The Torture Cover-Up 73


It emerges from the USA that 9,000 documents proving direct involvement of the White House in cases of brutal torture are being withheld from the Senate Committee by the Obama administration.  This should surprise nobody, as Obama has done everything in his power to protect George W Bush and the many in the administration, diplomatic service and CIA involved in the whole secret web of torture and murder.  The entire programme was on a scale and of an order of brutality much greater than anything that has been yet understood by the public.  All of those foreign nationals rendered to Uzbekistan, for example, were killed during or following torture and buried in the desert.

It seems that Obama and the Republicans are combining to make sure that the Senate Intelligence Committee’s report on the subject – which by all accounts will be damning enough – is never going to be made public in any way that reveals anything not already known.  The Republicans – and Fox News – have already united behind the extraordinary assertion that the CIA were entitled to spy on the Committee’s activity on its computers, because the physical computers had been provided by the CIA.

At least there is some traction for outrage in the United States.  In the UK, Downing Street dismissed the Gibson Inquiry as soon as it became clear that Gibson was not prepared to be a patsy like Lord Hutton.  I had some small part to play in that.  Gibson had instructed the Foreign Office that, in preparing my own evidence, I had to be given access to any document I had been able to see while I was Ambassador.  This caused huge alarm in the Foreign Office and security services as I knew precisely where the incriminating documents lie and how to find them in a way an outsider never could. Gibson’s insistence on my behalf put the wind up Downing Street and Cameron and Clegg decided to cancel the inquiry.  Similarly Downing Street is postponing the report of the Chilcot Inquiry until Chilcot – who is by no means as “difficult” as Gibson – produces a sufficiently anodyne report.  Even Chilcot’s ultra-Establishment panel of pro-war enthusiasts is having some difficulty with the demands on their intellectual integrity. In particular, Cameron is still refusing to let the Chilcot Committee see, let alone publish, the memos between Tony Blair and George Bush which make it absolutely clear the invasion was agreed long before has been admitted, and also cast some light on its true motives.  Cameron’s withholding of the invasion docs is a precise parallel to Obama’s withholding of the torture docs.  The complete media, political and public silence on this in the UK is terrifying in its implications.

 

 


Allowed HTML - you can use: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

73 thoughts on “The Torture Cover-Up

1 2 3
  • doug scorgie

    Clark
    14 Mar, 2014 – 12:05 pm

    “Modern communications create such vast potential for surveillance, and personality profiling and personal leverage based thereon, that no politician or any person with power can be considered safe from such coercion.”

    Yes Clark and you can be sure that every politician (of any party); senior civil servant; senior police officer and current and prospective judges have and are being spied on for the purposes of control (through blackmail) by anti-democratic deep state actors who all swear allegiance to the Crown.

  • Trowbridge H. Ford

    Nixon called Hoover on the night of May 1,1972, and told him finally that he had to retire – something he would never do, and the President would then have to fire him, but shortly thereafter the Director died mysteriously in bed, thanks apparently to some Plumber souping up his medication. It was just too close to be merely coincidental.

    As I recall, no autopsy was ever carried out on the Director’s death.

  • Ben

    “The chairwoman, Sen. Dianne Feinstein of California, made no mention of the White House documents during a blistering floor speech Tuesday in which she charged that the CIA may have undermined the Constitution and violated the law by searching computers used by her staff to compile the study. Brennan has denied her allegations and the White House has expressed continued confidence in his leadership of the CIA.”

    Closing ranks; manning the parapet for the Humpty Dumpties in the hope that all the King’s soldiers can make them whole again.

  • Herbie

    Fair enough, Trowbridge.

    This is quite a comprehensive and footnoted article by Peter Dale Scott which explains all:

    “The State, the Deep State, and the Wall Street Overworld”

    http://www.globalresearch.ca/the-state-the-deep-state-and-the-wall-street-overworld/5372843

    If you want it in a few sentences.

    With the rise of the masses in the late 19C, elites became more concerned as to how they might manage these emergent oiks. Some states opted for fascism, others for communism and the West went for participation, liberal democracy and PR. The price of this though was that elites would maintain their interests through these secretive organisations.

  • Ben

    “You have counter-asserted that ensuring the personal integrity of secret service staff and chiefs would be a sufficient check upon secret service power.”

    Indeed, Clark. But there are good citizens in the CIA. Colonel Charles McKee and five others who died on the Lockerbie flight were good people. But no good deed goes unpunished.

  • Ben

    http://plane-truth.com/Aoude/geocities/mckee.html

    ” McKee’s thick, 37-page Army dossier contains so many blacked-out words that it’s hard to glean the danger he faced. Surviving the censor’s ink was his title, ”Team Chief.” Under ”Evaluation,” it was written that he ”performs constantly in the highest-stress environment with clear operational judgment and demeanor . . . Especially strong in accomplishing the mission with minimal guidance and supervision . . . Continues to perform one of the most hazardous and demanding jobs in the Army.”

    For Beulah McKee the mystery deepened six months after Chuck’s death, when she received a letter from another U.S. agent in Beirut. It was signed ”John Carpenter,” a name the Pentagon says it can’t further identify. Although the letter claimed that Chuck’s presence on the Pan Am plane was unrelated to the bombing, Carpenter’s message only stirred her suspicions. ”I cannot comment on Chuck’s work,” he wrote, ”because his work lives on. God willing, in time his labors will bear fruit and you will learn the true story of his heroism and courage.”

    Chuck had given no clues about his work. Back home in November for Thanksgiving three weeks before he perished, he wouldn’t even see his friends. ”I don’t want to mingle, so I don’t have to answer any questions,” he told his mother. ”Anyway, he didn’t have time,” she recalls. ”He stayed up till 3 every morning studying reports. And when he flew back to Beirut, all he said was, ‘Don’t worry, Mom. Soon I’ll be out from under all this pressure.’ ”

  • coughanthraxcough

    Americans go to great lengths to avoid facing the facts about their ruling junta but CIA rule was instituted 65 years ago with 50 U.S.C. 403w, which made CIA determinations final and conclusive and not subject to review by any court. Of course, this provision was amended by the Convention Against Torture for actions conferring impunity for torture. But if Congress is ever so impudent as obtrude the supreme law that they enacted, all CIA has to do is go Kachoo! and their puppets will knuckle under.

  • Ben

    “Americans go to great lengths to avoid facing the facts about their ruling junta but CIA rule was instituted 65 years ago with 50 U.S.C. 403w, which made CIA determinations final and conclusive and not subject to review by any court”

    Many of us have been willfully ignorant until very recently.

    The National Security Act of 1947 was implemented by a Lib dem (Truman) and was part and parcel of the Republican Eisenhower’s warning about the Military Industrial Complex, which sits at the heart of all this pure evil.

  • Herbie

    “The National Security Act of 1947 was implemented by a Lib dem (Truman) and was part and parcel of the Republican Eisenhower’s warning about the Military Industrial Complex, which sits at the heart of all this pure evil.”

    And Truman himself, in later life, came to regret what he’d done, just as Woodrow Wilson regretted setting up the Federal Reserve.

    I just wish some of them would regret these things before doing them, but then they wouldn’t be where they were.

  • Trowbridge H. Ford

    It is interesting to note that when the powers that be tried to drag Truman into the dispute about who killed JFK, he told Look magazine in 1964 that he did not intend CIA to get…”engaged in strange activities,” only have it provide …” all the available information to the president.”

  • John Goss

    Today Moazzam Begg appeared by videolink to learn that his trial has been scheduled for 6 October. If this does not get rescheduled he will have spent a further 9 months in prison because he has been investigating the actions of his torturers. Moazzam Begg has been tortured by the US with complicity from UK spooks. My guess is that Chilcot may have been hoping to question him about how he was tortured and who was present. This is how the spooks are keeping him from appearing, and just for delivering a generator to an area of Syria which has no electricity. I predicted this morning they would get a bent judge to keep him banged away. These people are disgusting.

  • Mary

    He is in Belmarsh as I suggested and the judge was Sweeney. He will be tried by a High Court judge.

    http://news.uk.msn.com/begg-faces-court-on-terror-charges

    http://en.wikipedia.org/wiki/Nigel_Sweeney

    ‘Prosecution: Nigel Sweeney QC

    Nigel Sweeney heads the prosecution of the 21 July 2005 alleged bombers. He is a senior criminal barrister who has appeared in more than 40 terrorism-related trials, including the 1984 IRA Brighton bombing which was an attempt to assassinate then Prime Minister Margaret Thatcher.

    One of his most recent high profile trials was the prosecution of Kamel Bourgass, convicted of killing a policeman and a plot to spread poison. Mr Sweeney also works in an advisory role and has been consulted by the Home Secretary and MI6. Mr Sweeney was called to the bar in 1976 and became a QC in 2000.’
    http://news.bbc.co.uk/1/hi/uk/6321097.stm Feb 2007

  • John Goss

    Thanks Mary for the links. It saves me searching. I do not trust British justice. I used to do, and I was pleased to see the barristers striking in support of keeping legal aid at the level it is, but there have been so many miscarriages of high-profile cases, including Moazzam Begg’s, I am convinced that decisions are arrived at outside of court.

  • Mary

    NSA malware industrialises spying
    14 March 2014

    Apologies for the prolonged silence. I’m back in Nazareth after my speaking engagements in Canada. Having spent the last few days sorting out my own computer malware problems, there was a certain irony to the fact that the first article I accessed on my return was this report from Glenn Greenwald and Ryan Gallagher, based on the Edward Snowden leaks.

    It reveals that the NSA – surprise, surprise – has automated its spying operations, so that malware once used to target the odd terror suspect can now be used routinely. The programme is called “Owning the net”. (Israel also gets a special shout-out in the report for its work with the NSA in developing malware.)

    So it’s no longer – and, of course, never was – only about tracking metadata from our phone calls and Google searches. This is industrialised spying, including on domestic populations, using our interactions with the net (which means most of our activities) to know what is going on in our minds.

    Much of the evidence cited in the report is from 2009, so it is difficult to know how much further the NSA has gone in implementing its plans. My guess is things are far worse than even this report suggests: five years is a long time in software development.

    /..
    http://www.jonathan-cook.net/blog/2014-03-14/nsa-malware-industrialises-spying/

  • BrianFujisan

    It would appear They are trying to cover up this story too… i have been trying to dig into this a wee bit…to see if there is any truth in it – and if so, will Anonymous possibly have Scuppered the Planned attacks

    A post was made on the Russian website ‘Live Journal’ on Wednesday, March 12, 2014, by a profile titled Андрей Споров (Andrey Sporaw), containing documents detailing a corrupt plan between “US Army Attache Assistant in Kiev Jason Gresh’ and ‘a high ranking official from Ukrainian General Staff Igor Protsyk’, to conduct a series of attacks on Ukrainian military bases to ‘frame up the neighbor’, or in other words, create a Ukrainian false flag event and blame it on Russia. Image credit: whiteoutpress

    An Anonymous hacker responsible for the info says-

    “We have hacked e-mail correspondence of US Army Attache Assistant in Kiev Jason Gresh and a high ranking official from Ukrainian General Staff Igor Protsyk.

    It appears that they are planning to conduct a series of attacks on Ukrainian military bases in order to destabilize the situation in Ukraine.

    Particularly, Jason Gresh writes to Igor Protsyk that it’s time to implement a plan that implies “causing problems to the transport hubs in the south-east of Ukraine in order to frame-up the neighbor. It will create favorable conditions for Pentagon to act”, says Jason Gresh.

    In his turn, Protsyk writes to some Vasil and tells him to arrange an attack on an airbase of 25 aviation brigade of Ukrainian air force stationed in Melitopol.

    This Vasil is responsible for arranging the details of the attack, gathering of the gunmen and providing them with a map of sites that are chosen to be attacked.

    We strongly recommend everyone to look through these documents. There you will find all the details. (Anon)”

    Though when one tries to click the documents, uploaded to 2 very different file sharing websites, Mediafire and Sendspace, both of them have already been ‘removed for violation’.

    The authenticity of this information needs to be verified. One would need to do something such as find out if the anonymous hacker could have known what he said, had the hacker not truly taken the info from hacked emails, or see the emails themselves, but the documents with the details of the emails have already been taken down.

    However, if the documents were fake, or non-existent, how could they have already been ‘removed for violation’, from 2 different file sharing sites?

    It has not even been 24 hours since the original posting of this information.

    It seems someone needs to connect the dots and see if the alleged contents of these hacked emails match up with reality.

    If these events actually become reality (or this being leaked prevents this from even happening), maybe we have finally entered into an age where citizen hackers can reveal the psychopathic plans of powerful people, before they execute them and ruin the lives of innocent people.

    Source @

    http://theantimedia.org/anonymous-releases-email-allegedly-detailing-western-backed-false-flag-in-ukraine/

    Beforeitsnews have the story up too, and a few other sites –

    Anonymous exposes US invasion plans in Ukraine planned for the 15th of March 2014

    By tomorrow, the 15th of March 2014, the United States, through its agents in Ukraine, will begin a series of false flag attacks on targets in Ukraine which have been designed to make it look as if they were carried out by the Special Forces of the Russian Federation.

    http://beforeitsnews.com/politics/2014/03/anonymous-exposes-us-invasion-plans-in-ukraine-planned-for-the-15th-of-march-2014-2605130.html

  • John Goss

    Thanks for that Brian. Here are the emails intercepted by anonymous for the false-flag events.

    To: Igor Protsuyuk [email protected], [email protected]

    Subj: Peninsula

    Date: Sun, 9 March 2014 17:57:09 +0200

    Igor,

    Events are moving fast in the Crimea. Our friends in Washington expect more decisive action from your network.

    This comments underlines the desperation and the rush that the US has in cementing their overthrow of Ukraine. They can not risk that there will democratic elections and a legitimate government which will so no to NATO, the EU, the IMF and the US.

    I think it’s time to implement the plan we discussed lately. Your job is to cause some problems to the transport hubs in the south-east in order to frame-up the neighbor.

    The neighbor in this case means the Russian Federation. One note, for a military attaché Mr. Gresh’s English is not that good but he could be talking down to his hirelings.

    It will create favorable conditions for Pentagon and the Company to act.

    Of course the phrase “the Company” means the Central Intelligence Agency.

    Do not waste time, my friend.

    Sincerely,

    Jason P. Gresh

    Lieutenant Colonel, U.S. Army

    Assistant Army Attaché

    U.S. Embassy, Kyiv

    Tankova 4, Kyiv, Ukraine 04112

    (380-44) 521 – 5444 | Fax: (380-44) 521 – 5636

    E-Mail 2

    From: Igor Protsuyuk [email protected],

    To: Basil Labaichuk [email protected]

    Subj: Get active in Melitopol

    Date: Tue, 11 Mar 2014 5:50:35 -0700

    Vasily,

    You must launch actions in Melitopole very quickly . The 25th Air Transport Brigade is located there.

    We need to mess with (pull in, provoke) our sworn friends and our good neighbors . I think you understand me .

    This phrase is interesting in the use of the term “sworn friends” which may mean their terrorist allies, the other parts of their Trident or Yatsenyuk and Klitcschko themselves.

    You must proceed carefully and cautiously.

    The 25th Air Brigade is currently on combat missions, so make sure no great harm comes to the planes .

    There are already damaged aircraft at the location, with those you can do whatever you want. I will send you there registration numbers.

    Remember, it is necessary to make everything look like it was a real attack by Russian Special Forces .

    The Brigade Commander there is an intelligent man.

    He will not know the details but in an extreme case you can turn to him. We will warn him.

    Colonel Igor Protsyk

    Chief of Staff, Bilateral Military Cooperation Division, Main Directorate for Military Cooperation and PKO

    General Staff, Armed Forces of Ukraine

    tel +38044 481-5407 cell +38067 407 97 40

    e-mail: [email protected] e-mail: [email protected]

    E-Mail 3

    From: Basil Labaichuk [email protected]

    To: Oleg Kolyarny [email protected]

    CC: [email protected]

    Subj: Urgent need to make some noise

    Date: Tue, 11 Mar 2014 9:20:46 -0700

    Oleg, there is an urgent need to make noise attributed to Muscovites (epithet) at the Melitopole air base. This must be done before March 15. You already understand why.

    First of all you need to contact Paschke (Pavel) Tarasenko . You must know him, he’s from local Svoboda Party and is in on the plan.

    10-12 guys will be arriving there from the Center.

    They are the best fighters of the Trident. Misha (Mihail) is in charge, you should know him too. He will fill you in on the details. You must meet these people and ensure that they have everything they need.

    Proceed with caution. Speak only in Russian.

    The 25th Air Brigade is currently engaged in combat missions, so do not do a lot of damage to the aircraft.

    There are plenty of scrap (damaged) aircraft there and you can do whatever you like with them. You will be told which damaged aircraft you can attack.

    It is vital that everything looks like as real attack by our neighbor’s (Russian) commandos. But without bodies.

    Give me your account details again. The money will come on time, do not worry .

    See the attached file. It is just a proposal. Decide yourself what to do.

    Read more: http://voiceofrussia.com/2014_03_14/Operation-Independence-Continues-Anonymous-exposes-US-invasion-plans-in-Ukraine-7517/

  • fred

    @John

    If the emails were genuine they would have included full headers so they could be checked. Those headers are not even cut and paste, there is no “Subj:” header on an email.

    And no, I don’t believe an American Lieutenant Colonel would be faking an East European accent. I think whoever wrote that did not have a command of the English language.

  • AlcAnon/Squonk

    Fred,

    I have the full 7 MB 7zip archive as originally posted. There are headers present in the original archive as first posted. There are a large number of emails.

    The messages appear to have been downloaded from a Ukranian government email server. It is quite possible that some of the messages have been edited though including the one – Jason Gresh’s English certainly seems a bit odd.

    There are about 40 Megabytes of emails once unzipped. Here’s the headers for the message quoted from Gresh

    Delivered-To: [email protected]
    Received: by 10.220.4.2 with SMTP id 2csp62561vcp;
    Sun, 9 Mar 2014 08:57:15 -0700 (PDT)
    X-Received: by 10.224.51.74 with SMTP id c10mr35436450qag.33.1394380635325;
    Sun, 09 Mar 2014 08:57:15 -0700 (PDT)
    Return-Path:
    Received: from haig2.state.gov (haig-ee.state.gov. [169.253.194.10])
    by mx.google.com with ESMTPS id f6si8135208qap.24.2014.03.09.08.57.14
    for
    (version=TLSv1.2 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
    Sun, 09 Mar 2014 08:57:15 -0700 (PDT)
    Received-SPF: pass (google.com: best guess record for domain of [email protected] designates 169.253.194.10 as permitted sender) client-ip=169.253.194.10;
    Authentication-Results: mx.google.com;
    spf=pass (google.com: best guess record for domain of [email protected] designates 169.253.194.10 as permitted sender) [email protected]
    Received: from EEAPPSEREDG02.appservices.state.sbu ([10.47.98.102])
    by haig2.state.gov with ESMTP id s29FgT0w013967-s29FgT0x013967;
    Sun, 9 Mar 2014 11:42:29 -0400
    Received: from EEAPPSEREX06.appservices.state.sbu (10.47.98.206) by
    EEAPPSEREDG02.appservices.state.sbu (10.47.98.102) with Microsoft SMTP Server
    (TLS) id 14.3.158.1; Sun, 9 Mar 2014 11:57:13 -0400
    Received: from KIEVMB01.eur.state.sbu (10.168.34.7) by
    EEAPPSEREX06.appservices.state.sbu (10.47.98.206) with Microsoft SMTP Server
    id 14.3.158.1; Sun, 9 Mar 2014 11:57:13 -0400
    Content-Class: urn:content-classes:message
    MIME-Version: 1.0
    Content-Type: text/plain; charset=”iso-8859-1″
    Content-Transfer-Encoding: quoted-printable
    X-MimeOLE: Produced By Microsoft Exchange V6.5
    Subject: Peninsula
    Date: Sun, 9 Mar 2014 17:57:09 +0200
    Message-ID:
    X-MS-Has-Attach:
    X-MS-TNEF-Correlator:
    Thread-Topic: Peninsula
    Thread-Index: Ac87sDqNfxCUW94zShqj0tXF8YAqGQ==
    From: “Gresh, Jason P”
    To: ,
    X-FEAS-SYSTEM-WL: 10.47.98.102

    Ihor,

    Events are moving rapidly in Crimea. Our friends in Washington expect more decisive actions from your network.
    I think it’s time to implement the plan we discussed lately. Your job is to cause some problems to the transport hubs in the south-east in order to frame-up the neighbor.
    It will create favorable conditions for Pentagon and the Company to act.
    Do not waste time, my friend.

    Respectfully,

    JP

    Jason P. Gresh

  • AlcAnon/Squonk

    Or rather I should say some of the original messages seem to have been downloaded from Ukranian government servers – others could be from hacked gmail accounts.

    Other than quickly glance at the archive I haven’t dug into it much. I’d have to run it through Google translate as most of it is in Ukranian and/or Russian.

  • AlcAnon/Squonk

    By the way I can also confirm that the reason I downloaded the archive so quickly was because I happened to be reading a site where someone posted the link at the time. Minutes after I downloaded the link went dead with “Not Found”. Saw it with my own eyes. Also the message on the site where I got the link in the first place also disappeared although it was reposted shortly afterwards and stayed this time.

    I haven’t downloaded newer uploads of the archives to check if the contents are identical.

  • John Goss

    I’ve been putting a c in Gresch that should not be there, but seems to me like it ought to be there. It is Gresh. Since his family moved from Germany they must have taken the c out to make it more English and that’s what threw me. My mistake. These bloody Nazis. Just can’t trust them!

  • AlcAnon/Squonk

    Received: from haig2.state.gov (haig-ee.state.gov. [169.253.194.10])
    by mx.google.com with ESMTPS id f6si8135208qap.24.2014.03.09.08.57.14
    for
    (version=TLSv1.2 cipher=ECDHE-RSA-RC4-SHA bits=128/128);

    The line beginning for does actually say “for in the original document.

    Also the To: line reads “To: , ” in the original. Sorry I screwed up the cut and paste myself.

  • BrianFujisan

    Wow…

    Alcanon, Great Detective Work there Thanks….i’m glad you were quick to act… And John too well done guys…

    As john say’s i hope we don’t find out for the worse tomorrow…but also Anonymous could have possibly prevented attacks by the Expose.

  • AlcAnon/Squonk

    Stupid wordpress screwing up my text is the trouble.

    Rest assured correct “for” and “to” in the original document. I can’t be bothered ampersanding to get it right.

1 2 3

Comments are closed.