First for something cool The Brilliant Cube. Location South Korea. Brilliant Cube on Vimeo : http://vimeo.com/m/77023605 Brilliant Cube GCHQ and NSA with the other five eyes partners will stop at nothing to ruin your reputation Besides from the NSA and GCHQ and five eyes other … Continue reading How badly are we being manipulated. The 4 d ‘s Deny , Disrupt, Degrade, Deceive
I wrote a paper in college about Chernoybl long before anyone really considered the consequences. There is a 50 kilometer exclusion zone around the plant now no one is allowed in except with permission from the Govt.
The Chernobyl disaster (Ukrainian: Чорнобильська катастрофа, Chornobylska Katastrofa – Chornobyl Catastrophe) was a catastrophic nuclear accident that occurred on 26 April 1986 at the Chernobyl Nuclear Power Plant in Ukraine (then officially the Ukrainian SSR), which was under the direct jurisdiction of the central authorities of the Soviet Union. An explosion and fire released large quantities of radioactive particles into the atmosphere, which spread over much of the western USSR and Europe.
The Chernobyl disaster is widely considered to have been the worst nuclear power plant accident in history, and is one of only two classified as a level 7 event (the maximum classification) on the International Nuclear Event Scale (the other being the Fukushima Daiichi nuclear disaster in 2011). The battle to contain the contamination and avert a greater catastrophe ultimately involved over 500,000 workers and cost an estimated 18 billion rubles. The official Soviet casualty count of 31 deaths has been disputed, and long-term effects such as cancers and deformities are still being accounted for.
The number of potential deaths arising from the Chernobyl disaster is heavily debated. The WHO’s prediction of 4,000 future cancer deaths in surrounding countries is based on the Linear no-threshold model (LNT), which assumes that the damage inflicted by radiation at low doses is directly proportional to the dose. Radiation epidemiologist Roy Shore contends that estimating health effects in a population from the LNT model “is not wise because of the uncertainties”.
Radiation warning sign in Pripyat
According to the Union of Concerned Scientists the number of excess cancer deaths worldwide (including all contaminated areas) is approximately 27,000 based on the same LNT.
Another study critical of the Chernobyl Forum report was commissioned by Greenpeace, which asserted that the most recently published figures indicate that in Belarus, Russia and Ukraine the accident could have resulted in 10,000-200,000 additional deaths in the period between 1990 and 2004. The Scientific Secretary of the Chernobyl Forum criticized the report’s reliance on non-peer reviewed locally produced studies. Although most of the study’s sources were from peer-reviewed journals, including many Western medical journals, the higher mortality estimates were from non-peer-reviewed sources), while Gregory Härtl (spokesman for the WHO) suggested that the conclusions were motivated by ideology.
Chernobyl: Consequences of the Catastrophe for People and the Environment is an English translation of the 2007 Russian publication Chernobyl. It was published in 2009 by the New York Academy of Sciences in their Annals of the New York Academy of Sciences. It presents an analysis of scientific literature and concludes that medical records between 1986, the year of the accident, and 2004 reflect 985,000 premature deaths as a result of the radioactivity released. Though, it was impossible to precisely determine what dose the affected people received, knowing the fact that the received doses varied strongly from one individual to the other in the population above which the radioactive cloud travelled, and also knowing the fact that one cannot tell for sure if a cancer in an individual from the former USSR is produced by radiation from Chernobyl accident or by other social or behavioral factors, such as smoking or alcohol drinking.
The authors suggest that most of the deaths were in Russia, Belarus and Ukraine, though others occurred worldwide throughout the many countries that were struck by radioactive fallout from Chernobyl. The literature analysis draws on over 1,000 published titles and over 5,000 internet and printed publications discussing the consequences of the Chernobyl disaster. The authors contend that those publications and papers were written by leading Eastern European authorities and have largely been downplayed or ignored by the IAEA and UNSCEAR. This estimate has however been criticized as exaggerated, lacking a proper scientific base.
All these points are backed up by other research.
#1 It is estimated that there are 1,331 used nuclear fuel rods that need to be removed from Fukushima. Because of all of the damage that has taken place, computer-guided removal of the rods will not be possible. Manual removal is much riskier, and it is absolutely essential that the removal of each of the 1,331 rods goes perfectly because a single mistake could potentially lead to a nuclear chain reaction.
#2 According to Reuters, the combined amount of cesium-137 contained in those nuclear fuel rods is 14,000 times greater than what was released when the U.S. dropped an atomic bomb on Hiroshima at the end of World War II. Other estimates put this number far higher.
#3 Officials in Japan admit that 300 tons of radioactive water from Fukushima is entering the Pacific Ocean every 24 hours.
#4 According to a professor at Tokyo University, 3 gigabecquerels of cesium-137 are flowing into the port at Fukushima Daiichi every single day…
Yoichiro Tateiwa, NHK reporter: [Professor Jota] Kanda argues government statistics don’t add up. He says a daily leakage of 300 tons doesn’t explain the current levels of radiation in the water.
Jota Kanda, Tokyo University professor: According to my research there are now 3 gigabecquerels [3 billion becquerels] of cesium-137 flowing into the port at Fukushima Daiichi every day. But for the 300 tons of groundwater to contain this much cesium-137, one liter of groundwater has to contain 10,000 becquerels of the radioactive isotope.
NHK: Kanda’s research and monitoring by Tepco puts the amount of cesium-137 in the groundwater around the plant at several hundred becquerels per liter at most. He’s concluded that radioactive isotope is finding another way to get into the ocean. He’s calling on the government and Tepco to identify contamination routes other than groundwater.
#5 According to Tepco, a total of somewhere between 20 trillion and 40 trillion becquerels of radioactive tritium have gotten into the Pacific Ocean since the Fukushima disaster first began.
#6 Something is causing fish along the west coast of Canada to bleed from their gills, bellies and eyeballs. Could Fukushima be responsible?
#7 150 former sailors and Marines say that they now have radiation sickness as a result of serving on U.S. Navy ships near Fukushima and they are suing for damages.
#8 The Iodine-131, Cesium-137 and Strontium-90 that are constantly coming from Fukushima are going to affect the health of those living the the northern hemisphere for a very, very long time. Just check out what Harvey Wasserman had to say recently…
Iodine-131, for example, can be ingested into the thyroid, where it emits beta particles (electrons) that damage tissue. A plague of damaged thyroids has already been reported among as many as 40 percent of the children in the Fukushima area. That percentage can only go higher. In developing youngsters, it can stunt both physical and mental growth. Among adults it causes a very wide range of ancillary ailments, including cancer.
Cesium-137 from Fukushima has been found in fish caught as far away as California. It spreads throughout the body, but tends to accumulate in the muscles.
Strontium-90’s half-life is around 29 years. It mimics calcium and goes to our bones.
#9 It is believed that the Fukushima nuclear facility originally contained a whopping 1760 tons of nuclear material.
#10 It is being projected that the entire Pacific Ocean will soon “have cesium levels 5 to 10 times higher” than what we witnessed during the era of heavy atomic bomb testing in the Pacific many decades ago.
#11 According to the Wall Street Journal, it is being projected that the cleanup of Fukushima could take up to 40 years to complete.
More info and graphics
There are literally hundreds of articles in the last week discussing the impending doom in Japan. This issue really affects every single person on this planet. Whether you ignore it and remain apathetic is up to you. This accident will ultimately be responsible for millions of deaths. Mark my words on that. In action and pretending the problem is going away has not worked. Most of you do not realize just how serious a problem this has become. Main stream media will not talk about it whatsoever. Research what is going on… Your survival is at stake.
From Zero Hedge
After a self-imposed gag order by the mainstream media on any coverage of the Fukushima disaster (ostensibly the last thing the irradiated Japanese citizens needed is reading beyond the lies of their benevolent government, and TEPCO, and finding out just how bad the reality is especially since the key driver behind Abenomics is a return in confidence at all costs), the biggest nuclear catastrophe in history is once again receiving the attention it deserves. This follows the recent admission by TEPCO of the biggest leak reported at Fukushima to date, which forced the Japanese government to raise the assessment of Fukushima from Level 1 to Level 3, even though this is merely the catalyst of what has been a long and drawn out process in which Tepco has tried everything it could to contain the fallout from the exploded NPP, and failed. And today, in a startling and realistic assessment of Fukushima two and a half years after the explosion, the WSJ finally tells the truth: “Tepco Has Lost Control.”
Here is how the mainstream media, in this case the Wall Street Journal, catches up with a topic covered extensively in the “alternative” media for the past several years:
“This is what we have been fearing,” said Shunichi Tanaka, chair of Japan’s Nuclear Regulation Authority, answering questions about the leak at a news conference. “We cannot waste even a minute” to take action.
Behind the leak is a more serious problem: During the past few months it has become clear that Tepco has lost control over the flow of water at the plant and that the problem is escalating, nuclear experts say.
Every day, the utility has to find a place to store around 400 tons of contaminated water that it pumps out of the radioactive reactor buildings, and Wednesday it warned that it is fast running out of space. Storage tanks set up on the fly during plant emergencies have started springing leaks, and Tepco can’t replace them with sturdier ones fast enough. Groundwater-contamination levels are spiking at the seaward side of the plant, and water is flowing into the ocean past a series of walls, plugs and barriers that have been flung up to impede its passage.
What does “losing control” mean in practical terms?
That lack of control is a big liability, said Kathryn Higley, a specialist in the spread of radiation and head of the Department of Nuclear Engineering and Radiation Health Physics at Oregon State University, who spent a week in Fukushima earlier this year.
“You have to find ways to control water coming through the site,” Ms. Higley said. “With any sort of accident, you want to control the timing of what’s released and when it gets released.”
So far, the levels of radioactivity that have escaped to the outside remain relatively low, but some experts warn they may not stay that way—particularly as equipment ages and the heavy-duty work of dismantling the damaged buildings and removing the melted fuel rods proceeds. The radioactivity of the water in the most recent leak was so high that workers couldn’t get close enough to search for the cause until the remaining fluid in the tank was removed.
Tepco said it doesn’t think that water has flowed into the sea but can’t say for sure. Some of the flooded reactor basements are similarly too hot to approach, and it is still not clear where the melted fuel cores are, or in what state.
The last statement bears repeating: “it is still not clear where the melted fuel cores are.” Well as long as TEPCO is 100% confident there are no uncontrolled chain reactions taking place… Then again hundreds of tons of coolant must be cooling something.
“In the future there might be even more heavily contaminated water coming through,” said Atsunao Marui, head of the groundwater research group at Japan’s National Institute of Advanced Industrial Science and Technology and a member of a blue-ribbon panel set up in May to figure out ways of managing the radioactive water. “It’s important to think of the worst-case scenario.”
Only two times in History has a Nuclear Weapons been used on a civilian population. The United States was guilty of being the Country that dropped them. This isn’t about arguing the morality or functionality of the decision. The Manhattan project was perhaps the greatest secret ever kept when you consider the amount of people involved.
The first collection ever of the writings and insights of the original creators of the atomic bomb, along with pieces by the most important historians and interpreters of the subject, is now in paperback.
Born out of a small research program begun in 1939, the Manhattan Project eventually employed more than 130,000 people, including our foremost scientists and thinkers, and cost nearly $2 billion—and it was operated under a shroud of absolute secrecy. This groundbreaking collection of documents, essays, articles, and excerpts from histories, biographies, plays, novels, letters, and the oral histories of key eyewitnesses is the freshest, most exhaustive exploration yet of the topic.
Compiled by experts at the Atomic Heritage Foundation, the book features first-hand material by Albert Einstein, Leslie Groves, J. Robert Oppenheimer, Leo Szilard, Enrico Fermi, Richard Feynman, Niels Bohr, Henry Stimson, and many others.
Dozens of photographs depict key moments and significant figures, and concise explanatory material accompanies each selection. The project’s aftermath and legacy are covered as well, making this the most comprehensive account of the birth of the atomic age.
And now for something completely different
The argument that it seems hugely weird the NSA and US Govt wants to punish leakers such as Manning and Snowden to the fullest extent possible. At the same time they are leaking too secret information and perhaps compromising assets I do believe has value. There is something incredibly fishy about the timing of the base closures and this leak in particular.
Today the Daily Beast reported that an intercepted conference call between “more than 20 al Qaeda operatives” led nearly two dozen U.S. embassies scattered across Southwest Asia and North Africa to shut down over the weekend, a precautionary measure that American officials later extended through August 10. Based on testimony from three unnamed U.S. officials, reporters Eli Lake and Josh Rogin say al Qaeda lieutenants in Nigeria, Uzbekistan, Egypt and Islamic Maghreb discussed vague plans of attack with al Qaeda chief Ayman al-Zawahiri and the terrorist group’s Yemeni leader, Nasser al-Wuhayshi. One of the unnamed officers compared the call to a meeting of the “Legion of Doom.”
Within hours of publication, however, a bevy of national security journalists began casting doubts on the leaked information contained within the Beast’s report. Two theories were quickly born. Adam Goldman of the Associated Press wondered if the leak was manufactured to protect human intelligence (that is, a leaker within al Qaeda), while Ken Delanian of the Los Angeles Times suggested that it was intended to glorify the NSA’s signals intelligence capabilities at a politically vulnerable moment. Barton Gellman of the Washington Post, meanwhile, failed to see how the entire story — the leak, the method of intercept, and the contents of the call — added up:
The original article on the conference call
There is something very fishy about this in my estimation.
The crucial intercept that prompted the U.S. government to close embassies in 22 countries was a conference call between al Qaeda’s senior leaders and representatives of several of the group’s affiliates throughout the region.
The intercept provided the U.S. intelligence community with a rare glimpse into how al Qaeda’s leader, Ayman al-Zawahiri, manages a global organization that includes affiliates in Africa, the Middle East, and southwest and southeast Asia.
Several news outlets reported Monday on an intercepted communication last week between Zawahiri and Nasser al-Wuhayshi, the leader of al Qaeda’s affiliate based in Yemen. But The Daily Beast has learned that the discussion between the two al Qaeda leaders happened in a conference call that included the leaders or representatives of the top leadership of al Qaeda and its affiliates calling in from different locations, according to three U.S. officials familiar with the intelligence. All told, said one U.S. intelligence official, more than 20 al Qaeda operatives were on the call.
I get the sense they are playing us as fools yet again. Sadly I believe they are mostly correct. Most people care more about who advances on American Idol then the fact that their 4th Admendment rights are being shredded. This is a way to distract and confuse.
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Again.. I use my WordPress app on my phone to do most of my work. The links I post are mostly mobile links. All you have to do to make them work on a desktop is remove the m from the address.
I do think this information is the tip of the iceberg. I think we are being systematically lied to and manipulated to achieve the overall objective of total surveillance at any cost.
Lets begin with the Guardian story… Again it seems clear either Greenwald or reporters from Der Spiegal will win the Pulitzer Prize for Journalism this year.
Remind yourself… This is not only on Obama. It was a series of dominoes that started to fall with the attacks of 9-11.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.
The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.
The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.
“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.
US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”
But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.
FISA court info graphic
The administration, lawmakers and the intelligence community have claimed the National Security Agency (NSA) programs that use data from private companies to track millions of American are legal. One mysterious court has been tasked with determining whether these programs cross the line, but their decisions are secret, and made without public debate.
The surveillance program that first made news involved collecting the metadata on millions of telephone calls with help from telecommunications giant Verizon. The program is complicated and not much is known yet, so we decided to show you what we do know with the help of visuals.
We start with a flow chart about how the NSA-Verizon program works and the players involved, and move on to a graphic that breaks down the Foreign Intelligence Surveillance Court (FISC) and the elusive judges assigned to oversee each FISA application. At its peak in 2007, the FISC approved nearly 2,500 applications, but only denied four.
Wondering what they are? Sorry, that’s classified.
The Navy’s snooping machine
No, the U.S. Navy is probably not using a multi-billion dollar submarine to listen in on your phone calls and emails on behalf of the National Security Agency.
But it could.
A long line of secretive Navy spy submarines, most recently a nuclear-powered behemoth named USS Jimmy Carter, have for decades infiltrated remote waters to gather intelligence on rival states’ militaries, insurgents and terrorists on behalf of the NSA and other agencies using a range of sophisticated devices, including special equipment for tapping undersea communications cables
Before NSA whistleblower Edward Snowden revealed the agency’s phone and Internet monitoring programs targeting U.S. and European citizens, the mainstream press paid little attention to the elusive, subsurface warship. But following Snowden’s disclosures last month, several publications including the Huffington Post and the German Der Spiegel speculated that the Jimmy Carter was aiding the NSA’s surveillance of citizens’ communications in the U.S. and Europe.
“It seems this same submarine,” the Huffington Post claimed, “was pressed into service to spy on Europe.”
I will again say that the technology the NSA is using is far superior to what is available for us as consumers. I have said for a couple of years that the spying was total and complete –be it foreign or domestic. I came to that conclusion because I have studied the NSA since the 80’s and have read hundreds of articles and several books about how they operate. The Shadow Factory by James Bamford is something I encourage everyone to read if you have an interest in this topic.
I always return to the famous Wired article on Bluffdale and Stellar Wind by Bamford. He basically lays out exactly what Snowden has leaked. The details are not as precise but if you read between the lines you can guess what he is hinting at.
Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.
But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”
For the NSA, overflowing with tens of billions of dollars in post-9/11 budget awards, the cryptanalysis breakthrough came at a time of explosive growth, in size as well as in power. Established as an arm of the Department of Defense following Pearl Harbor, with the primary purpose of preventing another surprise assault, the NSA suffered a series of humiliations in the post-Cold War years. Caught offguard by an escalating series of terrorist attacks—the first World Trade Center bombing, the blowing up of US embassies in East Africa, the attack on the USS Cole in Yemen, and finally the devastation of 9/11—some began questioning the agency’s very reason for being. In response, the NSA has quietly been reborn. And while there is little indication that its actual effectiveness has improved—after all, despite numerous pieces of evidence and intelligence-gathering opportunities, it missed the near-disastrous attempted attacks by the underwear bomber on a flight to Detroit in 2009 and by the car bomber in Times Square in 2010—there is no doubt that it has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created.
I will be back later with the long promised research into cyber warfare that I have been working on…
I think this video is so moving… Captured on the evening of Sept 11th 2001. American composer Basinski used a looping tape that slowly was disintegrating and it is a powerful statement in my opinion of what occurred on that day. As the light begins to fade and the smoke continues to billow… The US finds itself in a new reality. It is hard to watch this for me without becoming somewhat emotional. I knew that life would never be the same. In some respects innocence was lost that day.
This is more in line with my Link of the day ( when I feel like doing them).
I am sure almost every Country is doing this to some degree as the article suggests. The name of the British Program is spooky sounding. I know I have seen a diagram outlining how it worked.
See below for link…
Tempora is, according to The Guardian newspaper, a clandestine security electronic surveillance program trialled in 2008, established in 2011 and operated by the British Government Communications Headquarters (GCHQ). It was revealed by American whistleblower Edward Snowden in May 2013 as part of his revelations of government sponsored mass surveillance programs. Snowden said that data collected by the Tempora programme is shared with the National Security Agency of the United States.
GCHQ taps fibre-optic cables for secret access to world’s communications
Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
This is actually fascinating…
According to Snowden the two principal components of Tempora are called “Mastering the Internet” and “Global Telecoms Exploitation”, the aim of each to collate as much online and telephone traffic as possible. The vast volume of data utilised by GCHQ in Tempora is extracted from over 200 fibre-optic cables and processed; full data is preserved for three days while metadata is kept for 30 days. British officials have claimed that GCHQ produces larger amounts of metadata than the NSA. By May 2012 300 GCHQ analysts and 250 NSA analysts had been assigned to sift through the flood of data. About 850,000 people have security clearance to access the data.
The article, published on Thursday, claims that France’s intelligence agency, the DGSE, has its own PRISM-like scheme that collects metadata from communications within the country, as well as those flowing into and out of France. The data is reportedly stored in the DGSE’s basement, where the agency has a supercomputer to chew through it.
Other French intelligence services apparently also have access to this data. The program may be illegal, as French surveillance laws require case-by-case warrants.
France isn’t the only European country whose clandestine espionage activities have been exposed post-PRISM. Whistleblower Edward Snowden revealed a British program called Tempora, which involves the tapping of the internet’s backbone at locations around the world.
Fantastic New Yorker Articlr concerning NSA/Europe
As the reporters James Fontanella-Khan and Joshua Chaffin pointed out in the Financial Times this week, American diplomats have for four years now waged “an ongoing, multi-agency effort to convince the E.U. to cooperate on a wide array of intelligence gathering, from sharing airline passenger data to watering down consumer data protection legislation.” Persuading democratic governments to share information on their citizens in the name of counterterrorism or any other security priority is fraught with legal and political problems in the best of circumstances. It will now be harder. Was what the Obama Administration learned about the French Ambassador worth it?
Trying to start being more involved. Energy level is getting better. I do have longer posts planned out and the research has been started. I will start trying to give at least something every day again. Been a hellish 4 weeks for me. No time to cry about my problems however.
Hope you enjoy the info graphic about meteors.
Wanted to add a fascinating article from The New York Times about a topic I deal with frequently. Cyber security and Cyber Attacks as well as Cyber Crime. Thieves were able to orchestrate a 45 million dollar bank heist via coordinated attack on multiple banks and ATMs with virtually military precision. Remarkable in many respects.
“”””””””””But the most noteworthy thing about the largely failed prosecution wasn’t the outcome. It was the tens of thousands of pages of documents—some declassified—that the litigation left in its wake. These documents illuminate Blackwater’s defense strategy—and it’s a fascinating one: To defeat the charges it was facing, Blackwater built a case not only that it worked with the CIA—which was already widely known—but that it was in many ways an extension of the Agency itself.””””””””
“””But according to the documents Blackwater submitted in its defense—as well as an email exchange I had recently with Prince—the contractor’s relationship with the CIA was far deeper than most observers thought. “Blackwater’s work with the CIA began when we provided specialized instructors and facilities that the Agency lacked,” Prince told me recently, in response to written questions. “In the years that followed, the company became a virtual extension of the CIA because we were asked time and again to carry out dangerous missions, which the Agency either could not or would not do in-house.”
This does not surprise me whatsoever.. and to some extent I predicted it.
Infographic or Map will come later. I am not feeling very good.