Saturday, 15 June 2013

Clinton vs The Mossad







It was well known that there was an Israeli spy inside the Clinton White House. But Clinton ordered the FBI to cease searching for the mole, code-named "Mega". It is now known that "Mega" was not just Mossad spy but top Mossad agent in America. The cancellation of the hunt for "Mega" occurred at the same time Clinton warned Monica Lewinsky that their phone conversations were being recorded. This strongly suggests that Clinton was "persuaded" to call off the FBI's hunt for "Mega" with the threat of a recorded phone sex session being made public.

Mega..?

When Clinton brokered the Irsaeli-Palestinian peace negotiations between Yitzakh Rabin and Yasser Arraft, all three acquired, in the eyes of some, the status of Enemies of the State (of Israel).

Most Israeli lawmakers and politicians distance themselves from the Jewish extremists calling for the assassination of Israeli Prime Minister Yitzhak Rabin over the Oslo peace accords. However, Likud Party leader Benjamin Netanyahu actively curries their favor. On the floor of the Knesset, he often attacks Rabin for giving away “parts of our homeland.” After one particularly fiery speech, thousands of right-wing protesters gather in Jerusalem’s Zion Square, where they put of posters of Rabin wearing a Nazi SS uniform, display banners calling Rabin “Arafat’s Dog,” and chant, “Death to Rabin! Nazis! Judenrat!”—a particularly odious epithet referring to the “Jewish councils” that were forced by the Nazis to expedite the transfer of Jews to concentration camps. 

Housing Minister Benjamin Ben-Eliezer is horrified by the frenzy of the mob, and tells Netanyahu, who is orchestrating the demonstration, “You’d better restrain your people. Otherwise it will end in murder. They tried to kill me just now.… Your people are mad. If someone is murdered, the blood will be on your hands.… The settlers have gone crazy, and someone will be murdered here, if not today, then in another week or another month!” 

Netanyahu ignores the warning, and, basking in the chants of “Bibi! Bibi! Bibi!,” takes the podium, where he is optimistically introduced as the next prime minister of Israel. [UNGER, 2007, PP. 139-140]


October 6, 1995: 
Oslo II Agreement Leads to Assassination of Israeli Prime Minister Rabin 
  
Israel’s Knesset approves Oslo II (see September 13, 1993), a complex set of agreements between Israel and the Palestinian Liberation Organization (PLO) on the future of the West Bank and the Gaza Strip. 

For Israeli law student Yigal Amir, this is the last straw. 

He has already made three half-hearted attempts to assassinate Israeli Prime Minister Yitzhak Rabin, but as of now he commits himself to carrying the deed through. For his part, Rabin continues to ignore warnings (see Early 1995) from Israeli intelligence and media reporters alike trying to alert him to the danger he is in from radical fundamentalists. [UNGER, 2007, PP. 140]


November 4, 1995: 
Israeli Prime Minister Rabin Assassinated 
The sheet with the lyrics to the ‘Song of Peace,’ stained with Rabin’s blood. [Source: Knesset]

Israeli Prime Minister Yitzhak Rabin is assassinated at a rally in Tel Aviv. Over 100,000 people have gathered in Kings of Israel Square to support Rabin and the Oslo peace process 

The rally is designed to be light-hearted, in contrast with the angry, combative rallies staged by radical conservatives to oppose the peace agreements (see October 1995). Rabin gives a short radio interview before leaving the stage at the rally, and tells listeners, 

“People have their personal security but they do not have doubts that the path of peace should be pursued.” 

Rabin’s wife Leah is asked if her husband is wearing a bulletproof vest. “Have you gone crazy?” she replies. “What are we, in Africa?… I don’t understand the ideas you journalists have.” 

Meanwhile, law student Yigal Amir is sitting on a concrete flower planter in the parking lot. 

A guard notices Amir and whispers into his microphone, 

“For God’s sake. What’s that dark guy doing down there? Is he one of us?” 

When Rabin walks by Amir to go to his car, Amir pulls out a gun and fires three shots. Two hollow-point bullets strike Rabin in the chest, severing major arteries and destroying his spinal cord. The third strikes Rabin’s bodyguard in the arm. 

“It’s nothing!” Amir shouts. “It’s just a joke! Blanks, blanks!” 

Police seize Amir; the wounded bodyguard rushes Rabin to the hospital, where he is pronounced dead 90 minutes later. When the police inform Amir that Rabin has died, he tells them, 

“Do your work. I’ve done mine.” 

Turning to an officer, he adds, 

“Get some wine and cakes. Let’s have a toast.” 

Someone later goes through Rabin’s pockets and finds a bloodied piece of paper with the lyrics to a popular tune, “The Song of Peace,” copied on it. Rabin had joined in singing the song at the rally. Author Craig Unger later writes that aside from the personal tragedy of the assassination, 

“In part because of his legacy as a great Israeli military commander, no one in Israel was, or ever could be, a more forceful figure than Rabin in promoting the peace process. As a result, his murder was a devastating blow to the Oslo principle, the principle of land for peace.” 

[UNGER, 2007, PP. 141-143; KNESSET HOMEPAGE, 2008]


FBI Probed Israeli White House Espionage During Clinton Term

By J. Michael Waller and Paul M. Rodriguez
InsightMagazine.com Archive 
(5-29-00)

A foreign spy service appears to have penetrated secret communications in the Clinton administration, which has discounted security and intelligence threats.

The FBI is probing an explosive foreign-espionage operation that could dwarf the other spy scandals plaguing the U.S. government. Insight has learned that FBI counterintelligence is tracking a daring operation to spy on high-level U.S. officials by hacking into supposedly secure telephone networks. The espionage was facilitated, federal officials say, by lax telephone-security procedures at the White House, State Department and other high-level government offices and by a Justice Department unwillingness to seek an indictment against a suspect.

The espionage operation may have serious ramifications because the FBI has identified Israel as the culprit. It risks undermining U.S. public support for the Jewish state at a time Israel is seeking billions of tax dollars for the return of land to Syria. It certainly will add to perceptions that the Clinton-Gore administration is not serious about national security. 

Most important, it could further erode international confidence in the ability of the United States to keep secrets and effectively lead as the world's only superpower.

More than two dozen U.S. intelligence, counterintelligence, law-enforcement and other officials have told Insight that the FBI believes Israel has intercepted telephone and modem communications on some of the most sensitive lines of the U.S. government on an ongoing basis. The worst penetrations are believed to be in the State Department. But others say the supposedly secure telephone systems in the White House, Defense Department and Justice Department may have been compromised as well.

The problem for FBI agents in the famed Division 5, however, isn't just what they have uncovered, which is substantial, but what they don't yet know, according to Insight's sources interviewed during a year-long investigation by the magazine. 

Of special concern is how to confirm and deal with the potentially sweeping espionage penetration of key U.S. government telecommunications systems allowing foreign eavesdropping on calls to and from the White House, the National Security Council, or NSC, the Pentagon and the State Department.

The directors of the FBI and the CIA have been kept informed of the ongoing counterintelligence operation, as have the president and top officials at the departments of Defense, State and Justice and the NSC. 

A "heads up" has been given to the House and Senate Intelligence Committees, but no government official would speak for the record.

"It's a huge security nightmare," says a senior U.S. official familiar with the super-secret counterintelligence operation. "The implications are severe," confirms a second with direct knowledge. "We're not even sure we know the extent of it," says a third high-ranking intelligence official. "All I can tell you is that we think we know how it was done," this third intelligence executive tells Insight. "That alone is serious enough, but it's the unknown that has such deep consequences."

A senior government official who would go no further than to admit awareness of the FBI probe, says: 

"It is a politically sensitive matter. I can't comment on it beyond telling you that anything involving Israel on this particular matter is off-limits. It's that hot."

It is very hot indeed. For nearly a year, FBI agents had been tracking an Israeli businessman working for a local phone company. The man's wife is alleged to be a Mossad officer under diplomatic cover at the Israeli Embassy in Washington. 

Mossad - the Israeli intelligence service - is known to station husband-and-wife teams abroad, but it was not known whether the husband is a full-fledged officer, an agent or something else. 

When federal agents made a search of his work area they found a list of the FBI's most sensitive telephone numbers, including the Bureau's "black" lines used for wiretapping. 

Some of the listed numbers were lines that FBI counterintelligence used to keep track of the suspected Israeli spy operation. The hunted were tracking the hunters.

"It was a shock," says an intelligence professional familiar with the FBI phone list.

"It called into question the entire operation. We had been compromised. But for how long?"

This discovery by Division 5 should have come as no surprise, given what its agents had been tracking for many months.

But the FBI discovered enough information to make it believe that, somehow, the highest levels of the State Department were compromised, as well as the White House and the NSC. 

According to Insight's sources with direct knowledge, other secure government telephone systems and/or phones to which government officials called also appear to have been compromised.

The tip-off about these operations - the pursuit of which sometimes has led the FBI on some wild-goose chases - appears to have come from the CIA, says an Insight source. 

A local phone manager had become suspicious in late 1996 or early 1997 about activities by a subcontractor working on phone-billing software and hardware designs for the CIA.

The subcontractor was employed by an Israeli-based company and cleared for such work. 

But suspicious behavior raised red flags. 

After a fairly quick review, the CIA handed the problem to the FBI for follow-up. 

This was not the first time the FBI had been asked to investigate such matters and, though it was politically explosive because it involved Israel, Division 5 ran with the ball. 

"This is always a sensitive issue for the Bureau," says a former U.S. intelligence officer. 

"When it has anything to do with Israel, it's something you just never want to poke your nose into. 

But this one had too much potential to ignore because it involved a potential systemwide penetration."

Seasoned counterintelligence veterans are not surprised. "The Israelis conduct intelligence as if they are at war. That's something we have to realize," says David Major, a retired FBI supervisory special agent and former director of counterintelligence at the NSC. 

While the U.S. approach to intelligence is much more relaxed, says Major, the very existence of Israel is threatened and it regards itself as is in a permanent state of war. 

"There are a lot less handcuffs on intelligence for a nation that sees itself at war," Major observes, but "that doesn't excuse it from our perspective."

For years, U.S. intelligence chiefs have worried about moles burrowed into their agencies, but detecting them was fruitless. 

The activities of Israeli spy Jonathan Pollard were uncovered by accident, but there remains puzzlement to this day as to how he was able to ascertain which documents to search, how he did so on so many occasions without detection, or how he ever obtained the security clearances that opened the doors to such secrets. 

In all, it is suspected, Pollard turned over to his Israeli handlers about 500,000 documents, including photographs, names and locations of overseas agents.

"The damage was incredible," a current U.S. intelligence officer tells Insight. "We're still recovering from it."

Also there has been concern for years that a mole was operating in the NSC and, while not necessarily supplying highly secret materials to foreign agents, has been turning over precious details on meetings and policy briefings that are being used to track or otherwise monitor government activities.

The current hush-hush probe by the FBI, and what its agents believe to be a serious but amorphous security breach involving telephone and modem lines that are being monitored by Israeli agents, has even more serious ramifications. "It has been an eye opener," says one high-ranking U.S. government official, shaking his head in horror as to the potential level and scope of penetration.

As for how this may have been done technologically, the FBI believes it has uncovered a means using telephone-company equipment at remote sites to track calls placed to or received from high-ranking government officials, possibly including the president himself, according to Insight's top-level sources. 

One of the methods suspected is use of a private company that provides record-keeping software and support services for major telephone utilities in the United States.

A local telephone company director of security Roger Kochman tells Insight, "I don't know anything about it, which would be highly unusual. I am not familiar with anything in that area."

U.S. officials believe that an Israeli penetration of that telephone utility in the Washington area was coordinated with a penetration of agents using another telephone support-services company to target select telephone lines.

Suspected penetration includes lines and systems at the White House and NSC, where it is believed that about four specific phones were monitored - either directly or through remote sites that may involve numbers dialed from the complex.

"[The FBI] uncovered what appears to be a sophisticated means to listen in on conversations from remote telephone sites with capabilities of providing real-time audio feeds directly to Tel Aviv," says a U.S. official familiar with the FBI investigation. Details of how this could have been pulled off are highly guarded. However, a high-level U.S. intelligence source tells Insight: "The access had to be done in such a way as to evade our countermeasures =8A That's what's most disconcerting."

Another senior U.S. intelligence source adds: 
"How long this has been going on is something we don't know. How many phones or telephone systems we don't know either, but the best guess is that it's no more than 24 at a time as far as we can tell."

And has President Clinton been briefed? 

"Yes, he has. After all, he's had meetings with his Israeli counterparts," 
says a senior U.S. official with direct knowledge. 

Whether the president or his national-security aides, including NSC chief Sandy Berger, have shared or communicated U.S. suspicions and alarm is unclear, as is the matter of any Israeli response. 

"This is the first I've heard of it," White House National Security Council spokesman Dave Stockwell tells Insight. "That doesn't mean it doesn't exist or that someone else doesn't know."

Despite elaborate precautions by the U.S. agencies involved, say Insight's sources, this alleged Israeli intelligence coup came down to the weakest link in the security chain: the human element. 

The technical key appears to be software designs for telephone billing records and support equipment required for interfacing with local telephone company hardware installed in some federal agencies. 

The FBI has deduced that it was this sophisticated computer-related equipment and software could provide real-time audio feeds. In fact, according to Insight's sources, the FBI believes that at least one secure T-1 line routed to Tel Aviv has been used in the suspected espionage.

The potential loss of U.S. secrets is incalculable. 

So is the possibility that senior U.S. officials could be blackmailed for indiscreet telephone talk. Many officials do not like to bother with using secure, encrypted phones and have classified discussions on open lines.

Which brings the story back to some obvious questions involving the indiscreet telephone conversations of the president himself. 

Were they tapped, and, if so did they involve national-security issues or just matters of the flesh? 

Monica Lewinsky told Kenneth Starr, as recounted in his report to Congress, that Lewinsky and Clinton devised cover stories should their trysts be uncovered and/or their phone-sex capers be overheard.

Specifically, she said that on March 29, 1997, she and Clinton were huddled in the Oval Office suite engaging in a sexual act. It was not the first time. 

But, according to Lewinsky as revealed under oath to the investigators for the Office of Independent Counsel, it was unusual because of what the president told her. 

"He suspected that a foreign embassy was tapping his telephones, and he proposed cover stories," 
the Starr report says. 

"If ever questioned, she should say that the two of them were just friends. If anyone ever asked about their phone sex, she should say that they knew their calls were being monitored all along, and the phone sex was just a put on." 

In his own testimony before a federal grand jury, Clinton denied the incident. But later - much later - he admitted to improper behavior and was impeached but not convicted. 

U.S. District Court Judge Susan Webber Wright found him to have obstructed justice. 

Curiously, Starr never informed Congress whether the Lewinsky tale was true. 

For that matter, according to Insight's sources,Starr never bothered to find out from appropriate agencies, such as the FBI or the CIA, whether the monitoring by a foreign government of the president's conversations with Lewinsky occurred.

Insight has learned that House and Senate investigators did ask questions about these matters and in late 1998 were told directly by the FBI and the CIA (among others) that there was no truth to the Lewinsky claim of foreign tapping of White House phones. 

Moreover, Congress was told there was no investigation of any kind involving any foreign embassy or foreign government espionage in such areas.

But that was not true. 

In fact, the FBI and other U.S. agencies, including the Pentagon, had been working furiously and painstakingly for well over a year on just such a secret probe, and fears were rampant of the damage that could ensue if the American public found out that even the remotest possibility existed that the president's phone conversations could be monitored and the president subject to foreign blackmail. 

To the FBI agents involved, that chance seemed less and less remote.

The FBI has become increasingly frustrated by both the pace of its investigation and its failure to gain Justice Department cooperation to seek an indictment of at least one individual suspected of involvement in the alleged Israeli telephone intercepts.

National security is being invoked to cover an espionage outrage. 

But, as a high law-enforcement source says, 

"To bring this to trial would require we reveal our methods of operation, and we can't do that at this point - the FBI has not made the case strong enough." 

Moreover, says a senior U.S. policy official with knowledge of the case: "This is a hugely political issue, not just a law-enforcement matter."

'You've Got the Crown Jewels'


If spies wanted to penetrate the White House, a facility widely considered the most secure in the world, how might it be done? For that matter, how might any agency or department of government be penetrated by spies?

"Actually, it's pretty easy if you know what you're doing," says a retired U.S. intelligence expert who has helped (along with other government sources) to guide Insight through the many and often complicated pathways of government security and counterespionage.

Access to designs, databases, "blueprints," memos, telephone numbers, lists of personnel and passwords all can be obtained. And from surprising sources. Several years ago this magazine was able to review from a remote site information on the supposedly secret and inaccessible White House Office Data Base, or WHODB 
(see "More Personal Secrets on File @ the White House," July 15, 1996).

Despite the spending of additional millions to beef up security when the White House installed a modern $30 million computerized telephone system a few years ago, communications security remains a big problem. Whatever the level of sophistication employed, there are soft underbellies that raise significant national-security problems. And potential for espionage, such as electronic intercepting of phone calls, is very great.

Calls to or from the White House dealing with classified information are supposed to be handled on secure lines, but it doesn't always happen. Sometimes, according to Insight's sources, despite the existence of special phones at the White House and elsewhere to handle such calls, some don't use them or only one side of the call does. An Insight editor recently was allowed for demonstration purposes to overhear a conversation placed over an unsecured line involving a "classified" topic.

Carelessness always has been a problem, but former and current FBI special agents say that under the Clinton administration the disregard for security has been epidemic. Many officials simply don't like the bother of communicating on secure phones.

In another instance, Insight was provided access to virtually every telephone number within the White House, including those used by outside agencies with employees in the complex, and even the types of computers used and who uses them. Just by way of illustration, this information allowed direct access to communications instruments located in the Oval Office, the residence, bathrooms and grounds.

With such information, according to security and intelligence experts, a hacker or spy could target individual telephone lines and write software codes enabling the conversations to be forwarded in real-time for remote recording and transcribing. The White House complex contains approximately 5,800 voice, fax and modem lines.

"Having a phone number in and of itself will not necessarily gain you access for monitoring purposes," Insight was told by a senior intelligence official with regular contact at the White House. "The systems are designed to electronically mask routes and generate secure connections." That said, coupling a known phone number to routing sequences and trunk lines would pose a security risk, this official says.

Add to that detailed knowledge of computer codes used to move call traffic and your hacker or spy is in a very strong position. "That's why we have so many redundancies and security devices on the systems - so we can tell if someone is trying to hack in," says a current security official at the White House.

Shown a sampling of the hoard of data collected over just a few months of digging, the security official's face went flush: "How the hell did you get that! This is what we are supposed to guard against. This is not supposed to be public."

Indeed. Nor should the telephone numbers or locations of remote sites or trunk lines or other sundry telecommunications be accessible. What's surprising is that most of this specialized information reviewed by Insight is unclassified in its separate pieces. When you put it together, the solved puzzle is considered a national-security secret. And for very good reason.

Consider the following: Insight not only was provided secure current phone numbers to the most sensitive lines in the world, but it discovered a remote telephone site in the Washington area which plugs into the White House telecommunications system.

Given national-security concerns, Insight has been asked not to divulge any telephone number, location of high-security equipment, or similar data not directly necessary for this news story.

Concerning the remote telecommunications site, Insight discovered not only its location and access telephone numbers but other information, including the existence of a secret "back door" to the computer system that had been left open for upward of two years without anyone knowing about the security lapse. This back door, common to large computer systems, is used for a variety of services, including those involving technicians, supervisors, contractors and security officers to run diagnostic checks, make repairs and review system operations.

"This is more than just a technical blunder," says a well-placed source with detailed knowledge of White House security issues. "This is a very serious security failure with unimaginable consequences. Anyone could have accessed that [back door] and gotten into the entire White House phone system and obtained numbers and passwords that we never could track," the source said, echoing yet another source familiar with the issue.

Although it is not the responsibility of the Secret Service to manage equipm= ent systems, the agency does provide substantial security controls over telecommunications and support service into or out of the White House. In fact, the Secret Service maintains its own electronic devices on the phone system to help protect against penetration. "That's what is so troubling about this," says a security expert with ties to the White House. 

"There are redundant systems to catch such errors and this was not caught. It's quite troubling.=8A It's not supposed to happen."

Insight asked a senior federal law-enforcement official with knowledge of the suspected Israeli spying case about the open electronic door. 

"I didn't know about this incident. It certainly is something we should have known given the scope of what's at stake," 
the official says.

Then Insight raised the matter of obtaining phone numbers, routing systems, equipment sites, passwords and other data on the telecommunications systems used by the White House: 

How hard would it be for a foreign intelligence service to get this information? 

"Obviously not as hard as we thought," a senior government official said. "Now you understand what we're facing and why we are so concerned."

That's one reason, Insight is told, the White House phone system is designed to mask all outgoing calls to prevent outsiders from tracing back into the system to set up taps. However, knowing the numbers called frequently by the White House, foreign agents could set up listening devices on those lines to capture incoming or outgoing calls. Another way of doing it, according to security experts, is to get inside the White House system. And, though it's considered impossible, that's what they said about getting the phone numbers that the president uses in his office and residence.

Like trash, information is everywhere - and often is overlooked when trying to tidy up a mess.

- PMR and JMW


'So What, It's Only Israel!'

There is a tendency in and out of government to minimize the impact of Israeli espionage against the United States because Israel is a friendly country. That overlooks the gravity of the espionage threat, says David Major, former director of counterintelligence programs at the National Security Council. 

"This 'don't worry about allied spying, it's okay' attitude is harmful," he warns. "The U.S. should expect that the rest of the world is bent on rooting out its national-security secrets and the secrets that could subject its leaders to blackmail." 

Minimizing or excusing "friendly spying," he argues, only discourages vigilance and encourages more attacks on U.S. national security. "I'm not outraged by nations that find it in their interests to collect intelligence but by our unwillingness to seriously pursue counterintelligence."

Major, now dean of the private Center for Counterintelligence and Security Studies, asks: 

"What price should Israel pay for this? My predictions are that there will be no impact whatsoever. Do we put our heads in the sand or do we take it as a wake-up call?"

Others observe that Israel has passed stolen U.S. secrets to America's adversaries. 

The government of Yitzhak Shamir reportedly provided the Soviet Union with valuable U.S. documents stolen by Israeli spy Jonathan Pollard. 

"It's the security equivalent of herpes," says a former U.S. antiterrorism official now at a pro-Israel think tank who requested anonymity. "Who gets it [beyond Israel] nobody knows.... Once we let it happen, the word gets out that 'you can get away with this.'"












It Got Them Killed: Mae Brussell




Mae Brussell

1922 - 1988


Cause of Death:
 Galloping Cancer of the Uterus and Revealing the existence and Practices of 
Satanic Cults within the US Military

Likely Suspects: The Process Church of Final Judgement, NAMBLA, The Sons of Sam, Lt. General Michael Aquino, 
The FBI, DEA, Col. Oliver North & The National Security Council, the Boorman Group, George H.W. Bush, "The Secret Team", The Soverign Knights of Malta, Propaganda Due, Michela Sindona, the Vatican Curia....

Basically, everyone...







Originally broadcast November 9, 1987. Part 1 of 3...


Heinrich Himmler, the NATO troops, Satan, child mutilations, MICHAEL AQUINO, DEFENSE DEPARTMENT, SAN FRANCISCO, PRESIDIO. Church of Set, Joint Chiefs, Vietnam mind control, psychological warfare. Merrill Lynch (Don Regan?), Anton LaVey, Church of Satan in S.F. Manson Family, the "dark side" of USA.

Child care centers, U.S. Army bases, molestation cases. Witnesses to McMartin school murdered. Satanic cults, WORSHIP OF SATAN, U.S. ARMY.

Bibliography sheet:

http://www.maebrussell.com/Bibliograp...

http://www.maebrussell.com/




Originally broadcsat November 16, 1987. Part 2 of 3...

The OCCULT, U.S. MILITARY, HEINRICH HIMMLER'S RITUALS, LT. COL. MICHAEL AQUINO, PART II. Why is the military, U.S. Attorney protecting Aquino? HOW MANY MORE DEFENSE INTELLIGENCE AGENTS, NATO OFFICERS, INTO NAZI RITUALS? S.F. child care center, Presidio. Witnesses to McMartin School killed. SATANISM AND MOLESTATIONS, RITUAL DAGGERS, PSYCHOLOGICAL WARFARE, MIND WARS, CHURCH OF SET AND SATAN.


Originally broadcast November 30, 1987. Part 3 of 3...

Satanist Michael Aquino, Nazi costumes, Waffen SS videos, Part III. Joined "Church fo Satan in Vietnam". Linked to Himmler's castle. Mother once engaged to member of Waffen SS. Is Aquino Liebensborn? National Defense University, top security clearances, attaché to DEFENSE INTELLIGENCE AGENCY. Was that with Daniel Graham, partner with Fritz Kraemer who could be Waffen SS? Gods, Beasts, Nazis and Occult, the thinking behind Heinrich Himmler's SS.





This is a show that Mae Brussell did on March 21, 1988.

Citizen Roy Cohn, Norieaga's Drug Running Friends, And Butler Silent Brotherhood.

Also, Oliver North at the Supreme Court, Ross Perot's employees (and money) used by North and FBI Executive Assistant Buck Revell (Chief Investigator of Pan-Am 103) to set up Libya for the La Belle Discoteque Bombing in Berlin and Operation Eldorado.

Buck Revell was also personally responsible for dirty tricks pulled by the FBI against Ross Perot to temporarily force Perot out of the 1992 Election race (by faking lesbian photos of Perot's daughter and offering them to the press before his daughter's wedding). 

Websites:
http://maebrussell.com/
http://www.antifascistencyclopedia.com/









Whilst in the midst of a far-reaching investigation into the MK-OFTEN Presidio Satanic Ritual Abuse case Mae was hit with a fast-onset cancer and died on October 3, 1988. 

She was 66 years old.

Cancer introduced through viral means is called an Oncovirus and it was estimated in 2002 cancer research that 17.8% of human cancers were caused by infections. 

If one needs further illustration they need only to examine AIDS and HIV infections. It is a relatively simple matter to isolate particular compounds and viruses and introduce them into a target by covert means. 

It can be done through food, drink, sex, doctor's visit or even by using DMSO (Dimethyl Sulfoxide) as a transfer agent spread on a automobile steering wheel. 

In Bob Marley's case it is alleged to have been vectored through a sharp copper piece of metal in a pair of boots given to him as a gift by Carl Colby, the son of Former CIA Director William E. Colby.






The Anti-Bilderbergers: Anthony Crossland


HOW THE CIA TOOK THE TEETH OUT OF BRITISH SOCIALISM

The CIA works systematically to ensure that the socialist parties of all Western countries toe a line compatible with U.S. interests. In Britain in the 1950s, the CIA's manipulation of the right wing of the Labour Party swung the party away from its pledge to nationalisation (enshrined in the celebrated Clause IV), away from nuclear disarmament and back towards a commitment to NATO. This decisive intervention by the Agency could be said to have changed the course of modern British history….

Following the end of World War II, the Labour Party was elected on a platform of extensive domestic social reform, and of peaceful co-existence with the Soviet Union in Europe. Fearful of the spread of Communist influence, the right wing of the party, under the new Labour leader Hugh Gaitskell, organised themselves around the journal Socialist Commentary, which became their most important mouthpiece. Throughout the post-war period, Labour's Gaitskellite right wing worked closely with MI5, Special Branch and a variety of CIA front organisations to advance its cause and keep the left at bay. Channelled with massive CIA funds, the right grew in confidence and influence, and vigorously campaigned against left-wingers like Aneurin Bevan, whom they denounced as "dangerous extremists".

Socialist Commentary set out to alert the British labour movement to the "growing dangers of international Communism". It was supported by David Williams, the London correspondent of the New Leader, an American anti-Communist publication backed by the CIA. Williams made it his business to join the British Labour Party and to take an active part in the Fabian Society.

In America, the New Leader provided a focus for weekly meetings of professional anti-Communists in the unions, universities and government service. It had a large staff and a world-wide network of overseas correspondents. New Leader began openly to advocate the infiltration of foreign socialist parties. In 1949, it carried a piece by CIA chief Allen Dulles advocating "a commission of internal security to examine subversive activities in the US and to use the institutions of democracy to destroy them"; this was rather like the head of MI5 writing for The Guardian.

In 1954, Denis Healey MP became the New Leader's London Correspondent.

CIA covert financing of the international student movement also began about this time. The student movement was diverging into two factions: those on the left, who supported the Soviet-funded World Federation of Democratic Youth (WFDY) constituted the most organised section and there was no home for right-wingers and social democratic organisations. To aid the right, MI6 and the CIA helped organise and fund the World Assembly of Youth (WAY).

WAY's initial membership was quite broad and included a number of left-wing socialists with no alignment to Moscow. However it was not long before the right asserted itself in the organisation, turning the student movement into an acceptable stamping ground for those wanting to make their name in preparation for parliamentary politics. Labour backbencher and Sunday Mirror columnist Woodrow Wyatt (who had received many IRD funds in the past) described WAY as "an organisation which does extremely valuable propaganda for the free world, without looking like a propaganda organisation" .

WAY was in contact with major establishment figures: a Friends of WAY Society included Conservative prime minister Sir Anthony Eden, ex-Labour prime minister Clement Atlee, Viscount Chandos (ex-colonial secretary) and Lord Mountbatten's wife Edwina. CIA officer Joseph Burkholder-Smith revealed that 10 (the CIA division which handled front groups) was in liaison with MI6 on all its world-wide front operations, in WAY in particular, and that the CIA were manipulating WAY student leaders.

WAY worked through the Colonial Office to extend its influence in Africa, setting up National Committees in Kenya, Mauritius, Sierra Leone, Seychelles and Uganda. The Colonial Office brought WAY events to the attention of the African colonial governments, arranged for WAY film shows and helped pay the travel expenses of the generally poor African delegates.

During the 1950s, WAY's European Youth Campaign received over £1,300,000 of CIA money, the largest proportion of which went to the British affiliate.

Meanwhile, in June 1950, the New Leader's Melvin Lasky helped set up the Congress for Cultural Freedom (CCF), a body whose declared purpose was "to defend freedom and democracy against the new tyranny sweeping the world" - namely Communism. Given massive CIA funding, the CCF launched political seminars, conferences, newspapers, periodicals, news services and a wide range of political and cultural activities throughout Western Europe. The CCF was one of the CIA's conduits for funding Brian Crozier's Forum World Features.

CCF also organised world-wide student exchanges and conferences in support of the new anti-Communist youth organisations which were promoted by the CIA.

In 1953, the CCF launched Encounter, a joint Anglo-American monthly journal involving MI6 agent C.M. Woodhouse, a covert action veteran who had been involved in Operation Ajax in Iran (a joint CIA/MI6 plot to overthrow the elected government of Mohammed Mossadeq). The magazine exchanged facilities with Socialist Commentary and used many of the same staff and writers. Encounter became one of the most influential liberal journals in the West.

As the CCF network grew, it embraced many prominent figures in the Labour Party - among them Anthony Crosland, who began attending CCF seminars along with Hugh Gaitskell, Denis Healey, Rita Hinden, Daniel Bell and a bevy of American and European politicians and academics.

Crosland's book The Future of Socialism was a major new political thesis which had been influenced by CCF conferences, in which he argued that growing affluence had radically transformed the working class in Europe and thus Marx's theory of class struggle was no longer relevant. The book was immediately adopted as the gospel of Labour's new leadership under Hugh Gaitskell.

During the 1950s, Gaitskell and his friends in the Socialist Commentary group adopted the argument forcibly put in the New Leader that a strong united Europe was essential to prevent the West from Russian attack. They received support from a New York-based group called the American Committee on United Europe, whose leadership included General Donovan, wartime head of the OSS (the fore-runner of the CIA), George Marshall, the U.S. Secretary of State, and Allen Dulles of the CIA.

This high-powered CIA-funded pressure group financed the so-called European Movement, headed by a friend of Hugh Gaitskell's, Joseph Retinger, who promoted select gatherings of European and American politicians, businessmen, aristocrats, top civil servants and military leaders. Founder members of the movement were Hugh Gaitskell and Denis Healey, along with such diverse characters as the president of Unilever and Sir Robert Boothby.

There were also U.S. labour attachés based in the London American embassy. One of them, Philip Kaiser, described his years in London in his memoirs: "The labour attaché is expected to develop contacts with key leaders in the trade union movement and to influence their thinking and decisions in directions compatible with American goals...."

The CIA ran the anti-Communist international trade union movement, the International Confederation of Free Trade Unions (ICFTU), and its various spin-off groups, such as the trade secretariats. The TUC itself helped fund the ICFTU through its affiliation fees. By the mid 1950s, nearly a quarter of the TUC's annual budget was going to the ICFTU.

No-one has yet assembled the full data of trade union officials and Labour politicians who took advantage of the education programmes and freebie trips run by American intelligence for sympathetic people in the labour movement, but it probably runs into thousands. In other words, much of the international political landscape of the post-war era in Britain consisted of U.S.-funded or directed political propaganda/psychological warfare projects. And this was on top of the formal military-diplomatic-financial influences of NATO, the IMF, World Bank, GATT, the UN, etc.

By the late 1950s, Anthony Crosland was acknowledged as the Labour Party's chief theoretician and his role in the CCF was expanded to "encourage sympathetic people" to participate in CCF-sponsored seminars, congresses and private gatherings all around the world. Hugh Gaitskell and other Labour politicians travelled to CCF functions in Europe, New Delhi, Rhodes, Australia and Japan, where they lectured on the theme that traditional socialism was irrelevant in a modern capitalist society. They spent years working to remodel European socialism in the image of the American Democratic Party, and this was backed up by the fullest publicity in Encounter, Socialist Commentary, Preuves, Der Monat and other CCF journals.

The day after Labour's defeat in the 1959 general election, Roy Jenkins, Anthony Crosland and Douglas Jay were among a small group who met with Gaitskell to propose that Labour drop its old commitment to traditional socialism, particularly Clause IV which pledged "common ownership of the means of production, distribution and exchange".

In February 1960, William Rogers, general secretary of the Fabian Society, set up a steering committee with Crosland, Roy Jenkins, Patrick Gordon Walker, Jay and some sympathetic journalists. This group started to work on a manifesto to be released in the event of Gaitskell's defeat in the defence debate at the party conference that year.

Gaitskell was indeed defeated and CND won its campaign of committing the Labour Party to a neutralist programme. With widespread press coverage, Rogers and his friends immediately released 25,000 copies of their manifesto, which appealed to Labour Party members to rally behind Gaitskell and "fight and fight and fight again". The group set up the Campaign for Democratic Socialism (CDS)and with large sums of CIA money channelled through the CCF, they were able to take a permanent office and appoint paid staff. Given the full support, resources and unlimited financial backing of the CIA, the CDS had great advantages over their opponents in the party, who had to rely entirely on unpaid volunteer workers. At the CDS's disposal were field workers in the constituencies and unions, whom it supported with travelling expenses, literature and organisational support, as well as supplying tens of thousands of free copies of the manifesto, pamphlets and other CDS publications, plus a regular bulletin, Campaign, which was circulated free of charge to a large mailing list. All of this was produced without a single subscription-paying member.

CDS achieved its objectives: the trade unions cracked under the pressure and the Labour Party returned to its support for NATO at the party conference in 1961. The Campaign for Democratic Socialism - with its CIA backing - was the most effective pressure group the Labour Party had ever seen. Its influence was out of all proportion to its original support among party members and its financial backers could justly claim to have changed the course of British politics.

George Thomson - a pillar of the CDS, who later resigned from Labour's front bench with Roy Jenkins to form the more right-wing Social Democratic Party (SDP) - said of Rita Hinden: "In the 50s, her ideas were greeted with outraged cries of "Revisionism!" But by the mid 60s, the revisionism of Social Commentary had become the orthodoxy of the Labour Movement".

The Labour Party apparatus remained firmly in Gaitskellian hands over the following decades, particularly the International Department of which Denis Healey had been head until he won his seat as an MP. In 1963, The Labour Party's Organisation Subcommittee was chaired by George Brown, one of the CIA's sources in the Labour Party.

In 1965, Healey's old post was taken over by J. Gwyn Morgan, who had been elected President of the National Union of Students on an anti-Communist ticket. Morgan became General Secretary of the International Student Conference, in charge of finance, in which capacity he negotiated with the CIA's foundations which supplied the bulk of the organisation's funds, and supervised expenditure of the several million dollars devoted to world-wide propaganda.

Morgan visited over 80 different countries in five years and got to know personally many heads of government and leaders of the world's principal social democratic parties. In 1965, he became head of Labour's Overseas Department and two years later he became Assistant General Secretary of the Labour Party.

Around this time, a group of Labour leaders, including Hugh Gaitskell and George Brown, made a direct approach to MI5 for records of tapped telephone conversations of Labour left-wingers, bank-account records of payments from Soviet organisations, or names of East European contacts which could be used to smear their left-wing opponents in the party. Informal flows of information between MI5 and Labour's right-wing became more common, and over the years MI5 recruited freely in Labour's headquarters and among the parliamentary party.

The Labour Party, moulded by American and British intelligence in the Gaitskell image, with its policies firmly rooted in Crosland's manifestos, became the programme of the next Labour government under Harold Wilson.

Michael Stewart, foreign secretary in the Wilson government during the escalation of U.S. military action in Vietnam, and Sam Watson, the powerful Durham miners' leader and ally of Gaitskell, were among those who have since been identified as CIA "agents of influence."

Charles Clarke, who was Neil Kinnock's closest political adviser throughout his years as labour leader, had a background as chair of the World Youth Council, which had well-documented CIA links.

The CIA was also involved in ensuring Labour's commitment to Britain's entry into the Common Market through the afore-mentioned European Movement, the elite international pressure group secretly funded by the CIA, which took most of the credit for the founding of the Common Market. The European Movement wanted a United States of Europe and the rearmament of Germany, which the U.S. government saw as a key to winning the Cold War with Russia.

The European Youth Campaign (EYC) was set up as the most active component of the European Movement in 1951. In one year alone it organised 1,899 sessions and conferences, 900 cinema shows, distributed 1.8 million brochures, staged 21 exhibitions and secured 2,400 minutes of radio time for the cause of European unity. The secretary of the British section of EYC was Maurice Foley, later a Labour MP and minister. Virtually every penny he, and the campaign's other organisers spent, came from the CIA. In eight years, £1.34 million of covert funds were passed on to the EYC by the CIA's American Committee on a United Europe.

SPLITTING THE LABOUR PARTY

American intelligence played a major hand in the formation of the Social Democratic Party (SDP). The inspirers of the SDP were Labour's Douglas Eden (who had previously worked for Brian Crozier's Shield as a researcher) and Stephen Haseler (who taught politics at the City of London). Both met with Crozier at his office while he was running the ISC and afterwards. The three agreed with the creation of a new political party in Britain, with the objective of attracting Labour's right-wing, thereby isolating the left and "cutting it down to size".

Eden and Haseler founded the Social Democratic Alliance (SDA), which had some 700 members, mostly municipal councillors, all over the United Kingdom. Crozier gave financial assistance to the SDA and arranged with Eden and Haseler to approach Roy Jenkins to lead their proposed new party. At the end of February 1981, four Labour right-wingers - Jenkins, Shirley Williams, David Owen and William Rodgers -announced the creation of a Council for Social Democracy and left the Labour Party to form the SDP. Crozier lays the blame for the failure of the SDP to fully achieve his aims on Roy Jenkins' policy of aiming not so much to split Labour as to attract moderate anti-Thatcher MPs from the Conservative Party. In any case, the SDP experiment could be regarded as succeeding in the CIA's designs because it divided the anti-Tory vote at the following elections and contributed to the Conservatives' retention of power.