From: Drone Free Zone
Why
Drones, foreign and domestic, became necessary to establishment
politicians and corporations.
By Melinda
Pillsbury-Foster
In the autumn of 2002 America was rushing
toward the War in Iraq, orchestrated by the Bush Administration,
especially Karl Rove and Dick Cheney. Though most people did not yet
realize this, Bill Clinton already had a very cooperative
relationship with the Bush family. He and Hillary were poised to
become seriously monied working for the same folks who had taken over
the Republican Party in the 1960s.
You don't need to be a Straussian to
embrace the strategy.
NeoConservative
is the term coined by Irving Kristol, a student of Leo Strauss. The
philosophy Strauss originated justifies any act
which
achieves the
desired goal in the pursuit of power. When you understand this is a
philosophy which absolutely justifies deceit and abuse of power,
and
extending control, the
corollary becomes clear. Those using Straussianism will, ultimately,
take steps to make their control perpetual because, otherwise, they
will suffer at the hands of their victims.
Those accepting Straussianism knew they
needed to evade exposure.
This explains the enthusiasm of both Bush
and Obama for Executive Orders. Although ordinary Americans think in
terms of a divide between right and left, this is an illusion. The
divide has been carefully created to stymie effective corrective
action by the people.
Notice how many of the measures now being
put into place were being planned years ago. Homeland Security, the
NSA, the militarization of our police and introduction of drones and
biometrics, and the CIA and FBI do nothing to increase the security
of ordinary Americans - but they are useful for controlling us.
Controlling America, and Americans, was
necessary to perpetuating their power and defending them from the
consequences of their deceit, beginning before the War in Iraq.
The
Highly Disordered in Power
If
you watched the documentary on Dick Cheney, now playing broadly on
television, titled, “The
World According To Dick Cheney,”
you
find a chilling insight into the mind of someone
who is
focused on centralizing and increasing the power of the presidency
using all available means. Cheney has long been a self-proclaimed
adherent of Leo Strauss, along with Don Rumsfeldt and most of the
cadre of individuals who came in to power with the Bush
Administration.
Cheney,
appointed to find a vice-presidential candidate for Bush in 2000,
conducted a carefully scripted process which disqualified everyone
except himself. Cheney knew he could never be elected president
because he lacks the social skills necessary and, if he ran, his
questionable health and DUIs, among other issues, would have been
exposed to the media and the public.
Always
described as a 'take-charge' kind of man,
Cheney's
entire
career is defined by treating politics as war.
Karl
Rove had a different agenda. While the Bush family certainly wanted
the War in Iraq and had been planning for it since W. was still
governor of Texas, Rove wanted a permanent hegemony over politics in
America. To accomplish this, he suborned the electoral system of the
United States using several different techniques.
Beginning
in the late 70's, he displaced the growing power of women moving
toward social justice within the GOP, displacing this with an
artificially created presence of politicized Evangelicals, galvanized
and trained for political action.
For
this enterprise, he enlisted Ralph Reed and Pat Robertson, long time
associates through Young Republicans.
Rove
spread out a network of political operatives, both within the GOP and
elsewhere, in think tanks and the media. John Fund, formerly on the
Editorial Board of the Wall Street Journal, is an example of this, as
is Matt Drudge. This allowed
Rove
to plant
disinformation at will in any part of the country. Both Rove and
Cheney's cell numbers are on Fund's speed dial.
Rove
also centralized the state Republican Parties, displacing
community-based candidates in the primaries with chosen and well
funded Rove functionaries. This was taking place in California in the
early 90s. Many of these targeted candidates were social
justice-oriented women.
To
lock down his control, Rove ensured the move to electronic voting,
which he could control remotely. This worked for him fairly smoothly
from 2000 until last year.
The
next level of strategy was the media. The media has been controlled
through the CIA since the time of the Kennedy assassination,
according to Peter Janney, in his book Mary's
Mosaic.
In exhaustive detail, the book lays out how a free media was silenced
through control of those who owned the media.
Planting
operatives in the media, who supplied CIA approved spin and planted
stories, became standard operating procedure. Continuing this
practice, Rove assigned the job of deflecting questions on the
visible problems with electoral fraud to John Fund, placed at the
Wall Street Journal by Robert Novak in 1984.
John
Fund was essential to deflecting attention from the issue of the
ongoing electoral fraud because Fund wrote, “Stealing
Elections,” which
muddied the water on this issue. While he was only one of many
operatives, he was not easily replaced because of his position at the
Wall Street Journal. Therefore, political capital was expended on his
protection in 2002.
People
forget scandals and willingly accept explanations, given a modicum of
manufactured proof. Victims and witnesses can be silenced so they can
no longer defend themselves. Major events distract public attention,
which, properly managed, may never be renewed.
In
early September, 2001 John Connolly of Vanity Fair published, “Sex,
Lies, and the Tape.” Included
was a taped
conversation, known as the WeaselSearch Tape, between Fund and
His girl friend, Morgan Pillsbury.
As
you listen to this tape, made in September, 1999, and read the
accompanying article you realize both Fund and his girl friend, my
disordered daughter, Morgan, lie, and are not to be trusted.
I
am the individual the two are discussing. Later, in 2001 – early
2002, Fund battered and nearly killed Morgan.
All
of the individuals discussed here were involved in the evolution of
events surrounding this tape.
By
winter 2002 Rove and associates probably believed they had managed to
defuse the problem Fund's battery of Morgan had caused. But the
situation devolved because of computer hacking, leaking Saddam's
willingness to leave later the same year.
The
Oncoming War in Iraq – Autumn 2002
Cheney
and Rove, both Straussians, had common ground in the drive for
perpetual war in 2001 – 2002,
had both adopted the ideas of Strauss. Their joint commitment to a
campaign of deceit was natural to each
and relatively easy to carry out through 2004 since the full array of
government tools were available to them and they were united.
The
rush to war started with the lies you likely remember about weapons
of mass destruction. In the autumn of 2002 a juggernaut for war was
launched and moving.
Then,
in November, an unanticipated problem raised its head.
In
November of 2002 Saddam let it be known he would gladly leave, if he
was paid. An email correspondence began. Max Blumenthal, for his
father, Sidney Blumenthal, and through him to the Clintons, persuaded
Saddam Bush was only blustering and would not invade. They did not
know, at the time, someone else was reading their emails.
For
me, this part of the story started when Morgan called me from the
basement where she was hiding in Georgia and asked,
“Mother, is Uday something like
E-Bay?"
Morgan
did not pay much attention to things not directly effecting her.
The
John Fund Scandal, briefly, was followed by some, then dropped in the
wake of 9/11. But for myself, it was a continuing problem.
Fund,
an old friend of mine, had begun a sexual relationship with my
daughter, lied to her, tried to dump her, and suffered the
consequences anyone in the family could have told him were in the
cards.
Morgan
is a psychopath. So is Fund. The reason the Weaselsearch tape was
made was because I had found, to my grief, her word was not to be
trusted. She made it to persuade me she had told the truth and
changed her ways. This last was a lie, but she hooked me into
believing her for a while.
The
previous spring, 2002, I was still renting an apartment for Morgan in
NY, and she had not yet fled NY, which she was forced to do because
of the attempt to kill her by John Fund, aided, she was told, by Rove
and Cheney.
About
that time, she had put a keylogger on Sidney Blumenthal's computer.
Blumenthal was, if you remember, Clinton's assistant and senior
adviser.
This,
I told her, was illegal. But she said it was payback because
Blumenthal had had her computer hacked and stolen information from
her about John Fund and others, to be used in his book, “The
Clinton Wars.”
Someone
with power had gotten to the court in New York. Ignoring the
evidence, and witnesses, they had sidelined the case, though we were
told Morgenthau personally held the file on his desk. If Robert
Morgenthau, District Attorney in Manhattan, what could we do?
Thwarted, Morgan returned the favor and put a keylogger on
Blumenthal's computer.
Morgan
is disordered. Ten years ago the problem of sociopathy and
psychopathy were not nearly as widely understood as today by any of
us. The disordered create chaos. But earlier the chaos Morgan created
was at least localized to her family and friends. When she broadened
her associations to the NeoCons, who are also disordered,
things got worse.
In
2012 I realized psychopaths never change. I also understood much more
about what had been going on with attempts to bring about the War in
Iraq and why Fund, Rove, and Cheney felt endangered by Morgan's
hacking.The Bush Administration knew Morgan knew about their efforts
to keep Saddam in Iraq so the war could go forward.
What
Morgan Found in Sid's Email Box
Morgan
had been getting emails between Sidney and his son, Max, which were
forwards from someone named Uday. She read them to me and sent one
on, with the identifying origin. This email went on to a friend who
could tell us where the email to Max had originated. The word came
back it had originated in the Saudi Arabian Emirates, and very well
could have come from Baghdad.
The
emails urged Saddam to stay in Iraq, saying Bush would not invade as
Saddam expressed his willingness to be paid to leave.
Morgan
kept reading these messages and the husband of the couple, with whom
she was staying, also saw these emails. When Morgan decided to put a
keylogger on Uday's computer this was accomplished by using the
subject line, “Women without Veils,” which was the
husband, Eric's, idea. It worked. Reading the emails continued, and
included emails directly from Uday. I did not ask for copies and none
were sent to me.
I
contacted a friend's husband who worked at the CIA and left the
matter in Morgan's hands. She told me the FBI had gotten in touch
with her and asked her to continue to monitor the correspondence,
also following Uday with the new keylogger she had installed in the
computer in Baghdad.
When
the bunker-buster hit Saddam's headquarters Morgan reported seeing
the 'ping' move from Baghdad to Virginia. She was not contacted
again. But they knew we knew.
There
had been no release of information regarding the activities of
Blumenthal and the Clintons in holding Saddam in Iraq in the media.
The War in Iraq was building. I had a horrible, sinking feeling in
the pit of my stomach.
Now
we know Saddam had no Weapons of Mass Destruction and that Saddam had
nothing to do with 9/11. If Saddam had been paid off to leave
there
would have been no war. But, of course, trillions of dollars would
have been lost to the war contractors and bankers.
As
you dig, the lies only get worse. If you read John Perkins',
“Confessions of an
Economic Hitman,” it
is clear you see what people will do to other human beings for money.
Not a pretty picture.
Drones,
militarized police, along with biometrics for tracking individuals,
and control through the GPS component, now standard in our cell
phones, are each essential to suppressing the ability of Americans to
resist and fight back. These are paid for by Americans, but produced
by private contractors. Today, contractors have become an essential
part of government.
The
world of government contractors is murky and hard to follow. We know
little enough about politicians, nothing about contractors, who are
unelected and nearly invisible. We need to know, we need
transparency. Along with knowing who they are, we need to hold them
accountable. Each of us is liable for doing harm to others. This is
also true of contractors.
For
the purpose of understanding one drone contractor we have chosen
Green Hills Software, Inc., a silver
member
of the Association
for Unmanned Aerial Vehicle Systems International.
They have
been involved in this story since, at least, 2002. Read
my previous article, “How
a Transparent World Protects us,” for details on Green Hills
and their Management Team.
The
company provides encryption and guidance, without which drones would
not work.
Green Hills is the best possible example of an errant
contractor. Their relationship with John Fund began in 1999. It is
likely Green Hills knew Saddam Hussein had offered to leave Iraq.
Green
Hills assisted in silencing myself and Morgan with curious haste,
beginning with sending the uncertified deposition, given by Morgan in
2001, to John Fund. When this took place their profits were
skyrocketed with government contracts. The War in Iraq was starting.
The
world would be very different today if the FED had simply printed up
a billion dollars and sent it to Saddam. He would have retired and
troubled us no more. Better yet, we could have looked for the real
perpetrators of 9/11 and held them accountable.
What
did not happen is history. Now, we understand far more clearly what
the problems are we face. Out of control contractors are only one of
these, but one which must be solved.
Green
Hills contact information, and evidence, has been provided to
attorneys in England and Pakistan who are now filing law suits. Since
Green Hills is international collecting should not be a problem.
A
small step, but useful in setting a new direction for America.
""END""
No comments:
Post a Comment