Posts Tagged ‘CIA’


1. When there is a CIA-organised false flag attack there is usually a drill going on at the same time.

In the attack on the Peshawar School:
One of the wounded students, Abdullah Jamal, said that he was with a group of teenagers who were getting first aid training with a team of Pakistani army medics when the violence began.

attack on army school in Pakistan

Irfan Shah told how he was sitting in his class at 10:30 when he heard the sound of firing outside.

Shah told MailOnline: ‘It was our social studies period.

“Our teacher first told us that some kind of drill was going on and that we do not need to worry.”

Read more: http://www.dailymail.

A plainclothes security officer.

2. When there is a CIA-organised false flag attack, the security services are often late in responding.

“After half an hour of the attack, the army came and sealed the school,” a teacher who escaped told a private television channel.

attack on army school in Pakistan

Blackwater.

3. In a CIA-organised false flag attack, there are the ‘patsies’ and there are ‘the real killers’.
In Peshawar, the ‘patsies’ had instructions not to kill children.
Our suicide bombers have entered the school, they have instructions not to harm the children, but to target the army personnel,” a spokesperson for the Pakistani Taliban told Reuters.
4. In a CIA-organised false flag attack, the CIA usually gets help from elements of the local police and military.
Eyewitnesses said the attackers were dressed in army uniforms.

In 2009, Israeli foreign minister Avigdor Lieberman said Pakistan was a greater threat to his country than Iran.

In Pakistan, there seems to be a Gladio-style operation which aims to promote the interests of certain gangsters.

On 16 December 2014, it was reported that mysterious gunmen had killed 132 children at a ‘heavily guarded’ military-run high school in Peshawar (above) in Pakistan.

Killing spree at Pakistan school, 132 students dead.

Attack on church in Peshawar, Pakistan, Sept. 22, 2013

This attack on the school looks like a false-flag inside job carried out by the security services.

Several children said that the gunmen communicated with each other in a foreign language.
Witnesses said that some of the gunmen were wearing Pakistani military uniforms.

Killing spree at Pakistan school, 132 students dead.


The 2004 attack on a school in Russia’s Beslan, which killed more than 330 people, was blamed on the CIA.

The Pakistani military is said to use Islamist militants to carry out attacks in places such as Kashmir and Afghanistan.

Killing spree at Pakistan school, 132 students dead.


David Headley, drug dealer and ‘CIA asset’.
Peshawar is an area where the drugs and weapons mafias are active, and it is an area known well by ‘CIA asset’ David Headley.
Reportedly, the so called Islamic terrorism is Pakistan is all about gang warfare.
According to Rakesh S. , at gather.com,
1. In the North West Frontier Province of Pakistan we find

(A) The ordinary people who often have no land, no jobs and little to eat. They are often treated like slaves.

(B) the rich elite who are made up of such people as army generals who run businesses, large landowners, warlords who sell drugs and guns, and certain mullahs with links to crime.

2. The ordinary people are often forced to work for the local warlords.

These ordinary people appear to be Islamic Terrorists but are, in fact, unwilling mercenaries for the warlords.

These unwilling mercenaries get slaughtered in the wars between the warlords and wars against the Pakistan government.

Bin laden worked for the Jewish Russian Mafia and the CIA, reportedly.
Rakesh.S writes that according to a Peshawar politician:

‘The Great Jihad of the 1980s was a myth…
‘People like Osama Bin Laden and Gulbuddin Hekmateyar were basically running mercenary operations and protection rackets with money from the Gulf and from Saudi Arabia, with arms provided by the CIA and MI6, and with the protection of Pakistan’s notorious Inter Service Intelligence (ISI) agency.’

Reagan’s friends.
The Taliban is being blamed for the attack on the Peshawar school.

Pakistan President Asif Ali Zardari has said that the CIA and Pakistan’s ISI together created the Taliban.

“The ISI and CIA created them together,” Zardari told the NBC news channel in an interview.

(informationliberation – CIA and ISI together created Taliban, says …)

Baitullah Mehsud

“For years the US mysteriously refused to kill former Pakistan Taliban chief Baitullah Mehsud via remote drone despite being offered his precise location by Pakistani intelligence authorities.”

It is believed that the Taliban is run by elements of the security services of the USA, UK, Israel, India and Pakistan.

Apparently the Pakistan Taliban are armed with US weapons.

(aangirfan: PAKISTAN TALIBAN ARMED WITH WEAPONS FROM USA, GERMANY …)

Dawood Ibrahim, Pakistani gangster and ‘CIA asset’.
Apparently the US owns a lot of top Pakistanis.

US Security Firm Bribes Pakistani Officials, Top Interior Ministry Officer Arrested

US officials have said that the CIA had routinely brought ISI operatives to a secret training facility in North Carolina.

(‘No smoking gun linking command to militants’ )

Some of the ‘bombers’ in Pakistan “have acknowledged that they have been trained by Israeli and Indian intelligences agencies in the camps located in Afghanistan.”

On 5 November 2009, The Nation (Pakistan) referred to Journalists as spies in FATA (part of Pakistan bordering Afghanistan)?.

Matthew Rosenberg, South Asian correspondent of the Wall Street Journal, has been spotted travelling frequently between Washington, Islamabad, Peshawar and New Delhi during the last couple of months….

According to an official of a law enforcement agency, who requested anonymity, Matthew was working as chief operative of the CIA and Blackwater in Peshawar. The law enforcement agencies, he said, had also traced Matthew’s links with Israel’s intelligence agency Mossad as well.

According to the BBC, “on Christmas Day 2007, the Afghan government said it was expelling two high level diplomats, one a British UN political affairs expert, the other, an Irishman and the acting head of the European Union mission.”

(BBC NEWS ‘Great Game’ or just misunderstanding?)

According to the Independent: “Britain planned to build a Taliban training camp for 2,000 fighters in southern Afghanistan.”

(Revealed: British plan to build training camp for Taliban fighters …)

A post at this site Cached tells us of the British government link to the terror in Pakistan.

In 2007 Pakistani Intelligence traced the source of much of terror in Pakistan to a ‘terrorist’ camp in Helmand province in Afghanistan.

The camp was run by Michael Semple and Mervyn Patterson.

Both of these British spooks were ostensibly working with humanitarian organizations.

Following extraordinary intelligence work by ISI, Karzai of Afghanistan and high officials in the Musharraf government exchanged visits which eventually resulted in the arrest and expulsion of Patterson and Semple from Afghanistan.

The real story was that these training camps were to create the Pakistan Taliban or Tehreek-e Taliban-e Pakistan (TMP); but why?

If the Taliban were to take over some areas in Pakistan and a part of the capital, then this would provide a sufficient basis for the US to bomb Pakistani nuclear installations and cease their nuclear weapons.

There were serious war plans and military exercises conducted by US forces for this scenario.

British India (www.zum.de/whkmla/histatlas)

On 19 October 2009, it was treported that the Pakistan Taliban (TTP) leaders were being evacuated by mysterious airlifts

“Mysterious airlifting of some Taliban elements from areas of the Pakistan-Afghanistan border linking Waziristan have been reported by several sources and fears are growing that anti-Pakistan TTP terrorists are also being rescued by their “foreign allies” from across the border.

“The unexplained movements of “un-marked” helicopters and aircraft have been reported since the last few days along the Pak-Afghan border and one source claimed that they were being transported to the Eastern Afghanistan.

“Some experts believe that secret allies of the friendly-Talibans took the action in order to secure the militants from an assault in South Waziristan by Pakistani Armed Forces while others believe the secret evacuation was part of a larger deal between some Western States and “good Taliban.”

“The airlifting and evacuation of TTP leaders from South Waziristan coincided with a report by foreign news media or a similar mysterious evacuation of “militants” from South Afghanistan to North Afghanistan.

“An Iranian news site on October 18 reported that the “British Army has been relocating Taliban insurgents from southern Afghanistan to the north by providing transportation means.”

“Quoting diplomats who spoke on condition of anonymity, the Iranian site claimed that insurgents are being airlifted from the southern province of Helmand to the north amid increasing violence in the northern parts of the country.

“The PressTV.com also claimed that “the aircraft used for the transfer have been identified as British Chinook helicopters.”

“The report suggested that the secret operation was being launched under the supervision of Afghan Interior Minister Mohammad Hanif Atmar, who “was still operating under the British guidance.”

“Afghanistan’s Pajhwok news agency reported that ‘US ambassador scotched speculation that his country was helping terrorists in the north, saying America had nothing to do with the air-dropping of armed men from helicopters in Samangan, Baghlan and Kunduz provinces.’

“At an October 11 news conference in Kabul, President Hamid Karzai had himself claimed that “some unidentified helicopters dropped armed men in the northern provinces at night.”

“According to a Pajhowk news report President Karzai revealed “the government had been receiving evidence of the air-dropping of gunmen from mysterious helicopters in the provinces over the last five months.”

“A comprehensive investigation is underway to determine which country the helicopters belong to; why armed men are being infiltrated into the region; and whether increasing insecurity in the north is linked to it.”

Mehsud, used by the CIA to get US troops into Pakistan?

Baithullah Mehsud, a ‘deceased’ tribal leader in Pakistan, may have links to the CIA.

Source: http://aanirfan.blogspot.in/
Advertisements

CIA-Sponsored Trolls Interact With Users to Discredit Information
December 1, 2012 – In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.

David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”

Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.

In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA’s Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range. This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data. They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.

The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore.

Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:

• Finances

• Stock transactions

• Business deals

• Foreign military

• Diplomatic secrets

• Legal documents

• Personal civilian communications

This information could be used at Fusion Centers for the DHS to create a more efficient profile on each and every American citizen. The implications are staggering. This ability to collect these types of data are a violation of the 4th Amendment guard against unreasonable searches and seizures. By collecting intelligence on every American citizen, the US government is treating everyone as if they were a potential foreign or domestic terrorist. Whether this assumption is valid or not, under the US constitution, Americans are supposed to be protected from intrusion of government; even if that government is their own.

At the same time the NSA spy center was being constructed, Attorney General Eric Holder new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.

The Obama administration empowered the NCTC with the authority afforded Obama under Presidential Executive Order 13354. This EO was codified by the Intelligence Reform and Terrorism Prevention Act of 2004. The NCTC reports directly to the President and director of National Intelligence as instructed by the President and Department of Homeland Security (DHS). Sen. John McCain was integral in the creation of this combination of military strength and governmental power culminating in all-encompassing tyranny.

Both private and public corporations will be employed to mine the data. Silicon Valley and other technology giants in the private sector will have open access to private information on any and all American citizens.

Since the manufactured attack on 9/11, the US government has created a “vast domestic intelligence apparatus” that spies on Americans and collects massive amounts of data to be profiled and used at the discretion of the Federal Bureau of Investigations (FBI), local law enforcement, DHS and military criminal investigators. The FBI and NSA house more than 1.5 billion government and private sector profiles. The information on average citizens includes all sources of criminal and non-criminal databases that assist the US government in creating a filing system on each American.

The NSA has a comprehensive program to search out our schools into scouting grounds for a team of American grown hacker community. The Obama administration has made it a concern of theirs that the future of cybersecurity rest with the college graduates of tomorrow. The NSA is focusing on colleges and universities within the US. Four schools have already been singled out as official Centers of Academic Excellence in Cyber Operations (CAE-COP).

The CAE-COP focuses on recruiting persons with “particular emphasis on technologies and techniques related to specialized cyber operations (e.g., collection, exploitation, and response), to enhance the national security posture of our Nation.”

Those chosen for this program become vital researchers expected to assist the NSA in:

• Global communications and computing networks

• Developing a digital strategic advantage

• Collaboration with the US government on cyber issues

• Carry out directives on designated targets at the discretion of the US government

These “cyber operators” are trained to become an elite team of “computer geniuses” that are experts in computer hacking, digital communications, cyber intelligence – for the purpose of spying on Americans; as well as conducting interactive digital psy-ops with users of the internet.

Earlier this month, Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the National Initiative for Cybersecurity Education (NICE).

NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.

Beginning in kindergarten, Napolitano hopes that the DHS-sponsored US Cyber Challenge will provide schools, universities and all forms of academia in the private sector the federal government-allocated tools they would need to “develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.”

In 2011, the NICE report entitled, “Shaping the Future of Cybersecurity Education”, explored intercepting children in the public education system, as well as continuing the focus throughout their educational career, there can be a national recruitment and retention process that produces “skilled workers for the private sector and government.”

Napolitano’s Secretary’s Honors Program for Cybersecurity Professionals is meant to recruit college students for the purpose of assimilating their talents into the federal government for “missions including cyber” security as defined by the DHS Advisory Council Task Force on CyberSkills. This focus is to ensemble the most effectual cybersecurity team comprised of civilians, US veterans and those educated specifically in the field of IT technologies. For the sake of national security, DHS is selecting the most technically skilled citizens in the avenues of malware and digital forensic analysis, to participate in the Cybersecurity Internship Program for a 2 year internship that will result in a devotional career in the federal government and service to Big Sis.

In August, the DHS was central in the taking of domain names for websites without due process or explanation – simply using the blanket claim of copyright infringement. Holder and Napolitano received correspondence from several members of the House of Representatives who were in protest of the domain name seizures, citing that the copyright claims were questionable and that the websites were clearly being censored for alternative reasons.

The letter stated that: “Our concern centers on your Department’s methods, and the process given, when seizing the domain names of websites whose actions and content are presumed to be lawful, protected speech.”

According to Lynnae Williams, former CIA clandestine service trainee and DIA analyst, the FBI and CIA use trolls to monitor social media and interact with users to discredit information disseminated on the web. Williams explains that the CIA provides training videos to new recruits on how to troll the internet. Once a target is locked-in, all open source information is obtained on the individual, and then any angle to discredit them in public forum is used on social media sites.

Software is used to sift through the “mountains” of users on social networking sites. At the Atlanta CIA branch where Williams was trained, she personally witnessed CIA-sponsored and sanctioned trolling of Americans on social networking sites.

In 2011, the CIA revealed its Open Source Center where recruited personnel are used as government trolls to “analyze” websites for information pertinent to the objective of the US government – meaning discrediting targets on certain websites. Under the guise of conducting business intelligence (i.e. cyberespionage), the Open Source software gathers digital data on targets; including all Facebook posts, Twitter posts, comments on website threads. Those assigned to monitor this data can interact with users online through anonymous portals. Agents are designated to surveillance operations to message anyone, analyze political and religious speech, assess trends and conduct electronic eavesdropping through cell phones, satellites and other digital apparatus.

Agents not only survey the internet and interact as anonymous persons through directed postings, but also are deployed to wander through the streets domestically and in foreign nations to monitor newspaper and other printed media to extract useful information about the temperament of the general public.

When professional trolls want to attack for copyright infringement, they may combine defamatory comments across the internet with a fraudulent DMCA notice of takedown, to discredit a source of information that they feel threatened by.

The EFF have reported on copyright trolls that experiment with claiming copyright infringement to “extract settlements from individuals.” These trolls “try to grow businesses out of suing Internet users.”

Professional trolls litter the court system with frivolous lawsuits based on wild accusations of copyright infringement in order to wear down the victim as well as hoping to squeeze monetary restitution for fraudulent claims. The members of the alternative media as well as readers need to be aware of these individuals who are cloaked in truth yet rife with disinformation. Their intention is to cut off the free flow of information on the internet and stifle voices that are exposing truth for their own selfish gains.

Sources and more information:

• CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information

Legal documents Personal civilian communications This information could be used at Fusion Centers for the DHS to create a more efficient profile on each and every American citizen . The implications are staggering. This ability to collect these types of data are a violation of the 4th Amendment guard against unreasonable searches and seizures.

Read more: http://www.disclose.tv/news/CIASponsored_Trolls_Interact_With_Users_to_Discredit_Information/86863#ixzz2DrOO4joE