The Great American Firewall: On the Question of Censorship

16 July 2020 — Black Agenda Report

Danny Haiphong, BAR Contributing Editor

The Great American Firewall: On the Question of Censorship

It should not surprise anyone that China would take protective measures against the threat of U.S. imperialism in the realm of cyber technology.

“Censorship in the United States is rampant but the Great American Firewall is rarely discussed.”

Continue reading

The cia coup against ‘the most loyal ally’ is history’s warning in 2020

2 June 2020 — John Pilger

gw.png

Prime Minister Gough Whitlam

The Australian High Court has ruled that correspondence between the Queen and the Governor-General of Australia, her viceroy in the former British colony, is no longer “personal” and the property of Buckingham Palace. Why does this matter?

Continue reading

Into the heart of the NHS – an American backed spy programme at the centre of Brexit

28 May 2020 — True Publica

By Rob Woodward: Palantir is a special ops company. It is considered at best as a controversial and highly opaque company that has long sought to sell governments an unmatched power to sift and exploit information of any kind for any purpose. Its billionaire owner Peter Thiel, the co-founder of PayPal, through Palantir has worked for years to boost the global dragnet of the NSA and its international partners and was in fact co-created with American spies.

Continue reading

CIA Covert Operations: The 1964 Overthrow of Cheddi Jagan in British Guiana

6 April 2020 — Origin: National Security Archive

Declassified Documents Explore Little-Known Political Coup in Latin America

Exhibits from the Digital National Security Archive

CIA Covert Operations: The 1964 Overthrow of Cheddi Jagan in British GuianaWashington, DC, April 6, 2020 – Cold War concerns about another Communist Cuba in Latin America drove President John F. Kennedy to approve a covert CIA political campaign to rig national elections in British Guiana, then a British colony but soon to be independent, according to declassified documents posted today by the National Security Archive.

Continue reading

Propaganda around the origin of Covid-19

25 March 2020 — Voltaire Network

The CIA is waging a campaign, which it portrays as “re-information,” claiming that Covid-19 originated in China while, at the same time, Russia is seeking to expose it as a US plot.

Thus, according to Reuters, the European External Action Service (EEAS) has issued an internal nine-page document highlighting 80 cases of disinformation (Fake News) allegedly disseminated by Russia to sow panic in the European Union [1].

Continue reading

Inside the World Uyghur Congress: The US-backed right-wing regime change network seeking the ‘fall of China’

5 March 2020 — The Grayzone

While posing as a grassroots human rights organization, the World Uyghur Congress is a US-funded and directed separatist network that has forged alliances with far-right ethno-nationalist groups.

The goal spelled out by its founders is clear: the destabilization of China and regime change in Beijing.

By Ajit Singh

Continue reading

The CIA’s ‘Minerva’ Secret

11 February 2020 — National Security Archive

Operation Condor Countries Used Crypto AG Devices Without Realizing the CIA Owned the Company, National Security Archive Documents Reveal

Encryption revelations raise questions about U.S. official knowledge of Argentina “dirty war” atrocities, Chile’s Letelier assassination, Southern Cone military dictatorships

Continue reading

U.S. Warms Up Old Spy Story To Warn Of Foreign Espionage

11 February 2020 — Moon of Alabama

The Washington Post is warming up an old crypto story:

For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret.

The company, Crypto AG, got its first break with a contract to build code-making machines for U.S. troops during World War II. Flush with cash, it became a dominant maker of encryption devices for decades, navigating waves of technology from mechanical gears to electronic circuits and, finally, silicon chips and software.

The Swiss firm made millions of dollars selling equipment to more than 120 countries well into the 21st century. Its clients included Iran, military juntas in Latin America, nuclear rivals India and Pakistan, and even the Vatican.

But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages.

The decades-long arrangement, among the most closely guarded secrets of the Cold War, is laid bare in a classified, comprehensive CIA history of the operation obtained by The Washington Post and ZDF, a German public broadcaster, in a joint reporting project.

Continue reading

Julian Assange’s lawyers were placed under surveillance. But that’s not the whole story

29 September 2019 — The Canary

A private security company organised 24/7 surveillance of WikiLeaks founder Julian Assange during his stay at the Ecuadorian embassy in London. This included confidential meetings between Assange and members of his legal team. The surveillance was provided directly to the CIA. These revelations could possibly jeopardise the viability of the US extradition case.

But within this story there lies another that raises serious questions about the establishment media and allegiances.
Continue reading

How to Find a Tiger in Africa: Searching for Agostinho Neto (1922 –1979) By T.P. Wilkinson

18 September 2019 — Black Agenda Report

How to Find a Tiger in Africa: Searching for Agostinho Neto (1922 –1979)
The history of liberated Angola, like the history of the world, cannot be told by humanity’s oppressors.

“In the jargon of the ‘West,’ anyone called a communist who becomes a head of state must be a dictator.”

What I want to do here is something very simple. I want to explain how I began to search for Agostinho Neto. I also want to explain the perspective that shapes this search.[i]

Continue reading