Welcome to The Truth News.Info

Hope you enjoy your visit!

Prepare For Rebellion, Obama Orders US-Canadian Troops
Dec 16, 2009

The terrorist are in the White House

Kremlin position papers presented to Prime Minister Putin today on his upcoming meeting with NATO Secretary General Anders Fogh Rasmussen state that the European-US military alliance has authorized an ‘emergency request’ from President Obama to utilize American and Canadian NATO troops to put down what is expected to be a “rebellion” after the expected January, 2010 ‘declaration of bankruptcy’ by the State of California.

According to these reports, Obama’s fears of rebellion are due to the economic health of California (the United States largest State) after the 3rd largest US State, New York, declared a ‘fiscal emergency’ and refused to release to its cities and towns over $750 Million due them this past week with the Governor of New York, David Paterson, declaring “I can’t say this enough: The state has run out of money.”

New York’s fiscal crisis, however, pales in comparison to California’s, where new economic data points to its expected 5-year budget deficit reaching the staggering amount of over $100 Billion which Russian economists warn will result in budget cuts so steep as to create ‘social chaos’ among this States 36 million citizens.

Note: These military vehicles in the video below are not camo for the desert,

Reports from the United States are, indeed, confirming the mass movement of military supplies and thousands of Canadian Special Forces Troops to California from the Canadian Forces Base of Petawawa to join their American military counterparts, with ‘secondary’ reports stating that at least 1,000 tanks are massing their too.

Russian Military Analysts are further warning in this report that Obama has decided to implement the feared RAND Corporation (one of the most powerful research arms of the US Military-Industrial-Homeland Security Complex) police state ‘blueprint’ tilted “Stability Police Force for the United States: Justification and Creating U.S. Capabilities” that has been modeled on the Nazi German secret police forces organization Geheime Staatspolizei (Gestapo) meant to ‘control and demoralize’ any opposition to the state.

Even worse for these American people is the legalization process currently embedded in their new health care legislation which will see everyone of them becoming virtual slaves of their government, and as warned about by the Fox News Service in their report titled “Be Afraid, Be Very Afraid of Obama’s Latest Big Brother Plan” and which says:

“Under the Democrats’ national health care scheme not only would OPM be charged with overseeing and administering federal employees health care but they will have the added charge of administering civilian federal health care as well. What does that mean? Basically, that Americans will be treated as “civil servants.” Are you starting to see the danger?

The more government seeks to control our lives the more Orwellian it gets. This “big brother” mentality that “government knows best” and that it is their mission to provide cradle to grave “care” of its citizens will doom America as we know it. Under such a system the individual becomes meaningless and the state becomes the entity upon which we are all forced to rely.”

Unfortunately, with or without these Americans succumbing to the loss of their Nation through the establishment of a police state, their fate appears to have already been sealed as new reports are showing that by their continued saving they are failing to provide China with the money needed through the buying of goods to purchase US bonds to keep them afloat, and which has led to the incredible circumstance of the United States, through its Federal Reserve and other financial entities, becoming the largest buyers of their own debt.

Not being seen in all of these dire events by the American people is that their present collapse as an independent Nation was engineered by their own President Obama, who working in concert with the previous President, George Bush, sold them out to Wall Street by packing his administration with banking insiders have, literally, pillaged the entire economic future of the United States for the benefit of their elite classes and, incredibly, supported these once collapsing banks with over $352 Billion in drug money.

And so grave has it become for ordinary Americans that new reports are now showing that in what was once the most powerful Nation on Earth, there now exists an ‘epidemic’ of child hunger and one their fastest growing cities is a tent-town of newly homeless named “Obamaville” in a stark reminder of the thousands of shanty towns named Hoovervilles built during the Great Depression.

For those American people believing their propaganda media reports that a recovery is underway they couldn’t be more mistaken, as newly released data shows that of the millions of jobs lost these past 2 years almost all of them are permanent. And, as always, these people are being kept from knowing the full and brutal truth of their economic collapse with reports also showing that the latest unemployment figures released by the US government were faked.

But to the greatest fears of these Americans should be the newly released information showing that US scientists have perfected, for the first time in history, a new drugless technique to wipe from these people’s minds their very own memories, and as we can read:

“In a scientific experiment that brings to mind the memory-erasing escapade in the 2004 film “Eternal Sunshine of the Spotless Mind,” scientists have blocked fearful recollections in human participants, sans drugs. The results challenge the view that our long-term memories are fixed and resistant to change.”

Russian Military Psychologists have long warned that the West’s longest term plan to control their soon to be rebellious populations lie in memory altering techniques such as are being perfected in the United States and due to be deployed through their mass media in radio programmes, television, and movie broadcasts outlets as these Nations past reliance on the drugging of their citizens through mass fluoridation is becoming more and more ineffectual.

Important to note too is that the economic collapse of the United States is just one of the catastrophic dangers they are facing, as this past week the giant plant genetics company Bayer admitted in a US Federal Court that it has been “unable to control the spread of its genetically-engineered organisms despite ‘the best practices’ to stop widespread contamination” and which may very well see the destruction of the American’s ability to feed themselves as these ‘monster plants’ reap their destruction on Nature.

To all of these events, it is not in our knowing if the American people will awaken from their self induced slumber to arise, as they have many times throughout their history, to reclaim for themselves what is now rapidly being stolen from them. But, and if their present actions are a predictor to what they may do in the future, one can only fear for them as they are marched in lockstep towards an abyss they only fail to see because they won’t open their eyes.


China's Dumping Of The Dollar Has Begun


Underming the American People's Right to Privacy: The Secret State's Surveillance Machine
Following the Money Trail: Telecoms and ISPs

By Tom Burghardt
December 11, 2009

Our every move!

"Follow the money."

And why not. As the interface between state and private criminality, following the money trail is oxygen and combustible fuel for rooting out corruption in high places: indelible signs left behind like toxic tracks by our sociopathic masters.

After all, there's nothing quite like exposing an exchange of cold, hard cash from one greedy fist to another to focus one's attention on the business at hand.

And when that dirty business is the subversion of the American people's right to privacy, there's also nothing quite like economic self-interest for ensuring that a cone of silence descends over matters best left to the experts; a veritable army of specialists squeezing singular advantage out of any circumstance, regardless of how dire the implications for our democracy.

In light of this recommendation researcher Christopher Soghoian, deploying the tools of statistical analysis and a keen sense of outrage, reaffirmed that "Internet service providers and telecommunications companies play a significant, yet little known role in law enforcement and intelligence gathering."

That the American people have been kept in the dark when it comes to this and other affairs of state, remain among the most closely-guarded open secrets of what has euphemistically been called the "NSA spying scandal."

And when the Electronic Frontier Foundation (EFF) posted thousands of pages of documents "detailing behind-the-scenes negotiations between government agencies and Congress about providing immunity for telecoms involved in illegal government surveillance" last month, they lifted the lid on what should be a major scandal, not that corporate media paid the least attention.

A lid that Obama's "change" regime hopes to slam back down as expeditiously as possible.

Hoping to forestall public suspicions of how things actually work in Washington, the administration has declared that "it will continue to block the release of additional documents, including communications within the Executive Branch and records reflecting the identities of telecoms involved in lobbying for immunity," according to EFF's Senior Staff Attorney Kurt Opsahl.

No small matter, considering that should a court ever find avaricious telecoms and ISPs liable for violating the rights of their customers, fines could mount into the billions. Even in today's climate of corporate bailouts and "too big to fail" cash gifts to executive suite fraudsters, damages, both in monetary terms and adverse publicity, would hardly be chump change.

Hence, last year's mad scramble for the retroactive immunity avidly sought by these grifters and granted by congressional con men on both sides of the aisle when they passed the despicable FISA Amendments Act, hastily signed into law by our former "war president."

Without belaboring the point that corporate media largely failed to expose the extent of the dirty deals struck amongst these scofflaws, Soghoian, a graduate student no less, stepped into the breech and filled some necessary gaps in the surveillance story.

Believing, naïvely perhaps, that numbers don't lie and that laying out the facts might just wake us from our deadly slumber, Soghoian writes: "If you were to believe the public surveillance statistics, you might come away with the idea that government surveillance is exceedingly rare in the United States."

Indeed, "the vast majority of ... [court] intercept orders are for phone wiretaps. Thus, for example, of the 1891 intercept orders granted in 2008, all but 134 of them were issued for phone taps."

Which begs the question: "How often are Internet communications being monitored, and what kind of orders are required in order to do so."

Unsurprisingly, the threshold for obtaining personal records is exceedingly low and "very few of these methods require an intercept order."

All the government need do to obtain a pen register or trap and trace order, which examine to/from/subject lines of email messages, URLs of viewed web pages, search terms, telephone numbers dialed and the like, is to unilaterally declare that information obtained via this backdoor route is "relevant" to an ongoing criminal or counterterrorist investigation.

In other words, give us everything we want and move along!

The nation's telecoms and ISPs have been very accommodating in this regard. And, as with other recent historical examples that come to mind such as the rush by U.S. firms to "rebuild" Iraq, Afghanistan and other benighted nations "liberated" by that "shining city upon a hill" that bombs, maims and generally does what it pleases because it can, servicing the secret state's limitless appetite for "actionable intelligence" has proven to be a very lucrative cash cow indeed.

Open a Can of Worms and Blood-Sucking Night Crawlers Slither Out

Deciding to "follow the money," Soghoian hoped "to determine how often Internet firms were disclosing their customers' private information to the government." As often as possible as it turns out. Describing the nexus between Sprint Nextel and the secret state, Soghoian discloses:

Sprint Nextel provided law enforcement agencies with its customers' (GPS) location information over 8 million times between September 2008 and October 2009. This massive disclosure of sensitive customer information was made possible due to the roll-out by Sprint of a new, special web portal for law enforcement officers.

The evidence documenting this surveillance program comes in the form of an audio recording of Sprint's Manager of Electronic Surveillance, who described it during a panel discussion at a wiretapping and interception industry conference, held in Washington DC in October of 2009.

It is unclear if Federal law enforcement agencies' extensive collection of geolocation data should have been disclosed to Congress pursuant to a 1999 law that requires the publication of certain surveillance statistics--since the Department of Justice simply ignores the law, and has not provided the legally mandated reports to Congress since 2004. (Christopher Soghoian, "8 Million Reasons for Real Surveillance Oversight," Slight Paranoia, December 1, 2009)

A web portal I might add, equipped with a built-in price list ready-made for charging securocrats who spy on our blog posts, emails, web searches, mobile phone pings; indeed, any data the government might deem worthy of an "investigation." Call it a PayPal for spooks; now how's that for convenience!

How did Soghoian dig up the facts on the firm's lucrative arrangement with the government? In October, he attended the ISS World 2009 conference, Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering (ISS), described by Wired as "a surveillance industry gathering for law enforcement and intelligence agencies and the companies that provide them with the technologies and capabilities to conduct surveillance."

Closed to the media and the public, the enterprising researcher obtained entry as a graduate student and recorded several sessions, since taken down at the insistence of ISS's corporate master TeleStrategies, who hosted the conference.

Describing itself as "the leading producer of telecommunications conference events in the United States," the firm claimed that Soghoian's recordings "violated copyright law." But not having deep pockets to weather a Digital Millennium Copyright Act (DMCA) takedown fight, he removed the files from his blog.

Inquiring minds can't help but wonder what was so threatening to the corporatist apple cart that they threatened to bring their thumb down, on a student no less? Let's take a look!

Among the sponsors of this year's ISS confab, one finds the usual low-key suspects manning the exhibits, hawking their wares and delivering learned presentations to their "partners" in the intelligence and security "community."

Leading the pack is ETI Group, self-described as "a leading management consulting firm specializing in Process Management and Improvement." As a "leading provider" of so-called "lawful interception solutions" for security agencies, telecoms and ISPs, ETI Group provide "future proof and scalable platforms" for the acquisition of information from "multiple sources."

NICE Systems, another "leading provider" of what it calls "Insight from Interactions solutions" derived from the "the convergence of advanced analytics of unstructured multimedia content and transactional data--from telephony, web, email, radio, video and other data sources." Partners in the "Security Sector" include, among others, Raytheon, Honeywell, Siemens, Lockheed Martin, HP, Tyco and Motorola, all of whom are heavy-hitters in the Military-Industrial-Intelligence Complex and niche players in the burgeoning electronic surveillance industry in their own right.

Next up is SAP, a firm whose Government Support & Services division provide "a comprehensive range" of "enterprise software applications" to "help the analysts of the Intelligence Community" obtain "timely, accurate, objective and relevant intelligence." One can only wonder whether Doug Feith's shop over at the Pentagon deployed SAP "solutions" to find Saddam's "weapons of mass destruction" during the run-up to the Iraq invasion!

Taking their turn on the dais is Spectronic Systems, a Danish firm that is "100% privately owned." Little however, could be gleaned from a perusal of their web site since the company kindly informs us that it "is strictly for the benefit of Government Agencies, Law Enforcement Agencies, Intelligence Agencies and Government Approved companies." However, ISS World was good enough to disclose that Spectronic activities include "the development and manufacturing of monitoring systems and monitoring centres" for telephone, internet, fax and modem traffic. Their systems are designed to "handle--i.e. retrieve, collect, decode, store and present--bulk data," that can double as "data retention systems" for "bulk monitoring of SMS, MMS, e-mails or other means of data communication." But how beneficial is it to the bottom line? Alas, a diligent search of the business press by this writer hit a veritable blank wall.

SS8 on the other hand is more forthcoming, claiming that their "products" allow intelligence agencies to "visualize and analyze a target's internet session" and to "recognize, monitor, investigate and prevent criminal activity." Proud that they have a "global reach," SS8 broadcasts that their "electronic surveillance solutions" are "deployed in over 25 countries" and that their data installations "can intercept more than 100 million subscribers." The firm's platform for internet, WiFi, broadband and satellite interception claims to be capable of ferreting out "hidden relationships" while identifying "trends" (code for data mining and social network analysis) that "meet the functional needs" of the secret state.

Telesoft Technologies, produce "monitoring probes" that "allow data extraction" from "cellular and fixed networks." This can be done for "fixed, 2/3G mobile and packet networks." According to the firm, their "universal passive probes extract call content, signalling [sic] and location information for use by monitoring applications," ensuring a seamless connection" of applications to "real world systems."

True Position; this firm's national security brief involves the identification and tracking of any mobile device in "real time" and offer "insightful intelligence" while "delivering powerful solutions" that "enable private enterprises and government agencies" the capability "to protect people, combat crime, and save lives like never before." According to the company's web site, the firm deploys data mining technologies that "monitor activity and behavior over time in order to build detailed profiles and identify others that they associate with."

Last, but certainly not least, is the ultra-spooky Israeli firm, Verint (formerly Comverse Infosys). Billing itself as the world leader in "actionable intelligence," readers are well-advised to peruse the documents on Verint products such as Reliant and Star Gate generously posted by our good friends over at the whistleblowing web site Quintessenz. And while your at it, why not check out AFC's piece, "Thick as Thieves: The Private (and very profitable) World of Corporate Spying," where information on the shady activities of the firm's founder, Kobi Alexander, can be found. Currently holed-up in Windhoek, Namibia after becoming the recipient of a 2006 thirty-two count indictment by the Justice Department that charged the ex-Israeli intelligence officer and entrepreneur with backdating millions of stock options worth $138 million, Alexander is a sterling representative of an industry dedicated to "lawful interception" of our electronic communications to "prevent criminal activity."

Amongst the exhibitors at ISS World, one finds (yet another) spooky Israeli firm Narus, whose hardware was a permanent "guest" in ATT/NSA "secret rooms" scattered around the country for surveillance of the entire Internet. First disclosed by ATT whistleblower Mark Klein in his sworn affidavit on behalf of EFF's lawsuit, Hepting v. ATT, the firm's STA 6400 traffic analyzer can monitor traffic equal to 39,000 DSL lines at 10 Gbit/s, or in practical terms, a single Narus machine can surveil several million broadband users at any given time. In 2004, the former Deputy Director of NSA, William Crowell joined the firm's board of directors. As a result of FAA's retroactive immunity provision, Hepting v. ATT was dismissed in 2009.

Which brings us full-circle to Sprint Nextel's spiffy new web portal that enables the secret state to "ping" their customers' GPS locations eight million times in the space of a year.

Tip of the Proverbial Iceberg

Hoping to learn more, Soghoian filed multiple Freedom of Information Act (FOIA) requests with the Department of Justice, seeking relevant details on just how much these corporate grifters charge our silent guardians for their electronic spying.

It was at that point that Soghoian ran into a brick wall. When he uncovered evidence that the illicit surveillance compact amongst federal security agencies, telecoms and ISPs was a limitless gold mine enriching shareholders at the expense of our constitutional rights, the firms struck back.

"Verizon and Yahoo intervened and filed an objection on grounds that, among other things, they would be ridiculed and publicly shamed were their surveillance price sheets made public," Wired reported December 1.

What do these firms have to hide? Apparently, quite a lot.

Yahoo and Verizon weren't about to release the data and filed a 12-page objection letter with the Justice Department, claiming that if their pricing information were disclosed to Soghoian he would use it for nefarious ends "to 'shame' Yahoo and other companies--and to 'shock' their customers."

Cryptome Delivers the Goods, Again

Despite their whining, the indefatigable John Young, webmaster of the intelligence and security whistleblowing web site Cryptome, has published the Yahoo! Compliance Guide for Law Enforcement.

The 17-page handy guide for spooks and cops provides information on what the firm can and will provide the secret state (everything) and what it will cost.

Cryptome, never a site to run from a fight, has also posted the compliance guides of AT&T, Verizon, Sprint, Voicestream, Cox, Cingular, SBC, and Pacific Telesis.

As Antifascist Calling has averred many times, since the business of America's security is, after all, business, let's just say the "service" Yahoo provides our nation's spooks doesn't come cheap.

For his sterling efforts to inform the public, Young has been threatened by Yahoo attorneys with the tony Washington law firm Steptoe & Johnson.

In a series of communications with Young, Yahoo's lawyers are threatening legal action in the form of a Digital Millennium Copyright Act (DMCA) takedown notice, claiming that "the unauthorized use and distribution of this document ... infringes Yahoo's intellectual property rights and constitutes a violation of U.S. copyright law."

Attorney Michael T. Gershberg's tersely worded missive, alleges that the posted spy guide "also infringes Yahoo's trade secrets and constitutes business interference."

Young fired back December 2: "The Yahoo document hosted on Cryptome was found on the Internet at a publicly accessible site.

"There is no copyright notice on the document. Would you please provide substantiation that the document is copyrighted or otherwise protected by DMCA? Your letter does not provide more than assertion without evidence."

Gershberg countered: "On behalf of our client, Yahoo! Inc., attached please find a notice of copyright infringement pursuant to Section 512 of the Digital Millennium Copyright Act. Thank you for your cooperation in this matter."

Undeterred, Young shot back: "I cannot find at the Copyright Office a grant of copyright for the Yahoo spying document hosted on Cryptome. To assure readers Yahoo's copyright claim is valid and not another hoary bluff without substantiation so common under DMCA bombast please send a copy of the copyright grant for publication on Cryptome."

Continuing, Young wrote: "Until Yahoo provides proof of copyright, the document will remain available to the public for it provides information that is in the public interest about Yahoo's contradictory privacy policy and should remain a topic of public debate on ISP unacknowledged spying complicity with officials for lucrative fees."

According to Cryptome, "The information in the document which counters Yahoo's customer privacy policy suggests a clearing of the air is in order to assure customer reliance on Yahoo's published promises of trust. A rewrite of Yahoo's spying guide to replace the villainous one would be a positive step, advice of an unpaid, non-lawyerly independent panel could be sought to avoid the stigma associated with DMCA coercion.

"Note: Yahoo's exclamation point is surely trademarked so omitted here."

Commenting on the spy guide, Wired reported,

The Compliance Guide reveals, for example, that Yahoo does not retain a copy of e-mails that an account holder sends unless that customer sets up the account to store those e-mails. Yahoo also cannot search for or produce deleted e-mails once they've been removed from a user's trash file.

The guide also reveals that the company retains the IP addresses from which a user logs in for just one year. But the company's logs of IP addresses used to register new accounts for the first time go back to 1999. The contents of accounts on Flickr, which Yahoo also owns, are purged as soon as a user deactivates the account.

Chats conducted through the company's Web Messenger service may be saved on Yahoo's server if one of the parties in the correspondence set up their account to archive chats. This pertains to the web-based version of the chat service, however. Yahoo does not have the content of chats for consumers who use the downloadable Web Messenger client on their computer.

Instant message logs are retained 45 to 60 days and includes an account holder's friends list, and the date and times the user communicated with them. (Kim Zetter, "Yahoo Issues Takedown Notice for Spying Price List," Wired, December 4, 2009)

Well, just how much does Yahoo charge for their dubious shenanigans with the secret state? Wired reports: "According to this list, Yahoo charges the government about $30 to $40 for the contents, including e-mail, of a subscriber's account. It charges $40 to $80 for the contents of a Yahoo group."

Do the math for millions of customers whose rights have been abused and violated and pretty soon we're talking serious money!

Is this what Yahoo and Verizon mean when they claim that should their surveillance price lists be publicly disclosed to they would be used "to 'shame' Yahoo! and other companies--and to 'shock' their customers."

"Therefore," the company avers, "release of Yahoo's information is reasonably likely to lead to impairment of its reputation for protection of user privacy and security, which is a competitive disadvantage for technology companies."

Well guess what, guilty as charged! Now that the information has been widely posted and mirrored by the global whistleblowers Wikileaks and countless other web sites, we should consider the alarming implications of Christopher Soghoian's essential research to our privacy and democratic rights and act accordingly.

Barring a mechanism that guarantees public accountability from the secret state and their grifting corporate partners, we are left with no alternative but to name and shame. After all, democracy is not a spectator sport


New Pledge of Allegiance (TOTALLY AWESOME!)

Written by a 15 year old School kid in Ohio with more brains than Congress and the US Supreme Court combined.

Since the Pledge of Allegiance and The Lords Prayer are not allowed in Schools anymore because the word 'God' is mentioned... a kid in Ohio wrote the new school prayer:

Now I sit me down in school Where praying is against the rule For this great nation under God Finds mention of Him very odd.

If Scripture now the class recites, It violates the Bill of Rights. And anytime my head I bow Becomes a Federal matter now.

Our hair can be purple,orange or green, That's no offense; it's a freedom scene. The law is specific, the law is precise. Prayers spoken aloud are a serious vice.

For praying in a public hall Might offend someone with no faith at all. In silence alone we must meditate, God's name is prohibited by the state.

We're allowed to cuss and dress like freaks, And pierce our noses, tongues and cheeks.. They've outlawed guns, but FIRST the Bible. To quote the Good Book makes me liable.

We can elect a pregnant Senior Queen, And the 'unwed daddy,' our Senior King. It's 'inappropriate' to teach right from wrong, We're taught that such'judgments' do not belong

We can get our condoms and birth controls, Study witchcraft, vampires and totem poles. But the Ten Commandments are not allowed, No word of God must reach this crowd.

It's scary here I must confess, When chaos reigns the school's a mess So, Lord, this silent plea I make: Should I be shot; My soul please take! Amen

If you aren't ashamed to do this, Please pass this on. Jesus said, 'If you are ashamed of me, I will be ashamed of you before my Father.'

Under God, One Nation...


Pyramid UFO / Ovni Over Moscow Dec 09 2009
Pyramid UFO / Ovni Over Moscow Dec 09 2009



September 11, 2001: America and NATO Declare War on Afghanistan
NATO's Doctrine of Collective Security

by Michel Chossudovsky
December 21, 2009

Why are American and NATO troops in Afghanistan?

What is the justification for waging war on a country of 28 million people?

What justifies Obama's military surge?

Both the media and the US government, in chorus, continue to point to the 9/11 attacks and the role of Al Qaeda led by "terrorist mastermind" Osama bin Laden.

The bombing and invasion of Afghanistan is described as a "campaign" against Islamic terrorists, rather than a war.

To this date, however, there is no proof that Al Qaeda was behind the 9/11 attacks.

Neither is there evidence that Afghanistan as a Nation State was behind or any way complicit in the 9/11 attacks.

The Afghan government in the weeks following 9/11, offered on two occasions to deliver Osama bin Laden to US justice, if there were preliminary evidence of his involvement in the attacks. These offers were refused by Washington.

Where was Osama on September 11, 2001?

To this date, Osama bin Laden, the leader of Al Qaeda, is identified in military documents and official statements of both the Bush and Obama administrations as the mastermind behind the 9/11 attacks.

The Afghan government (the "Taliban regime" in official documents) is identified as supporting Al Qaeda and providing refuge to its leader Osama bin Laden inside Afghan territory at the time of the 9/11 attacks.  

On September 10, 2001, according to a CBS news report, Osama bin Laden had been admitted to a Pakistani military hospital in Rawalpindi. (CBS Evening News with Dan Rather;  CBS, 28 January 2002,
See also Michel Chossudovsky, Where was Osama on September 11, 2001?, Global Research,11 September 2008):

"DAN RATHER, CBS ANCHOR: As the United states and its allies in the war on terrorism press the hunt for Osama bin Laden, CBS News has exclusive information tonight about where bin Laden was and what he was doing in the last hours before his followers struck the United States September 11.

This is the result of hard-nosed investigative reporting by a team of CBS news journalists, and by one of the best foreign correspondents in the business, CBS`s Barry Petersen. Here is his report.

(BEGIN VIDEOTAPE) BARRY PETERSEN, CBS CORRESPONDENT (voice-over): Everyone remembers what happened on September 11. Here`s the story of what may have happened the night before. It is a tale as twisted as the hunt for Osama bin Laden.

CBS News has been told that the night before the September 11 terrorist attack, Osama bin Laden was in Pakistan. He was getting medical treatment with the support of the very military that days later pledged its backing for the U.S. war on terror in Afghanistan (CBS, op cit, emphasis added)

Recovering from his hospital treatment in Rawalpindi on the 11th of September, how could Osama have coordinated the 9/11 attacks?

How could Afghanistan be made responsible for these attacks by Al Qaeda? Bin Laden is a national of Saudi Arabia who, according to CBS News, was not in Afghanistan, but in Pakistan at the time of the attacks.

The Invasion of Afghanistan: NATO's Doctrine of Collective Security

The legal argument used by Washington and NATO to invade Afghanistan was that the September 11 attacks constituted an undeclared "armed attack" "from abroad" by an unnamed foreign power, and that consequently "the laws of war" apply, allowing the nation under attack, to strike back in the name of "self-defense".

The "Global War on Terrorism" was officially launched by the Bush administration on September 11, 2001. On the following morning (September 12, 2001), NATO's North Atlantic Council meeting in Brussels, adopted the following resolution:

"if it is determined that the [September 11, 2001] attack against the United States was directed from abroad [Afghanistan] against "The North Atlantic area", it shall be regarded as an action covered by Article 5 of the Washington Treaty". (emphasis added)

In this regard, Article 5 of the Washington Treaty stipulates that if:

"The Parties agree that an armed attack against one or more of them in Europe or North America shall be considered an attack against them all and consequently they agree that, if such an armed attack occurs, each of them, in exercise of the right of individual or collective self-defence recognised by Article 51 of the Charter of the United Nations, will assist the Party or Parties so attacked by taking forthwith, individually and in concert with the other Parties, such action as it deems necessary, including the use of armed force, to restore and maintain the security of the North Atlantic area." (NATO, What is Article 5,  NATO Topics - NATO and the Scourge of Terrorism, accessed 24 November 2009, emphasis added)

"Use of Armed Force" only "If It is Determined..."

There was an "if" in the September 12 resolution. Article 5 would apply only if it is determined that Afghanistan as a Nation State was complicit or behind the 9/11 attacks.

In practice, the "if" had already been waved prior to 9/11. The entire NATO arsenal was already on a war footing. In military terms, NATO and the US were already in an advanced state of readiness. Known to military analysts, but never revealed in the Western media, the implementation of a large scale theater war takes at least one year of advanced operational planning, prior to launching of an invasion. Using article 5 of the Wasington Treaty had in all likelihood been contemplated by military planners, as a ptetext for wagin war, prior to 9/11. 

There was no official declaration of war on September 12th. The Alliance waited until 3 days before the invasion to declare war on Afghanistan, a impoverished country which by no stretch of the imagination could have launched an attack against a member state of "The North Atlantic area".

The September 12 resolution of the Atlantic Council required "determination" and corroborating evidence, that:

1) Al Qaeda led by Osama bin Laden had ordered the "attack from abroad" on the United States of America; 

2) The terrorist attacks of 9/11 constituted a bona fide military operation (under the provisions of Article 5) by an alleged foreign country (Afghanistan) against a NATO member state, and consequently against all NATO member states under the doctrine of collective security: 

"Article 5 and the case of the terrorist attacks against the United States: The United States has been the object of brutal terrorist attacks. It immediately consulted with the other members of the Alliance. The Alliance determined that the US had been the object of an armed attack. The Alliance therefore agreed that if it was determined that this attack was directed from abroad, it would be regarded as covered by Article 5. NATO Secretary General, Lord Robertson, subsequently informed the Secretary-General of the United Nations of the Alliance's decision.

Article 5 has thus been invoked, but no determination has yet been made whether the attack against the United States was directed from abroad. If such a determination is made, each Ally will then consider what assistance it should provide. In practice, there will be consultations among the Allies. Any collective action by NATO will be decided by the North Atlantic Council. The United States can also carry out independent actions, consistent with its rights and obligations under the UN Charter.

Allies can provide any form of assistance they deem necessary to respond to the situation. This assistance is not necessarily military and depends on the material resources of each country. Each individual member determines how it will contribute and will consult with the other members, bearing in mind that the ultimate aim is to "to restore and maintain the security of the North Atlantic area".

By invoking Article 5, NATO members have shown their solidarity toward the United States and condemned, in the strongest possible way, the terrorist attacks against the United States on 11 September.

If the conditions are met for the application of Article 5, NATO Allies will decide how to assist the United States. (Many Allies have clearly offered emergency assistance). Each Ally is obliged to assist the United States by taking forward, individually and in concert with other Allies, such action as it deems necessary. This is an individual obligation on each Ally and each Ally is responsible for determining what it deems necessary in these particular circumstances.

No collective action will be taken by NATO until further consultations are held and further decisions are made by the the North Atlantic Council. (NATO, NATO Topics - NATO and the Scourge of Terrorism, accessed 24 November 2009, emphasis added)

The Mysterious Frank Taylor Report

The final decision to invoke Article 5 in relation to the 9/11 attacks came three weeks later upon the submission to the NATO Council of a mysterious classified report by a US state Department official named Frank Taylor. The report was submitted to NATO on October 2nd, 5 days before the commencement of the bombing and invasion of Afghanistan.

Frank Taylor was working in the US State Department. He had been entrusted in writing up a brief to establish whether the US "had been attacked from abroad", pursuant to the North Atlantic Council's resolution of September 12 2001.

US Ambassador at Large and Co-ordinator for Counter-terrorism Frank Taylor briefed the North Atlantic Council barely on October 2nd, five days before the commencement of the bombings.

On October 2nd  he handed his brief to NATO "on the results of investigations into the 11 September attacks.... " NATO - Topic: Terrorism, NATO and the fight against Terrorism, accessed 24 November 2009).

The classified report was not released to the media. And to this date, to our knowledge, it has remained classified.

NATO's Secretary General Lord Robertson casually summarised the substance of the Frank Taylor report in a press release:

"This morning, the United States briefed the North Atlantic Council on the results of the investigation into who was responsible for the horrific terrorist attacks which took place on September 11.

The briefing was given by Ambassador Frank Taylor, the United States Department of State Coordinator for Counter-terrorism.

This morning's briefing follows those offered by United States Deputy Secretary of State Richard Armitage and United States Deputy Secretary of Defense Paul Wolfowitz, and illustrates the commitment of the United States to maintain close cooperation with Allies.

Today's was classified briefing and so I cannot give you all the details.

Briefings are also being given directly by the United States to the Allies in their capitals.

The briefing addressed the events of September 11 themselves, the results of the investigation so far, what is known about Osama bin Laden and the al-Qaida organisation and their involvement in the attacks and in previous terrorist activity, and the links between al-Qaida and the Taliban regime in Afghanistan.

The facts are clear and compelling. The information presented points conclusively to an al-Qaida role in the September 11 attacks.

We know that the individuals who carried out these attacks were part of the world-wide terrorist network of al-Qaida, headed by Osama bin Laden and his key lieutenants and protected by the Taliban.

On the basis of this briefing, it has now been determined that the attack against the United States on September 11 was directed from abroad and shall therefore be regarded as an action covered by Article 5 of the Washington Treaty, which states that an armed attack on one or more of the Allies in Europe or North America shall be considered an attack against them all.

I want to reiterate that the United States of America can rely on the full support of its 18 NATO Allies in the campaign against terrorism." (Lord Robertson, NATO Secretary General, statement to the NATO Council, State Department, Appendix H, Multinational Response to September 11 NATO Press http://www.state.gov/documents/organization/10313.pdf, accessed 24 November 2009, emphasis added)

In other words, 2 days before the actual commencement of the bombing campaign on October 7, the North Atlantic Council decided, based on the information provided by Frank Taylor to the Council  "that the attacks were directed from abroad" by Al Qaeda, headed by Osama bin Laden, thereby requiring an action on the part of NATO under Article 5 of the Washington Treaty ( NATO - Topic: Terrorism, NATO and the fight against Terrorism, accessed 24 November 2009):

NATO action under article 5, was outlined in an October 4 decision, 3 days before the commencement of the bombings.

Two days later, on 4 October, NATO agreed on eight measures in support the United States, which were tantamount to a declaration of war on Afghanstan:

to enhance intelligence sharing and co-operation, both bilaterally and in appropriate NATO bodies, relating to the threats posed by terrorism and the actions to be taken against it;

to provide, individually or collectively, as appropriate and according to their capabilities, [military] assistance to Allies and other states which are or may be subject to increased terrorist threats as a result of their support for the campaign against terrorism;

to take necessary measures to provide increased security for facilities of the United States and other Allies on their territory;

to backfill selected Allied assets in NATO?s area of responsibility that are required to directly support operations against terrorism;

to provide blanket overflight clearances for the United States and other Allies? aircraft, in accordance with the necessary air traffic arrangements and national procedures, for military flights related to operations against terrorism; to provide access for the United States and other Allies to ports and airfields on the territory of NATO nations for operations against terrorism, including for refuelling, in accordance with national procedures;

that the Alliance is ready to deploy elements of its Standing Naval Forces to the Eastern Mediterranean in order to provide a NATO presence and demonstrate resolve; and that the Alliance is similarly ready to deploy elements of its NATO Airborne Early Warning Force to support operations against terrorism. NATO - Topic: Terrorism, NATO and the fight against Terrorism, accessed 24 November 2009 emphasis added)

Press reports of Frank Taylor's brief to the NATO Council were scanty. The invocation of Article 5, five days before the bombings commenced, was barely mentioned. The media consensus was: "all roads lead to Bin Laden" as if bin Laden was a Nation State which had attacked America.

What stands out are outright lies and fabrications. Moreover, prior to October 2nd, NATO had no pretext under Article 5 of the Washington Treaty to intervene militarily in Afghanistan.

The pretext was provided by Frank Taylor's classified report, which was not made public.

The two UN Security Council resolutions adopted in the course of September 2001, did not, under any circumstances, provide a justification for the invasion and illegal occupation  of a UN member country of 28 million people. (see Security Council resolution 1368 (2001) Threats to international peace and security caused by terrorist acts,  Security Council resolution 1373 (2001) Threats to international peace and security caused by terrorist acts).

UNSC Resolution 1373 (2001) called for prevention and suppression of terrorist acts, as well suppression of the financing of terrorism: 

?(e) Ensure that any person who participates in the financing, planning, preparation or perpetration of terrorist acts or in supporting terrorist acts is brought to justice and ensure that, in addition to any other measures against them, such terrorist acts are established as serious criminal offences in domestic laws and regulations and that the punishment duly reflects the seriousness of such terrorist acts;


?3. Calls upon all States to:

?(a) Find ways of intensifying and accelerating the exchange of operational information, especially regarding actions or movements of terrorist persons or networks; forged or falsified travel documents; traffic in arms, explosives or sensitive materials; use of communications technologies by terrorist groups; and the threat posed by the possession of weapons of mass destruction by terrorist groups;

?(b) Exchange information in accordance with international and domestic law and cooperate on administrative and judicial matters to prevent the commission of terrorist acts;

?(c) Cooperate, particularly through bilateral and multilateral arrangements and agreements, to prevent and suppress terrorist attacks and take action against perpetrators of such acts;


?4. Notes with concern the close connection between international terrorism and transnational organized crime, illicit drugs, money-laundering, illegal arms-trafficking, and illegal movement of nuclear, chemical, biological and other potentially deadly materials, and in this regard emphasizes the need to enhance coordination of efforts on national, subregional, regional and international levels in order to strengthen a global response to this serious challenge and threat to international security;

?5. Declares that acts, methods, and practices of terrorism are contrary to the purposes and principles of the United Nations and that knowingly financing, planning and inciting terrorist acts are also contrary to the purposes and principles of the United Nations (excerpts of UNSC Resolution 1373 (2001, See also UN Press Release SC 7178 SECURITY COUNCIL UNANIMOUSLY ADOPTS WIDE-RANGING ANTI-TERRORISM RESOLUTION; CALLS FOR SUPPRESSING FINANCING, IMPROVING INTERNATIONAL COOPERATION, Security Council, 4385th Meeting, September 2001)

Nowhere in this resolution is there any mention of military action against a UN member State.

The US led war on Afghanistan, using 9/11 as a pretext and a justification is illegal and criminal.

The US and NATO heads of state and heads of government from 2001 to the present are complicit in the launching of a criminal and illegal war.


FOX News Recruiting For U.S. Military!
It looks like we have nothing to worry about folks we can all work for the DOD and support our new fascist government, what the heck we are all property of the state now anyway and with a world war in the blender.