Terrorists in Argelia same as the ones who opperated in Benghazi

By LUIS MIRANDA | THE REAL AGENDA | JANUARY 23, 2013

Some Egyptians who participated in the mass kidnapping of a gas plant in Algeria last week also participated in the attack on the U.S. consulate in Benghazi that killed four diplomats, as reported Tuesday by the New York Times, whose sources are allegedly Algerian officials.

Based on this information, the Egyptians who were part of the jihadist command died in the assault carried out by the Algerian army that killed 67 people after four days of siege. No clutch, three of the terrorists were captured alive and one of them was the one who provided this information, the report said.

This relationship reinforces the notion that jihadist groups that have become strong in the Sahara cooperate across borders, an issue that Western defense officials have warned about. For example, the alleged organizer of the assault on the gas plant, Mokhtar Belmojtar, is believed to be based in Mali. Belmojtar has also been identified by other sources as a CIA agent.

In the video below, Belmojtar appears taking credit for the terror attack perpetrated against the gas plant in Algeria.

 

According to Infowars.com, Belmokhtar was recruited and trained by the CIA in Afghanistan. The man was recruited from North Africa and worked for the American intelligence agency as well as the Pakistani ISI. The Mujahideen organization would later splinter into al-Qaeda and the Taliban. After the war in Afghanistan, Belmokhtar went back to Algeria in the 1990s and immediately a group known as the Salafists for Preaching and Combat (GSPC).

U.S. Secretary of State Hillary Clinton warned of these cross-border ties between terrorist groups which by all accounts occurred shortly after the assault on Benghazi, reports the New York Daily, but Clinton gave no concrete evidence of these relationships. Clinton said the Islamist uprising in northern Mali, now fighting against the French and African troops, had provided a “safe area” for terrorists to “extend its influence.” Mrs. Clinton did not denounce the allegiance concocted by the CIA with all these terrorist groups, though.

From Kurt Nimmo’s article at Inforwars.com:

“Al-Qaeda in the Islamic Maghreb from the outset in 2007 had established a close relationship to the Libyan Islamic Fighting Group, whose leaders had also been trained and recruited in Afghanistan by the CIA,” writes Michel Chossudovsky. “The LIFG is supported covertly by the CIA and Britain’s MI6.”

The GSPC was purportedly founded by Hassan Hattab, a former Groupe Islamique Armé (GIA) commander. Mohammed Samraoui, the Algerian army’s deputy chief counterintelligence specialist, claims GSPC was established by the Algerian army in an attempt to weaken and destroy the moderate Islamic Salvation Front, an Islamist political party poised to take power in Algeria’s elections. GSPC members were recruited by Algerian intelligence upon returning from the jihad in Afghanistan.

Infowars.com also cites a document from MI6, as proof that British intelligence were more than aware about plans to assassinate former Libyan leader Muammar Gaddafi, who was deposed and murdered with the help of Western forces that infiltrated Libya last year.

The official source cited in the reports did not say why they have given credibility to the statement issued by the terrorist, nor if this information was obtained under torture. The information does match the kind of relationships that the United States government maintain with terrorist groups all over the Middle East and Northern Africa, which serve as proxy trouble makers operating under Western sponsorship.

The Real Agenda encourages the sharing of its original content ONLY through the tools provided at the bottom of every article. Please DON’T copy articles from The Real Agenda and redistribute by email or post to the web.

International ‘Court of Criminals’ calls for the arrest of Qaddafi

Associated Press
June 27, 2011

The International Criminal Court has issued arrest warrants for Libyan leader Moammar Gadhafi, his son and his intelligence chief for crimes against humanity in the early days of their struggle to cling to power.

Judges announced Monday that Gadhafi is wanted for orchestrating the killing, injuring, arrest and imprisonment of hundreds of civilians during the first 12 days of an uprising to topple him from power after more than four decades, and for trying to cover up the alleged crimes.

The warrants turn Gadhafi, his son Seif al-Islam Gadhafi and intelligence chief Abdullah al-Sanoussi into internationally wanted suspects, potentially complicating any efforts to mediate an end to more than four months of intense fighting in the North African nation.

U.S. Government: Historically a Pathological Liar

Can you believe anything that comes out of any U.S. government official? Only the gullible public could.

By Luis R. Miranda
The Real Agenda
May 2, 2011

This article would be an op-ed if it wasn’t because there is so much proof that the United States government has lied its way into building the Empire that is now collapsing. I do not need to justify why there are so many people who do not trust anything the government says, because history is the most faithful witness that governments lie when they have to, use fear when their lies don’t work, and murder when fear is no longer effective.

Sunday, president Barack Obama interrupted regular television programming to announce the death of Osama Bin Laden, the ghost that had eluded intelligence and military assets for a decade. Obama didn’t only take credit for Bin Laden’s death, but he also arrogantly spoke as if we had to take his word for it. The announcement came at a suspiciously convenient time, exactly when Obama needed it the most.

So the question is, do we take the announcement at face value? Only the gullible public would and could. Only the minority that still believes government is good, honest and straightforward with the people have the guts to believe any official version of the facts. Only the men and women who are afraid of learning the facts about history and who rely on the main stream corporate media would.

The rest of us know better. The rest of us, the majority, know that when government controls the information that sees the light, there is zero chance to expect the truth. When the government is the judge, jury and executioner, as it happens often, there is no room for trust.

American government lies abound and have stained history for decades. From the Gulf of Tonkin to the Bay of Pigs. From the Weapons of Mass Destruction excuse, to Al-CIA-eda. From Bin Laden to the War on Terror.

A country and a government that allows its president to be murdered (John F. Kennedy) in plain daylight for the sake of empire building does not have credibility.

A government that false-flag attacks its own troops (Gulf de Tonkin) to take the country into war does not have credibility.

A government that creates boogie-men (Bin Laden) to terrorize its own people and the world does not have any credibility.

A government that murders a million people (Iraq 1991 y Iraq 2003) in one single country does not have credibility.

A government that experiments with foreign (Guatemala) and its own people (Tuskegee), does not have credibility.

A government that invades countries for humanitarian reasons while bombing its people with depleted uranium, does not have credibility.

A government that says it killed the supposed head of a terrorist organization that is of its creation while showing no proof of it, does not have credibility.

A government that invites terrorists to dine in the Pentagon while accuses them of being terrorists, does not have credibility.

A government that operates in secrecy while spying on everyone cannot be trusted.

Nothing short of seeing Osama Bin Laden’s body and conducting an independent forensic analysis would probe enough for anyone in their right mind to believe the United States announcement that it captured and killed Bin Laden. Unfortunately, the United States government conveniently disposed of his body so that no one can ever find out if it was him or not  -just as it did with the rubble of the World Trade Center Towers- but has only shown a doctored picture with Photoshop. A government that has lied throughout its whole history wants us to believe what it has to say regarding the capture and murder of the greatest boogie-man of the 21st century? I don’t think so!

“The very word secrecy is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. Even today, there is little value in opposing the threat of a closed society by imitating its arbitrary restrictions. Even today, there is little value in insuring the survival of our nation if our traditions do not survive with it. And there is very grave danger that an announced need for increased security will be seized upon those anxious to expand its meaning to the very limits of official censorship and concealment. That I do not intend to permit to the extent that it is in my control. And no official of my Administration, whether his rank is high or low, civilian or military, should interpret my words here tonight as an excuse to censor the news, to stifle dissent, to cover up our mistakes or to withhold from the press and the public the facts they deserve to know.”

– John F. Kennedy

Colonel Anthony Shaffer: Government Covered-up 9/11

During an interview on Freedom Watch, Shaffer said a massive cover-up at the highest levels of the U.S. government exists regarding the September 11 attacks in 2001.

U.S. Intelligence Weakening Internet for Takeover

As in other occasions, exercises are being conducted before full a takeover.  Will the next false-flag attack come to fruition on the net? The Cybersecurity Bill gives Obama the power to shut down companies and the World Wide Web as a whole.

1500 AM

In places like Arlington, Va.; Washington, D.C.; across the U.S. and around the world, a global cybersecurity exercise is underway designed to test the limits not only of the “network of networks,” but the ingenuity of the people charged with protecting it.

Welcome to Cyber Storm III.

This is the third time that the Department of Homeland Security, in conjunction with other federal agencies, is holding this global cybersecurity exercise. Previous Cyber Storm exercises were conducted in 2006, and again in 2008. For the first time, DHS will manage its response to Cyber Storm III from its new National Cybersecurity and Communications and Integration Center.

Normally, this facility, located in a nondescript office building in Arlington is classified and closed to the public. But the NCCIC recently opened its doors for an inside look to let DHS officials brief the media on Cyber Storm III, a worldwide cybersecurity response exercise that has been underway since late Monday.

Brett Lambo, the director of the Cybersecurity Exercise Program with DHS’s National Cybersecurity Division, is the architect, or game master for this global cybersecurity exercise.

“The overarching philosophy,” he told reporters in a recent briefing at the NCCIC, “is that we want to come up with something that’s a core scenario, something that’s foundational to the operation of the Internet.”

Cyber Storm III includes many players in places across the U.S. and around the world:

  • Seven federal departments: Homeland Security, Defense, Commerce, Energy, Justice, Treasury and Transportation.
  • Eleven states: California, Delaware, Illinois, Iowa, Michigan, Minnesota, North Carolina, New York, Pennsylvania, Texas, Washington, plus the Multi-State Information Sharing and Analysis Center (ISAC). This compares with nine states that participated in Cyberstorm II.
  • Twelve international partners: Australia, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden, Switzerland, and the United Kingdom (up from four countries that participated in Cyber Storm II).

DHS officials also say 60 private sector companies will participate in Cyber Storm III, up from 40 who participated in Cyber Storm II. Firms include banking and finance, chemical, communications, defense industrial, information technology, nuclear, transportation and water.

Lambo said to preserve the exercise’s value as a vigorous test of cybersecurity preparedness, exact details of the scenario which participants will deal with over the next three days are secret. However, he did share some of the broad parameters of the scenario he helped write, and which he will administer.

“In other exercises, you do have specific attack vectors; you have a denial of service attack, you have a website defacement, or you have somebody dropping a rootkit,” he said. “But we wanted to take that up a level to say, ‘All of those things can still happen, and based on what you do, if you’re concerned about the availability of infrastructure, we can look at what happens when the infrastructure is unavailable.'”

Lambo said another way to look at the scenario is that it builds upon what they learned from previous exercises.

“In Cyber Storm I, we attacked the Internet, in Cyber Storm II, we used the Internet as the weapon, in Cyber Storm III, we’re using the Internet to attack itself,” he said.

Lambo added under normal circumstances, the Internet operates based on trust that a file, or a graphic, or a computer script is what it says it is, and comes from a trusted source. But what if that source was not what it said it was, or the source has a malicious intent?

“What we’re trying to do is compromise that chain of trust,” he said, in further explaining in broad strokes of the Cyber Storm III exercise scenario.

Lambo and his colleagues at the Cyber Storm control center also will introduce new, and hopefully unexpected conditions to the scenario to further test participants.

“We have the ability to do what we call dynamic play,” he said. “If we get a player action coming back into the exercise that is either different from what we expected it to be, if it’s something we’d like to chase down further, or if it’s something we’d like to pursue, we have the ability to write injects on the fly.”

He said those injects could include new attacks.

The Cyber Storm exercise will be conducted primarily using secure messaging systems like e-mail or text messages to relay intersects to participants and that the simulated attacks are not being conducted over a live or a virtual network now in operation on the Internet, he said.

For the U.S. government, Cyber Storm III also offers the opportunity to test the DHS’ National Cyber Incident Response Plan.

“We want to focus on information sharing issues,:” he said. “We want to know how all of the different organizations are compiling, acting on, aggregating information that they’re sharing, especially when you’re thinking about classified lines coming into the unclassified domain. There’s a concept called tearlining, in which we take classified information, and get it below the tearline, so that those without security clearances and get it, and act on it.”

The Cyber Storm III exercise is expected to conclude by Oct. 1.