The two psychologists credited with creating the CIA’s torture program have reached a confidential settlement with victims of the brutal techniques.
On Thursday, a confidential agreement was reached between two psychologists tasked with designing and implementing the CIA’s torture program and the American Civil Liberties Union. The ACLU originally filed the lawsuit against James Mitchell and John Bruce Jessen in October 2015, accusing them of operating a “joint criminal enterprise” via their creation and promotion of violent torture methods. After the ACLU consistently overcame every legal barrier, the trial was schedule to begin on June 26. However, due to the Trump administration’s attempts to stop officials from testifying, U.S. District Court Judge Justin Quackenbush set a new date of September 5, 2017. The settlement allows the Mitchell, Jessen, and the CIA to avoid the release of more damaging information related to the controversial torture program.
Washington (AFP) – Two psychologists who helped design the CIA’s post-9/11 detainee interrogation program will stand trial in September for promoting the use of torture methods like water-boarding, starvation and chaining prisoners in extreme stress positions.
Federal judges in Washington state late Monday ordered a lawsuit on behalf of three former detainees — one of whom died in a CIA prison following harsh interrogation — to go to a jury trial, rejecting efforts to force a settlement and prevent a full hearing of the case.
The lawsuit, filed by the American Civil Liberties Union on behalf of the ex-detainees, will be the first involving the torture program to go to trial.
79-year-old retired CIA agent, Malcom Howard, has made a series of astonishing claims since being released from hospital in New Jersey on Friday and told he has weeks to live. Mr. Howard claims he was involved in the “controlled demolition” of World Trade Center 7, the third building that was destroyed on 9/11.
Mr. Howard, who worked for the CIA for 36 years as an operative, claims he was tapped by senior CIA agents to work on the project due to his engineering background, and early career in the demolition business.
Trained as a civil engineer, Mr. Howard became an explosives expert after being headhunted by the CIA in early 1980s. Mr. Howard says has extensive experience in planting explosives in items as small as cigarette lighters and as large as “80 floor buildings.”
The Money Laundering Act conceptually declares digital crytpo-currency mining, usage, and holding an act of money laundering and counterfeiting, particularly in regards to Federal Reserve Notes maintaining their fictitious Valueless Perception of Worth.
A copy of the 400+ pages (700+ pdf) of the CIA/NSA ‘Stellar Wind’ (aka ‘President’s Surveillance’) Program is provided below. Recent commentaries are also included. Stellar Wind was launched in 2001 and continued into the first two years of the Obama administration and in 2011 was ended. Stellar Wind was a creation of the NSA and CIA to track and store all domestic internet traffic. The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, telephone conversations, financial transactions, and Internet activity. Stellar Wind was replaced by a series of other programs, such as Boundless Informant, PRISM and XKeyscore (as exposed by Edward Snowden).
In June 2013 the Washington Post and the Guardian published an OIG draft report, dated March 2009, leaked by Edward Snowden detailing the Stellar Wind program. In June 2013 the Guardian also published the Inspector General’s report on Stellar Wind as well as correspondence involving attorney general Michael Mukasey in 2007 requesting permission for the NSA to expand its ‘contact chains’ deeper into Americans’ email records.
In 2012 the New York Times published a video interview with NSA whistleblower William Binney, who helped design Stellar Wind. NSA whistleblower Thomas Drake also commented on SW.
Here, courtesy of Cryptome, is a copy of a document that examines the legality of the program.
To see the entire ‘Stellar Wind’ (aka ‘President’s Surveillance’) Program document, click here.
Julian Assange cautioned all of us a while back, in the vein of revelations similar to those provided by Edward Snowden, that Google — the insidious search engine with a reputation for powering humanity’s research — plays the dark hand role in furthering U.S. imperialism and foreign policy agendas.
Now, as the Wikileaks founder faces days of questioning by a Swedish special prosecutor over rape allegations inside his Ecuadorian Embassy haven in London today — and particularly in wake of the presidential election — Assange’s warning Google “is not what it seems” must be revisited.
Specifically, by submitting DNA to AncestryDNA, you agree to“grant AncestryDNA and the Ancestry Group Companies a perpetual, royalty-free, world-wide, transferable license to use your DNA, and any DNA you submit for any person from whom you obtained legal authorization as described in this Agreement, and to use, host, sublicense and distribute the resulting analysis to the extent and in the form or context we deem appropriate on or through any media or medium and with any technology or devices now known or hereafter developed or discovered.”
The issue with Ancestry.com having such “royalty free perpetual licenses” to our private property DNA is that it is a SHARED CORPORATE License. The F.B.I, C.I.A. I.R.S. etc are corporations that have greater authority to operate the legal artificial person trade-name bank-account insurance franchises corporations [e.g. called “PERSONS” and “INDIVIDUALS”]- as their parent governmental corporation created these “corporate persons.” These “legal fictional authorities” share these royalty free perpetual licenses with Ancestry.com.
Do NOT give up any biometric private property! Biometric data is ineffective as security. If a corporation wants your biometric data, we need to SELL it to them and define the terms and conditions of its use.
Governmental Service Corporations -like the UNITED STATES INC, CHINA INC, and RUSSIA INC- all have developed the most advanced computer spying tools. They have spend their “artificial person CITIZEN” funds to create these spying tools.
Wikileaks exposes many of these tools. These include Vault 7: spying on chat, phones, Skype, WIFI networks, hacking PDF documents, and abusing the anti-virus software designed to stop these “infections” of corporate legalese BS. Other CIA programs are: Eternal Blue, CrunchyLimeSkies, ElderPiggy, AngerQuake and McNugget.
Governments MUST use these tools in the “wild” where other people can take them and reverse engineer them. If governments developed these tools but never used them, they can’t rationalize having built these spy softwares in the first place.
Thus, the most advance governmental service corporation Software spyware is used in the wild… where actual Blackhat hackers operate. These hackers now have access to these programs. And they have got the codes…
KD: I wrote to David because on Fox News it was said recently that Freddie Mac and Fannie Mae were used by method of THEFT to Fund Obama Care. This was 6 days ago as I wrote him immediately before I forgot.
Wikileaks is being called a NON-STATE Intelligence Service. Investigative Journalists investigating Human Right Crimes and analyzing it is called JOURNALISM.
By this new definition of “INTELLIGENCE SERVICES” as meaning “FREEDOM OF SPEECH,” all news -e.g. Huffington Post, New York Times, Washington Post, L.A. Times, FOX News, CNN, RT, BBC, Al-Jeezira, etc- are Intelligence Services.
Investigative Journalists publish news publicly and use it for exposing criminal governmental service corporations.
INTELLIGENCE SERVICES keep the news private and use it for their own advantages.