David Martin lists 17 techniques used by governments and their willing executioners to suppress facts and cover-up official crime. Knowing these techniques helps to resist these psychological attacks and expose the deceivers.Read more . . .
The author’s main “evidence” for his assessment of Al Qaeda are alleged pronouncements by so-called Al Qaeda leaders. The author doesn’t bother to examine the authenticity, the credibility and the good faith of these pronouncements. He simply accepts them and US government allegations about Al Qaeda at face value.Read more . . .
Where does ISIS get its technical equipment and the know-how to produce videos and run Internet sites? These are not qualities commonly found among fanatical fundamentalists anywhere; indeed most true radical fundamentalists tend to eschew technology. A supply of advice, technical assistance, and equipment comes from somewhere. Where does ISIS get the money for food, gasoline, clothes, ammunition, and Japanese pick-up trucks? And I wonder, did one of those wild-looking jihadi types just show up one day at an Iraqi car dealership and order a fleet of Japanese pick-ups? Were they delivered out on the desert or did a gang of jihadists march in, waving their Kalashnikovs, to drive them away?Read more . . .
Agent provocateurs in Iraq? UPI, June 3, 2005 U.S. intelligence officers are reporting that some of the insurgents in Iraq are using recent-model Beretta 92 pistols, but the pistols seem to have had their serial numbers erased. The numbers do … Read more . . .
And yes, I am Charlie. Not only because they made us laugh; but because they were sacrificial lambs in a much nastier, gruesome, never-ending shadowplay.Read more . . .
While hailed by the New York Times as the “finest historical narrative so far on the origins of al-Qaeda” and by Washington Post as “authoritative”, the author offers unsubstantiated legends and acts as a purveyor of disinformation. As a Pulizer-prize winner, the author can hardly be regarded as incompetent. What is the alternative?Read more . . .
Michael Scheuer, a former CIA intelligence officer, author, historian and foreign policy critic was once the Chief of Bin Laden Station, tasked with tracking Bin Laden. His book is replete with significant omissions that raise questions about his scientific standards. Some of the omissions are listed in the Book review.Read more . . .
The author is Director of the Center of Security Studies and of the Security Studies Program at Georgetown University. He worked for many years at RAND Corporation. His books on terrorism have been translated into several languages. He is often invited by mainstream media to comment on terrorism issues. While utterly useless as a textbook on terrorism, Bruce Hoffman’s book can be profitably used by aspiring academic prostitutes.Read more . . .
The author, a former CIA official, purports to write scholarly books. I have analysed a paper by the author, Bruce Riedel, published on November 30, 2008 by the Brookings Institution entitled “Terrorism in India and the Global Jihad.” The paper was written in the wake of the Mumbai attacks. Approximately half of all factual statements made in this short essay are either baseless, wrong or unsubstantiated.Read more . . .
Burke’s book appears at first sight as a serious, scholarly, contribution to the study of Al Qaeda. It is heavily annotated, contains a glossary and a useful index, a map of Afghanistan and is well structured. Yet, as I will attempt to show, the book is essentially a slick fraud.Read more . . .
An alleged spectacular Iranian bomb plot uncovered in Kenya in 2012 has all the hallmarks of a Western intelligence “false flag” operation – with the aim of tightening international oil sanctions even further on Iran.Read more . . .
Cyber-Herding: Exploiting Islamic Extremists Use of the Internet by David B. Moon, Capt, USAF Joint Information Operations Student Department of Defense Analysis http://www.dtic.mil/ndia/2007solic/moon_paper.pdf Defining Cyber-herding Cyber-herding is the action by which an individual, group, or organization drives individuals, groups, or organizations to a desired … Read more . . .
J7 London Bombings Dossier Index 28 & 29 Media Restrictions Official version of events The Government, unsurprisingly, has never openly admitted to censoring the reporting of the events of 7th July. It has, however, conceded that some information … Read more . . .
Terror and Homeland Defense: Bringing the Stories Home On December 6, 2001 the National Academy of Engineering and the Foundation for American Communications (FACS) held a conference for news executives at the Reserve Officers Association in Washington, D.C. The … Read more . . .
Mexico admits hostage rescue was staged for TV … Read more . . .
#New Realities in the Media Age: A Conversation with Donald Rumsfeld [Prepared Remarks as Delivered] Speaker: Donald H. RumsfeldSecretary, U.S. Department of DefensePresider: Kenneth I. ChenaultChairman, American Express Company General Meeting: New Realities in the Media Age February … Read more . . .
Rumsfeld Urges Using Media to Fight Terror By Ann Scott TysonWashington Post Staff WriterSaturday, February 18, 2006; Page A07 Defense Secretary Donald H. Rumsfeld yesterday called for the military and other government agencies to mount a far more aggressive, swift … Read more . . .
Phony Terrorism Stats from Dept of Injustice U.S. overstates arrests in terrorismBy Mark Fazlollah and Peter Nicholas, Philadelphia Enquirer – December 16, 2001http://www.phillynews.comWASHINGTON – The Department of Justice has overstated its record ofarresting and convicting terrorists for years, inflating the … Read more . . .
http://www.fair.org/extra/0305/war-on-terror.htmlMay/June 2003 The Victories That Weren’t In the "war on terror," media slight facts for spin By Corey Pein It shouldn’t surprise anyone that bureaucrats and politicians exaggerate their accomplishments; news media exist, in part, to check government claims against … Read more . . .