Thursday, May 21, 2015

THE HIDDEN GOVERNMENT GROUP

By Peter Dale Scott


Peter Dale Scott is considered the father of  "Deep Politics"-- the study of hidden permanent institutions and interests whose influence on the political realm transcends the elected, appointed and career officials who come and go.

A former English professor at U.C. Berkeley, Peter Dale Scott has written many books including:
"Drugs, Oil and War" "The War Conspiracy"  "Deep Politics and the Death of JFK"  "The Road to 911"   "Cocaine Politics"  "Minding the Darkness" and his latest book, "The American Deep State: Wall Street, Big Oil and the Attack on Democracy."

Professor Scott writes:
"For some time now I have been analyzing American history in the light of what I have called structural deep events, like the JFK assassination, the Watergate break-in, Iran-Contra, and the 9/11 attacks, which repeatedly involve law-breaking or violence, are mysterious to begin with, are embedded in ongoing covert processes, have political consequences that enlarge covert government, and are subsequently covered up by systematic falsifications in the main stream media and internal government records.

The more I study these deep events, the more I see suggestive similarities between them, increasing the possibility that they are not unrelated external intrusions on American history, but parts of an endemic process, sharing to some degree or other a common source.

For example, one factor linking Dallas, Watergate, Iran-Contra and 9/11, has been the involvement in all four deep events of personnel involved in America's highest-level emergency planning, known since the 1950s as Continuity of Government (COG) planning, or more colloquially inside the Pentagon as 'The Doomsday Project."

A few of these actors may have been located at the top, as overseers of the secret COG system.
Others were located further down in it's secret communications network.

I see this planning group as one among many in what I have chosen to call the 'American deep state,' along with agencies like the CIA and NSA, the private groups like Booz Hamilton to which more than half of the US intelligence budget is outsourced, and finally the powerful banks and corporations whose views are well represented in the CIA and NSA.

But if only one group among many, the COG planning group is also special, because of it's controls and access to a communications channel, not under government control, that can reach deeply into the US social structure.

COG planning was originally authorized by Truman and Eisenhower as planning for a response to a crippling atomic attack that had decapitated government.

In consequence it's planning group contemplated extreme measures, including what Alsonso Chardy in 1987 called 'suspension of the Constitution'

And yet, in Iran-Contra it's asset of a secret communications network, developed for the catastrophe of decapitation, was used instead to evade an official embargo on arms sales to Iran that dated back to 1979.

My question today is whether the network could have been similarly misused in November 1963."


Read more:
http://www.voltairenet.org/article187504.html

Wednesday, May 20, 2015

THE AMERICAN DEEP STATE


Professor Peter Dale Scott's latest book is:
"THE AMERICAN DEEP STATE: Wall Street, Big Oil and the Attack on Democracy"
(Rowman & Littlefield, Publishers)

This provocative book makes a compelling case for a hidden "deep state" that influences and often opposes official U.S. policies.

Prominent political analyst Peter Dale Scott begins by tracing America's increasing militarization, restrictions on constitutional rights, and income disparity since the Vietnam War.

He argues that a significant role in this historic reversal was the intervention of a series of structural deep events, ranging from the assassination of President Kennedy to  9/11.

He does not attempt to resolve the controversies surrounding these events, but he shows their significant points in common, ranging from overlapping personnel and modes of operation to shared sources of funding.

Behind all of these commonalities is what Scott calls the deep state: a second order of government, behind the public or constitutional state, that has grown significantly stronger since World War ll.

He marshals convincing evidence that the deep state is partly institutionalized in non-accountable intelligence agencies like the CIA and NSA, but it also includes private corporations like 
Booz Allen Hamilton and SAIC, to which 70 percent of intelligence budgets are outsourced.

Behind these public and private institutions is the traditional influence of Wall Street bankers and lawyers, allied with international oil companies beyond the reach of domestic law.

With the importance of Gulf states like Saudi Arabia to oil markets, American defense companies, and Wall Street itself, this essential book shows that there is now a supranational deep state, sometimes demonstrably opposed to both White House policies and the American public interest.

Friday, May 8, 2015

WHAT IS ORGANIZED STALKING?


Organized Stalking, aka Gang Stalking or Multi-Stalking, is intense, long-term, covert surveillance and harassment of a targeted individual.

Domestic counter-surveillance operations of this type are perpetuated by federal agents and contractors, sometimes with the support of state and local law enforcement personnel.

The goal of such covert operations is to "subvert" or "neutralize" an individual deemed to be an "enemy" or "potential enemy."

Although the term "gang stalking" is misleading, it is accurate in the sense that the perpetrators ---- law enforcement and intelligence agencies, and private security thugs -- do often function in the manner of criminal gangs.

Although they sometimes conduct their operations under the color of law, many of their activities have neither constitutional or moral legitimacy.

This is true of all the likely major perpetrators of organized stalking in the USA:
the FBI, the Department of Homeland Security, U.S. military counter-intelligence agencies, state and local Law Enforcement Intelligence Units (LEIUs), and security contractors.

All of these groups -- and other federal intelligence agencies such as the CIA and NSA -- have well-documented histories of abusing their powers.

The covert tactics used by the perpetrators of organized stalking are quietly being used to suppress dissent, silence whistle-blowers, and get revenge against persons who have angered someone with connections to the public and private agencies involved.

The most well-documented example of such operations was the FBI's infamous COINTELPRO (Counter-Intelligence Programs) under the direction of J. Edgar Hoover.

These operations ran from 1956 until 1971, when they were exposed by political activists who broke into an FBI office and obtained secret documents which they handed over to the media.

COINTELPRO's official goal was to "expose, disrupt, misdirect, discredit or otherwise neutralize" individuals deemed to be subversive.

As the United States Senate (Church Committee) investigation of COINTELPRO found, tactics used by the FBI included many of the methods associated with organized stalking, such as overt surveillance (stalking for psychological operations purposes).

The FBI even perpetuated such crimes as blackmail and assassinations.

Organized Stalking methods include warrantless electronic surveillance, slander, blacklisting, and a variety of psychological operations (Psy Ops).

An organized stalking victim is systematically isolated and harassed in a manner intended to cause sustained emotional torment while creating the least-possible evidence of stalking that would be visible to others.

This process is often referred to as "no-touch torture."

Methods are specifically chosen for their lack of easily-captured objective evidence.

Perpetrators use common annoyances such as honking horns, constant noise by neighbors, or rude comments and abusive behavior by strangers, but on a frequent, long-term basis.

The cumulative effects of relentless exposure to such tactics can amount to psychological torture for the victim.

A whole set of psychological operations are perpetuated against targeted individuals.

These methods include such things as threats, slander, vandalism, abusive phone calls, computer hacking, tormenting the victim with noise, and "mobbing" (orchestrated harassment by strangers, neighbors or co-workers).

Accounts by numerous victims of organized stalking share common specific details -- suggesting that the perpetrators are following a well-tested and standardized playbook of methods that have proven to be easily kept off the radar of potential witnesses and the mainstream news media.


For more information, go to:
http://www.fightgangstalking.com/what-is-gang-stalking/