In these programs, we continue discussion of the Azov milieu and its “Intermarium” outreach, in the context of Ukraine as a “pivot point” central to control of the World Island or Earth Island. The evolution of the Intermarium concept is fundamental to analysis of this phenomenon.
Ukraine’s significance as a global epicenter of burgeoning fascism extends to the region’s online, ideological and iconic manifestation. Two recent Canadian teens–Kam McLeod and Bryer Schmegelsky–who apparently killed three people in cold blood were influenced by Nazi culture and Azov Battalion manifestation in particular. ” . . . . A Steam user confirmed to The Globe and Mail that he talked to Mr. Schmegelsky regularly online. He recalled Mr. McLeod joining their chats as well. The user, whom The Globe is not identifying, provided photos sent by an account believed to be owned by Mr. Schmegelsky, showing him in military fatigues, brandishing what appears to be an airsoft rifle – which fires plastic pellets. Another photo shows a swastika armband, and yet another features Mr. Schmegelsky in a gas mask. The photos were reportedly sent in the fall of 2018, but the user said he stopped playing online games with Mr. Schmegelsky earlier this year after he continued to praise Hitler’s Germany. One account connected to the teens uses the logo of the Azov Battalion, a far-right Ukrainian militia that has been accused of harbouring sympathies to neo-Nazis. . . .”
Discussing Zbigniew Brzezinski’s doctrine of controlling Eurasia by controlling the “pivot point” of Ukraine. Fundamental to this analysis is the concept of the Earth Island or World Island as it is sometimes known.
Brzezinski, in turn, draws on the geopolitical theories of Sir Halford Mackinder, and, later contemporary Intermarium adovcates such as Alexandros Petersen.
Stretching from the Straits of Gibraltar, all across Europe, most of the Middle East, Eurasia, Russia, China and India, that stretch of land: comprises most of the world’s land mass; contains most of the world’s population and most of the world’s natural resources (including oil and natural gas.) Geopoliticians have long seen controlling that land mass as the key to world domination.
Most of the three programs highlighting the evolution and application of the Intermarium concept consist of reading and analysis of a long academic paper by Marlene Laruelle and Ellen Rivera. Of paramount significance in this discussion is the pivotal role of Ukrainian fascist organizations in the Intermarium and closely connected Promethean networks, from the post World War I period, through the time between the World Wars, through the Cold War and up to and including the Maidan coup.
Military, economic and political networking has employed the Intermarium idea, with what the paper terms the “ideological underpinnings” stemming from the evolution of the Ukrainian fascist milieu in the twentieth and twenty-first centuries. Some of the most important U.S. think tanks and associated military individuals and institutions embody this continuity: ” . . . . The continuity of institutional and individual trajectories from Second World War collaborationists to Cold War-era anti-communist organizations to contemporary conservative U.S. think tanks is significant for the ideological underpinnings of today’s Intermarium revival. . . .”
Program Highlights Include: Review of the incorporation of the Gehlen “Org” into the U.S. and Western intelligence apparatus; the key presence of the OUN/B and other Eastern European fascist groups into the Gehlen outfit; approval given to Gehlen for his deal with the Americans by Admiral Doenitz (who succeeded Hitler) and General Franz Halder (Gehlen’s “former” chief of staff); the incorporation of the OUN/B/Gehlen/ABN milieu into the Republican Party via the Crusade For Freedom; the key roles in the CFF played by Richard Nixon, Ronald Reagan, William Casey and George H.W. Bush; Allen Dulles and William Donovan’s wartime collusion with Nazi Germany to craft the Christian West entity; the formation of the Black Eagle Trust by John J. McCloy, Robert Lovett and Robert B. Anderson (this assured the continuity of both Japanese fascism and German Nazism in the postwar period).
We have spoken for years about The Crusade For Freedom, a covert operation with both foreign and domestic venues. Abroad, the CFF was a vehicle for financing the use of Eastern European Third Reich alumni as “fascist freedom fighters” in paramilitary operations in the Soviet Union and Eastern Europe. Domestically, the CFF spawned a Nazi branch of the Republican Party, with roots in the Third Reich and the Reinhard Gehlen spy organization. Many of CFF’s members figure in the milieu of the JFK assassination:
” . . . . Members of the Texas Crusade for Freedom would become a who’s who of Texans connected to the events surrounding the assassination of John F. Kennedy. In addition to Neil Mallon, members included [Paul] Raigorodsky, Lewis W. MacNaughton, Everette De Golyer, and Dallas mayor Earle Cabell, brother of Charles Cabell, who was Allen Dulles’s deputy CIA director [fired by JFK for his conduct in the Bay of Pigs operation along with Dulles himself]. Another member was D. Harold Byrd, who owned the building in downtown Dallas that would become known as the Texas School Book Depository. Another member was E.M. “Ted” Dealey, publisher of “The Dallas Morning News,” who was a harsh critic of Kennedy. . . .”
With Trump having re-focused attention on GOP immigration policy with his recent comments about Haiti and Norway, we review the Crusade For Freedom, an illegal domestic and foreign covert operation executed by the elite of the post-World War II Republican Party: Allen Dulles, Richard Nixon, Ronald Reagan, William Casey and George H.W. Bush. The program provided for the legal entry of Nazi SS into the country. ” . . . . There is a very high correlation between CIA domestic subsidies to Fascist ‘freedom fighters’ during the 1950’s and the leadership of the Republican Party’s ethnic campaign groups. The motive for the under-the-table financing was clear: Nixon used Nazis to offset the Jewish vote for the Democrats. . . . In 1952, Nixon had formed an Ethnic Division within the Republican National Committee. Displaced fascists, hoping to be returned to power by an Eisenhower-Nixon ‘liberation’ policy signed on with the committee. In 1953, when Republicans were in office, the immigration laws were changed to admit Nazis, even members of the SS. They flooded into the country. Nixon himself oversaw the new immigration program. . . .” All of the contents of this website as of 12/19/2014–Dave Emory’s 37+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated. All of the contents of this website as of 12/19/2014–Dave Emory’s 37+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated.
An episode of the early Cold War (I) was an uprising in East Berlin in 1953. At least part of the revolt may have been spurred by Nazi (and CIA) spymaster Reinhard Gehlen, about whom we have spoken and written so often. “Some of the provocateurs captured by the Communist authorities were too well equipped with blueprints for sabotage to have managed the business alone,” the intelligence historian Andrew Tully has written. “Rioters had in their pockets plans for blowing up railroad bridges and railway terminals, and detailed floor plans of governmental buildings. They had forged food stamps and fake bank drafts to be used to spread confusion in the food-rationing system and to disrupt East German bank credits. It seemed indisputable that they were getting their espionage pay checks from the CIA’s top German spy . . . Reinhard Gehlen.” . . . . All of the contents of this website as of 12/19/2014–Dave Emory’s 37+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated.
With a new Cold War gaining momentum and charges of Russian interference in the U.S. election, this program takes stock of information pointing in the other direction. After reviewing previous discussion of why the DNC, John Podesta and NSA “hacks” do not withstand scrutiny, the broadcast sets forth information indicating that Ukrainian fascists and related elements may well be the authors of a “cyber false-flag” operation.
Not only is the so-called “evidence” characteristic of a relatively clumsy false-flag operation–albeit one conducted on the internet–but the so-called “experts,” link to the milieu of the Reinhard Gehlen “Org.”
The joint CIA/FBI/NSA declassified version of the Intelligence Report on Russian hacking came out. There is no substantive detail in the report:“ . . . . To summarize, the report says that the CIA, FBI, and National Security Agency believe that Russian hackers—directed ultimately by Vladimir Putin—hacked email accounts belonging to the Democratic National Committee and to Clinton campaign chairman John Podesta and then passed the material they obtained on to WikiLeaks through a third party. This was done, the report asserts, because the Russians believed that Donald Trump would be friendlier to their country’s interests, as president, than Hillary Clinton. And … that’s about it. Not counting intro pages or appendices, the report is five pages long and does not include any description of the actual evidence that Russian actors were responsible for the DNC/Podesta hacks (an assertion that’s supported by publicly available evidence analyzed by third parties) or the assertion that Putin ultimately directed the release of hacked material in order to help elect Donald Trump (an assertion that’s harder to verify independently). . . . .”
The Bitly technology used in the hacks enabled the entire world to see what was going on! This strongly indicates a cyber-false flag operation: ” . . . . Using Bitly allowed ‘third parties to see their entire campaign including all their targets— something you’d want to keep secret,’ Tom Finney, a researcher at SecureWorks, told Motherboard. It was one of Fancy Bear’s ‘gravest mistakes,’ as Thomas Rid, a professor at King’s College who has closely studied the case, put it in a new piece published on Thursday in Esquire, as it gave researchers unprecedented visibility into the activities of Fancy Bear, linking different parts of its larger campaign together. . . .”
It should be noted that while this report is signed off on by the CIA, NSA, and FBI, the FBI never examined the DNC’s hacked server. Instead, according to the DNC, the job was outsourced to CrowdStrike! Neither the FBI, nor any other U.S. government entity has run an independent forensic analysis on the system! ” . . . Six months after the FBI first said it was investigating the hack of the Democratic National Committee’s computer network, the bureau has still not requested access to the hacked servers, a DNC spokesman said. No US government entity has run an independent forensic analysis on the system, one US intelligence official told BuzzFeed News. . . .The FBI has instead relied on computer forensics from a third-party tech security company, CrowdStrike, which first determined in May of last year that the DNC’s servers had been infiltrated by Russia-linked hackers, the U.S. intelligence official told BuzzFeed News. . .‘CrowdStrike is pretty good. There’s no reason to believe that anything that they have concluded is not accurate,’ the intelligence official said, adding they were confident Russia was behind the widespread hacks. . . It’s unclear why the FBI didn’t request access to the DNC servers, and whether it’s common practice when the bureau investigates the cyberattacks against private entities by state actors, like when the Sony Corporation was hacked by North Korea in 2014. BuzzFeed News spoke to three cybersecurity companies who have worked on major breaches in the last 15 months, who said that it was “par for the course” for the FBI to do their own forensic research into the hacks. None wanted to comment on the record on another cybersecurity company’s work, or the work being done by a national security agency. . . .”
The FBI claims that the DNC denied them access to the servers! Right! Note the prominence of CrowdStrike in this imbroglio. More about them below. ” . . . . The FBI struck back at the Democratic National Committee on Thursday, accusing it of denying federal investigators access to its computer systems and hamstringing its investigation into the infiltration of DNC servers by Russia-backed hackers. ‘The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated. This left the FBI no choice but to rely upon a third party for information,’ a senior law enforcement official told BuzzFeed News in a statement. ‘These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier.’ . . . The warring statements are the latest twists in an extraordinary standoff between the Democrats and federal investigators that reached a fever pitch over the bureau’s probe into Democratic nominee Hillary Clinton’s private email server. . . . The FBI announced it was investigating the hack of the DNC’s servers in July, after a third-party computer security firm, Crowdstrike, said it had evidence of Kremlin-backed hackers infiltrating its system. . . .”
The DNC responded to the FBI’s counter-assertion by reasserting that it’s giving the FBI full access to whatever it requested. If there’s a problem with the FBI getting access to that server, it’s a problem between the FBI and Crowdstrike: ” . . . The FBI had previously told lawmakers on the Hill that the DNC had not allowed federal investigators to access their servers. After BuzzFeed News reported on Wednesday that the DNC claimed FBI agents had never asked for the servers, congressional officials pressured the FBI for answers. A senior law enforcement official issued a public statement on the matter Thursday night. ‘Someone is lying their ass off,’ a US intelligence official said of the warring statements. But officials with the DNC still assert they’ve ‘cooperated with the FBI 150%.They’ve had access to anything they want. Anything that they desire. Anything they’ve asked, we’ve cooperated,’ the DNC official said. ‘If anybody contradicts that it’s between Crowdstrike and the FBI.’ . . .Without direct access to the computer network, another US intelligence official told BuzzFeed, federal investigators had been forced to rely on the findings of the private cybersecurity firm Crowdstrike for computer forensics. From May through August of 2016, the Democratic National Committee paid Crowdstrike $267,807 dollars for maintenance, data services and consulting, among other things, according to federal records. . . .”
An important article underscores that many tech experts disagree with the government’s so-called analysis: ” . . . . Yet despite the scores of breathless media pieces that assert that Russia’s interference in the election is ‘case closed,‘might some skepticism be in order? Some cyber experts say ‘yes.’ . . . Cyber-security experts have also weighed in. The security editor at Ars Technica observed that ‘Instead of providing smoking guns that the Russian government was behind specific hacks,’ the government report ‘largely restates previous private sector claims without providing any support for their validity.’ Robert M. Lee of the cyber-security company Dragos noted that the report ‘reads like a poorly done vendor intelligence report stringing together various aspects of attribution without evidence.’ Cybersecurity consultant Jeffrey Carr noted that the report ‘merely listed every threat group ever reported on by a commercial cybersecurity company that is suspected of being Russian-made and lumped them under the heading of Russian Intelligence Services (RIS) without providing any supporting evidence that such a connection exists.’ . . .”
CrowdStrike–at the epicenter of the supposed Russian hacking controversy is noteworthy. Its co-founder and chief technology officer, Dmitry Alperovitch is a senior fellow at the Atlantic Council, financed by elements that are at the foundation of fanning the flames of the New Cold War: “In this respect, it is worth noting that one of the commercial cybersecurity companies the government has relied on is Crowdstrike, which was one of the companies initially brought in by the DNC to investigate the alleged hacks. . . . Dmitri Alperovitch is also a senior fellow at the Atlantic Council. . . . The connection between [Crowdstrike co-founder and chief technology officer Dmitri] Alperovitch and the Atlantic Council has gone largely unremarked upon, but it is relevant given that the Atlantic Council—which is is funded in part by the US State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk—has been among the loudest voices calling for a new Cold War with Russia. As I pointed out in the pages of The Nation in November, the Atlantic Council has spent the past several years producing some of the most virulent specimens of the new Cold War propaganda. . . . ”
There was an update back in December from the German government regarding its assessment of the 2015 Bundgestag hacks (attributed to “Fancy Bear” and “Cozy Bear,” as mentioned in the Sandro Gaycken post above) that it attributed to APT28 and Russia: while it asserts the hacks did indeed take place, the leaked documents were later determined to be an insider leak (via Google translate). “ . . . . According to the report, federal security authorities are convinced that not hackers had stolen the 2420 documents published by the Internet platform Wikileaks in early December. There was certainly no evidence that the material had been stolen in the cyber attack on the Bundestag in 2015, it was called into security crises. . . . ”
Another article details at length the skepticism and outright scorn many cybersecurity experts feel concerning the report. ” . . . . Did the Russian government hack the DNC and feed documents to WikiLeaks? There are really two questions here: who hacked the DNC, and who released the DNC documents? These are not necessarily the same. An earlier intrusion into German parliament servers was blamed on the Russians, yet the release of documents to WikiLeaks is thought to have originated from an insider. [35] Had the Russians hacked into the DNC, it may have been to gather intelligence, while another actor released the documents. But it is far from certain that Russian intelligence services had anything to do with the intrusions. Julian Assange says that he did not receive the DNC documents from a nation-state. It has been pointed out that Russia could have used a third party to pass along the material. Fair enough, but former UK diplomat Craig Murray asserts: ‘I know who the source is… It’s from a Washington insider. It’s not from Russia.’ [We wonder if it might have been Tulsi Gabbard–D.E.] [36] . . . .”
Exemplifying some of the points of dissension in the above-linked story: ” . . . . Cybersecurity analyst Robert Graham was particularly blistering in his assessment of the government’s report, characterizing it as “full of garbage.” The report fails to tie the indicators of compromise to the Russian government. ‘It contains signatures of viruses that are publicly available, used by hackers around the world, not just Russia. It contains a long list of IP addresses from perfectly normal services, like Tor, Google, Dropbox, Yahoo, and so forth. Yes, hackers use Yahoo for phishing and maladvertising. It doesn’t mean every access of Yahoo is an ‘indicator of compromise’.’ Graham compared the list of IP addresses against those accessed by his web browser, and found two matches. ‘No,’ he continues. ‘This doesn’t mean I’ve been hacked. It means I just had a normal interaction with Yahoo. It means the Grizzly Steppe IoCs are garbage. . . .”
The source code used in the attacks traces back to Ukraine! ” . . . . In conjunction with the report, the FBI and Department of Homeland Security provided a list of IP addresses it identified with Russian intelligence services. [22] Wordfence analyzed the IP addresses as well as a PHP malware script provided by the Department of Homeland Security. In analyzing the source code, Wordfence discovered that the software used was P.A.S., version 3.1.0. It then found that the website that manufactures the malware had a site country code indicating that it is Ukrainian. [Note this!–D.E.] The current version of the P.A.S. software is 4.1.1, which is much newer than that used in the DNC hack, and the latest version has changed ‘quite substantially.’ Wordfence notes that not only is the software ‘commonly available,’ but also that it would be reasonable to expect ‘Russian intelligence operatives to develop their own tools or at least use current malicious tools from outside sources.’ To put it plainly, Wordfence concludes that the malware sample ‘has no apparent relationship with Russian intelligence.’ . . .”
The program concludes with a frightening piece of legislation signed into law by Barack Obama in December. It is an ominous portent of the use of government and military power to suppress dissenting views as being “Russian” propaganda tools! “. . . . The new law is remarkable for a number of reasons, not the least because it merges a new McCarthyism about purported dissemination of Russian ‘propaganda’ on the Internet with a new Orwellianism by creating a kind of Ministry of Truth – or Global Engagement Center – to protect the American people from ‘foreign propaganda and disinformation.’ . . . As part of the effort to detect and defeat these unwanted narratives, the law authorizes the Center to: ‘Facilitate the use of a wide range of technologies and techniques by sharing expertise among Federal departments and agencies, seeking expertise from external sources, and implementing best practices.’ (This section is an apparent reference to proposals that Google, Facebook and other technology companies find ways to block or brand certain Internet sites as purveyors of ‘Russian propaganda’ or ‘fake news.’) . . .”
Program Highlights Include: review of information from previous programs linking the disinformation about the high-profile hacks to the milieu of Ukrainian fascism; review of Alexandra Chalupa’s role in disseminating the “Russia did it” meme; review of “Eddie the Friendly Spook” Snowden’s role in the disinformation about the high-profile hacks; the implementation of a frightening new law authorizing the Pentagon and other government agencies to act to counter any information seen as “Russian propaganda.”
FTR #‘s 914 and 915 feature former BBC and Reuters journalist Gerrard Williams, developing material he presented in his book (co-authored with military historian Simon Dunstan) “Grey Wolf: The Escape of Adolf Hitler.”
An apparent deal between Sullivan & Cromwell attorney turned spy Allen Dulles and Martin Bormann lies at the core of the Hitler escape, code-named “Aktion Feuerland” (Operation Land of Fire). In exchange for sparing the art looted by the Reich and granting the Western Allies access to Nazi military technology, Hitler’s escape along with those of Eva Braun, Martin Bormann and Gestapo chief Heinrich Muller were arranged. In addition, the SS and Gestapo-staffed Reinhard Gehlen spy outfit was also one of the “carrots” made available to the West in this deal.
The potential “sticks” were the full activation of the Nazi Werewolf guerillas to make life miserable for occupation forces, the destruction of the creme of Western art and a disinformation gambit presenting a Nazi operation to use U‑boat launched V‑1 missiles filled with nerve gas against New York. (The latter drew U.S. Navy anti-submarine forces away from the planned southern Atlantic route for Hitler’s U‑boat escape.)
Because Allen Dulles faced prosecution for his operations on behalf of Third Reich industrial concerns, Dulles joined forces with Bormann. Using the extensive Nazi presence in Argentina, Bormann and Muller successfully spirited Hitler and Eva Braun out of Germany.
Much of FTR #915 deals with the re-establishment of Nazis in power in the “new” Federal Republic and the role of Martin Bormann directing that government from afar. The role of the Nazis and the Gehlen spy outfit in particular in the Cold War is a primary focus of FTR #915.
Program Highlights Include: the foundational role of the German/American corporate links in the realization of “Aktion Feuerland;” the role of Eva Peron (“Evita”) as a Nazi spy prior to, and during, World War II; Evita’s role as a functionary of the postwar Bormann capital network; the revenge taken by Muller on members of Juan and Eva Peron’s contingent for extorting money from the Bormann network; famed espionage novelist Ian Fleming’s role as a British commando securing both art and Nazi military technology as the Nazi armies retreated; mainstream press accounts of Hitler’s escape and postwar activities; the continued redaction and withholding of documents about Hitler’s postwar presence; death threats directed against some of the authors’ sources; review of the Vatican-linked “Ratlines” in the escape of Nazi luminaries; details of the faking of the death of Martin Bormann; the use of doubles for Hitler and Eva Braun in Aktion Feuerland; pressure from right-wing German sources on the authors, attempting to suppress the investigation; the faking of the “DNA test” on Bormann’s “corpse”; the role of Nazis in managing the Cold War.
The spokesman–and apologist–for the Nazi Azov Battalion in Ukraine is Roman Zvarych. Zvarych was the personal secretary to Jaroslav Stetsko–the head of the World War II Nazi collaborationist OUN/B government. Azov is now receiving U.S. government funding. All of the contents of this website as of 12/19/2014–Dave Emory’s 35+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated.
The mafia began as a resistance movement focused against Norse (Viking) and Saracen (Turkish/Muslim) invaders in 12th and 13 century Sicily. It might seem incredible to the casual observer that an organization that began so long ago could have developed and spread to the size, gravitas and scope of operations that it has. We also appreciate that when Mr. Emory uses the term “Underground Reich,” it might seem odd or incredible to many. Bringing up to date “L’Affaire Snowden,” we underscore the deep politics underlying the CIA’s broadcast psychological warfare fronts and their evolution into the milieu involving and surrounding Eddie the Friendly Spook. Much of the material in this program is reviewed from previous broadcasts, presented here to provide depth and understanding to how what has been presented as a “progressive,” “enlightened” phenomenon could be its opposite. “Team Snowden” manifests fascism and the Underground Reich at every turn. A major element of analysis is the development of the CIA’s focal point networks in the 1950’s, resulting in the formation of a CIA-controlled “government-within-the-government.” Is “Team Snowden” evolved from the focal point networks? Next the broadcast reviews the formation of the Broadcast Board of Governors, an umbrella organization enfolding the CIA’s radio propaganda and psychological fronts formed during the Cold War. “Team Snowden” is inextricably linked with the BBG–Snowden himself worked for CIA when he decided to infiltrate NSA and leak its secrets. In that context, we note that the Gehlen organization was at the foundation of the formation of the propaganda/psychological warfare fronts under the direction of the BBG. Much of the program underscores the Gehlen Org’s links to the Underground Reich, in order to reinforce listeners’ understanding of how this network dating to World War II could project its influence through the decades and into our contemporary historical period. ” . . . A network of former Nazi intelligence agents, the majority of whom were members of the SS, began working out of offices at Camp King side by side with army intelligence officers. . . . The Gehlen Organization was a murderous bunch, “free-wheeling” and out of control. . . The army became fed up with the Gehlen Organization, but there was no way out. Its operatives were professional double-crossers and liars–many were also alleged war criminals–and now they had the army over a barrel. . . .” Discussion concludes with “First Look” media czar Pierre Omidyar’s selection of Robert Lietzke to be an Omidyar fellow (Lietzke was one of Edward Snowden’s superiors when he was employed at Booz Allen Hamilton.) Program Highlights Include: Review of the Crusade For Freedom–the covert operation that precipitated the formation of the Nazi wing of the GOP; the CFF’s use of Radio Liberty as a front for employing fascists and laundering funds; the continuity in the Nazi chain of command from the Third Reich to the Gehlen organization when it went to work for the U.S.; the Gehlen organization’s strong links to the Bormann capital network; the strong overlap of the Thyssen industrial family, its business partners in the Bush family, Allen Dulles’ CIA and the Bormann network; the Gehlen group’s initial re-incarnation as the eyes and ears of Army intelligence.
From the Republican Party to European political and intellectual elites to “The New York Times,” everyone is “shocked, shocked” at the fascistic nature of the Trump candidacy. They shouldn’t be–his candidacy is the direct outgrowth of powerful forces that have been at work in this country for decades. After highlighting two op-ed pieces from the “Times,” accurately noting the virulent fascism at the root of the Trump phenomenon, the broadcast notes that neither Europe, where fascism is on the march once again, nor the American so-called “progressive sector,” which has embraced the “Eddie the Friendly Spook,” Glenn Greenwald and Julian Assange are in a position to complain. Snowden, Greenwald, Assange et al embody PRECISELY the same forces percolating at the surface of the Trump waters. Much of the broadcast consists of excerpts of an important new book: “The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government” by David Talbot. In that worthy volume, Talbot chronicles the role of the Dulles brothers and Sullivan and Cromwell in the capitalization of Hitler’s Germany and the cover-up of the Nazi flight capital program, Dulles’s long collaboration with Nazi General Reinhard Gehlen, Gehlen’s pursuit (with Dulles) of the Cold War as a continuation of Hitler’s war against the U.S.S.R., the Dulles/Gehlen collaboration in the formation of the fascist networks known as “Stay Behind/Gladio.” The program concludes with review of the Crusade For Freedom, a Dulles project which culminated in the formation of a Nazi branch of the GOP. Program Highlights Include: the genesis of the Bormann network and its apparent collaboration with the Dulles networks; Prescott Bush, Sr.‘s role as the Senate’s liaison with Dulles’s CIA; the roles of Richard Nixon, Ronald Reagan, William Casey and George H.W. Bush with the Crusade For Freedom; “The New York Times” and its own incorporation of Third Reich alumni as part of its collaboration with CIA.
Recent Comments