NSA’s longtime veteran William Binney speaks out; CFR; Yardley

AMY GOODMAN: And talk about that for a moment, Bill, the former Qwest CEO Joe Nacchio, the only head of a communications company to—the only head of a company to demand a court order or approval under FISA.

WILLIAM BINNEY: Yes, and the consequence for him was they targeted him, and now he’s in prison. So, I mean, they succeeded in prosecuting him. But what it told me was that the intent from the beginning was to do domestic spying, accumulating information and knowledge about the U.S.—the entire U.S. population. So I thought of that as a J. Edgar Hoover on super steroids, you know? It wasn’t that he had information and knowledge to leverage just the Congress. You have information and knowledge to leverage everyone, judges included, in the country. So, that’s why I got so concerned. I tried to work internally in the government to get people to do something about it, but that whole process failed. So what it did was it alerted them to what I was doing, and they targeted me with the FBI, and they attempted to falsely prosecute me. Fortunately, I was able to get evidence of malicious prosecution every time, so they finally backed off trying to prosecute me….

And they (FBI agents) said they thought I was lying. Well, at that point, “OK,” I said, “I’ll tell you about the crime I know about,” and that was that Hayden, Tenet, George Bush, Dick Cheney, they conspired to subvert the Constitution and the constitutional process of checks and balances, and here’s how they did it. And I talked about program Stellar Wind, all the data coming in, about how they managed to graph it and also how they bypassed the courts. They didn’t tell the courts about this program, and they didn’t solicit any approval from the courts. And they also only told four people initially in Congress, that were the—they were the chiefs and deputies of the Intelligence Committee….

AMY GOODMAN: Bill Binney, Bloomberg Businessweek recently disclosed how a secretive unit inside the National Security Agency called Tailored Access Operations conducts massive cyber-espionage on overseas computer networks, the Pentagon hackers harvesting nearly 2.1 million gigabytes every hour, the equivalent of, oh, like hundreds of millions of pages of text. Do you know about this?

WILLIAM BINNEY: Well, I think they would refer to that as active attack on your computer, and it’s like hackers. You know, it’s this—that’s how you can—what they’re doing is going across the network and going through your weaknesses or holes in your operating system and then getting into your computer and then looking at whatever data you have in there, selecting it out, and using your unused CPU to send it back to themselves. So, that’s—that’s pretty much what they’re doing. That’s, of course, what the Chinese are doing to us, so that’s—and I’m sure other countries are doing it—the Israelis, the Russians, all of them, you know? So that’s standard hacking into the system that we hear about

http://www.democracynow.org/blog/2013/6/10/inside_the_nsas_domestic_surveillance_apparatus_whistleblower_william_binney_speaks_out

William Binney served in the National Security Agency for almost 40 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group, a senior NSA crypto-mathematician, largely responsible for automating the agency’s worldwide eavesdropping network. He was one of the two co-founders of the agency’s Signals Intelligence Automation Research Center, resigned after the September 11th attacks, concerned about the increasing surveillance of the American people.

…………………………………………………………………………

photo

……………………………………………………………………………………………………………………..

America must know who her friends were and who were her enemies.  How except by reading the secret messages of foreign governments was she to learn the truth?   -Yardley to Major van Deman, head of US Army Intelligence, ~1916….

when I was in London studying cryptography with the British, an English Colonel told me that Captain Hitchings, their most brilliant cryptographer, was worth four divisions to the British Army.       -Yardley, pp. 35, 38 of the following book:

http://books.google.com/books?id=Y2GI32l-hXIC&printsec=frontcover&dq=black+chamber+yardley&hl=en&sa=X&ei=CNPUUf_sOOyWigL7tYHgBw&ved=0CC8Q6AEwAA#v=onepage&q=black%20chamber%20yardley&f=false

…………………………………………………………………………………

The CFR/RIIA method of operation is simple — they control public opinion. They keep the identity of their (core) group secret. They learn the likes and dislikes of influential people. They surround and manipulate them into acting in the best interest of the CFR/RIIA (Royal Institute of International Affairs at London).

The CFR has only 3000 members yet they control over three-quarters of the nation’s wealth. The CFR runs the State Department and the CIA. The CFR has placed 100 CFR members in every Presidential Administration since Woodrow Wilson. They work together to misinform and disinform the President to act in the best interest of the CFR not the best interest of the American People….

The CFR has only 3000 members yet they control over three-quarters of the nations wealth. The CFR runs the State Department and the CIA. The CFR has placed 100 CFR members in every Presidential Administration since Woodrow Wilson. They work together to misinform and disinform the President to act in the best interest of the CFR not the best interest of the American People….

The “Secret Team” help carry out psycho-political operations scripted by CFR members in the state department and the Intelligence Organizations. The psycho-political operations are coordinated by a group of Council on Foreign Relations members called the Special Group.

The Special Group evolved from the Psychological Strategy Board. 

President Truman issued an executive order establishing the Psychological Strategy Board (PSB). The Board was run by CFR members Gordon Gray and (his consultant) Henry Kissinger. The PSB has close ties to the State Department and Intelligence Organizations. The purpose of the PSB was to co-ordinate psycho-political operations. Many of those operations were focused at Americans. http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_cfr_01.htm

……………………………………………………

CFR members…continue to control the lives of the American people through well planed psycho-political operations. These psychological operations rob American citizens of the present, by creating false reality worlds. These false reality worlds are created to trick the American public into acting not in their own best interest but in the best interest of a group of subtle fascists intent on creating one world order under their control.http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_cfr_02.htm

……………………………………………………..

In 1913, CFR founding father Colonel House helped pick the charter members of the original Federal Reserve Board. Among those chosen were Paul Warburg [ House Warburg and House of Khun-Lobe & Co. ] and Benjamin Strong [ House of Morgan and House of Khun-Lobe & Co. ]. HouseWarburg, and Strong were American Round Table group members. According to Round Table Group historian, Carroll Quigley, the aim of the dynastic banking houses was,

“…nothing less than to create a world system of financial control in private hands able to dominate the political system of each country and the economy of the world as a whole. This system was to be controlled in a feudalist fashion by the central banks of the world acting in concert, by secret agreements arrived at in frequent private meetings and conferences. The apex of the system was to be the Bank for International Settlements in Basle, Switzerland, a private bank owned and controlled by the world’s central banks which were themselves private corporations. Each central bank , in the hands of men like Montague Norman of the Bank of England, Benjamin Strong of the New York Federal Reserve Bank, Charles Rist of the Bank of France, and Hjalmer Schact of the Reichs bank, sought to dominate its government by its ability to control Treasury loans, to manipulate foreign exchanges, to influence the level of economic activity in the country, and to influence cooperative politicians by subsequent economic rewards in the business world.”17     

http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_cfr_04.htm

………………………………………………………………………

Conspicuously absent from the CSIS web-site are links of CSIS members to the Council on Foreign Relations. Once the links are added it becomes clear that theCSIS is run by the Council on foreign Relations. CSIS is part of the Council on Foreign Relations propaganda machine, that focuses well planned psycho-political operations at powerful individuals and the masses.

CSIS convenes 700-800 meetings, seminars, and conference each year in Washington and throughout the world. These are strategic psycho-political operations meant to influence powerful individuals at home and abroad. CSIS generates thousands of media appearances, articles, and background contacts annually. These are tactical psycho-political operations meant to influence mass public opinion.4…

Center for Strategic and International Studies list of “Who Leads CSIS” contains 63 people, 35 are Council on Foreign Relations members . Of the Center’s staff of 80 research specialists at least 20 are Council on Foreign Relations members.

Contributions from more than 300 corporations, foundations, and individuals constitute 85% of the revenues required to meet the Center’s budget, which in 1997 was $17 million. The remaining funds come from endowment income, government contracts, and publication sales. 6

The Center for Strategic and International Studies (CSIS) is a public policy research institution dedicated to analysis and policy impact. CSIS is the only institution of its kind that maintains resident experts on all the world’s major geographical regions. It also covers key functional areas, such as international finance, U.S. domestic and economic policy, and U.S. foreign policy and national security issues. 7…

CFR members on CSIS Board of Trustees include:

Council on Foreign Relations member Anne Armstrong*, former U.S. Ambassador to Great Britain; Chairman, CSIS Board of Trustees

Council on Foreign Relations member Maurice R. Greenberg*Chairman, American International Group, Inc.; Vice Chairman CSIS Board of Trustees

Council on Foreign Relations member William A. Schreyer Chairman Emeritus, Merrill Lynch& Co., Inc.; Chairman, Executive Committee CSIS Board of Trustees

Council on Foreign Relations member David M. Abshire*, member CSIS Board of Trustees

Council on Foreign Relations member William E. Brock, member CSIS Board of Trustees

Council on Foreign Relations member Harold Brown, member CSIS Board of Trustees

Council on Foreign Relations member Zbigniew Brzezinski, member CSIS Board of Trustees

Council on Foreign Relations member Joseph T. Gorman, member CSIS Board of Trustees

Council on Foreign Relations member Henry A. Kissinger, member CSIS Board of Trustees

Council on Foreign Relations member John C. Sawhill, member CSIS Board of Trustees

Council on Foreign Relations member James R. Schlesinger, member CSIS Board of Trustees

Council on Foreign Relations member Brent Scowcroft, member CSIS Board of Trustees

Council on Foreign Relations member R. James Woolsey, member CSIS Board of Trustees

Council on Foreign Relations member Amos A. Jordan, Emeritus, member CSIS Board of Trustees

Council on Foreign Relations member Leonard H. Marks, Emeritus, member CSIS Board of Trustees

Council on Foreign Relations member Robert S. Strauss, Emeritus, member CSIS Board of Trustees

http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_cfr_05.htm

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s