02 May 2013
Why Drones, Foreign & Domestic, Became Necessary To Establishment Politicians & Corporations
In the autumn of 2002 America was rushing toward the War in Iraq, orchestrated by the Bush Administration, especially Karl Rove and Dick Cheney. Though most people did not yet realize this, Bill Clinton already had a very cooperative relationship with the Bush family. He and Hillary were poised to become seriously monied working for the same folks who had taken over the Republican Party in the 1960s.
You don’t need to be a Straussian to embrace the strategy.
NeoConservative is the term coined by Irving Kristol, a student of Leo Strauss. The philosophy Strauss originated justifies any act which achieves the desired goal in the pursuit of power. When you understand this is a philosophy which absolutely justifies deceit and abuse of power, and extending control, the corollary becomes clear. Those using Straussianism will, ultimately, take steps to make their control perpetual because, otherwise, they will suffer at the hands of their victims.
Those accepting Straussianism knew they needed to evade exposure.
This explains the enthusiasm of both Bush and Obama for Executive Orders. Although ordinary Americans think in terms of a divide between right and left, this is an illusion. The divide has been carefully created to stymie effective corrective action by the people.
Notice how many of the measures now being put into place were being planned years ago. Homeland Security, the NSA, the militarization of our police and introduction of drones and biometrics, and the CIA and FBI do nothing to increase the security of ordinary Americans – but they are useful for controlling us.
Controlling America, and Americans, was necessary to perpetuating their power and defending them from the consequences of their deceit, beginning before the War in Iraq.
The Highly Disordered in Power
If you watched the documentary on Dick Cheney, now playing broadly on television, titled, “The World According To Dick Cheney,” you find a chilling insight into the mind of someone who is focused on centralizing and increasing the power of the presidency using all available means. Cheney has long been a self-proclaimed adherent of Leo Strauss, along with Don Rumsfeldt and most of the cadre of individuals who came in to power with the Bush Administration.
Cheney, appointed to find a vice-presidential candidate for Bush in 2000, conducted a carefully scripted process which disqualified everyone except himself. Cheney knew he could never be elected president because he lacks the social skills necessary and, if he ran, his questionable health and DUIs, among other issues, would have been exposed to the media and the public.
Always described as a ‘take-charge’ kind of man, Cheney’s entire career is defined by treating politics as war.
Karl Rove had a different agenda. While the Bush family certainly wanted the War in Iraq and had been planning for it since W. was still governor of Texas, Rove wanted a permanent hegemony over politics in America. To accomplish this, he suborned the electoral system of the United States using several different techniques.
Beginning in the late 70′s, he displaced the growing power of women moving toward social justice within the GOP, displacing this with an artificially created presence of politicized Evangelicals, galvanized and trained for political action.
For this enterprise, he enlisted Ralph Reed and Pat Robertson, longtime associates through Young Republicans.
Rove spread out a network of political operatives, both within the GOP and elsewhere, in think tanks and the media. John Fund, formerly on the Editorial Board of the Wall Street Journal, is an example of this, as is Matt Drudge. This allowed Rove to plant disinformation at will in any part of the country. Both Rove and Cheney’s cell numbers are on Fund’s speed dial.
Rove also centralized the state Republican Parties, displacing community-based candidates in the primaries with chosen and well funded Rove functionaries. This was taking place in California in the early 90s. Many of these targeted candidates were social justice-oriented women.
To lock down his control, Rove ensured the move to electronic voting, which he could control remotely. This worked for him fairly smoothly from 2000 until last year.
The next level of strategy was the media. The media has been controlled through the CIA since the time of the Kennedy assassination, according to Peter Janney, in his book Mary’s Mosaic. In exhaustive detail, the book lays out how a free media was silenced through control of those who owned the media.
Planting operatives in the media, who supplied CIA approved spin and planted stories, became standard operating procedure. Continuing this practice, Rove assigned the job of deflecting questions on the visible problems with electoral fraud to John Fund, placed at the Wall Street Journal by Robert Novak in 1984.
John Fund was essential to deflecting attention from the issue of the ongoing electoral fraud because Fund wrote, “Stealing Elections,” which muddied the water on this issue. While he was only one of many operatives, he was not easily replaced because of his position at the Wall Street Journal. Therefore, political capital was expended on his protection in 2002.
People forget scandals and willingly accept explanations, given a modicum of manufactured proof. Victims and witnesses can be silenced so they can no longer defend themselves. Major events distract public attention, which, properly managed, may never be renewed.
In early September, 2001 John Connolly of Vanity Fair published, “Sex, Lies, and the Tape.“ Included was a taped conversation, known as the WeaselSearch Tape, between Fund and His girlfriend, Morgan Pillsbury.
As you listen to this tape, made in September, 1999, and read the accompanying article you realize both Fund and his girlfriend, my disordered daughter, Morgan, lie, and are not to be trusted.
I am the individual the two are discussing. Later, in 2001 – early 2002, Fund battered and nearly killed Morgan.
All of the individuals discussed here were involved in the evolution of events surrounding this tape.
By winter 2002 Rove and associates probably believed they had managed to defuse the problem Fund’s battery of Morgan had caused. But the situation devolved because of computer hacking, leaking Saddam’s willingness to leave later the same year.
The Oncoming War in Iraq – Autumn 2002
Cheney and Rove, both Straussians, had common ground in the drive for perpetual war in 2001 – 2002, had both adopted the ideas of Strauss. Their joint commitment to a campaign of deceit was natural to each and relatively easy to carry out through 2004 since the full array of government tools were available to them and they were united.
The rush to war started with the lies you likely remember about weapons of mass destruction. In the autumn of 2002 a juggernaut for war was launched and moving.
Then, in November, an unanticipated problem raised its head.
In November of 2002 Saddam let it be known he would gladly leave, if he was paid. An email correspondence began. Max Blumenthal, for his father, Sidney Blumenthal, and through him to the Clintons, persuaded Saddam Bush was only blustering and would not invade. They did not know, at the time, someone else was reading their emails.
For me, this part of the story started when Morgan called me from the basement where she was hiding in Georgia and asked, “Mother, is Uday something like E-Bay?” Morgan did not pay much attention to things not directly effecting her.
The John Fund Scandal, briefly, was followed by some, then dropped in the wake of 9/11. But for myself, it was a continuing problem.
Fund, an old friend of mine, had begun a sexual relationship with my daughter, lied to her, tried to dump her, and suffered the consequences anyone in the family could have told him were in the cards.
Morgan is a psychopath. So is Fund. The reason the Weaselsearch tape was made was because I had found, to my grief, her word was not to be trusted. She made it to persuade me she had told the truth and changed her ways. This last was a lie, but she hooked me into believing her for a while.
The previous spring, 2002, I was still renting an apartment for Morgan in NY, and she had not yet fled NY, which she was forced to do because of the attempt to kill her by John Fund, aided, she was told, by Rove and Cheney.
About that time, she had put a keylogger on Sidney Blumenthal’s computer. Blumenthal was, if you remember, Clinton’s assistant and senior adviser.
This, I told her, was illegal. But she said it was payback because Blumenthal had had her computer hacked and stolen information from her about John Fund and others, to be used in his book, “The Clinton Wars.”
Someone with power had gotten to the court in New York. Ignoring the evidence, and witnesses, they had sidelined the case, though we were told Morgenthau personally held the file on his desk. If Robert Morgenthau, District Attorney in Manhattan, what could we do? Thwarted, Morgan returned the favor and put a keylogger on Blumenthal’s computer.
Morgan is disordered. Ten years ago the problem of sociopathy and psychopathy were not nearly as widely understood as today by any of us. The disordered create chaos. But earlier the chaos Morgan created was at least localized to her family and friends. When she broadened her associations to the NeoCons, who are also disordered, things got worse.
In 2012 I realized psychopaths never change. I also understood much more about what had been going on with attempts to bring about the War in Iraq and why Fund, Rove, and Cheney felt endangered by Morgan’s hacking.The Bush Administration knew Morgan knew about their efforts to keep Saddam in Iraq so the war could go forward.
What Morgan Found in Sid’s Email Box
Morgan had been getting emails between Sidney and his son, Max, which were forwards from someone named Uday. She read them to me and sent one on, with the identifying origin. This email went on to a friend who could tell us where the email to Max had originated. The word came back it had originated in the Saudi Arabian Emirates, and very well could have come from Baghdad.
The emails urged Saddam to stay in Iraq, saying Bush would not invade as Saddam expressed his willingness to be paid to leave.
Morgan kept reading these messages and the husband of the couple, with whom she was staying, also saw these emails. When Morgan decided to put a keylogger on Uday’s computer this was accomplished by using the subject line, “Women without Veils,” which was the husband, Eric’s, idea. It worked. Reading the emails continued, and included emails directly from Uday. I did not ask for copies and none were sent to me.
I contacted a friend’s husband who worked at the CIA and left the matter in Morgan’s hands. She told me the FBI had gotten in touch with her and asked her to continue to monitor the correspondence, also following Uday with the new keylogger she had installed in the computer in Baghdad.
When the bunker-buster hit Saddam’s headquarters Morgan reported seeing the ‘ping’ move from Baghdad to Virginia. She was not contacted again. But they knew we knew.
There had been no release of information regarding the activities of Blumenthal and the Clintons in holding Saddam in Iraq in the media. The War in Iraq was building. I had a horrible, sinking feeling in the pit of my stomach.
Now we know Saddam had no Weapons of Mass Destruction and that Saddam had nothing to do with 9/11. If Saddam had been paid off to leave there would have been no war. But, of course, trillions of dollars would have been lost to the war contractors and bankers.
As you dig, the lies only get worse. If you read John Perkins’, “Confessions of an Economic Hitman,” it is clear you see what people will do to other human beings for money. Not a pretty picture.
Drones, militarized police, along with biometrics for tracking individuals, and control through the GPS component, now standard in our cell phones, are each essential to suppressing the ability of Americans to resist and fight back. These are paid for by Americans, but produced by private contractors. Today, contractors have become an essential part of government.
The world of government contractors is murky and hard to follow. We know little enough about politicians, nothing about contractors, who are unelected and nearly invisible. We need to know, we need transparency. Along with knowing who they are, we need to hold them accountable. Each of us is liable for doing harm to others. This is also true of contractors.
For the purpose of understanding one drone contractor we have chosen Green Hills Software, Inc., a silver member of the Association for Unmanned Aerial Vehicle Systems International.
They have been involved in this story since, at least, 2002. Read my previous article, “How a Transparent World Protects us,” for details on Green Hills and their Management Team.
The company provides encryption and guidance, without which drones would not work. Green Hills is the best possible example of an errant contractor. Their relationship with John Fund began in 1999. It is likely Green Hills knew Saddam Hussein had offered to leave Iraq.
Green Hills assisted in silencing myself and Morgan with curious haste, beginning with sending the uncertified deposition, given by Morgan in 2001, to John Fund. When this took place their profits were skyrocketed with government contracts. The War in Iraq was starting.
The world would be very different today if the FED had simply printed up a billion dollars and sent it to Saddam. He would have retired and troubled us no more. Better yet, we could have looked for the real perpetrators of 9/11 and held them accountable.
What did not happen is history. Now, we understand far more clearly what the problems are we face. Out of control contractors are only one of these, but one which must be solved.
Green Hills contact information, and evidence, has been provided to attorneys in England and Pakistan who are now filing law suits. Since Green Hills is international collecting should not be a problem.
A small step, but useful in setting a new direction for America.