invasion of Iraq and AfghanistanDustin DeMoss
The document discusses conspiracy theories that claim the 2003 US invasion of Iraq was orchestrated by the Rothschild family to further their goals. It outlines the theories, which assert that neoconservative thinkers who advocated for the war were secretly acting on behalf of the Rothschilds. It acknowledges the historical power of the Rothschild family's private banking business but questions whether they orchestrated the Iraq war behind the scenes given a lack of evidence from the conspiracy theorists. It aims to seriously analyze any actual connections between the Rothschilds and the invasion.
The document discusses growing concerns in the Obama administration over the Saudi-led military campaign in Yemen and efforts to restore peace. Secretary of State John Kerry may visit Saudi Arabia next week to discuss issues with the campaign and explore new strategies. The U.S. initially backed the bombing campaign but is now worried about the civilian death toll and the possibility that arms supplied to pro-government forces could fall into terrorist hands. The administration is also seeking ways to restart mediation between Houthi rebels and the exiled Yemeni government.
The timeline begins on September 11, 2001 with the terrorist attacks in the United States. It ends on May 1, 2011 when Osama bin Laden was killed by U.S. forces in a raid on his compound in Pakistan. Throughout the timeline, key events include the start of the war in Afghanistan in October 2001, battles searching for bin Laden including the Battle of Tora Bora in December 2001, audiotapes and videos released by bin Laden, and attacks attributed to al-Qaeda such as the July 7, 2005 bombings in London.
The article discusses the Arab Spring uprisings and provides a principled Islamic stance. It argues that while dictators have fallen, the regimes remain unchanged. It warns against portraying the uprisings as Western-backed or due to social media alone. The West supported despotic regimes for strategic reasons and continues to do so. True change requires ending corruption, foreign interference, and implementing an Islamic system with elected leadership and justice for all.
The document discusses the history and techniques of investigative journalism. It provides definitions for different types of investigative reporting such as original investigative reporting and reporting on investigations. It also discusses challenges that can arise in investigative reporting like relying too heavily on investigatory sources or becoming activists rather than independent observers. A key part of the document is a case study about the New York Times' coverage of Wen Ho Lee and the accusation that he stole nuclear secrets for China. It reflects on aspects of the coverage that could have been improved by considering alternative explanations and perspectives earlier.
1) The WikiLeaks document dump reflected positively on US diplomacy and policy, showing efforts to prevent Iran from obtaining nuclear weapons and negotiations with Saudi Arabia over oil.
2) While some documents were embarrassing, they did not reveal sensitive information like assassination attempts or illegal torture that could have been in past leaks.
3) The impact on US foreign policy is considered "fairly modest" according to the Defense Secretary, and unlike the Pentagon Papers, the WikiLeaks documents did not involve deliberate government lies that led to loss of life.
The document discusses terrorism and provides several examples of terrorist attacks around the world, including the September 11th attacks in the United States, bombings in London in 2005, and a derailed train attack in Russia in 2009. It also discusses America's response to terrorism through actions like waterboarding and the ongoing war in Afghanistan.
Guo Wengui, who was arrested in the US for a $1 billion fraud scheme, helped fund the flight of Yan Limeng from Hong Kong to the US. Yan alleged without evidence that COVID-19 was created by the Chinese government, and her unreviewed paper making this claim was initially promoted by Guo's organizations. Western media, especially right-leaning outlets, then picked up Yan's claims and spread them to millions of people before the scientific community debunked her allegations as fraudulent. Both Yan and Guo took advantage of anti-Chinese sentiment to undermine the Chinese government and distract from issues like the US pandemic response.
The U.S. government appears to be covertly attacking Wikileaks and its founder Julian Assange in response to Wikileaks publishing hundreds of thousands of classified documents from the State Department and earlier military leaks from Iraq and Afghanistan. While some of the leaks jeopardized safety, most of the State Department leaks confirmed already public information. The government sees Wikileaks' actions as undermining their authority over classified information, but attacks on Wikileaks' infrastructure sets a worrying precedent for press freedom. Companies like Amazon and PayPal suspended services to Wikileaks after political pressure, showing how legal attacks can achieve results the law itself cannot. This clandestine war on Wikileaks threatens the ability of journalists to publish leaks
Whistleblowers are people who expose wrongdoing in government and business. They may operate from inside as employees or externally. WikiLeaks is an organization that publishes leaked classified documents and information from anonymous sources. It has released videos and documents related to the Iraq and Afghanistan wars, including evidence of civilian casualties and abuse of detainees. The source of the leaks was Bradley Manning. WikiLeaks and its founder Julian Assange face legal issues and criticism over whether they ethically handled and released classified government information.
1. Iraqi exile group fed false information to news media
By Jonathan S. Landay and Tish Wells
Knight RidderNewspapers March 15, 2004
WASHINGTON— The formerIraqi exile group that gave the Bush
administration exaggerated and fabricated intelligence on Iraq also
fed much of the same information to leading newspapers,news
agencies and magazines in the United States, Britain and Australia.
A June 26, 2002,letter from the Iraqi National Congress to the
Senate Appropriations Committee listed 108 articles based on
information provided by the INC's InformationCollection Program, a
U.S.-funded effortto collectintelligence in Iraq.
The assertions in the articles reinforced PresidentBush's claims that
Saddam Hussein should be ousted because he was in league with
Osama bin Laden, was developing nuclear weapons and was hiding
biologicaland chemical weapons.
Feeding the information to the news media, as well as to selected
administration officials and members of Congress,helped fosteran
impressionthat there were multiple sources of intelligence on Iraq's
illicit weapons programs and links to bin Laden.
In fact, many of the allegations came from the same half-dozen
defectors,weren't confirmed by other intelligence and were hotly
disputed by intelligence professionals at the CIA, the Defense
Department and the State Department.
Nevertheless,U.S. officials and others who supported a pre-emptive
invasion quoted the allegations in statements and interviews without
running afoul of restrictions on classified information or doubts about
the defectors' reliability.
Other Iraqi groups made similar allegations about Iraq's links to
terrorism and hidden weapons that also found their way into official
administration statements and into news reports, including several by
Knight Ridder.
2. Knight Ridder, which obtained a copy of the INC letter, reviewed all of
the articles in what the documentcalled a "summary of ICP product
cited in major English language news outlets worldwide (October
2001-May 2002)."
The articles made numerous assertions that so far haven't been
substantiated 11 months after Baghdad fell, including charges that:
_Saddam collaborated for years with bin Laden and was complicitin
the Sept. 11, 2001,terrorist attacks. Intelligence officials said there is
no evidence of operational ties betweenIraq and al-Qaida, and no
evidence of an Iraqi hand in the attacks.
_Iraq trained Islamic extremists in the same hijacking techniques
used in the Sept.11 strikes and prepared them for operations against
Iraq's neighbors and possiblythe United States. Two senior U.S.
officials said that so far no evidence has been found to substantiate
the charge.
_Iraq had mobile biologicalwarfare facilities disguised as yogurt and
milk trucks and hid banned weapons production and storage facilities
beneath a hospital, fake lead-lined wells and Saddam's palaces.No
such facilities or vehicles have been found so far.
_Iraq held 80 Kuwaitis captured in the 1991 Gulf War in a secret
underground prison in 2000.No Kuwaiti prisoners have been found
so far.
_Iraq could launch toxin-armed Scud missiles at Israel that could kill
100,000 people and was aggressivelydeveloping nuclear weapons.
No Iraq Scud missiles have been found yet.
_Navy Lt. Cmdr. Michael ScottSpeicher, missing since the 1991 Gulf
war, was seen alive in Baghdad in 1998.The case remains
unresolved, but the Navy last week said there was no evidence that
Speicherwas ever held in captivity.
According to the letter, publications in which the articles appeared
included The New York Times,The Washington Post,Vanity Fair,
3. The Atlantic Monthly, The Times of London,The Sunday Times of
London, The Sunday Age of Melbourne, Australia, and two Knight
Riddernewspapers,The Kansas City Star and The Philadelphia Daily
News. The Associated Press and others also wrote stories based on
INC-provided materials.
Other U.S. and international news media picked up some of the
articles. By mid-January 2002,polls showed that a solid majority of
Americans favored military force to oust Saddam.
Many of the stories noted that the information they contained couldn't
be independentlyverified.
In at least one case,the INC made a defectoravailable to a journalist
before his information had been fully reviewed by U.S. intelligence
officials.
The defector,an engineer, Adnan Ihsan al Haideri, claimed in a Dec.
20, 2001,New York Times article by Judith Miller that there were
biological,nuclear and chemical warfare facilities under private villas,
the Saddam Hussein Hospital and fake water wells around Baghdad.
Senior U.S. officials said U.S. arms inspectors have found no fake
wells or a laboratory under the hospital. Some secretrooms have
been located under villas, mosques and palaces, but the officials,
who asked not to be identified,said they weren't among locations that
al Haideri claimed to know about.
Several requests to The New York Times to speak to Miller were not
answered.
INC leader Ahmad Chalabi and other officials have insisted that the
group screened all defectors as thoroughly as they could.
U.S. intelligence officials have determined that virtually all of the
defectors' informationwas marginal or useless,and that some of the
defectors were fabricators or embellished the threat from Saddam.
Many of the articles relied on interviews with the same defectors,who
appeared to change facts with each telling. For instance, one defector
4. first appeared in several stories as an Iraqi army formercaptain, but a
later story said he was a major.
Another defectortold one interviewer that the aircraft fuselage on
which Islamic extremists received training in hijacking belonged to a
Boeing 707 and was quoted in a later story as saying that it came
from a Russian-made Tupolev.
Intelligence debriefers lookfor such differences whentrying to
determine the reliability of defectors,who sometimesexaggerate their
importance or try to tell interviewers what they think the interviewers
want to hear.
The Information CollectionProgram (ICP) was financed out of the
more than $18 million that Congress approved forthe Iraqi National
Congress,led by Chalabi, now a memberof the Iraqi Governing
Council, between1999 and 2003.The group remains on the
Pentagon's payroll.
The INC letter said that it fed ICP information to Arab and Western
news media and to two officials in the offices of Vice PresidentDick
Cheney and Secretary of Defense Donald H. Rumsfeld,the leading
invasion advocates.
The information bypassed U.S. intelligence channels and reached the
recipients even after CIA, Defense IntelligenceAgencyand FBI
officersquestioned the accuracy of the materials or the motives of
those who supplied them.
Some of the information, such as the charge that Iraq ran a terrorist
training camp in Salman Pak, found its way into administration
statements, including a Sept. 12, 2002,White House paper.
The CIA and the State Department had long viewed the INC as
unreliable.
5. Some articles cited in the INC letter were based on transcripts the
INC provided.An article in The Kansas City Star, for example, quoted
an unidentified INC memberas saying he had information that
Speicherwas seen alive in Baghdad in 1998.
A March 17, 2002,Sunday Times of London article on Saddam's
alleged illicit weapons was based on a 3,000-page transcriptof the
preliminary INC debriefing of al Haideri.
The article also reported claims in a videotaped interview made by
unnamed Iraqi oppositionofficials with a second defectorthat
Saddam had mobile biologicalwarfare laboratories disguised as milk
and yogurt trucks. Such vehicles have yet to be found.
Marie Colvin, a co-author of the article, said the INC insisted to her
that all defectors were scrutinized as fully as possiblebeforebeing
passed on, and that it was up to reporters to decide how to use their
information.
"I believe they acted in good faith," she said. "Over seven years, I
would not say there was a story I was fooled on."
Many articles quoted defectors as saying that Saddam was training
extremists from throughout the Muslim world at Salman Pak, outside
Baghdad.
"We certainly have found nothing to substantiate that," said a senior
U.S. official.
Instead, he said, U.S. intelligence analysts believe that Iraqi
counterterrorism units practiced anti-hijacking techniques on an
aircraft fuselage at the site.
An Oct. 12, 2001,WashingtonPost opinion piece by columnist Jim
Hoagland quoted an INC-supplied defector,Sabah Khalifa Khodada
Alami, as saying that Salman Pak offered hijacking and assassination
courses.
6. The article, which urged the Bush administration to examine possible
Iraqi complicityin Sept. 11, said Alami was a formermilitary instructor
and ex-army captain whom the INC tracked down to Fort Worth,
Texas, where he settled in May 2001 as a refugee.
Hoagland's column said the defectorshould not be automatically
believed.Hoagland said he wrote it to call attention to "the difficulties
that two defectors had in receiving an evaluation from the CIA."
In a Nov. 11 story in the Observerof London by David Rose,Alami
was quoted as saying that "the method used on 11 September
perfectlycoincides with the training I saw at the camp."
The article said Alami was assigned to Salman Pak between 1994
and 1995.
However, a Nov. 8, 2001,New York Times article said Alami worked
at Salman Pak for eight years.
The Oct. 12, 2001,Washington Postpiece also cited an INC claim
that an unnamed former Iraqi intelligence officerclaimed that
"Islamists" were trained at Salman Pak on a U.S.-made Boeing 707.
In a later article, which appeared to be based on an interview with the
same man, the aircraft was identified as an old Russian-made
Tupolev.
That defectorcomplained in The Washington Postcolumn that CIA
interrogators in Ankara had treated him "dismissively" earlier that
week.
The Nov. 8, 2001,New York Times article featured an interview in an
unidentified Middle East country that was arranged by the INC with
an unidentified Iraqi lieutenant general who said he'd been
interviewed by the CIA in Ankara the previous month.
He and an unidentified Iraqi intelligence service sergeantclaimed
they worked at Salman Pak for several years and that trainees were
being prepared for attacks on neighboring countries and possiblythe
United States.
7. The unnamed lieutenant general appears to have been the defector
of the same rank, code-named Abu Zeinab, who was featured in the
Nov. 11, 2001,Observerarticle.
The newspaper said the defectorwas interviewed by telephone, and
that it was also given details of an interview that two London-based
INC activists had conducted with Abu Zeinab at a safe house in
Ankara, Turkey.
Abu Zeinab claimed that trainees were instructed in hijacking aircraft.
The defector's full name, Abu Zeinab al Qurairy, was revealed in a
February 2002 article in Vanity Fair magazine that was also written by
Rose,who declined to comment.
The defectorsaid the Islamists at Salman Pak pledged to obeyorders
to carry out suicide attacks and that those who flunked training were
"used as targets in live-ammunition exercises."
Al Qurairy said in one exercise,students had to land helicopters on a
speeding train and then hijack it.
A list of the 108 articles that the Iraqi National Congress says were
based on information it supplied to news media is available on the
web at www.krwashington.com.
———
(c) 2004,Knight Ridder/Tribune InformationServices.
Iraq
Read more here: http://www.mcclatchydc.com/2004/03/15/10176/iraqi-
exile-group-fed-false-information.html#storylink=cpy