Skip navigation

Feds Investigate “Racist” Depiction of Obama as a Zombie

Making fun of the president is now considered a domestic threat requiring DOJ intervention
 
Feds Investigate "Racist" Depiction of Obama as a Zombie

by Paul Joseph Watson | July 11, 2014


Following complaints by the NAACP, the Department of Justice is investigating a parade float, labeled “racist” by the Nebraska Democratic Party, which featured President Obama depicted as a zombie.

The float, which featured in last week’s July 4th annual Independence Day parade in Norfolk, Nebraska, depicted a zombie stood outside a hut adorned with the words “Obama Presidential Library.”

The Nebraska Democratic Party responded by describing the float as among the “worst shows of racism and disrespect for the office of the presidency that Nebraska has ever seen.”

What makes the controversy even more ludicrous is that the creator of the float, a local farmer, said the zombie wasn’t even supposed to represent Obama, but instead was a depiction of a victim of the recent VA health care scandal.

After the NAACP complained about the float to the Department of Justice, the DOJ demanded a meeting with Mayor Fuchtman and city administrators before the two parties met with NAACP representatives and parade organizers, who “plan to reevaluate the policies for what is allowed in the parade,” according to KTVI.

“The DOJ apparently told the city it had received concerns, including from the NAACP, regarding the float,” reports KMTV.

Since the float has nothing whatsoever to do with criminal behavior or a criminal investigation, we can only assume that the Justice Department’s involvement is related to its function, “to ensure public safety against threats foreign and domestic.”

Are we now to assume that depicting Obama as a zombie or any other fictional character, or indeed merely having people think that he is being depicted as a fictional character, represents some kind of major domestic threat that requires federal government intervention?

In addition, making fun of Obama in a manner which has no connection to race whatsoever is now apparently considered racist anyway, just as previous depictions of Obama as the Joker out of Batman were also labeled racist, despite George W. Bush having been depicted as the very same character.

The notion that a parade float which represents creative criticism of the way the Obama administration has handled the VA scandal could represent some kind of a threat which requires the attention and resources of the federal government sounds like something straight out of North Korea.

Facebook @ https://www.facebook.com/paul.j.watson.71
FOLLOW Paul Joseph Watson @ https://twitter.com/PrisonPlanet

Visiting Websites About Privacy Gets You Put in an NSA Database of “Extremists”

Posted By Paul Joseph Watson On July 3, 2014

Searching for online articles about privacy is enough to get someone put in an NSA database of “extremists,” according to new revelations published today.

In an article for German news outlet Tagesschau (translation here), Lena Kampf, Jacob Appelbaum and John Goetz reveal how the NSA’s “deep packet inspection” rules, which it uses to determine who to target for deep surveillance, include looking for web users who search for articles about Tor and Tails, an anonymous browser and a privacy-friendly operating system.

Those whose Internet traffic patterns suggest merely an interest in Tor or Tails are immediately put on a list of “extremists,” as is anyone who actually uses the Tor network.

 “Tor and Tails have been part of the mainstream discussion of online security, surveillance and privacy for years. It’s nothing short of bizarre to place people under suspicion for searching for these terms,” writes Boing Boing’s Cory Doctorow, adding that the NSA’s goal is, “to split the entire population of the Internet into “people who have the technical know-how to be private” and “people who don’t” and then capture all the communications from the first group.”

The revelation once again highlights the fact that the NSA’s data dragnet has little to do with catching terrorists and everything to do with targeting anyone who values their right to privacy. The mass collection of such information only serves to make it easier for actual bad guys to evade detection since the federal agency is building such vast and unwieldy databases.

Earlier this week, journalist Glenn Greenwald announced that he was set to release new information based on leaked documents obtained by whistleblower Edward Snowden which would reveal which individuals and institutions were the targets of NSA spying.

However, at the last minute Greenwald said the story would be postponed as a result of the U.S. government, “suddenly began making new last-minute claims which we intend to investigate before publishing.”

Facebook @ https://www.facebook.com/paul.j.watson.71
FOLLOW Paul Joseph Watson @ https://twitter.com/PrisonPlanet

*********************

Paul Joseph Watson is the editor at large of Infowars.com and Prison Planet.com.

Wednesday, June 25, 2014

Long before 1984 gave us the adjective “Orwellian” to describe the political corruption of language and thought, Thucydides observed how factional struggles for power make words their first victims. Describing the horrors of civil war on the island of Corcyra during the Peloponnesian War, Thucydides wrote, “Words had to change their ordinary meaning and to take that which was now given them.” Orwell explains the reason for such degradation of language in his essay “Politics and the English Language”: “Political speech and writing are largely the defense of the indefensible.”

Tyrannical power and its abuses comprise the “indefensible” that must be verbally disguised. The gulags, engineered famines, show trials, and mass murder of the Soviet Union required that it be a “regime of lies,” as the disillusioned admirer of Soviet communism Pierre Pascal put it in 1927.

Image credit: 

Barbara Kelley

Our own political and social discourse must torture language in order to disguise the failures and abuses of policies designed to advance the power and interests of the “soft despotism,” as Tocqueville called it, of the modern Leviathan state and its political caretakers. Meanwhile, in foreign policy the transformation of meaning serves misguided policies that endanger our security and interests.

One example from domestic policy recently cropped up in Supreme Court Justice Sonya Sotomayor’s dissent in the Schuette decision, which upheld the Michigan referendum banning racial preferences. In her dissent, Sotomayor called for replacing the term  “affirmative action” with “race-sensitive admissions.” But “affirmative action” was itself a euphemism for the racial quotas in use in college admissions until they were struck down in the 1978 Bakke decision. To salvage racial discrimination, which any process that gives race an advantage necessarily requires, Bakke legitimized yet another euphemism, “diversity,” as a compelling state interest that justified taking race into account in university admissions.

Thus the most important form of “diversity” for the university became the easily quantifiable one of race. Not even socio-economic status can trump it, as the counsel for the University of Texas admitted during oral arguments in Fisher vs. University of Texas last year, when he implied that a minority applicant from a privileged background would add more diversity to the university than a less privileged white applicant. All these verbal evasions are necessary for camouflaging the fact that any process that discriminates on the basis of race violates the Civil Rights Act ban on such discrimination. Promoting an identity politics predicated on historical victimization and the equality of result is more important than the principle of equality before the law, and this illiberal ideology must be hidden behind distortions of language and vague phrases like “race-sensitive” and “diversity.” 

Another example can be found in the recently released report from the White House Task Force to Protect Students from Sexual Assault. The report is the basis for the government’s numerous policy and procedural suggestions to universities and colleges in order to help them “live up to their obligation to protect students from sexual violence.” Genuine sexual violence, of course, needs to be investigated, adjudicated, and punished to the full extent of the law by the police and the judicial system. But the “sexual assault” and “sexual violence” the Obama administration is talking about is something different. 

At the heart of the White House report is the oft-repeated 2007 statistic that 20 percent of female college students have been victims of “sexual assault,” which most people will understand to mean rape or sexual battery. Yet as many critics of the study have pointed out, that preposterous number––crime-ridden Detroit’s rape rate is 0.05 percent––was achieved by redefining “sexual assault” to include even consensual sexual contact when the woman was drunk, and behaviors like “forced kissing” and “rubbing up against [the woman] in a sexual way, even if it is over [her] clothes.”

The vagueness and subjectivity of such a definition is an invitation to women to abandon personal responsibility and agency by redefining clumsy or boorish behavior as “sexual assault,” a phrase suggesting physical violence against the unwilling. As one analyst of the flawed study has reported, “three-quarters of the female students who were classified as victims of sexual assault by incapacitation did not believe they had been raped; even when only incidents involving penetration were counted, nearly two-thirds did not call it rape.” As many have pointed out, if genuine sexual assault were happening, colleges would be calling in the police, not trying the accused in campus tribunals made up of legal amateurs and lacking constitutional protections such as the right to confront and cross-examine one’s accuser. 

What matters more than protecting college women against a phantom epidemic of rape, then, is the need to expand government power into the social lives of college students, empowering the federal bureaucrats, university administrators, and ideological programs like women’s studies that all stand to benefit by this sort of coercive intrusion. This enshrining of racial and sexual ideology into law through the abuse of language has had damaging consequences, whether for the minority college students mismatched with the universities to which they are admitted, thus often ensuring their failure and disillusion; or for the young women encouraged to abandon their autonomy and surrender it to government and education bureaucrats who know better than they how to make sense of their experiences and decisions.

In foreign policy, however, the abuse of language is positively dangerous. Since 9/11, our failure to identity the true nature of the Islamist threat and its grounding in traditional Islamic theology has led to misguided aims and tactics. Under both the Bush and Obama administrations, for example, the traditional Islamic doctrine of jihad––which means to fight against the enemies of Islam, which predominantly means infidels––has been redefined to serve the dubious tactic of flattering Islam in order to prevent Muslim terrorism.

Thus in 2008 the National Terrorism Center instructed its employees, “Never use the term jihadist or mujahideen in conversation to describe terrorists,” since “In Arabic, jihad means ‘striving in the path of God’ and is used in many contexts beyond warfare.” Similarly, CIA chief John Brennan has asserted that jihad “is a holy struggle, a legitimate tenet of Islam, meaning to purify oneself or one’s community,” despite the fourteen centuries of evidence from the Koran, hadiths, and bloody history that jihad is in fact predominantly an obligatory armed struggle against the enemies of Islam. The reluctance to put Muslim violence in its religious context reflects not historical truth, but a public relations tactic serving the delusional strategy of appeasing Muslims into liking us.

That’s why, to this day, the 2009 murders of 13 military personnel at Fort Hood by Muslim Army Major Nidal Malik Hasan are still classified as “workplace violence” rather than an act of terror. This despite the fact that Hasan––whose business cards had the initials “SoA,” “Soldier of Allah,” on them––shouted the traditional Islamic battle cry “Allahu Akbar” during his rampage. Or that in a presentation at Walter Reed Hospital, Hasan had put up a slide with the great commission to practice jihad that Mohammed delivered in his farewell address: “I was ordered to fight all men until they say ‘There is no god but Allah.’” This command to wage jihad was echoed in 1979 by the Ayatollah Khomeini, revered as a “Grand Sign of God” for his theological acumen, and by Osama bin Laden in 2001. Those ignoring this venerable jihadist tradition must use verbal evasions like “workplace violence” and “striving in the path of God” to hide the indefensible––and failed––tactic of appeasement that prevents us from accurately understanding the religious motives of Muslim terrorists, and the extent of the Muslim world’s support for them.

No foreign policy crisis, however, is more illustrative of the “regime of lies” and abuse of language to serve “indefensible” aims than the conflict between Israel and the Arabs. The Arabs’ aim, of course, is to destroy Israel as a nation, a policy they have consistently pursued since 1948. Since military attacks have failed ignominiously, an international public relations campaign coupled to terrorist violence has been employed to weaken Israel’s morale and separate Israel from her Western allies. An Orwellian assault on language has been key to this tactic.

Examples are legion, but one is particularly insidious, here seen in a New York Times headline from 2011: “Obama Sees ’67 Borders as Starting Point for Peace Deal.” The common reference to “borders” in regard to what is in fact the armistice line from the 1948 Arab war against Israel is ubiquitous. Yet there has never been recognized in international law a formal “border” between Israel and what the world, in another Orwellian phrase, calls the “West Bank,” because that territory has never been part of a modern nation. Its only international legal status was as part of the British Mandate for Palestine, which was confirmed by the League of Nations in 1922, and which was intended as the national homeland for the Jewish people. The Arabs’ rejection of the U.N. partition plan and their invasion of Israel in 1948 put the territory’s status in limbo once Jordan annexed Judea and Samaria, which the international community with a few exceptions refused to recognize. In 1967 Israel took it back in another defensive war against Arab aggression. Since then, its final disposition has awaited a peace treaty that will determine the international border.

This may sound like quibbling over careless language, but the dishonest use of “border” reinforces and encodes in peoples’ minds the big lie of the conflict––that a Palestinian “nation” is being deprived of its “homeland” by Israel, a canard that didn’t become current among Arabs and the rest of the world until after the 1967 Six Day War. And this lie in turns validates the common use of “occupation”––which implies an illegal invasion into and control of another nation, as the Germans did to France in 1940––to describe Israel’s defensive possession of territories that have long served as launch pads for aggression against Israel. Until a peace treaty, the territory known as the “West Bank”––more accurately Judea and Samaria, the heartland of historical Israel for centuries––is disputed, not “occupied.”

To paraphrase Thucydides, words like “borders” and “occupation” have had their ordinary meanings changed, and been forced to take meanings that serve tyranny and aggression. And we who accept those new meanings are complicit in the resulting injustice that follows.

Government Spies On Innocent People Via Webcams, Laptops, Xbox

Latest Snowden Leak confirms story Infowars first broke EIGHT YEARS AGO

Steve Watson
Infowars.com
February 27, 2014

The latest revelation concerning mass government spying confirms an issue that Infowars has been covering for close to a decade. British and American governments are spying on people in their own homes via web cams, laptop microphones and devices such as the X-box.

The London Guardian has the details in a report based on information leaked by NSA whistleblower Edward Snowden.

The British surveillance agency GCHQ, with help from the NSA, actively spied on nearly 2 million Yahoo users via webcams built into their computers. The documents show that the agency intercepted millions of images as part of a secret program codenamed OPTIC NERVE.

The report also states that Americans were almost certainly targeted as part of the bulk collection of data, and that there is no law to prevent such activity in Britain.

NSA ragout 4

The documents show that images were collected from webcams at regular intervals, one image every five minutes, and were used by the spy agency to trial automated facial recognition programs.

The Guardian describes the process as “eerily reminiscent of the telescreens evoked in George Orwell’s 1984.”

NSA ragout 3

The documents dub the practice as “bulk access to Yahoo webcam images/events”, and spies working at GCHQ compared it to a police database of mugshots. “Face detection has the potential to aid selection of useful images for ‘mugshots’ or even for face recognition by assessing the angle of the face,” the papers read. “The best images are ones where the person is facing the camera with their face upright.”

Essentially, the spy agency appear to have been building a huge digital database containing the faces of Yahoo users.

The documents advise employees at GCHQ on how to use the system, noting “[I]f you search for similar IDs to your target, you will be able to request automatic comparison of the face in the similar IDs to those in your target’s ID”.

In one presentation contained within the documents, more technologically advanced systems, such as iris recognition cameras, are discussed as potential surveillance tools. The paper even chillingly states “think Tom Cruise in Minority Report”.

The documents state that Yahoo users were specifically singled out because “Yahoo webcam is known to be used by GCHQ targets”.

The papers also note that a large quantity of the data collected contained nudity or sexually explicit imagery. The spy agency seemingly made no effort to prevent the collection of such images.

Yahoo described the practice as “a whole new level of violation of our users’ privacy,” and strenuously denied having any knowledge of the program.

Infowars first reported in 2006, EIGHT YEARS AGO, that innocent people were being spied on through their computers. We specifically described the practice as Minority Report style technology, as the GCHQ had done.

We have since covered the issue consistently, warning that “Hundreds of millions of Internet-active Americans will all be potential targets for secret surveillance.”

Of course, some quarters dismissed our reports as “conspiracy theories”, while worried internet users questioned whether the reports were accurate.

The GCHQ program was seemingly not limited to Yahoo user web cams either. Another presentation within the leaked internal papers discusses the capabilities of the Xbox 360′s Kinect camera, saying it generated “fairly normal webcam traffic” and that it was being evaluated as a potential surveillance tool.

We have also documented the potential use of Xbox for surveillance purposes, noting that Skype calls made on the devices can be intercepted. We have also warned that the ‘always on’ camera of the new Xbox One, which is so powerful it can see through clothing, is wide open to abuse by hackers and government agencies.

According to the leaked documents, the OPTIC NERVE program began as a prototype in 2008 and was still active in 2012. There is no indication that the program has been deactivated.

Security expert Bruce Schneier writes that this latest revelation highlights how there is no distinction between actively spying on a person and what he called “Eavesdropping by algorithm”, in other words, automated computer surveillance. The NSA and the Obama administration have attempted to argue that what they are doing cannot be called “spying” or even “collecting” data, because when the data is gathered, a person is not looking at it. Director of National Intelligence James Clapper still uses this explanation to claim he never lied to Congress when he answered ‘no’ to the question “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?”

The fallout from the OPTIC NERVE program, the creation of facial recognition databases, and the fact that spooks provably looked at images of people, even NAKED images of people, highlights the fact, Schneier argues, that the “NSA’s definition of ‘collect’ makes no sense whatsoever”, and that our governments are indeed actively spying on us.

—————————————————————-

Steve Watson is the London based writer and editor for Alex Jones’ Infowars.com, and Prisonplanet.com. He has a Masters Degree in International Relations from the School of Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from Nottingham Trent University.

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

By 24 Feb 2014, 6:25 PM EST
Featured photo - How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations A page from a GCHQ top secret document prepared by its secretive JTRIG unit

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations”.

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world”, including “information ops (influence or disruption)”.

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the newly created NSA review panel announced by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell”, devoted to “online human intelligence” and “strategic influence and disruption”:

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack”, while dissecting how human being can be manipulated using “leaders”, “trust, “obedience” and “compliance”:

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

School Shooting Expert Threatened Over Sandy Hook Investigation

Was told if he didn’t back off “bad things are going to happen”

Adan Salazar
Infowars.com
February 18, 2014

The Sandy Hook school shooting was a giant, elaborate hoax and no one really died; that’s the conclusion Wolfgang Halbig, a former educator, US Customs agent and Florida state trooper, has reached after ten months of investigation and multiple disputes with federal, state and school authorities.

Halbig is convinced a deluge of discrepancies prove that the whole scenario was a scripted event.

“..I suspect, in my professional opinion as a consultant and doing this a long, long time, I think it’s a scripted event that took place. I think it was in planning for maybe two, two and a half years,” Halbig said recently in an explosive interview with American Free Press.

Halbig is not your average conspiracy theorist. In fact he’s not one at all.

He’s a former educator and law enforcement officer who now contracts out as a national school safety consultant.

His job is to help schools prevent incidents like the one that unfolded in Newtown. In order to do that, he needs to know exactly what happened at Sandy Hook.

“How do I tell people how to make their school safer when we don’t even have the truth about Sandy Hook?” asked a frustrated Halbig. “See, there is a nexus, I do this for a living.”

But school, state and federal officials aren’t making his job easy, and the state’s even threatened him for meddling in their affairs.

“They were in plain clothes,” Halbig recalled, describing a visit from Lake County homicide investigators. “They introduced themselves, they showed me their identification, their badges, and they basically said, ‘We need to have a conversation,’ and I said, ‘Well come on in, sit down, make yourselves comfortable,’ and then they read off my resumé. I mean, somehow, they did a lot of homework.. Basically the next thing they said was if I don’t stop, the Connecticut state police were gonna file charges and they recommended that I hire an attorney.”

The retired school principal, however, affirmed he’s in the right. “I said there is no way in the world that I’m gonna hire an attorney, because I’m following the procedures of the Connecticut state Freedom of Information Act. I mean, if anybody ought to be arrested, I said you tell those guys they ought to be arrested for failing to comply by the law of Connecticut.”

He says they also treated him in a threatening manner, stating “if I don’t comply that bad things are going to happen to me.”

Nevertheless, Halbig says, like any homicide investigation, Sandy Hook is a giant puzzle, but one which the public hasn’t been provided all the pieces to solve.

“..[T]his crime that was committed is a puzzle and no one can show me the pieces to put together to finish this puzzle. They don’t fit no matter how hard you try.. you and your listeners will not be able to put this puzzle together,” Halbig attested to host Dave Gahary.

Unanswered Questions

National school safety consultant Wolfgang Halbig.

National school safety consultant Wolfgang Halbig.

For Halbig, there are unanswered questions, lots of them.

For instance, why in the immediate aftermath of the shooting were no medical helicopters summoned?

“Think about it: you have 20 children, 6 staff members who were supposed to have been shot. They’re seriously injured. Where’s the trauma helicopters? Those are the quickest and the best medical services that any child or any school staff member can receive, and no trauma helicopters were ever requested?”

Halbig also called Life Star emergency services, who confirmed they were never summoned that morning. “[T]hey said, ‘Mr. Halbig we were never requested on that morning. We were shocked and surprised, we were ready, we thought we were going to go to Sandy Hook.’ They had helicopters ready to go, but they were never asked.. Here’s my premise.. there wasn’t anybody there to be treated.”

Halbig also questions why EMT and firefighters, who were mere minutes away from the scene, were prevented from entering the school and possibly saving lives, and additionally, he wants to know how, within the first 11 minutes, America was already presented with a death toll.

“Who declared all those 26 people dead within the first 11 minutes? Connecticut law states that only a doctor can declare them dead, legally dead.”

Moreover, Halbig says the FBI’s classification of the school shooting report is something he’s never witnessed in his entire career. “I can tell you [out of] all the shootings, never has an FBI agency ever classified an investigative report on a school shooting.”

More Unanswered Questions

There are also a whole host of peculiarities Halbig is still baffled by.

For example, why was Sandy Hook elementary torn down? Even in the Columbine tragedy, whose crime scene Halbig assisted with and in which he testified as a key witness, the school was cleaned up, but was never torn down.

According to Halbig, no one could tell him which environmental company cleaned up the bloody mess, or who installed the school’s security system, all things his job would require him to know.

He has other pressing questions, such as: Why was there a registered nurse found in the building four hours after the shooting? Why was there a sign flashing “Everyone must sign in?” Why were there port-a-potties on site within three hours? Why were children turned around by officers and sent back into rooms supposedly littered with dead bodies? How did someone with Asperger’s have the physical coordination to carry the large amount of munitions Adam Lanza supposedly carried? Why did no parents file a lawsuit against the school, when in every other school shooting suits have been filed? And ultimately, why would the state threaten Halbig?

“The things [we’re] talking about.. they should never offend any parent…These are simple questions that we as homicide investigators, we need to know and we should know.”

Sandy Hook elementary / Image: Wikimedia Commons

Sandy Hook elementary / Image: Wikimedia Commons

Truth Seeking Won’t Stop

Altogether, from the puzzle pieces he’s collected and analyzed, Halbig concludes there is a massive cover up.

“Absolutely… It is.. when you refuse to respond to simple requests, something is not right.”

The next step legally, Halbig says, would be to hire attorneys and depose the key players of the investigation, because, “The only way you’re ever gonna get the truth is by getting them to raise their right hands..” “..[I]f you lie in a deposition and if you’re caught in that lie, there’s a lot of things that you can lose, you can go to jail and you can lose your retirement..” warns the safety consultant.

When asked if he feels his life could be in danger if the cover-up goes all the way up to the White House, Halbig answered he is not fearful because he’s led a rich life, but that for him, people showing up and knocking on his door was the final straw.

“Here’s the problem and this is what got me fired up even more, is when they start bringing people to my house.”

Halbig says next he’s traveling to Newtown, Conn. and scoping out the crime scene, and that he’s possibly planning a Sandy Hook event in Orlando, Florida sometime in the near future.

He says he won’t stop until he gets some answers.

Below, check out Infowars’ report on why so many people think the Sandy Hook school shooting was a staged event.

This article was posted: Tuesday, February 18, 2014 at 1:32 pm

Think Tank: “Extraordinary Crisis” Needed to Preserve “New World Order”

Author of ‘shock and awe’ doctrine says elite threatened by non-state actors like Edward Snowden

Paul Joseph Watson
Infowars.com
January 17, 2014

Writing for the Atlantic Council, a prominent think tank based in Washington DC, Harlan K. Ullman warns that an “extraordinary crisis” is needed to preserve the “new world order,” which is under threat of being derailed by non-state actors like Edward Snowden.

Image: Atlantic Council Meeting (Wikimedia Commons).

The Atlantic Council is considered to be a highly influential organization with close ties to major policy makers across the world. It’s headed up by Gen. Brent Scowcroft, former United States National Security Advisor under U.S. Presidents Gerald Ford and George H. W. Bush. Snowcroft has also advised President Barack Obama.

Harlan K. Ullman was the principal author of the “shock and awe” doctrine and is now Chairman of the Killowen Group which advises government leaders.

In an article entitled War on Terror Is not the Only Threat, Ullman asserts that, “tectonic changes are reshaping the international geostrategic system,” arguing that it’s not military superpowers like China but “non-state actors” like Edward Snowden, Bradley Manning and anonymous hackers who pose the biggest threat to the “365 year-old Westphalian system” because they are encouraging individuals to become self-empowered, eviscerating state control.

“Very few have taken note and fewer have acted on this realization,” notes Ullman, lamenting that “information revolution and instantaneous global communications” are thwarting the “new world order” announced by U.S. President George H.W. Bush more than two decades ago.

“Without an extraordinary crisis, little is likely to be done to reverse or limit the damage imposed by failed or failing governance,” writes Ullman, implying that only another 9/11-style cataclysm will enable the state to re-assert its dominance while “containing, reducing and eliminating the dangers posed by newly empowered non-state actors.”

Ullman concludes that the elimination of non-state actors and empowered individuals “must be done” in order to preserve the new world order. A summary of their material suggests that the Atlantic Council’s definition of a “new world order” is a global technocracy run by a fusion of big government and big business under which individuality is replaced by transhumanist singularity.

Ullman’s rhetoric sounds somewhat similar to that espoused by Trilateral Commission co-founder and regular Bilderberg attendee Zbigniew Brzezinski, who in 2010 told a Council on Foreign Relations meeting that a “global political awakening,” in combination with infighting amongst the elite, was threatening to derail the move towards a one world government.

Ullman’s implied call for an “extraordinary crisis” to reinvigorate support for state power and big government has eerie shades of the Project For a New American Century’s 1997 lament that “absent some catastrophic catalyzing event – like a new Pearl Harbor,” an expansion of U.S. militarism would have been impossible.

In 2012, Patrick Clawson, member of the influential pro-Israel Washington Institute for Near East Policy (WINEP) think tank, also suggested that the United States should launch a staged provocation to start a war with Iran.

Ullman’s concern over failing state institutions having their influence eroded by empowered individuals, primarily via the Internet, is yet another sign that the elite is panicking over the “global political awakening” that has most recently expressed itself via the actions of people like Edward Snowden, Julian Assange, Bradley Manning and their growing legion of supporters.

Facebook @ https://www.facebook.com/paul.j.watson.71
FOLLOW Paul Joseph Watson @ https://twitter.com/PrisonPlanet

*********************

Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.

This article was posted: Friday, January 17, 2014 at 6:09 am

DHS Insider: “Preparations Have Been Finalized to Respond to a Crisis of Unprecedented Magnitude Within the United States”

Douglas J. Hagmann
SHTF plan
December 28, 2013

Editor’s Note: One of the questions oft asked in alternative news circles is why, if elements within the U.S. government intend to collapse our economy and implement martial law, no one within these circles has spoken out.

Image: DHS (Wikimedia Commons).

The fact is that scores of people have made it their duty to alert the American people to what’s going on behind the scenes. They’ve told us of the corruption and backroom deals. They’ve given us the warning signs to look for, many of which have already come to pass. They’ve even made us aware of the government’s response should the worst come to pass. Detractors often dismiss the warnings and insider reports as bogus, often claiming that if the sources are anonymous they can’t be legitimate. But do we blame them for taking extreme steps to protect their identities? Edward Snowden and Bradley Manning showed their faces, and now they will spend their lives as targets. Given what happened to these whistle blowers, is it any surprise that others with insider knowledge refuse to speak out in an official capacity?

The following warning comes to us from an anonymous source embedded deep within the Department of Homeland Security who has taken it upon himself to share his knowledge with our audience through the generous contrtributions of the Hagmann and Hagmann Report via the Northeast Intelligence Network. The insider has taken extraordinary measures to remain anonymous, but given what we know the government is up to and the signs we see all around us, does his desire for anonymity make his claims any less legitimate than if he had included his name?

We’ve long argued that any manufactured event would be telegraphed to the general public by whistle blowers on the inside. Deny the possibility if you so choose, but this insider, along with others who have shared their information may well be the only warning you’ll ever receive. As the Insider notes, most people simply have no idea what’s coming, nor do they care to. One morning they’ll wake up and all hell will have broken loose.

 

Under the cover and amid the distraction of the Christmas bustle, I had my last “official” contact with a source inside the Department of Homeland Security known as “Rosebud” in my writings. My source is leaving his position, retiring along with numerous others choosing to leave this bureaucratic monstrosity. For this contact, my source took unprecedented measures to be certain that our contact was far off the radar of prying government eyes and ears. I was stunned at the lengths he employed, and even found myself somewhat annoyed by the inconvenience that his cloak-and-dagger approach caused. It was necessary, according to my source, because all department heads under FEMA and DHS are under orders to identify anyone disclosing any information for termination and potential criminal prosecution.

“DHS is like a prison environment, complete with prison snitches,” he said, referring to the search for leaks and leakers. And the warden is obsessed. Ask anyone in DHS. No one trusts anyone else and whatever sources might be left are shutting up. The threats that have been made far exceed anything I’ve ever seen. Good people are afraid for their lives and the lives of their families. We’ve all been threatened. They see the writing on the wall and are leaving. It’s not a joke and not hype.”

The following is a narrative from my source, prefaced with the instructions to “take it or leave it,” and “disregard it at your own peril.” He added that it’s now up to each American to act on the information themselves or suffer the consequences. “I’ve resigned myself to the fact that most [Americans] will never be convinced of the reality that is taking place right in front of them.”

 

The plan explained

“According to every internal document I’ve seen and read, and from the few people I’ve spoken with who understand what’s going on, preparations have been finalized to respond to a crisis of unprecedented magnitude within the United States. The response will include the use of lethal force against U.S. citizens under the instructions of Barack Obama.” But why?

“‘It’s the economy, stupid,’” he began, paraphrasing a campaign slogan coined by James Carville for Bill Clinton’s 1992 campaign. ”Just as I disclosed in our first meeting, the crisis will be rooted in an economic collapse. I told you last year, at a time when gold and silver were setting record highs, one specific indicator that time is very short. It is the final ‘smack down’ of the metals, gold and silver, that will presage the orchestrated economic collapse that is being planned by the bankers of Wall Street. Everybody needs to understand that this is a deliberate collapse of the U.S. economy with the oversight of the White House and the full knowledge of the Justice Department. Everyone seems to be waiting for some big, history making event that will signal the start of the collapse. The fact is that the collapse has already started. It’s incremental, like a snowball rolling down a hill. It gets bigger and rolls faster. Well, this snowball is well on its way down the hill.”

“I don’t mean to sound repetitive, by I can’t stress this enough. Contrary to what you hear, we’re already in an economic collapse, except that most people haven’t a clue. The ‘big bang’ comes at the end, when people they wake up one morning and can’t log in to their bank accounts, can’t use their ATM cards, and find out that their private pension funds and other assets have been confiscated,” he stated.

“I’ve seen documentation of multiple scenarios created outside of DHS. Different plans and back-up plans. Also, please understand that I deliberately used the word ‘created,’ as this is a completely manufactured event. In the end it won’t be presented that way, which is extremely important for everyone to understand. What is coming will be blamed on some unforeseen event out of everyone’s control, that few saw coming or thought would actually happen. Then, another event will take place concurrent with this event, or immediately after it, to confuse and compound an already explosive situation.” I asked for specifics.

“As I said, there are several scenarios and I don’t know them all. I know one calls for a cyber-attack by an external threat, which will then be compounded by something far removed from everyone’s own radar. But it’s all a ruse, or a pretext. The threat is from within,” he stated. “Before people can regain their footing, a second event will be triggered.” Again, I asked for specifics.

“I’ve seen one operational plan that refers to the federal government’s response to a significant terrorist attack on U.S. soil. Information at these levels is compartmentalized. I don’t have specifics, just plans for the response. The response will be controls and restrictions on travel, business, and every aspect of our lives, especially gun ownership and speech that incites people against the government. I guess some people would call it Martial Law, and they would not be incorrect. But understand that this will be a process deployed in stages. How quickly of a process remains to be seen.”

The mechanics explained

As I said, people continue to look for something big to happen first, followed by a militaristic response by the federal government against U.S. citizens. Based on what I’ve seen, I don’t believe it will happen this way, although there is one unthinkable exception. That exception would involve a ‘decapitation’ of our leadership, but I’ve seen nothing even remotely suggestive of that. But I’ve heard and even read articles where that is mentioned. Frankly, though, that’s always been a threat. I suppose that if the leadership is deemed useless, or becomes a liability to the larger agenda in some manner, it could happen. The precedent exists. Let’s pray that it’s not the case now.”

“I don’t think anyone except the initiated few know the precise series of events or the exact timing, just a general overview and an equally general time period. I think we’re in that period now, as DHS has their planned responses finalized. Also, the metals are important because it’s real money, not Ponzi fiat currency. The U.S. has no inventory of gold, so the prices are manipulated down to cause a sell-off of the physical assets. China is on a buying spree of gold, and other countries want their inventory back. The very people causing the prices to drop are the ones who are also buying the metals at fire sale prices. They will emerge extremely wealthy when the prices rise after the U.S. currency becomes wallpaper. A little research will identify who these people and organizations are.”

“I’d like to add a bit of perspective that might help explain the events as I described. Do you remember former Defense Secretary Donald Rumsfeld announcing that the Pentagon was unable to account for $2.3 trillion in the defense budget? That was on September 10, 2001, the day before the attacks of 9/11. Some suggest that 9/11 was orchestrated, in part to cover up the missing money, which is ludicrous. The result, however, was that suddenly the accounting issue took a back seat because of the attacks. The result will be the same. That’s a perfect example of the mechanics of what we are about to experience. It’s going to take years to sort out, and when it’s finally sorted out, the damage will have long been done.”

“Please note a few final things. The relationship that exists between DHS today and the executive branch is well beyond alarming. DHS and other organizations have become the private army of the Oval Office. The NSA, and I’ve got contacts there, is taking orders from the Oval Office. The IRS is under the virtual control of the Oval Office in a manner that would make Nixon cower. Even though all roads appear to lead to the Oval Office, they lead through the Oval Office. It’s not just Obama, but the men behind him, the people who put him there. The people who put him there are the ones who created him.” I asked who created him.

“First, ask yourself why there was such an all out effort to marginalize anyone talking about Obama’s eligibility in 2008. Even so-called conservatives pundits fell for the lie that such questions were nothing more than a diversion. They were following a specific drumbeat. That should tell every rational adult that he is a creation of the globalists who have no allegiance to any political party. He is the product of decades of planning, made for this very time in our history. He was selected to oversee the events I just disclosed. Who has that ability? He’s a product of our own intelligence agencies working with the globalists. He should be exhibit ‘A’ to illustrate the need to enforce the Logan Act. Need I say more?”

As often said by another of my sources, the U.S. is a captured operation. The lie is bigger than most people realize or are willing to confront. That is, until there is no other option. By then, it might be too late.

This article was posted: Saturday, December 28, 2013 at 6:38 am

Congress Backs Terrorists In Syria, Says We Need NSA Spying Because There are Terrorists In Syria

Washington’s Blog
December 4, 2013

The civil war in Syria started in March 2011. And see this.

However, the U.S. has been funding the Syrian opposition since 2006 … and arming the opposition since2007. (In reality, the U.S. and Britain considered attacking Syrians and then blaming it on the Syrian government as an excuse for regime change … 50 years ago (the U.S. just admitted that they did this to Iran) . And the U.S. has been planning regime change in Syria for 20 years straight. And see this.)

The New York Times, (and here and here) , Wall Street Journal, USA Today, CNN, McClatchy (andhere), AP, Time, Reuters, BBC, the Independent, the Telegraph, Agence France-Presse, Asia Times, and the Star (and here) confirm that supporting the rebels means supporting Al Qaeda and two other terrorist groups.

Indeed, the the New York Times has reported that virtually all of the rebel fighters are Al Qaeda terrorists.

The Syrian rebels are now calling for terrorist attacks on America. And we’ve long known that most of the weapons we’re shipping to Syria are ending up in the hands of Al Qaeda. And they apparently have chemical weapons.

And yet the U.S. is stepping up its support for the Islamic extremists.

The chair of the House Intelligence Committee – Mike Rogers – voted for arming the Syrian rebels. And the chair of the Senate Intelligence Committee – Diane Feinstein – has apparently quietly let arms flow to the rebels.

So are they admitting their mistake?

Heck, no! They’re using the specter of Syrian terrorists to justify mass surveillance by the NSA on innocent Americans …

And now he’s trying to use rebel Al Qaeda as an excuse for mass surveillance by the NSA.

As Juan Cole notes:

Senator Diane Feinstein and Rep. Mike Rogers took to the airwaves on Sunday to warn that Americans are less safe than two years ago and that al-Qaeda is growing and spreading and that the US is menaced by bombs that can’t be detected by metal detectors.

Call me cynical, but those two have been among the biggest detractors of the American citizen’s fourth amendment rights against unreasonable search and seizure of personal effects and papers. I think their attempt to resurrect Usama Bin Laden is out of the National Security Agency internal playbook, which specifically instructs spokesmen to play up the terrorist threat when explaining why they need to know who all 310 million Americans are calling on our phones every day. [Here’s what he’s talking about. Andhere.]

CNN’s Candy Crowley interviews them

Now, obviously there are violent extremists in the world and the US like all other societies is likely to fall victim to further attacks by terrorists. But if they could not inflict significant damage on us with 9/11 (and economically and in every other way except the horrible death toll, they could not), then it is a little unlikely that this kind of threat is existential.

In fact the number of terrorist attacks in the US has vastly declined since the 1970s (as has violent crime over-all), as WaPo’s chart shows:

(The chart shows each attack as a number and does not show fatalities; obviously the Oklahoma City bombing and 9/11 would be prominent in that case. But the fact is that foreign terrorist attacks kill almost no one in America these days. You’re far more likely to fall in your bathtub and die than to face terrorism).

Rogers makes a big deal out of the fighting in northern Syria as a threat to the United States and says “thousands” of “Westerners” have gone to fight there. But Rogers is just obfuscating by mentioning vastly exaggerated statistics.

The number of Americans estimated by the FBI to be fighting in Syria? 24. Two dozen. That’s it.

The Syrian civil war has nothing to do with the US, and is a local struggle rather unlikely to involve hitting America (more especially since, as Rogers carefully avoids mentioning, the US is committed to arming these rebels to fight against al-Assad.)

That’s right. Mike Rogers voted to give arms to the Syrian rebels. And while he may hope they don’t go to the al-Qaeda affiliates (as happened when Ronald Reagan gave $5 billion to the Afghan Mujahidin in the 1980s) [oops], he has no guarantee that won’t happen and is willing to take the risk. If Rogers were really, really concerned about the Jabhat al-Nusra, he wouldn’t be risking upping its firepower with Americans’ tax dollars as a justification for monitoring who your 15 year old daughter calls on her cell phone.

Let us say that again. Feinstein and Rogers just came on television to scaremonger the American people with the Syrian jihadis, and both of them voted to give the Syrian rebels millions of dollars in arms.

That’s a pretty good racket. You support the jihadis abroad and then point to jihadis abroad as the reason for which you have to get into the underwear of the American people.

Then they brought up Iraq, which is another local struggle. Dick Cheney repeatedly warned that if the US left Iraq, the terrorists created by the US Occupation (he didn’t put it that way) would follow us home. But it was never very likely an allegation. You could easily get an attack in the US by a disgruntled Sunni Iraqi. But that the Sunni Arabs of Iraq are gunning for the US? No sign of it.

Indeed, Al Qaeda wasn’t even in Iraq until the U.S. invaded that country.

And U.S. policy has lead to a world-wide increase in terrorism.

Of course, mass surveillance doesn’t really have much to do with terrorism in the first place.

No wonder Americans have such a low opinion of Congress. But people like Feinstein and Rogers couldn’t care less.

This article was posted: Wednesday, December 4, 2013 at 6:32 am