The program begins with material overlapped from our previous program, delineating U.S. government protection of Jihadist elements, in order that they could be used as proxy warriors in ongoing covert operations.
Key Points of Discussion and Analysis Include: The FBI’s limiting of the investigation of the assassination of extremist Rabbi Meir Kahane; the fact that the limiting of that investigation permitted Ali Mohamed, Mahmoud Aboulihama and Mohammed Salameh to participate in future terrorist attacks, including the 1993 World Trade Center bombing and the 1998 Nairobi Embassy bombing; the FBI’s blaming of the attenuation of the investigation of the Kahane murder on New York DA Robert Morgenthau; Morgenthau’s previous investigation of the CIA-linked BCCI; the FBI’s shielding of Army Special Forces operative Ali Mohamed in the1993 World Trade Center bombing; the FBI’s shielding of Mohamed in the 1995 “Landmarks Case”—the plot to blow up the United Nations, the George Washington Bridge and both the Lincoln and Holland Tunnels; the probability that Mohamed’s utility as a trainer of mujahadeen for covert operations in Afghanistan, Bosnia and parts of the former Soviet Union was the cause of his inviolability.
The next section of the program presents information about the genesis of Ali Mohamed as a U.S. agent and trainer of mujahadeen.
Key Points of Discussion and Analysis Include: Zbigniew Brzezinski’s creation of the mujahadeen training and recruitment organization at the outset of the Afghan war against the Soviet Union; the training of Egyptian president Anwar Sadat’s elite personal guard (of which Ali Mohamed was a member) by J.J. Capucci and Associates, headed by “ex” CIA-agent Edwin Wilson and Theodore Shackley; the handing over of the training of Sadat’s guard to the CIA following Brzezinski’s visit to Egypt in 1980; Ali Mohamed’s training at Fort Bragg in the U.S. by Special Forces; Mohamed’s networking with and allegiance to both Sheikh Rahman (involved with the Al-Kifah Center mujahadeen effort, the 1993 World Trade Center bombing and the Landmarks case) and Ayman Al-Zawahiri, Osama bin Laden’s right-hand man and eventual successor.
Next, we dolly back and examine the continued domestic and foreign operations of the Al-Kifah Center milieu, including operations involving drug trafficking and other criminal activity, support for the Al-Kifah Center by Saudi Arabia and the Center’s involvement in covert operations in Xinjiang Province in China, Chechnya in Russia, Uzbekistan and other former parts of the Soviet Union and the Balkans.
Key Points of Discussion and Analysis Include: The transition of Ali Mohamed’s mujahadeen-training program from sending fighters to Afghanistan to sending fighters to Bosnia; the Saudi government’s partial financing of Sheikh Rahman’s defense fund (Rahman was indicted in the 1993 World Trade Center bombing); Al-Kifah trainees’ participation in covert operations in Chechnya, Tajikistan and fighting alongside the Uighurs in Xinjiang province; Al-Qaeda’s alliance with the Islamic Movement of Uzbekistan; the Al-Qaeda/IMU use of heroin trafficking to finance combat and terror operations; the 9/11 Commission Report’s dismissal of the verifiable fact that Al-Qaeda helped finance its operations with the Afghan drug trade; the Al-Kifah Center milieu’s involvement in the drug trade, as well as arson-for-hire and counterfeiting; Mujahid Abdulqaadir Menepta, a Muslim suspect in both the 9/11 case and the Oklahoma City bombing; Menepta’s alleged involvement in organized crime and drug trafficking; the Al-Kifah Center’s joint operations with the Saudis; Sphinx Trading’s link to the Al-Kifah operation; the protection of Sphinx Trading even after 9/11.
Fleshing out the jihadist milieu, we note bin Laden relatives and their involvement in Al-Qaeda fronts and the cover-up of their activities by the Deep State milieu.
Key Points of Discussion and Analysis Include: the World Assembly of Muslim Youth and its links to mujahadeen and terrorism; Abdullah bin Laden’s leadership of the WAMY; Abdullah bin Laden’s evacuation by jet along with other Saudis and members of the bin Laden family after 9/11; the Golden Chain letter discovered in the IIRO office in Bosnia, containing the names of key Al-Qaeda financiers; the presence in the “Golden Chain’ of Khalid bin Mahfouz, the top banker in Saudi Arabia; the IIRO’s founding by Jamal Kalifa, Osama bin Laden’s nephew.
The last part of our program reviews two elements presented in FTR#1181.
In the trial of Ramzi Yousef, a lay-out of the terror scenario that became the 9/11 attacks was on Yousef’s laptop, yet was never brought to light.
Likewise, the name of Khalid Shaikh Mohamed–dubbed the mastermind of the 9/11 and currently the focal point of ongoing legal proceedings–was all but omitted from Yousef’s trial, despite his participation in the aborted “Operation Bojinka” plot to blow up a number of airliners over the Pacific.
In our series, we note the exclusion of key participants in the murder of extremist Rabbi Meir Kahane, which permitted co-conspirators to participate in the first World Trade Center attack in 1993 and Nairobi U.S. Embassy bombings in 1998.
Among the probable motives for these key, deadly omissions is the use of these Al-Qaeda, Muslim-Brotherhood derived terrorist elements as proxy warriors in Afghanistan, Bosnia, Chechnya and Uzbekistan.
We conclude by reviewing how cynical the Deep State can be, acting with a complete disregard for American combat military personnel.
With President Biden having announced the withdrawal of U.S. combat forces from Afghanistan, we contemplate the events that led to that involvement, especially terrorist incidents culminating in the 9/11 attack.
We rely on research done by the brilliant, venerable Peter Dale Scott.
We begin by noting how cynical the Deep State can be, acting with a complete disregard for American combat military personnel: ” . . . . Just how subordinated official policy could become to deep state needs was demonstrated in November 2001, when Cheney, at the request of [Pakistan’s head of state] Musharraf and the ISI [Pakistan’s primary intelligence service], approved secret airlifts to ferry surrounded Pakistani and high-level al-Qaeda fighters out of Afghanistan, to safety in Pakistan. . . .”
In the trial of Ramzi Yousef, a lay-out of the terror scenario that became the 9/11 attacks was on Yousef’s laptop, yet was never brought to light.
Likewise, the name of Khalid Shaikh Mohamed–dubbed the mastermind of the 9/11 and currently the focal point of ongoing legal proceedings–was all but omitted from Yousef’s trial, despite his participation in the aborted “Operation Bojinka” plot to blow up a number of airliners over the Pacific.
In our series, we note the exclusion of key participants in the murder of extremist Rabbi Meir Kahane, which permitted co-conspirators to participate in the first World Trade Center attack in 1993 and Nairobi U.S. Embassy bombings in 1998.
Among the probable motives for these key, deadly omissions is the use of these Al-Qaeda, Muslim-Brotherhood derived terrorist elements as proxy warriors in Afghanistan, Bosnia, Chechnya and Uzbekistan.
“. . . . In Triple Cross, Peter Lance, who does not mention KSM’s escape from Qatar, focuses instead on the way that, later in the same year, U.S. federal prosecutors kept his name out of the trial of Ramzi Yousef in connection with the 1993 World Trade Center bombing: “Assistant U.S. Attorneys Mike Garcia and Dietrich Snell presented a riveting, evidence-driven case . . . and characterized the material retrieved from Ramzi’s Toshiba laptop as ‘the most devastating evidence of all. . . .’ . . . While Yousef’s laptop . . . contained the full details of the plot later executed on 9/11, not a word of that scenario was mentioned during trial . . . . Most surprising, during the entire summer-long trial, the name of the fourth Bojinka conspirator, Khalid Shaikh Mohammed . . . . was mentioned by name only once, in reference to a letter found in [Yousef’s apartment] . . . .”
Illustrating the machinations of what Professor Scott terms “The American Deep State” are the interactions between Big Oil, Sullivan & Cromwell, the Dulles brothers and the Eisenhower administration to destabilize the Mossadeq regime in Iran.
Key Points of Discussion and Analysis Include: A letter written by Sullivan & Cromwell attorney John Foster Dulles in the 1930s to a British colleague, celebrating cartels and the triumph of international businessmen in overcoming barriers to geopolitical maneuvering erected by “nationalist” politicians; collaboration by the “Seven Sisters” of Big Oil (Standard Oil of New Jersey [now Exxon], Standard Oil of New York [now Mobil], Standard Oil of California [now Chevron], Gulf Oil, Texaco, Royal Dutch Shell and Anglo-Iranian [now BP] in controlling the international oil business; a cooperative effort by the Seven Sisters to successfully reduce Iranian oil production from 241 million barrels a year in 1950 to 10.6 million barrels a year in 1952 in order to destabilize premier Mossadeq; Professor Scott’s point that the CIA’s overthrow of Mossadeq in 1953 represented a “Deep State” realization of the goal of the oil cartel; the role of ARAMCO in the strangling of Iranian oil production, offsetting the drop in Iranian production by increasing its own; change of a Justice Department suit against Big Oil from a criminal proceeding to a civil suit prosecuted by the Department of State; the predictable resolution of that suit in favor of big oil; the fact that the oil cartel was represented in that suit by Sullivan & Cromwell and John Foster Dulles was in charge of the State Department; the fact that John Foster Dulles’ brother and Sullivan & Cromwell associate Allen was in charge of the CIA at the same time and oversaw the removal of Mossadeq; Allen Dulles’ successful gambit to sidestep President Eisenhower by securing British Prime Minister Harold MacMillan as an executive authority to dispatch U‑2 flights..
The program concludes with delineation of U.S. government protection of Jihadist elements so that they could be used as proxy warriors in ongoing covert operations.
Key Points of Discussion and Analysis Include: U.S. government protection for Ali Mohamed, an al-Qaeda operative who doubled as a Special Forces operative training mujahadeen for combat operations in Afghanistan, Bosnia, Chechnya among other places; FBI agent John Zent’s communication to the RCMP in Vancouver, leading to Mohamed’s release from custody; Mohamed’s training of mujahadeen at the Al-Kifah Refugee Center in Brooklyn; the assassination of extremist Rabbi Meir Kahane by trainees of Mohamed’s including El Sayyid Nosair; the FBI and New York Police Department’s cover-up of the participation in the Kahane killing of Nosair/Mohamed associates; the eventual participation of some of those associates in the 1993 World Trade Center bombing; the FBI’s sabotage of New York County District Attorney Robert Morgenthau’s attempts to widen the investigation of the Al-Kifah milieu; the central role of Ali Mohamed’s Al-Kifah trainees in the 1993 World Trade Center bombing.
In a series of programs we are recording, we highlight the vital research of the brilliant, venerable Berkeley researcher Peter Dale Scott, who has chronicled the shocking behavior of elements of our government, covering up the involvement in terrorist incidents of individuals and institutions that, if properly pursued, could have prevented the 9/11 attacks–the event that precipitated our entry into that conflict. “. . . . In Triple Cross, Peter Lance, who does not mention [9/11 mastermind Khalid Shaikh Mohammed’s] escape from Qatar, focuses instead on the way that, later in the same year, U.S. federal prosecutors kept his name out of the trial of Ramzi Yousef in connection with the 1993 World Trade Center bombing: ‘Assistant U.S. Attorneys Mike Garcia and Dietrich Snell presented a riveting, evidence-driven case . . . and characterized the material retrieved from Ramzi’s Toshiba laptop as ‘the most devastating evidence of all. . . .’ . . . While Yousef’s laptop . . . contained the full details of the plot later executed on 9/11, not a word of that scenario was mentioned during trial . . . . Most surprising, during the entire summer-long trial, the name of the fourth Bojinka conspirator, Khalid Shaikh Mohammed . . . . was mentioned by name only once, in reference to a letter found in [Yousef’s apartment] . . . .”
With the (justifiable) outrage swirling around FBI director (and Mitt Romney backer) James Comey’s public discussion of the discovery of more of Hillary Clinton’s e‑mails having been discovered, another election-related investigation has gone largely unexamined. Indeed, the importance of the investigation has been downplayed.
Computer experts discovered a link between a server registered to the Trump organization and two servers registered to the Alfa Bank in Moscow, a bank that is part of the Alfa conglomerate discussed in FTR #‘s 530 and 573.
In the Foer piece, and in attempted discrediting articles of same, it is apparent that the investigators do not understand the nature of the entity they are investigating. The journalistic “spin” put on Alfa in the coverage is “Russia/Putin/Kremlin” new Cold War context. Alfa is very, very different.
In FTR #‘s 530, 573 we examnined the nature of Alfa’s history, operations and institutional and economic foundations. It is anything BUT “Kremlin/Putin/Russia.”
It appears to be Underground Reich, all the way, with evidentiary tributaries running in the direction of: the Iran-Contra scandal; the Iraqgate scandal; the oil-for-food scam vis a vis Iraq; malfeasanace by a coterie of GOP bigwigs including Dick Cheney and others close to George W. Bush, and Haley Barbour; money-laundering by powerful international drug syndicates; Chechen warlords and drug-trafficking syndicates; the Royal family of Liechtenstein; the Bank al-Taqwa (which helped finance al-Qaeda); the Marc Rich operations; Eastern European and Russian associates of Wolfgang Bohringer, one of Mohamed Atta’s close associates in South Florida; and the Carl Duisberg Fellowship, which brought Mohamed Atta to Germany from Egypt and may have helped him into the U.S.
The program highlights major aspects of the investigation into the Alfa/Trump link:
The Trump/Alfa link was not a malware attack, as some of the computer scientists initially thought: ” . . . . The researchers quickly dismissed their initial fear that the logs represented a malware attack. The communication wasn’t the work of bots. The irregular pattern of server lookups actually resembled the pattern of human conversation—conversations that began during office hours in New York and continued during office hours in Moscow. It dawned on the researchers that this wasn’t an attack, but a sustained relationship between a server registered to the Trump Organization and two servers registered to an entity called Alfa Bank. . . .”
The set-up was highly unusual: ” . . . . The researchers had initially stumbled in their diagnosis because of the odd configuration of Trump’s server. ‘I’ve never seen a server set up like that,’ says Christopher Davis, who runs the cybersecurity firm HYAS InfoSec Inc. and won a FBI Director Award for Excellence for his work tracking down the authors of one of the world’s nastiest botnet attacks. ‘It looked weird, and it didn’t pass the sniff test.’ The server was first registered to Trump’s business in 2009 and was set up to run consumer marketing campaigns. It had a history of sending mass emails on behalf of Trump-branded properties and products. Researchers were ultimately convinced that the server indeed belonged to Trump. (Click here to see the server’s registration record.) But now this capacious server handled a strangely small load of traffic, such a small load that it would be hard for a company to justify the expense and trouble it would take to maintain it. ‘I get more mail in a day than the server handled,’ Davis says. . . .”
The article details more unusual aspects of the link: ” . . . . That wasn’t the only oddity. When the researchers pinged the server, they received error messages. They concluded that the server was set to accept only incoming communication from a very small handful of IP addresses. . . . Eighty-seven percent of the DNS lookups involved the two Alfa Bank servers. ‘It’s pretty clear that it’s not an open mail server,’ Camp told me. ‘These organizations are communicating in a way designed to block other people out.’ . . . .”
Paul Vixie–one of the premier experts in the field–felt the connection was highly unusual: ” . . . . Earlier this month, the group of computer scientists passed the logs to Paul Vixie. In the world of DNS experts, there’s no higher authority. Vixie wrote central strands of the DNS code that makes the internet work. After studying the logs, he concluded, ‘The parties were communicating in a secretive fashion. The operative word is secretive. This is more akin to what criminal syndicates do if they are putting together a project.’ Put differently, the logs suggested that Trump and Alfa had configured something like a digital hotline connecting the two entities, shutting out the rest of the world, and designed to obscure its own existence. . . .”
The available evidence indicates that the hookup indicated “human-level communication”: ” . . . I put the question of what kind of activity the logs recorded to the University of California’s Nicholas Weaver, another computer scientist not involved in compiling the logs. ‘I can’t attest to the logs themselves,’ he told me, ‘but assuming they are legitimate they do indicate effectively human-level communication.’ . . . ”
More about the nature of the communication, from the scientist using the code-name “Tea Leaves”: ” . . . . Tea Leaves and his colleagues plotted the data from the logs on a timeline. What it illustrated was suggestive: The conversation between the Trump and Alfa servers appeared to follow the contours of political happenings in the United States. ‘At election-related moments, the traffic peaked,’ according to Camp. There were considerably more DNS lookups, for instance, during the two conventions. . . .”
The scientists attempted to get the public to pay attention to their investigation and New York Times writers turned their attention to the case: ” . . . In September, the scientists tried to get the public to pay attention to their data. One of them posted a link to the logs in a Reddit thread. Around the same time, the New York Times’ Eric Lichtblau and Steven Lee Myers began chasing the story.* (They are still pursuing it.) Lichtblau met with a Washington representative of Alfa Bank on Sept. 21, and the bank denied having any connection to Trump. . . .”
Things got “interesting” after that. According to the computer scientists, the Trump Organization shut down the server! As the brilliant Berkeley researcher Peter Dale Scott noted, in a different context, “The cover-up obviates the conspiracy. ” . . . . In September, the scientists tried to get the public to pay attention to their data. One of them posted a link to the logs in a Reddit thread. Around the same time, the New York Times’ Eric Lichtblau and Steven Lee Myers began chasing the story.* (They are still pursuing it.) Lichtblau met with a Washington representative of Alfa Bank on Sept. 21, and the bank denied having any connection to Trump. . . . The computer scientists believe there was one logical conclusion to be drawn: The Trump Organization shut down the server after Alfa was told that the Times might expose the connection. Weaver told me the Trump domain was ‘very sloppily removed.’ Or as another of the researchers put it, it looked like ‘the knee was hit in Moscow, the leg kicked in New York.’. . . . Four days later, on Sept. 27, the Trump Organization created a new host name, trump1.contact-client.com, which enabled communication to the very same server via a different route. When a new host name is created, the first communication with it is never random. To reach the server after the resetting of the host name, the sender of the first inbound mail has to first learn of the name somehow. It’s simply impossible to randomly reach a renamed server. ‘That party had to have some kind of outbound message through SMS, phone, or some noninternet channel they used to communicate [the new configuration],’ Paul Vixie told me. The first attempt to look up the revised host name came from Alfa Bank. ‘If this was a public server, we would have seen other traces,’ Vixie says. ‘The only look-ups came from this particular source.‘According to Vixie and others, the new host name may have represented an attempt to establish a new channel of communication. But media inquiries into the nature of Trump’s relationship with Alfa Bank, which suggested that their communications were being monitored, may have deterred the parties from using it. Soon after the New York Times began to ask questions, the traffic between the servers stopped cold. . . .”
Not surprisingly, the FBI has dismissed the relevance of the computer link.
This dismissal comes against the background of several late-breaking developments:
The unsuccessful attempt by Alfa subsidiary Crown Resources to buy Marc Rich’s commodities firm: ” . . . A deal to sell the Swiss-based commodities operation of former U.S. fugitive financier Marc Rich to Russia-owned energy trading group Crown Resources is off. . . . Crown is owned by the Alfa Group conglomerate. . . . .”
The subsequent successful attempt by Alfa player Mikhail Fridman to purchase the Marc Rich firm: ” . . . Mikhail Fridman: ‘Defendant Mikhail Fridman currently serves as Chairman of the Board of Directors of co-conspirator Alfa Bank and as Chairman of the Board of Directors of Defendant Consortium Alfa Group. Fridman further served on the Board of VimpelCom, a NYSE company, and has control over Golden Telecom, a NASDAQ company ... purchased the United States trading firm owned by American, Mark Rich, the one time commodities baron pardoned by President Clinton with much controversy. . . .”
The FBI’s long-dormant Twitter account began tweeting files about Bill Clinton’s pardon of Marc Rich, shortly after the official dismissal of investigations into the Alfa/Trump link: ” . . . . Now, a new interagency mystery is raising questions about whether the F.B.I. has become politicized, just days before the presidential election. On Sunday, a long-dormant F.B.I. Twitter account suddenly sprung to life, blasting out a series of links to case files that cast the Clintons in a decidedly negative light. . . . Then, on Tuesday, the “FBI Records Vault” account—which had not tweeted at all between October 2015 and Sunday—published a link to records related to the 15-year-old, long-closed investigation into former President Bill Clinton’s pardoning of onetime commodities trader turned fugitive Marc Rich. The post, which was quickly retweeted thousands of times, links to a heavily redacted document that repeatedly references the agency’s “Public Corruption” unit—less-than-ideal optics for Hillary Clinton, who has spent her entire campaign fighting her image as a corrupt politician. . . .”
FBI Director James Comey was in charge of the original Marc Rich investigation and the pardon of Rich by Bill Clinton. Is there a connection between the official dismissal of the investigation into the Alfa/Trump link by the FBI, the tweeting by the FBI of the files on the Clinton pardon of Marc Rich and the fact that it was Comey who presided over the Marc Rich investigations? ” . . . . In 2002, Comey, then a federal prosecutor, took over an investigation into President Bill Clinton’s 2001 pardon of financier Marc Rich, who had been indicted on a laundry list of charges before fleeing the country. The decision set off a political firestorm focused on accusations that Rich’s ex-wife Denise made donations to the Democratic Party, the Clinton Library and Hillary Clinton’s 2000 Senate campaign as part of a plan to get Rich off the hook. Comey ultimately decided not to pursue the case. The kicker: Comey himself had overseen Rich’s prosecution between 1987 and 1993. . . .”
Program Highlights Include: details of the Carl Duisberg Society’s links to Atta and to major German corporations; discussion of the Alfa Fellowhip against the background of German Ostpolitik discussed in FTR #‘s 918 and 919; detailed analysis of Viktor Kozeny associates Fridman and (Pyotr) Aven (Kozeny employed Bohringer as a pilot); a summary analysis of the major points in FTR #‘s 530 and 573.
Continuing coverage of the re-emergence of fascism in Ukraine, this program highlights the Orwellian aspects of governance in Ukraine and the coverage of events there by the world’s media.
Ukraine recently held a nation-wide minute of silence for Symon Petliura (as with other Ukrainian names, the spelling of his name is subject to varying transliteration.) In the immediate post-World War I period, Petliura’s armies butchered some 50,000 Jews. Also stunning, though predictable under the circumstances, is the Poroshenko government’s renaming of streets for Nazi collaborators Stephan Bandera and Roman Shukhevych. This has received scant, and altogether slanted coverage in the West, with Bandera’s well-documented alliance with Hitler being nuanced as “Kremlin propaganda.” It is now illegal in Ukraine to criticize Bandera, Shukhevych, the OUN/B or its military arm the UPA as having collaborated with the Nazis.
The institutionalized masking of the true nature of the Ukrainian government continues apace, with U.N. observers barred from investigating torture by government forces in the civil war that simmers in the East, the branding of reporters covering the war as “terrorists” and the publication of their addresses by a pro-government website, and the publication by “The New York Times” of an apparently fraudulent claim of Russian masking of the presence of Buk missiles in Eastern Ukraine.
Exemplifying the cover-up of the fascist nature of Ukraine is a piece from “The Huffington Post” that dismisses the verifiable Nazi nature of the Azov battalion as–once again–Kremlin propaganda. The source for the disinformation about Azov is Roman Zvarych, the former personal secretary to Jaroslav Stetsko, the head of Ukraine’s World War II collaborationist government.
Program Highlights Include: the Dutch intelligence service’s disclosure that only the Ukrainian army had missiles capable of downing Malaysian Airlines Flight MH-17; the use of the “punisher battalions” (such as Azov) by the Ukrainian government to circumvent Minsk II; the tainting of evidence in the investigation of the downing of MH-17 by the corrupt nature of the SBU (Ukrainian intelligence); the trafficking in stolen art by Valentyn Nalyvaichenko, the former head of the SBU.
Bringing up to date topics covered in previous programs and posts, this broadcast begins with further coverage of the development of UFOs–so-called “flying saucers.” They were observed at the Roswell and Area 51 military bases and described as having been developed by the CIA, not “space aliens.”
In numerous posts and programs, we have noted that the GOP/Underground Reich element of U.S. intelligence has used Muslim Brotherhood-derived jihadis as proxy warriors and armed heralds of corporatist economics. In that context, we highlight the frankly suspicious release of Boston Marathon bomber Tamerlan Tsarnaev’s immigration file–only 206 of 651 pages were released in their entirety.
The use of Islamists as proxy warriors also bears consideration in light of law enforcement’s casual attitude toward 17 Muslim men who fired “hundreds of shots” and were “chanting” in the early morning hours in a park in San Bernardino County in California. Why wasn’t the FBI more concerned?
With tensions rising in the Western Pacific between the U.S. and China, newly-elected Philippines president Rodrigo Duterte harbors deep resentment of the U.S. over the extraction of a self-proclaimed CIA agent who incurred criminal charges in Mindanao while apparently looking for Golden Lily loot in the Islands.
After detailing yet another “suicide” of a key executive of Swiss Re, we present a significant analysis of the recent replacement of the head of the Israeli Defense Force with Avigdor Lieberman, the head of a far-right wing Israeli political party: “Israel has been ‘infected by the seeds of fascism,’ he [former Prime Minister Ehud Barak] said.”
Program Highlights Include: The CIA’s use of Gerhard von Mende, Nazi Germany’s top official coordinating Islamist forces working for the Third Reich; The Carl Duisberg Society’s sponsorship of Mohamed Atta associate and Chechen jihadi Mohamedou Ould Slahi.
In FTR #773, among other programs and posts, we noted that the Boston Marathon bombing appears to have been blowback from ongoing covert “ops” using Islamist proxy warriors in the Earth Island. The heavy censorship of Tamerlan Tsarnaev’s immigration files reinforces the suspicion that there is information about the bombers that is too sensitive to be released. All of the contents of this website as of 12/19/2014–Dave Emory’s 35+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated.
Returning to our airwaves for the first time in several years, award-winning journalist Robert Parry highlights some of his research on the Ukrainian crisis. After discussing Russian president Putin’s banning of foreign-based NGO’s from operating in Russia, Robert notes the role of the National Endowment of Democracy in orchestrating the Ukraine coup, as well as the organization’s evolution from William Casey’s CIA.
Highlighting American journalists’ unwillingness to call the Maidan events as what they obviously were–a coup–Robert sets forth Assistant Secretary of State Victoria Nuland’s plotting with the American ambassador to Ukraine and her discussion of a $5 billion capital investment the U.S. had made in Ukraine.
After reviewing the World War II fascist heritage of organizations like Svoboda and Pravy Sektor, Robert sets forth the deep involvement of those organizations in the Maidan events, as well as the “point” position of Nazi elements like the Azov battalion in the conflict in Ukraine’s Eastern regions.
One of the most important topics of discussion is the Orwellian nature of the coverage of events in Ukraine. Noting that there was no “Russian invasion” of the country (as reported by the U.S. media), Robert also discusses Crimea’s long-standing, clearly expressed sentiment to re-unite with Russia, to which that region belonged since the 19th century.
A signature element of American propaganda against Russia has been the allegation that Putin was behind the shootdown of Malaysian Air Lines Flight 17. After discussing U.S. photo reconnaissance indicating that Ukrainian government troops were behind the shootdown of the Malaysian airliner, Robert deconstructs an Australian “60 Minutes” propaganda piece that purports to prove Russian authorship of the downing of the airliner.
Program Highlights Include: analysis of the burning alive of anti-government protesters by Nazi punisher battalions; the assassination of critics of the Ukrainian government; Ukrainian-American Natalie Jaresko’s assumption of the finance ministry of Ukraine; Jaresko’s financial chicanery while working for U.S. intelligence cutout AID; former Georgian president Mikhail Saakashvili’s appointment as governor of Odessa; the import of ISIS-linked Chechens to fight alongside the Nazi formations in Ukraine; analysis of the Maidan sniper shootings as a provocation.
Analyzing the possibility that American use of Muslim Brotherhood Islamists as proxy warriors and armed heralds of corporatist free-market economic values might backfire on the United States, we look at the development of ISIS, the curious Turkish about-face on the Fetullah Gulen organization and fallout from the so-called “Arab Spring.” Beginning with discussion of a “doomsday” contingency plan concocted by al-Qaeda and Saddam Hussein to back each other up militarily in the event either or both were overthrown by the U.S., we examine the prominent role of former members of Saddam’s officer corps in administering ISIS. ISIS and al-Qaeda are holding forth in Libya, which is serving as a base for spreading their operations into Africa. Like the bloody Syrian civil war, the overthrow of Khadafy (which set the stage for the Islamist presence in Libya) is an outgrowth of the so-called “Arab Spring”–one of the “conga-line ops” we highlighted in FTR #885. Much of the program highlights the operations of the Fetullah Gulen organization in Turkey. Alleged to be a CIA front organization and Islamic extremist in nature, the Gulen organization was formerly an ally of Tayyip Erdogan. Now, it is among his most bitter opponents. Program Highlights Include: review of Hitler’s view that Islamists were a crucial Third Reich ally; review of a critical meeting in Switzerland at which prominent Euro-fascists and al-Taqwa director Ahmed Huber met; speculation that the Swiss “Euro-fascist” summit may have helped generate the intelligence disinformation that helped lure the Bush administration into the ill-advised Iraq war; “ex” CIA officer Graham Fuller’s ridicule of the allegation that the Gulen organization is a CIA front organization; the close connections between Erdogan’s AKP Party, Germany and the EU.
Addressing the Knesset (Israel’s parliament), Ukrainian president Petro Poroshenko recently gave a pro-forma apology for the participation of Ukrainians in the Holocaust. Israel is among the countries that glossed over Poroshenko’s honoring of the OUN/B executioners at Babi Yar (right). The recent election of a Nazi mayor in a Ukrainian town should surprise no one. All of the contents of this website as of 12/19/2014–Dave Emory’s 35+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated.
Recent Comments