Skip to main content

Posts

Showing posts from February 8, 2014

Washington Destabilizes Ukraine

By Paul Craig Roberts - The control freaks in Washington think that only the decisions that Washington makes and imposes on other sovereign countries are democratic. No other country on earth is capable of making a democratic decision. The world has witnessed this American self- righteousness for eons as Washington overthrows one democratic government after the other and imposes its puppet, as Washington did in Iran in 1953 when the CIA, as it now admits, and as Ervand Abrahamian proves in his book The Coup (The New Press, 2013), overthrew the elected government of Mossadeq, and more recently the elected government of Honduras and many governments in between. Currently Washington is working overtime to overthrow the governments of Syria, Iran again, and Ukraine. Washington has also targeted Venezuela, Bolivia, Ecuador, and Brazil, and in its wildest dreams the governments of Russia and China. On January 26 Syrian government advisor Bouthaina Shaaban asked Wolf Blitzer, a pro

‘Dirty Tricks’: UK Spies Use Sex, Cyber Attacks to Discredit Targets – Snowden Leaks

By RT  " RT " - Intelligence agents working for the United Kingdom have employed “dirty tricks” including sexual “honey traps” to ensnare rival agents, hackers, suspected terrorists, arms dealers, and other criminals, according to documents leaked by Edward Snowden. Documents leaked by the US National Security Agency whistleblower and published by NBC news Friday detail strategies used by the Joint Threat Research and Intelligence Group (JTRIG), a spy unit whose existence has been classified, to “destroy, deny, degrade [and] disrupt” adversaries. The slides, which were used in 2010 and 2012, showed that the JTRIG completed their mission by “discrediting” them via misinformation and hacking their communications. The leak details two primary methods of attack, cyber operations and propaganda efforts. The propaganda missions include mass messaging and the manipulation of stories on social media platforms like Twitter, Flickr, Facebook, YouTube. The cyber-attacks primarily inclu