When spying on the world used to be a problem: the good old days

by Jon Rappoport

June 30, 2022

(To join our email list, click here.)

At one time, circa 2013, spying on everybody was considered outrageous. Now it’s “necessary.”

I’m reprinting my article from 2013 below. But first, a quick bit of history concerning two little known Israeli companies, Narus and Verint. They have helped the NSA spy on the planet.

Narus, in 2010, was folded into Boeing, one of the largest defense contractors in the world. Then, in 2014, Boeing sold Narus to Symantec. In 2016, Symantec sold half of itself to the notorious Carlyle Group. So Narus, a little engine that could, has been keeping very high-priced company.

Verint has managed to retain its independence, after buying out the majority stake of Comverse Technology, its former owner, in 2013.

Okay, here we go—from this point on, everything was written in 2013:

2013. Boom. Explosive revelations. The NSA is using telecom giants to spy on anybody and everybody, in a program called PRISM.

But the information is not new.

Three books have been written about the super-secret NSA, and James Bamford has written them all.

In 2008, Amy Goodman of Democracy Now interviewed Bamford as his latest book, The Shadow Factory, was being released.

Bamford explained that, in the 1990s, everything changed for NSA. Previously, they’d been able to intercept electronic communications by using big dishes to capture what was coming down to Earth from telecom satellites.

But with the shift to fiber-optic cables, NSA was shut out. So they devised new methods.

For example, they set up a secret spy room at an AT&T office in San Francisco. NSA installed new equipment that enabled them to tap into the fiber-optic cables and suck up all traffic.

How Bamford describes this, in 2008, tells you exactly where the PRISM program came from:

“NSA began making these agreements with AT&T and other companies, and that in order to get access to the actual cables, they had to build these secret rooms in these buildings.

“So what would happen would be the communications on the cables would come into the building, and then the cable would go to this thing called a splitter box, which was a box that had something that was similar to a prism, a glass prism.

“And the prism was shaped like a prism, and the light signals would come in, and they’d be split by the prism. And one copy of the light signal would go off to where it was supposed to be going in the telecom system, and the other half, this new cloned copy of the cables, would actually go one floor below to NSA’s secret room.

“… And in the secret room was equipment by a private company called Narus, the very small company hardly anybody has ever heard of that created the hardware and the software to analyze these cables and then pick out the targets NSA is looking for and then forward the targeted communications onto NSA headquarters.”

In James Bamford’s 2008 interview, he mentions two Israeli companies, Narus and Verint, that almost nobody knew about. They played a key role in developing and selling the technology that allowed NSA to deploy its PRISM spying program:

Bamford: “Yeah. There’s two major — or not major, they’re small companies, but they service the two major telecom companies. This company, Narus, which was founded in Israel and has large Israel connections, does the — basically the tapping of the communications on AT&T. And Verizon chose another company, ironically also founded in Israel and largely controlled by and developed by people in Israel called Verint.

“So these two companies specialize in what’s known as mass surveillance. Their literature — I read this literature from Verint, for example — is supposed to only go to intelligence agencies and so forth, and it says, ‘We specialize in mass surveillance,’ and that’s what they do.

“They put [this] mass surveillance equipment in these facilities. So you have AT&T, for example, that, you know, considers it’s their job to get messages from one person to another, not tapping into messages, and you get the NSA that says, we want, you know, copies of all this. So that’s where these [two Israeli] companies come in. These companies act as the intermediary basically between the telecom companies and the NSA.”

AMY GOODMAN: “Now, Jim Bamford, take this a step further, because you say the founder and former CEO of one of these companies [Verint] is now a fugitive from the United States somewhere in Africa?”

JAMES BAMFORD: “…the company that Verizon uses, Verint, the founder of the company, the former head of the company, is now a fugitive in — hiding out in Africa in the country of Namibia, because he’s wanted on a number of felony warrants for fraud and other charges. And then, two other top executives of the company, the general counsel and another top official of the parent company, have also pled guilty to these charges.

“So, you know, you’ve got companies — these [two] companies have foreign connections with potential ties to foreign intelligence agencies, and you have problems of credibility, problems of honesty and all that. And these companies — through these two companies pass probably 80 percent or more of all US communications at one point or another.

“And it’s even — gets even worse in the fact that these companies also supply their equipment all around the world to other countries, to countries that don’t have a lot of respect for individual rights —- Vietnam, China, Libya, other countries like that. And so, these countries use this equipment to filter out dissident communications and people trying to protest the government. It gives them the ability to eavesdrop on communications and monitor dissident email communications. And as a result of that, people are put in jail, and so forth…”

AMY GOODMAN: “And despite all of this…these telecom companies still have access to the most private communications of people all over America and actually, it ends up, around the world. And at the beginning of the summer [2008], the Democrats and Republicans joined together in granting retroactive immunity to these companies for spying on American citizens.”

The fugitive CEO of Verint, whom Bamford mentions, is Jacob “Kobi” Alexander. In 2006, the US Dept. of Justice charged him with conspiring to commit securities and wire and mail fraud. The SEC weighed in and filed similar civil charges.

Alexander fled to Namibia, where he finally settled with the SEC for $46 million. In 2017, he returned to the US, where he was sentenced to the 30 months in prison.

He is no longer the CEO of Verint.

It’s obvious that these two Israeli companies, Narus and Verint, working for NSA, have been able to divert mega-tons of data to Israeli intelligence.

The recent media stories on this NSA PRISM spying system indicate that NSA is tapping into the servers of huge tech companies; Google, AOL, Microsoft, Skype, Apple, Yahoo. The methods of data theft may have expanded, but the result and intent remain the same.

The government-corporate juggernaut moves ahead. Their rationale—catching terrorists—is, in great part, a cover story to obscure the fact that the State wants control over the lives of all citizens, as it ratchets up the very conditions that provoke rebellion.

It’s a classic pincer movement.

As far as the current NSA PRISM spying is concerned, look for limited hangouts. These are partial admissions and excuses, offered to conceal greater crimes and stop investigations.

The giant tech companies already have their limited hangout in place: “We didn’t know it was happening, we would never have allowed it to happen, and we’ll be much more careful in the future.”

Obama is saying: Yes, let’s have dialogue on this matter…there’s a fine line between national security needs and overweening intrusion into citizens’ privacy.

The NSA is saying: We do spy, but we don’t read content of emails and phone calls. We just keep ‘records’ of the communications.

The lies lying liars tell.


(Episode 13 of Rappoport Podcasts — “The Real President” — is now posted on my substack. It’s a blockbuster. To listen, click here. To learn more about This Episode of Rappoport Podcasts, click here.)


The Matrix Revealed

(To read about Jon’s mega-collection, The Matrix Revealed, click here.)


To read Jon’s articles on Substack, click here.


Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Secret House memo released: the fallout, the lies, and the bigger picture

Secret House memo released: the fallout, the lies, and the bigger picture

by Jon Rappoport

February 5, 2018

The House Intelligence Committee’s 4-page memo has been released.

The hullabaloo about the memo unfairly “damaging the reputation” of the FBI and the Dept. of Justice is a joke.

The same types of Democrat ideologues who are spouting that line, now, were screaming at the FBI, decades ago, when COINTELPRO, the Bureau’s op to place spies inside dissident Left groups across the US, was exposed. But suddenly, now, the FBI is pure as the driven snow, and its reputation must not be besmirched; otherwise, Democracy itself could collapse.

And in more recent times, the mainstream Left press, without an ounce of regret or remorse, exposed monumental fraud and incompetence at the FBI’s vaunted forensic lab and stuck a dagger in its heart:

Washington Post, April 18, 2015: “The Justice Department and FBI have formally acknowledged that nearly every examiner in an elite FBI forensic unit gave flawed testimony in almost all trials in which they offered evidence against criminal defendants over more than a two-decade period before 2000…the cases include those of 32 defendants sentenced to death…Of those, 14 have been executed or died in prison…”

So forget the idea that the Left is valiantly trying to protect the FBI’s reputation. The Left is trying to say Trump is a crook and a traitor; and whatever works toward that end—including spreading praise on the FBI as a holy church—is in the game plan.

At the heart of the House Committee memo is the charge, boldly expressed, that FBI/DOJ spying on the Trump team was launched or expanded after obtaining a FISA court warrant.

And that warrant, opening the door to spy on Trump team member, Carter Page, was granted based on the notorious Trump dossier, compiled by ex-MI-6 agent, Christopher Steele.

But wait. The dossier was bought and paid for by the Democratic National Committee and the Hillary Clinton camp. And therefore, in effect, a political op, launched to win the election for Hillary, helped start the ball rolling against Trump and his supposed Russian connections.

That’s bad enough, but that’s not all.

The focus comes back to the Trump dossier. Was it fake or real? Was it accurate or cooked up? If it was fake, a whole pillar of the FBI/DOJ investigation of Trump—including the Mueller probe—collapses.

Many observers have thrown dirt on the dossier, but they are missing one point that stands out like a mountain on a clear day. I’ll explain.

The Trump dossier: what no one is talking about

A British spy’s fantastical story.

First, a bit of background.

The dirty Trump dossier made several claims:

One: Russia had strong blackmail material on Trump and COULD THUS CONTROL A SITTING PRESIDENT OF THE UNITED STATES;

Two: Most damning in that material, Trump used prostitutes while he was in Russia, and paid several of them to urinate on a hotel bed Obama had once slept in;

Three: Russia hacked DNC (Democratic National Committee) emails and passed them on to WikiLeaks, who published them. The emails were damaging to Hillary and helped Trump win the election;

Four: Russia obviously wanted Trump to win the election.

British ex-spy, Christopher Steele, who put together the dossier, once worked in Russia and allegedly had many connections there.

Steele assembled the Trump dossier after consulting with a number of Russians and spreading some money around.

Steele claims, in the dossier, that he was talking with well-placed Russian officials. That’s where he obtained his information.

What??

Why would these Russians speak with him? Why would these Russians expose a purported plot to hand the election to Trump?

If such a Russian plot existed, it would be a tightly held secret. VERY TIGHTLY HELD. BECAUSE IT WOULD BE THE NUMBER-ONE RUSSIAN INTELLIGENCE OP.

AN OP FOR THE AGES.

THE HOLY GRAIL.

BLACKMAIL CONTROL OVER A SITTING US PRESIDENT.

Yet, here are Russian intelligence people spilling the beans to Steele, a former British spy.

And by spilling the beans, they’re pretty much committing suicide, because their Russian colleagues and superiors will be able to track them down and identify them, since they’ve had connections to Steele in the past.

Steele goes to Russia, sits down with a number of Russian intel people, asks them questions, and they tell him all about a top-secret plot to sway a US election and CONTROL THE PRESIDENT OF THE UNITED STATES. No problem.

OR…Steele never accumulated all the information in the Trump dossier. He made unwarranted leaps of inference. He invented key facts. He wanted to satisfy his employers, Hillary Clinton, and the DNC. They wanted dirt on Trump, and he gave them dirt.

Daniel Craig could play the Steele role in a Netflix series.

I’m working on a script. Here are the first few lines:

Steele: Hi, Ivan, remember me?

Ivan: Why, it’s Chris Steele! Haven’t seen you in years. Let’s see, you were working for MI-6 in the old days here in Moscow, right? Pretending you were a diplomat. Yes, we had a few lunches back then.

Steele: Right. Look, I was wondering whether you can tell me about a super-secret file you guys are building on Donald Trump. This is the off the record, of course.

Ivan: Sure. We’re blackmailing him. If we can help him win the election, he’ll be under our thumb, completely. This is a Putin operation. It’s a little noisy here in the restaurant. Why don’t we go over to my office and I’ll show you all the data.

Steele: That’d be great.

Ivan: Putin wants Trump to win. I don’t like Trump. I prefer Hillary. I assume you do, too.

Steele: Well, sure. I’m working for her. That’s why I’m here.

Ivan: Wonderful…

It’s a sure-fire hit.

It’s so believable.

Now to the bigger picture: to what degree is the secret House memo, just released, a limited hangout?

If the FBI/DOJ offered up a fake dossier to the FISA, in order to obtain a warrant to spy on the Trump team, what else did they do?

The FBI, CIA, and NSA form a blanket of surveillance across America, collecting billions of messages. Are we supposed to believe the FISA warrant was the only effort to gain permission to spy on Trump? Or that legal permission was an issue in the first place?

Of course it wasn’t. The House memo focuses on the legal side of things as a smokescreen.

A politicized group of spying agencies would go a lot further in spying on Trump—but beyond that, we’re talking about spying on all citizens, including Congressional and other government officials, regardless of party affiliation.

There is only one barrier the NSA, CIA, FBI, and other intelligence agencies face: when they use surveillance-material in criminal ways, how can the material be released and falsely attributed to other sources?

This is analogous to “parallel construction.” If a law-enforcement agency tries to use illegally obtained evidence as a basis for prosecution, a court will disallow the evidence. Therefore, the agency must concoct a “parallel” investigation that arrives at the desired goal through another route.

In the case of spying on government officials, this “parallel” is rather easy to pull off. It’s accomplished, for example, by anonymous leaks to the press.

You could call this meta-government. Officials are threatened, blackmailed, smeared, and controlled by intelligence agencies.

It works. There is no need for a Steele dossier that blames Russia and Putin or any foreign actor. Actually, placing blame on the Russians—with enough press support—deflects attention from ongoing home-grown operations.

The Trump-FISA-dossier scandal is just the tip of an exceedingly large surveillance iceberg.

An American iceberg.

William Binney, cryptanalyst-mathematician, served 30 years at the NSA: “The FBI has access to the data collected, which is basically the emails of virtually everybody in the country. And the FBI has access to it. All the congressional members are on the surveillance too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason – they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything they’ve done for the last 10 years at least.”

That’s a lot more spying than three warrants granted by a FISA court to surveil the Trump team. But you’re supposed to look at the warrants and how they were obtained, and not look at the wall-to-wall spying on every American.

You’re supposed to get embroiled in the Republican members of the House Intelligence Committee vs. the Democrat members, as they fling accusations at each other.

You’re not supposed to realize the NSA already has thousands of Trump-related documents, illegally obtained over a long period of time, as well as Obama-related documents, and documents on anybody and everybody who communicates electronically.

The endless spying is not for the purpose of catching terrorists. Ultimately, it’s not even for blackmail. It’s for implementing a long-range plan to profile and track and control every person— the Technocrats’ wet dream—and the real-time ongoing energy consumption of each human will be radically diminished, with quotas numerically assigned From Above, and regulated, at automated choke-points, in the Brave New World of promoted and fabricated Scarcity.

“We’re saving the planet. Thank you for your (enforced) participation. Be happy. Feel inspired.”

You’re definitely not supposed to look at that and resist it.


The Matrix Revealed

(To read about Jon’s mega-collection, The Matrix Revealed, click here.)


Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

The secret House memo and “rescue from above”

The secret House memo and “rescue from above”

—truth plus psyop—

by Jon Rappoport

January 23, 2018

The theme: Something starts off as fairly reasonable, and then is blown out of all proportion.

First, a brief recap on the secret House memo—not available to the press or public—and the reaction to it.

Purportedly, the memo will reveal that Democrat operatives—some inside the FBI and the DOJ—feloniously used a fake and fabricated “Trump dossier” to obtain a warrant to spy on the Trump team during and after the 2016 presidential campaign.

The spying was then undertaken to hopefully a) gain information that would help defeat Trump in the election; and b) connect Trump to “Russian efforts” to influence the election in his favor.

Breitbart: “Members of the House on Thursday said they viewed a ‘shocking’ classified memo allegedly detailing abuse of the Foreign Intelligence Surveillance Act (FISA) by senior Justice Department and Federal Bureau of Investigations officials in relation to the investigation of the Trump campaign and called for it to be declassified and available to the public immediately.”

“’The facts contained in this memo are jaw-dropping and demand full transparency. There is no higher priority than the release of this information to preserve our democracy,’ said Rep. Matt Gaetz (R-FL), a member of the Judiciary Committee, which oversees the DOJ and the FBI.”

Another Judiciary Committee member, Rep. Steve King (R-IA), called what he saw in the memo ‘sickening’ and said it was ‘worse than Watergate’.”

From this platform, some people are expressing hope that the memo will achieve everything from jailing Hillary Clinton and James Comey to “draining the whole swamp.” They claim the memo contains the answer to who murdered Seth Rich, as well as the outline of a 16-year plan to destroy the US.

And at the extreme end of THAT scenario—there are friendly extra-terrestrials in the wings offering us help.

You can find such “analyses” sweeping around online.

It’s called Rescue From Above.

It happens every time…

In this case, what starts out as a possibly explosive secret memo, which could indict key members of the FBI and DOJ and DNC, including Hillary, and exonerate Trump from charges of Russian collusion…becomes a messianic mission from higher powers to save the country and the world.

And the key is: all people have to do is sit back and wait. Rescue will happen.

—Just as the Iraqi Dinar’s meteoric rise was coming soon, years ago; and just as UFOs, on their way here for decades, will be arriving any day, to give us free energy and benevolent reprogramming for our tattered DNA—

This pattern of Rescue From Above has been sold to populations by priest classes and divine-right monarchs for centuries. It’s called bait and switch.

The underlying principle is: the individual need not do anything except sign up for the Article of Faith. In fact, nothing he can do otherwise will help.

Socialism and Technocracy have sold the same bill of goods.

“The State will take care of you.”

“Merging your brain with a super-computer will endow you with truth and talent beyond your wildest dreams.”

Advertising follows the same model. “Merely by buying this product, you will become better.”

This perverse approach (also of course used by organized religious organizations) limits the definition of rescue to “something coming from the outside.”

Rescue certainly doesn’t come from YOU, for YOU.

No, no, no. That would be too much to ask. If true, that would be alarming.

No. Instead, sign up for a Great Marshmallow that will encase you and give you Fulfillment at some point, hopefully soon.

Righteously arresting government criminals for serious crimes is a long way off from the Marshmallow.

One of the first articles I wrote for publication (circa 1982, LA Weekly) described how certain “Tribulation and Rapture” Christian leaders in the US were urging extremist Israeli groups to raid the Dome of the Rock in Jerusalem. Destroying this holy Islamic Shrine would then trigger the ultimate war on the Plain of Armageddon.

But that was presented as a good thing. Because, in the process, God would lift true believers from Earth into Heaven, and the other billions of non-believers would perish in nuclear fire.

The Rescue From Above Marshmallow comes in different forms.


The Matrix Revealed

(To read about Jon’s mega-collection, The Matrix Revealed, click here.)


Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

COMPROMISED: Sex-abuser Congressmen are open to massive blackmail

COMPROMISED: Sex-abuser Congressmen are open to massive blackmail

by Jon Rappoport

November 23, 2017

Most people are naïve about how intelligence operations are run. Holding damaging secrets on public figures equals the opportunity for blackmail. This strategy was probably discovered by cave men.

—Sex-abuse claims filed against members of Congress—beyond Al Franken and John Conyers—

Where are all the names of these Congressmen? We’re now told that, in the past 10 years, $17 million has been paid out to accusers in small sums. An unknown part of that money was compensation for explicitly sexual offenses.

There are more cases where the accusers simply gave up and refused to pursue claims. They’re potentially waiting in the wings.

Not only are the Congressmen guilty, they’re open to blackmail. As they vote on bills; as they decide which lobbyists to favor; as they decide what advice to follow from intelligence agencies; as they decide whether to take meetings with agents from other countries; they’re always looking over their shoulders, wondering: HOW MUCH DO THESE PEOPLE KNOW ABOUT ME? WHAT SHOULD I DO TO STAY SAFE?

And in some hotel room, late at night, when a person slips them a folder with details of their sexual misdemeanors or felonies, what are they going to do? How are they going to resist whatever is being asked for?

COMPROMISED.

This is the political elephant in the room the mainstream press isn’t talking about.

What about the NSA and the CIA and other spying agencies in the US (and other countries)? How much devastating information about sexual abuse have they gathered on these Congressmen?

How much covert control have the agencies chosen to exercise?

WE OWN YOU.

The levels of complexity can be dizzying. Suppose a guilty Congressman learns actual secrets about another politician? His impulse is to blow the whistle. But can he? What will he bring down on his own head?

Suppose he knows vital secrets about Monsanto, Dow, Exxon, Eli Lilly?

I’LL KEEP YOUR SECRETS IF YOU KEEP MINE.

A BROTHERHOOD OF SECRET-KEEPERS.

An awareness, over the years, spreads through Congress: “Many of us are guilty and we need to protect each other.”

Because it isn’t just the sexual secrets anymore. It’s the subsequent immoral actions taken and not taken, based on being compromised. Based on being controlled.

“Appreciate your committee vote to kill the bill yesterday, Senator. I assure you that thing in Miami last summer…”

“When does our deal end? When are we even? This is worse than prison.”

“It’s not worse. And it never ends. But don’t worry, be happy. Keep playing the game. It’s no skin off your nose.”

“What about honor?”

“Please. You gave that away a long time ago. In Miami. But we also know about the hotel rooms in New York, Washington, Chicago, LA…”

The Congressman can’t believe the bind he’s in. He’s having the above conversation with a man from the CIA. He and the CIA are supposed to be on the same team. And they are, if he’ll understand who is higher in the pecking order, who gives the commands.

One day, he’ll wake up and realize that, among the four women he abused, three were innocent, but one was sent in by the Agency with the task of seducing him. If necessary, at a later date, she could use their night together as blackmail. (For a rough variation on this theme, see numerous accounts of NY Governor Eliot Spitzer’s 2008 hooker scandal, which caused his resignation from office. Spitzer was attacking Wall Street and Big Pharma.)

Then we come to the issue of reporters, who themselves could be compromised, because they’re secretly guilty of sexual abuse.

For example, long-time political reporter, Glenn Thrush (Politico, NY Times, MSNBC), has just been accused of kissing and groping four women. The Times has suspended him from his position covering the White House.

If Thrush, at any time, has been aware of politicians’ misdeeds, did he cover them and expose them fully—or was he “under the gun” to play ball because of his own secrets?

One could reasonably ask this question about Thrush’s relations with the 2016 Hillary Clinton campaign.

Case in point. WikiLeaks (October 2016) released an email from Thrush to John Podesta, Hillary’s campaign manager. Thrush was writing an article that referred to Podesta. He emailed Podesta part of the draft, asking him to “fact-check” it. Astonishingly, Thrush remarked in the email:

“No worries Because I have become a hack I will send u the whole section that pertains to u. Please don’t share or tell anyone I did this. Tell me if I fucked up anything.”

Podesta replied: “no problems here.”

Politico’s vice president of communications, Brad Dayspring, made an impassioned and transparently moronic defense of his reporter:

“Glenn is one of the top political reporters in the country [!], in no small part because he understands that it is his job to get inside information, not appear perfect when someone illegally hacks email [!]…I can speak with firsthand knowledge and experience that Glenn checks the validity of often complex reporting with everybody, on both sides of the aisle.”

So who is Brad Dayspring, the ardent defender of his “top political reporter?”

Years earlier, on October 25, 2011, while Dayspring was working as Communications Director for House Majority Leader, Eric Cantor, ADWEEK reported (link here):

“Turns out Dayspring’s personal Twitter feed, @BDayspring… follows 1,007 accounts, one of which is SexyTwitPics… Description: ‘We RT [retweet] only the HOTTEST Pics DIRECTLY from Sexy Ladies’ Twitter Accts! (No random girls, xxx, guys) Ladies Mention us w your pics! 18+’”

Maybe it’s a stretch, but I’d say the level of intelligence Dayspring exhibited in defending Glenn Thrush is matched by his interest in SexyTwitPics.

One of the elephants in the room is, of course, Bill Clinton. For several decades, people having been writing about his sexual predations. It’s assumed that he and his allies (including his wife) have been able to avoid final excommunication from politics because of their power—but it would be foolish to assume he has been free from blackmail.

We wouldn’t be talking about some reporter with a damning file on Bill Clinton. We would be talking about an agency like the CIA and their file. No one who is a serial abuser simply shrugs off the CIA and blithely walks away.

In other words, the Clintons may have nine lives precisely BECAUSE they made a deal with the devil…


power outside the matrix

(To read about Jon’s collection, Power Outside The Matrix, click here.)


Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Love the medical spy in your home

Love the medical spy in your own home

by Jon Rappoport

July 23, 2017

“O stubborn, self-willed exile from the loving breast! Two gin-scented tears trickled down the sides of his nose. But it was all right, everything was all right, the struggle was finished. He had won the victory over himself. He loved Big Brother.” (George Orwell, 1984)

What are Merck/Amazon up to these days?

The drug giant is sponsoring a contest, in association with Amazon, to develop voice-activated programs for patients with diabetes.

Utilizing Amazon Alexa, the voice-interactive AI box that functions as a personal assistant—a spy in your own home—Amazon will enable “help” for people managing their disease.

An article at fiercepharma.com describes one of the finalists in the Merck contest: “The intelligent personal assistant platform creator Ejenta advanced into the finals with PIA, or personal intelligent agents. Its entry aims to leverage NASA artificial intelligence technology and Internet of Things connectivity to detect risky behaviors and encourage healthy habits. The system could also notify care teams if abnormalities are detected.”

Are you getting this?

Personal intelligence agents?

Detecting risky behaviors and abnormalities?

Notifying CARE TEAMS?

“Personnel dispatched to 142 Summit Street, home of John Jones, diabetic. Alexa heard the crinkle of a package-wrap associated with sugar cookies. 92% probability Jones just opened the bag and is quietly chewing the cookies. Front-door entry advised. Do not ring bell. Move into the home quickly and disarm the subject…”

But don’t worry, it’s for people’s own good. Of course. People need protection from their bad habits.

“I had a close call today, Fred. I was aching for chocolate candy, and I guess I made some kind of lip-smacking sound. I was on the edge. But my Alexa alerted the care team and they showed up in a few minutes and their dogs found my secret stash in a trunk in the basement. The guys sprayed the trunk with high-dose fluoride and Roundup and a few other chemicals…”

“That’s nothing, Jim. I was calling my ex-wife. I wanted to get together for lunch. But my psychiatrist had told me any contact with her would be a negative. Alexa alerted the care team and they disconnected the call before it went through, showed up with a shot of Thorazine and put me under for a few hours. When I woke up, I felt better. Saved again.”

It takes a village.


power outside the matrix

(To read about Jon’s collection, Power Outside The Matrix, click here.)


Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Two Israeli companies: spying on the world

Two Israeli companies: spying on the world

by Jon Rappoport

July 12, 2017

I’m reprinting my article from 2013 below. But first, a quick bit of recent history concerning two little known Israeli companies, Narus and Verint. They have helped the NSA spy on the planet.

Narus, in 2010, was folded into Boeing, one of the largest defense contractors in the world. Then, in 2014, Boeing sold Narus to Symantec. In 2016, Symantec sold half of itself to the Carlyle Group. So Narus, a little engine that could, has been keeping very high-priced company.

Verint has managed to retain its independence, after buying out the majority stake of Comverse Technology, its former owner, in 2013.

Okay, here we go—from this point on, everything was written in 2013:

2013. Boom. Explosive revelations. The NSA is using telecom giants to spy on anybody and everybody, in a program called PRISM.

But the information is not new.

Three books have been written about the super-secret NSA, and James Bamford has written them all.

In 2008, Amy Goodman of Democracy Now interviewed Bamford as his latest book, The Shadow Factory, was being released.

Bamford explained that, in the 1990s, everything changed for NSA. Previously, they’d been able to intercept electronic communications by using big dishes to capture what was coming down to Earth from telecom satellites.

But with the shift to fiber-optic cables, NSA was shut out. So they devised new methods.

For example, they set up a secret spy room at an AT&T office in San Francisco. NSA installed new equipment that enabled them to tap into the fiber-optic cables and suck up all traffic.

How Bamford describes this, in 2008, tells you exactly where the PRISM program came from:

“NSA began making these agreements with AT&T and other companies, and that in order to get access to the actual cables, they had to build these secret rooms in these buildings.

“So what would happen would be the communications on the cables would come into the building, and then the cable would go to this thing called a splitter box, which was a box that had something that was similar to a prism, a glass prism.

“And the prism was shaped like a prism, and the light signals would come in, and they’d be split by the prism. And one copy of the light signal would go off to where it was supposed to be going in the telecom system, and the other half, this new cloned copy of the cables, would actually go one floor below to NSA’s secret room.

“… And in the secret room was equipment by a private company called Narus, the very small company hardly anybody has ever heard of that created the hardware and the software to analyze these cables and then pick out the targets NSA is looking for and then forward the targeted communications onto NSA headquarters.”

In James Bamford’s 2008 interview, he mentions two Israeli companies, Narus and Verint, that almost nobody knew about. They played a key role in developing and selling the technology that allowed NSA to deploy its PRISM spying program:

Bamford: “Yeah. There’s two major — or not major, they’re small companies, but they service the two major telecom companies. This company, Narus, which was founded in Israel and has large Israel connections, does the — basically the tapping of the communications on AT&T. And Verizon chose another company, ironically also founded in Israel and largely controlled by and developed by people in Israel called Verint.

“So these two companies specialize in what’s known as mass surveillance. Their literature — I read this literature from Verint, for example — is supposed to only go to intelligence agencies and so forth, and it says, ‘We specialize in mass surveillance,’ and that’s what they do.

“They put [this] mass surveillance equipment in these facilities. So you have AT&T, for example, that, you know, considers it’s their job to get messages from one person to another, not tapping into messages, and you get the NSA that says, we want, you know, copies of all this. So that’s where these [two Israeli] companies come in. These companies act as the intermediary basically between the telecom companies and the NSA.”

AMY GOODMAN: “Now, Jim Bamford, take this a step further, because you say the founder and former CEO of one of these companies [Verint] is now a fugitive from the United States somewhere in Africa?”

JAMES BAMFORD: “…the company that Verizon uses, Verint, the founder of the company, the former head of the company, is now a fugitive in — hiding out in Africa in the country of Namibia, because he’s wanted on a number of felony warrants for fraud and other charges. And then, two other top executives of the company, the general counsel and another top official of the parent company, have also pled guilty to these charges.

“So, you know, you’ve got companies — these [two] companies have foreign connections with potential ties to foreign intelligence agencies, and you have problems of credibility, problems of honesty and all that. And these companies — through these two companies pass probably 80 percent or more of all US communications at one point or another.

“And it’s even — gets even worse in the fact that these companies also supply their equipment all around the world to other countries, to countries that don’t have a lot of respect for individual rights —- Vietnam, China, Libya, other countries like that. And so, these countries use this equipment to filter out dissident communications and people trying to protest the government. It gives them the ability to eavesdrop on communications and monitor dissident email communications. And as a result of that, people are put in jail, and so forth…”

AMY GOODMAN: “And despite all of this…these telecom companies still have access to the most private communications of people all over America and actually, it ends up, around the world. And at the beginning of the summer [2008], the Democrats and Republicans joined together in granting retroactive immunity to these companies for spying on American citizens.”

The fugitive CEO of Verint, whom Bamford mentions, is Jacob “Kobi” Alexander. In 2006, the US Dept. of Justice charged him with conspiring to commit securities and wire and mail fraud. The SEC weighed in and filed similar civil charges.

Alexander fled to Namibia, where he finally settled with the SEC for $46 million. [Update: In 2017, he returned to the US, where he was sentenced to the 30 months in prison.]

He is no longer the CEO of Verint.

It’s obvious that these two Israeli companies, Narus and Verint, working for NSA, have been able to divert mega-tons of data to Israeli intelligence.

The recent media stories on this NSA PRISM spying system indicate that NSA is tapping into the servers of huge tech companies; Google, AOL, Microsoft, Skype, Apple, Yahoo. The methods of data theft may have expanded, but the result and intent remain the same.

The government-corporate juggernaut moves ahead. Their rationale—catching terrorists—is, in great part, a cover story to obscure the fact that the State wants control over the lives of all citizens, as it ratchets up the very conditions that provoke rebellion.

It’s a classic pincer movement.

As far as the current NSA PRISM spying is concerned, look for limited hangouts. These are partial admissions and excuses, offered to conceal greater crimes and stop investigations.

The giant tech companies already have their limited hangout in place: “We didn’t know it was happening, we would never have allowed it to happen, and we’ll be much more careful in the future.”

Obama is saying: Yes, let’s have dialogue on this matter…there’s a fine line between national security needs and overweening intrusion into citizens’ privacy.

The NSA is saying: We do spy, but we don’t read content of emails and phone calls. We just keep ‘records’ of the communications.

The lies lying liars tell. The NSA has multiple and redundant methods of spying. If they have to cut back, for a while, on directly accessing the servers of the giant tech firms, they can do it without losing a step.

After all, as James Bamford revealed five years ago [now nine years ago], NSA cuts directly into fiber-optic cables and splits the data into two copies, one of which it keeps for itself. They can access Google and Yahoo in other ways.

Most easily, they can say to these willing tech partners, “Give us all your data.” And it will be done.

Firms like Google are already spying on their customers, putting together extensive profiles to craft better targeted ads. Google knows spying. Doing it for commercial purposes, or for “national security” purposes? They don’t need to make those distinctions.


power outside the matrix

(To read about Jon’s collection, Power Outside The Matrix, click here.)


Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Buy your food from the CIA: Amazon buys Whole Foods

Buy your food from the CIA: Amazon buys Whole Foods

by Jon Rappoport

June 19, 2017

When Amazon boss and billionaire Jeff Bezos bought the Washington Post in 2013, he also had an ongoing $600 million contract to provide cloud computing services to the CIA. That meant the Washington Post, which already had a long history of cooperation with the CIA, renewed their wedding vows with the Agency and doubled down on the alliance.

By any reasonable standard of journalism, the Post should preface every article about the CIA, or article sourced from the CIA, with a conflict of interest admission: TAKE THIS PIECE WITH A FEW GIANT GRAINS OF SALT, BECAUSE OUR NEWSPAPER IS OWNED BY A MAN WHO HAS A HUGE CONTRACT TO PROVIDE SERVICES TO THE CIA.

Now Bezos and his company, Amazon, have bought Whole Foods for $13.7 billion. Whole Foods is the premier retailer of “natural” foods in America.

The degree of profiling of Whole Foods customers will increase by a major factor. Amazon/CIA will be able to deploy far more sophisticated algorithms in that regard.

It’s no secret that many Whole Foods customers show disdain for government policies on agribusiness, health, medicine, and the environment. Well, that demographic is of great interest to the Deep State, for obvious reasons. And the Deep State will now be able to analyze these customers in finer detail.

At the same time, the Amazon retail powerhouse will exercise considerable control over the food supply, since it will be selling huge numbers of food products to the public. Amazon will have new relationships with all the farmers Whole Foods has been using as suppliers.

Perhaps this disclaimer posted on every Whole Foods item is now in order: KEEP IN MIND THE FACT THAT THE OWNER OF WHOLE FOODS, AMAZON, HAS A VERY TIGHT RELATIONSHIP WITH THE CIA. USE YOUR IMAGINATION.

Then there is this. The CIA has its own private company, called In-Q-Tel, which was founded in 1999 to pour investment money into tech outfits that could develop new ways to facilitate “data collection,” and service other CIA needs. In-Q-Tel, Jeff Bezos, and Amazon are connected. For example, here is a 2012 article from technologyreview.com:

“Inside a blocky building in a Vancouver suburb, across the street from a dowdy McDonald’s, is a place chilled colder than anywhere in the known universe. Inside that is a computer processor that Amazon founder Jeff Bezos and the CIA’s investment arm, In-Q-Tel, believe can tap the quirks of quantum mechanics to unleash more computing power than any conventional computer chip. Bezos and In-Q-Tel are in a group of investors who are betting $30 million on this prospect…”

Nextgov.com described the deal this way: “Canadian company D-Wave Systems raised $30 million to develop quantum computing systems. Bezos Expeditions, the personal investment company of Amazon founder Jeff Bezos, and CIA venture capital arm In-Q-Tel participated in the latest funding round, the firm announced. The company’s quantum computing technology seeks to speed up data-crunching. If successful, the technology could aid automated intelligence gathering and analysis.”

Yes, automated intelligence gathering and analysis are exactly what outfits like Amazon and the CIA need for profiling the public. Other companies who have purchased products from D-Wave Systems? Goldman Sachs and Lockheed Martin. Let’s see: Amazon, CIA, Goldman, Lockheed—a formidable collection of Deep State players.

“Buy your food from the purest natural retailer in the world, the CIA. Oops, I mean Amazon. Oops, I mean Whole Foods.”


The Matrix Revealed

(To read about Jon’s mega-collection, The Matrix Revealed, click here.)


Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

James Comey stars in another bad movie

James Comey stars in another bad movie

by Jon Rappoport

June 9, 2017

Where was the devastating revelation about Trump’s crimes during James Comey’s Congressional testimony yesterday?

“Who produced this stinker? Find out and fire him. I thought I was the head of a movie studio. Apparently, I’m marketing sleeping pills. I conked out after watching five minutes of Comey…”

If James Comey’s testimony before Congress yesterday were a Hollywood movie, and if the press weren’t obliged to make a very big deal out of it, the studio that produced it would have shut it down and eaten the box office losses. The movie theaters would have been empty, except for a few stragglers getting out of the rain.

We did learn that Comey leaked his “memo” of a conversation with Trump (about the Michael Flynn investigation) to the press. So the FBI director is a leaker. And we only have Comey’s word that his “memo” notes were correct and accurate.

Then Comey stated that Attorney General Loretta Lynch told him to call his investigation into Hillary Clinton’s private email server a “matter,” not an investigation. So the former Attorney General was a partisan Hillary supporter.

Comey asserted that Trump “pressured” him to cease investigating Michael Flynn. Trump didn’t order Comey to stop that probe. And Trump could have, because the president, in the chain of command, is over and above the Justice Department and the FBI. Oops. That’s right.

Attorney Alan Dershowitz : “Comey confirmed that under our Constitution, the president has the authority to direct the FBI to stop investigating any individual. I paraphrase, because the transcript is not yet available: the president can, in theory, decide who to investigate, who to stop investigating, who to prosecute and who not to prosecute. The president is the head of the unified executive branch of government, and the Justice Department and the FBI work under him and he may order them to do what he wishes.”

“As a matter of law, Comey is 100 percent correct. As I have long argued, and as Comey confirmed in his written statement, our history shows that many presidents—from Adams to Jefferson, to Lincoln, to Roosevelt, to Kennedy, to Bush 1, and to Obama—have directed the Justice Department with regard to ongoing investigations. The history is clear, the precedents are clear, the constitutional structure is clear, and common sense is clear.”

Was Comey investigating Trump’s “Russia connections?” Business Insider: “President Donald Trump’s private attorney, Marc Kasowitz, on Wednesday said his client felt ‘completely and totally vindicated’ by James Comey’s prepared opening statement to the Senate Intelligence Committee.”

“Comey’s remarks, released Wednesday in advance of Thursday’s Senate hearing, confirmed previous statements by Trump that Comey had told him three times that he was not personally being investigated amid the FBI’s wide-ranging inquiry into Russian meddling in the election and the Trump campaign’s possible ties to Russia.”

So…where were Comey’s revelations yesterday? Nowhere. Where were his explosive charges about Trump’s crimes? Nowhere.

Comey should really take a long vacation. He should disappear from public life for quite some time. He’s embarrassing himself.

Recall the last bad movie Comey starred in. The Hillary email server scandal. The FBI probe was off, it was on, it was off. Early in this fiasco, Comey delivered a televised press conference. FBI directors don’t hold press conferences, but Comey did. He simultaneously played the role of FBI head, grand jury, Attorney General, and Constitutional jurist. He only held one of those jobs, but that didn’t stop him. He laid out, end to end, Hillary Clinton’s violations of federal law governing the handling of classified materials. He failed to note that “hostile intent” is no part of that law. He failed to note that negligence is the only standard for prosecution. He said that since Hillary (who was surely negligent) didn’t intend to cause harm to the nation, he wasn’t recommending prosecution. Now THAT should have been the subject of a Congressional hearing. But it wasn’t.

Before that, Comey starred in a little known movie called HSBC.

In 2013, before his appointment as FBI director, Comey was brought in by the scandal-ridden HSBC Bank, to oversee efforts to clean up its act—in particular, money laundering for drug cartels.

Comey was positioned as the face of honesty and competence for HSBC.

How well did he do, before he exited his position? How much crime and how many criminals did he leave behind?

Three years later, after Comey had departed, The NY Times wrote: “HSBC Bank Executives Face Charges in $3.5 Billion Currency [Fraud] Case … Traders Use Front-Running to Profit From Client Orders…”

I guess Comey didn’t clean up the HSBC mess. There were a few things he didn’t notice while he was there. A few thing he left behind. A few billion things.

I guess that uniquely qualified him for appointment as FBI director.

So here is my memo. It’s directed to Netflix, Amazon Prime, Hulu, and assorted Hollywood studios: “Before you sign Tom Hanks, Alec Baldwin, Stephen Colbert, Michael Moore, or Caitlyn Jenner to star as James Comey in a heroic biopic, ‘Don’t Cry for Me, America,’ check your brains. It’s a loser.


power outside the matrix

(To read about Jon’s collection, Power Outside The Matrix, click here.)


Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

US presidents can grant immunity to snooping spies

US presidents can grant immunity to snooping spies

Sharyl Attkisson reports on methods of covert surveillance

by Jon Rappoport

April 16, 2017

Government agents can’t legally spy on a US citizen? Do the spying in a ship outside the three-mile limit, in international waters.

This is just one way of skirting the law.

Sharyl Attkisson, former CBS investigative reporter, recently spoke with “a small group of reliable, formerly high-placed intelligence officials.” They tipped her to surveillance tactics in the arsenal of intel agencies.

Attkisson: “U.S. Presidents have the power to issue secret presidential directives that can authorize otherwise illegal acts (theoretically in the country’s best interests). These directives may come with pre-planned cover stories to be used in the event the operation is exposed, and they come with indemnity for those involved, giving them permission to lie about the operation or their involvement without fear of prosecution… The public will rarely know about such presidential directives since most who see them must sign agreements that promise nondisclosure and consent to polygraphs.”

That’s a blockbuster revelation.

Guaranteed immunity for those involved in the spying/surveillance operation (and other types of operations).

Plus permission for agents to lie about being involved.

All in the interest of “national security.” Unless it isn’t. Unless a president wants to enact revenge on a personal enemy, or commit a financial crime, or win an election, or protect a friend, or serve his elite bosses, or advance a corporate goal, or…pretty much anything.

He can act like a king.

One of Attkisson’s intelligence sources told her the following: “If the work of targeting an individual cannot be accomplished by government intel officers, it can be contracted out to third parties or to foreign parties who aren’t bound by U.S. law.”

Here’s a complete shady five-step method for spying. Attkisson:

“1. Locate a foreign target already under CIA surveillance.”

“2. Have a government agent use the foreign target’s phone and/or computer to make it look like the foreigner contacted the U.S. citizen whose communications are sought. The contacts can be benign, but they establish a record that falsely implies a relationship exists between the U.S. citizen and the foreign target.”

“3. The government agent can also mimic a communication back from the U.S. citizen to the foreign target, creating an appearance that the U.S. citizen initiated contacts. This could be favorable to justifying a warrant on the U.S. citizen later.”

“4. The U.S. citizen is now tied to the foreign entity and is now an ‘incidental’ collection target that can be surveilled in a ‘masked’ format. Although ‘masked,’ the surveilling agency knows the U.S. citizen’s identity.”

“5. If the U.S. citizen does anything that can be construed as illegal or suspicious, it’s possible the intel agency can then receive approval to surveil him directly rather than only ‘incidentally’.”

All these crooked methods and approaches to spying on US citizens are, of course, accompanied by other legal methods. And permission to pursue even the legal avenues can be obtained by hoax and fraud and special favor. Then there is the NSA, which spies on Americans as if it were a natural law, like the sun rising and setting.

The war on terror? That’s just a pretext to allow universal surveillance.


The Matrix Revealed

(To read about Jon’s mega-collection, The Matrix Revealed, click here.)


Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Bombshell: how far did Obama spying go?

Bombshell: How far did Obama spying go?

The Sharyl Attkisson case.

by Jon Rappoport

April 6, 2017

During the transition between election and inauguration, Trump associates have phone conversations with foreign leaders. Those conversations are recorded by US intelligence agencies and turned into secret intelligence reports…

Former Obama National Security Advisor, Susan Rice, is accused of “unmasking” the names of Trump team members contained in those US intelligence reports and illegally leaking their names to the press. Bloomberg reports: “One U.S. official familiar with the reports said they contained valuable political information on the Trump transition such as whom the Trump team was meeting, the views of Trump associates on foreign policy matters and plans for the incoming administration.”

In other words, US intelligence agencies, under Obama, were spying on Trump associates—and Rice obtained the names of those associates, which are supposed to be kept confidential.

Leaking the names to the press, in the current political atmosphere, would result in the impression that Trump associates were having improper conversations with foreign leaders, or even “colluding” with them. Lots of innuendo here.

The Susan Rice spying scandal points to what? More. Other Americans the Obama team spied on. Other Americans who were opposed to the Obama agenda. Other Americans who were critical of the Obama administration. Other Americans who were exposing the Obama administration.

For example, former CBS star investigative reporter, Sharyl Attkisson—who has sued members of the Obama team and several federal agencies. That lawsuit has just been referred to another venue by the judge in the case. He could have dismissed the suit, but he didn’t. He wants it to proceed. He wants Attkisson to have her day in court.

You might remember Attkisson was uncovering highly embarrassing details about the gun-walking operation, Fast & Furious, and the attack on the US diplomatic mission in Benghazi. She was making the Obama administration extremely uncomfortable.

But let me quote Judge Emet Sullivan’s recent order transferring Attkisson’s suit:

“In 2011——at the same time that Ms. Attkisson was conducting investigations and issuing certain of her high-profile news reports——the Attkissons ‘began to notice anomalies in numerous electronic devices at their home in Virginia.’ These anomalies included Ms. Attkisson’s work-issued laptop computer and a family desktop computer ‘turning on and off at night without input from anyone in the household,’ ‘the house alarm chirping daily at different times,’ and ‘television problems, including interference.’ All of these electronic devices used ‘the Verizon FiOS line installed in [the Attkissons’] home,’ but Verizon was unable to stanch the anomalous activity despite multiple attempts. In January 2012, the Attkissons’ residential internet service ‘began constantly dropping off’.”

“In February 2012, ‘sophisticated surveillance spyware’ was installed on Ms. Attkisson’s work-issued laptop computer. A later forensic computer analysis revealed that Ms. Attkisson’s laptop and the family’s desktop computer had been the ‘targets of unauthorized surveillance efforts.’ That same forensic analysis revealed that Ms. Attkisson’s mobile phone was also targeted for surveillance when it was connected to the family’s desktop computer. The infiltration of that computer and the extraction of information from it was ‘executed via an IP address owned, controlled, and operated by the United States Postal service.’ Additionally, based on the sophisticated nature of the software used to carry out the infiltration and software fingerprints indicating the use of the federal government’s proprietary software, the infiltration and surveillance appeared to be perpetrated by persons in the federal government.”

“An independent forensic computer analyst hired by CBS subsequently reported finding evidence on both Ms. Attkisson’s work-issued laptop computer and her family’s desktop computer of ‘a coordinated, highly-skilled series of actions and attacks directed at the operation of the computers.’ Computer forensic analysis also indicated that remote actions were taken in December 2012 to remove the evidence of the electronic infiltration and surveillance from Ms. Attkisson’s computers and other home electronic equipment.”

“As Ms. Attkisson’s investigations and reporting continued, in October 2012 the Attkissons noticed ‘an escalation of electronic problems at their personal residence, including interference in home and mobile phone lines, computer interference, and television interference.’ In November of that year, Ms. Attkisson’s mobile phones ‘experienced regular interruptions and interference, making telephone communications unreliable, and, at times, virtually impossible’.”

“Additionally, in December 2012, a person with government intelligence experience conducted an inspection of the exterior of the Attkissons’ Virginia home. That investigator discovered an extra Verizon FiOS fiber optics line. Soon thereafter, after a Verizon technician was instructed by Ms. Attkisson to leave the extra cable at the home, the cable disappeared, and the Attkissons were unable to determine what happened to it. In March 2013, the Attkissons’ desktop computer malfunctioned, and in September of that year, while Ms. Attkisson was working on a story at her home, she observed that her personal laptop computer was remotely accessed and controlled, resulting in data being deleted from it. On April 3, 2013, Ms. Attkisson filed a complaint with the Inspector General of the Department of Justice. The Inspector General’s investigation was limited to an analysis of the compromised desktop computer, and the partially-released report that emerged from that investigation reported ‘no evidence of intrusion,’ although it did note ‘a great deal of advanced mode computer activity not attributable to Ms. Attkisson or anybody in her household’.”

“The Attkissons allege that the ‘cyber-attacks’ they ‘suffered in [their] home’ were perpetrated by ‘personnel working on behalf of the United States.’ Accordingly, they have asserted various claims against the United States and against former Attorney General Eric Holder, former Postmaster General Patrick Donahoe, and unknown agents of the Department of Justice, the United States Postal Service, and the United States, all in their individual capacities. Those claims include claims against the United States under the FTCA and claims against the individual federal officers for violations of constitutional rights under Bivens v. Six Unknown Named Agents of Fed. Bureau of Narcotics, 403 U.S. 388 (1971)…”

Spying, surveillance, harassment, interference, attempts at intimidation.

Are you noticing any significant mainstream news coverage of this case? Of course not.

Ordinarily, mainstream reporters protect their own colleagues, but here there is silence.

Let’s call it what it is: PARTISAN POLITICAL SILENCE.

The silence is based on a principle they don’t teach at journalism schools:

“We omit the news that contradicts our agenda. Our agenda IS the news.”

Memo to the new Attorney General, Jeff Sessions: You could launch your own investigation into the Attkisson case. Bring it front and center. Uncover all the nasty details. Expose the perpetrators.

Now.


power outside the matrix

(To read about Jon’s collection, Power Outside The Matrix, click here.)


Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.