When Black Things Propel Us: ‘Deep State’ Power Crimes
3 June 2014
USA. It’s propaganda was always slicker than the Nazi’s. It has decades more experience in terrorism than Al Qaeda. And
now it comes first in the world for state mass surveillance too.
Amid the storm of revelations about the Five Eyes mass surveillance system that NSA whistle-blower Edward Snowden blew
wide open, Snoopman finds it curious that the US National Security Agency still promotes its creation myth: that it was formed to prevent
another ‘Pearl Harbor’.
He concludes that if the NSA staff and its outsourced contractors would simply make a trip to the Library of Congress to
read well-researched books such as Day of Deceit: The Truth about FDR and Pearl Harbor, they would realize that the Five Eyes spy network is one of three critical components of a totalitarian state
Indeed, propaganda, terrorism and mass surveillance were the very same components critical to the power of the
totalitarian super-state, Oceania, depicted in George Orwell’s dystopian novel Nineteen Eighty-four. In this fully referenced feature, Snoopman goes beyond the Bubble Gum TV News History of the United States to
investigate how and why this has happened.
USA, NSA & the Construction of a Totalitarian Super-State
The Echelon global mass surveillance network, that is comprised of the ‘Five Eyes’ spy partners – the United States, the
United Kingdom, Canada, Australia and New Zealand – poses a bona fide threat to the ideal of free and open societies.
Indeed, the ‘Five Eyes’ spy network is in breach of the United Nations’ Universal Declaration of Human Rights
of 1948. Article 12 of this declaration, to which all Echelon ‘Five Eyes’ spy partners are signatories, states: “No one
shall be subjected to arbitrary interference with his privacy, family, home or correspondence…”
Snowden’s whistle-blowing has revealed the extensiveness of the Five Eyes network’s penetration into the world’s digital
communications. The leaked NSA documents show the US spy agency has developed a decryption program called “BULLRUN”
, that can “exploit” encrypted internet data. All Five Eyes spy partners use BULLRUN. The NSA’s UK counterpart, the GCHQ, bragged in one document that it had designed “new access opportunities”
into Google’s systems and had been seeking to do the same with other major internet firms such as Microsoft’s Hotmail, Yahoo, and Facebook
. However, the world also learned in early June 2013 that through the PRISM program, the NSA can directly access the
systems of Microsoft, Hotmail, Skype, Apple, Google, YouTube, Gmail, Facebook and Yahoo
Additionally, intelligence analysts around the world can access practically any digital communications through another program called X-KEYSCORE
, as Snowden’s ‘go to newspaper’, The Guardian revealed in late July 2013. According to the NSA’s leaked documents, this “widest reaching” program can access
real-time communications, and digital histories of a person’s internet activity such as web searches, the content of
emails and social media communications, and the metadata to help refine searches of people’s networks. All the operator
needs is an email address or some other contact detail, according to Edward Snowden. Furthermore, the Five Eyes global surveillance system can snoop
on people’s conversations, activities and movements by accessing cellphones and computer microphones, even when they
are switched off!
While the collection of meta-data has been acknowledged by the Five Eyes nation’s leaders and head spooks, this
collection of ‘data behind the data’ – such as phone numbers, IP addresses, email addresses, contact lists and websites
visited – is also a breach of the Universal Declaration of Human Rights. That is because it still qualifies as arbitrary
interference of a person’s right to privacy, family, home and private communications. By being able to snoop on the mass
populaces’ communications’ data sets, the Five Eyes spy agencies gain an invasive picture of who people know, the sites
they visit and the organizations they contact. This secretive access is nothing but arbitrary. In other words, the state gains the power to data mine, build digital pictures of people’s lives and build new maps of
the world to exploit. The collection of metadata, therefore, is a breach of the right to freedom of association
. That is why the Five Eyes’ governments are at pains to deny or refuse to confirm that their global surveillance
system is a mass one.
Instead, the Five Eyes leaders claim it is ‘targeted’ to catch suspected criminals. This lie is akin to the state saying
it is only interested in catching snapper, while exploiting every trawling technology available, every waiver of marine
reserve provisions and routinely flouting international treaties, charters and even ecological science. In the process,
this metaphorical fishing fleet catches every other hapless species of fish, by surreptitiously transferring everyone to
a virtual ‘privacy extinction list’. The intention is to mine data for commercial exploitation, not only of rival
countries and their transnational corporations to gain advantages in trade negotiations. But also, through an alliance
with corporate partners, codenamed ASPHALT, the NSA planned to gather everything. The intention, as I shall show, is to
ensure that the dominant capitalist coalitions, or oligarchies, that sit atop of the Five Eyes countries gain a decisive
edge in a global game of economic warfare, military dominance and political intrigue.
The NSA’s British counterpart, the Government Communications Headquarters (GCHQ), also has a “collect it all” alliance
with major companies under the codename TARMAC. The symbolism inherent to the codenames, ASPHALT and TARMAC, is
particularly potent when the adage ‘All roads lead to Rome’ is recalled. It becomes truly spooky when it’s remembered
that the Roman Empire’s insatiable appetite for making war was facilitated by road building and it’s acknowledged that
America and Britain head a transnational corporate empire.
The NSA brags that it has strategic partnerships with over 80 global corporations
, including: AT, IBM, Motorola, Microsoft, Hewlett Packard (HP), Intel, Dell, Verizon, Cisco, EDS (now HP), Qwest (now part of
Centurylink), Oracle, Qualcomm, Google, YouTube, Facebook, Microsoft, Skype, Apple, Twitter, Yahoo, PalTalk, AOL, Booz
Allen Hamilton, Northrop Grumman, and Science Applications International Corporation (SAIC).The Guardianrevealed that three transnational telecommunications companies
, Vodafone, Verizon and BT, had also cooperated with the GCHQ to access their fibre-optic networks, under a program
To date, the news media has failed to highlight this breach to the Universal Declaration of Human Rights. Furthermore,
this human rights provision was written as a protection for citizens against the fascism that had occurred under Hitler,
Mussolini and Stalin.
Pinstripe fascists and the mass surveillance state
Perhaps if it was by now common knowledge that one of the NSA’s corporate partners, IBM (International Business
Machines), made the Nazi’s twelve year reign technically possible and more horrific than it would have otherwise been,
the world would fully realize that an important technological component of fascism has been implemented. IBM not only
supplied their computing machines and punch card systems to the Nazis, so that Jewish, gypsy and gay people could be
efficiently rounded up, transported across Europe and worked to death.
As Edwin Black proves compellingly in his book, IBM and the Holocaust, the solutions company also maintained its own leased machines, constantly redesigned the punch cards in full knowledge
of their customers’ purposes, and collected on the profits, as per arrangement, after World War II and the Final
Solution. In other words, IBM’s punch card machines were an efficient mass surveillance tool for storing, organizing
and communicating metadata to prosecute the Holocaust.
IBM’s critical material support of the Nazi’s prior to and throughout World War II was not an isolated case. Some of America’s other iconic industrial corporations supplied the fascist regime with patents, technologies and
, in order to ultimately gain from the destruction of the Third Reich’s war machine. These corporations included:
Rockefeller’s Standard Oil cartel, General Motors, General Electric, DuPont, Dow Chemical and International Telephone
and Telegraph (IT). An American Fraternity deliberately financed the Nazis, as William Engdahl demonstrates in Gods of Money; Charles Higham shows inTrading with the Enemy: The Nazi-American Money Plot 1933-1949, Guido Giacomo Preparata proves in Conjuring Hitler; and Anthony Sutton argues compellingly in Wall Street and the Rise of Hitler. The Wall Street banks included: the Chase National Bank (now JP Morgan Chase); the Schroeder-Rockefeller Company; the
Manhattan Bank; the National City Bank of New York (now Citibank); the New York Trust Company; V. A. Harriman & Co. and Dillon & Read.
Without these technologies, co-investments, and raw materials supplied by American industrial and banking corporations,
the Nazis could not have: motorized their army; flown bombers and fighter planes; manufactured explosives on an epic
scale; and exploited information to make the inevitable Holocaust as horrific as it became. This collaboration between
Wall Street banking and industrial cartels and the Nazis occurred with the complicity and active participation of
government actors across the state apparatus of Britain, America and Germany, with ‘neutral’ countries such as
Switzerland, Sweden, Argentina, Brazil and Panama playing vital roles, as the above mentioned authors show.
It is also pertinent to note the expansion of the NSA’s spying powers were signed off by President George W. Bush, whose
administration warped the law to deem mass surveillance of the American population ‘legal’, as is made clear in the
documentary United States of Secrets
. Pertinent, because George W. Bush’s grandfather, Prescott Bush, who became a wealthy industrialist manufacturing
armaments during World War II, was also a director at Union Banking Corporation, a Wall Street bank that moved funds
back and forth between the United States and Germany for Nazi financier and steel magnate Fritz Thyssen. Indeed, US
family dynasties such as the Bushes, the Rockefeller’s, the Harriman’s, and the DuPont’s were not only a part of the
Nazi Nexus for profit. As an American oligarchy, they conspired to head the world’s dominant military and financial
empire, centred around the control of oil.
‘Uncrackable’ History of US-sponsored Terrorism: From WWII to the Shock Doctrine
A major justification for the Five Eyes’ state spying apparatus is countering terrorism. Indeed, in the PBS documentary United States of Secrets
, about NSA’s mass surveillance on the US population since the terror attacks of September 11 2001 or 9/11, it is
claimed that the National Security Agency was formed after World War II so that the United States is never surprised
again with another Pearl Harbor-type attack.
Contrary to the official story advanced today by the U.S. National Security Agency
, key insiders of President Delano Roosevelt’s Administration were not taken by surprise, including Roosevelt himself,
as Robert Stinnett makes clear in his book Day of Deceit: The Truth about FDR and Pearl Harbor. During 17 years of military archival research, Stinnett found that two weeks before the attack, Washington had
issued a ‘Vacant Sea’ order for the North Pacific, to reduce the chances of the Japanese naval fleet being sighted by
military and merchant ships. Washington had also ordered the newest US warships – twenty-one in all, including two
aircraft carriers – out of Pearl Harbor. The United States Navy and Army cryptographers had cracked the codes of
Japanese diplomatic and military encrypted messages since December 1940. On that basis, a secret inner circle around president Roosevelt had
conspired with the British and Dutch governments to cut off crucial supplies of oil, steel and aviation lubricants to
Japan in order to provoke the Imperial Government of Japan to attack Pearl Harbor. Despite what the NSA still claims,
Japanese diplomatic messages did contain military information and the Japanese fleet did not travel under radio silence,
because they did not know their communications had been decrypted.
In their accounts of the post-World War II order, journalists such as John Pilger
and Naomi Klein
, and documentary filmmaker Eugene Jarecki
, along with US foreign policy critic Noam Chomsky
, have shown that the US-NATO Alliance has routinely conducted acts of terror. These Black Operations, as they are
called, have occurred in over 50 countries and were often conducted to topple democratic socialist governments or
communist states in Europe, Central and South America, South East Asia, the Middle East and Africa. After World War II,
the Atlantic Alliance covertly formed a secret ‘stay behind’ army by recruiting fascists, including former Nazis, to
conduct terrorism operations codenamed ‘Gladio’ (Latin for Roman sword).Operation Gladio was a low-grade war
that exploited a “Strategy of Tension”
designed to frighten the mass populaces of Europe and thereby shift the political gravity to the ‘right’. These
clandestine ‘false flag’ operations were continued by all NATO countries after its formation in 1949, and were carried
out by their intelligence services, militaries, and paramilitaries, with dominant participation from the Anglo-American
membership of NATO, as Madhi Darius Nazemroaya reports in his book The Globalization of NATO.
The bombings of trains, planes, automobiles, buses, and buildings conducted under Operation ‘Gladio’ were ‘false flag’
operations. In conventional warfare, a belligerent state conducting a ‘false flag’ terror operation uses another
country’s ‘flag’ with the intention to frame the enemy as the perpetrator (or overt acts of provocation to lure an enemy
to make an overt attack, while denying the provocation). By blaming ’left’ wing groups for the carnage of Operation
Gladio, key insiders that involved the CIA, MI6 and the Coordination and Planning Committee (CPC) of NATO’s Supreme
Headquarters Allied Powers Europe (SHAPE), could manipulate people with subtle propaganda that a ‘free world’ equated
with capitalism. (SEE full resolution version here: Terror Network Chart
Prior to the highly public exposure of Operation Gladio in 1990, and numerous state investigations
, the US-NATO Alliance added a new modus operandi by funding, training and resourcing groups in jurisdictions
not under their control, to create what appear to be grassroots uprisings in order to topple ‘insubordinate’
governments. Such ‘uprisings’ as the Arab Spring have been called ‘color revolutions’
because a color is chosen for flags, banners and clothing to manipulate perceptions and emotions by manufacturing the
image of widespread solidarity, as Thierry Meyssan has identified
. This style of coup is made to appear as though it started in the ‘streets’
through a popular uprising to rid an oppressed people of an autocratic leader or government
. The US Congress gives AID funds through ‘democracy building’ programs
. The Western mainstream media can be counted on to report a Bubble Gum TV News version of events that fails to
challenge these US-NATO clandestine operations. The events themselves and their distorted reconstructions in the Bubble
Gum News are written by black satirists with a taste for the fascist aesthetic of violence.
Indeed, Eugene Jarecki’s Sundance Film Festival Grand Jury Prize-winning documentary Why We Fight compellingly shows that America fights wars to make the world secure for its corporations. This covert strategy,
identified by Klein as the ‘Shock Doctrine’, was crucial to roll-out and deepen the incursion of ‘free market economic
shock treatments’, where states refused to submit to other acts of coercion, including engineered financial crises.
Forward Engineering 1984: A Slicker, Snazzier, Faster, More ‘Fun’ Totalitarian State
Too few today recognize this totalitarian state is in an advanced stage of construction around them because it does not look like the Orwellian world of Nineteen Eighty-four. In George Orwell’s dystopian novel, the power of the totalitarian super-state, Oceania, relies on mass surveillance,
propaganda, and terrorism (in the form of torture administered to dissidents deemed to be ‘thoughtcriminals’). Oceania
is engaged in a perpetual war with either one of two rival super-states, Eurasia and Eastasia, at various times. A
banned book, The Theory and Practice of Oligarchical Collectivism, reveals that the purpose of war is to waste the resources and productive energy of society, so that the mass populaces
never rise above toil and poverty to challenge an unseen oligarchy.
Meanwhile, in the real world, American journalist Chris Hedges has reported a corporate totalitarian
core thrives inside a fictitious democratic shell. Recent studies show that aTransnational Capitalist Class is steering capitalism
by means of highly-networked corporate board directorships and ownership
. This corporate totalitarian core, comprising just 147 corporations
, is spreading outward from America. In essence, a corporatized totalitarianism is driving the construction of a
worldwide technocratic system. A technocracy is a totalitarian system of government administered by scientists,
engineers and technicians. Key insiders manage the technocratic system in service of super-rich people, or oligarchs,
who use their vast economic resources to steer the trajectory of whole societies.
In this section, I sketch why and how this happened.
In the early 1970s, elite planners that were part of the North Atlantic capitalist class met to discuss threats to their
power under the auspices of the “1980’s Project;” the goal of which was to reconfigure control of the planet.
Central to this project was the deployment of neo-liberal ideology under the rubric of ‘free market reforms’.
Despite the ideological claim of ‘prosperity for all’ used to promote the deployment of ‘free market economic shock
treatments’, the intention was to reduce the material wealth of mass populaces so that they would be less able to assert
their political independence. The intention was to hinder the efforts of the ‘disobedient’
and thereby counter the cultural movements that had emerged in the 1960s, as well as the developmental demands of
‘Third World’ countries that sought to be decolonized.
To this end, in April 1972, the chairman of the Council on Foreign Relations, David Rockefeller, presented his idea of a
new alliance between the wealthy and politically connected of America, Europe and Japan to a secretive global
policy-shaping group called the Bilderberg Group, which convened in Knokke, Belgium. It’s difficult to overstate the
role played by this oligarch. If there were a board game invented to make Monopoly obsolete, sayOligarchy, David Rockefeller would inspire a special oligarchic game-piece that looks, thinks and moves like an octopus, for he
has been a prominent member of the Bilderberg Group since its first meeting in 1954. Editor-in-chief of the Voltaire Network, Thierry Meyssan, who has accessed the Bilderberg Group’s records for 1954 to 1966 (and numerous records pertaining to
later years), stated the Group is a lobbying tool for the NATO Alliance
, North Atlantic militarists that intend to be a secret world government.
It had the credentials to be that, since it’s first chairman was Prince Bernard, a German aristocrat who served in the
SS cavalry up until marrying into the Dutch royal family. The first Bilderberg meeting appeared to be intended to
promote ‘free-market’ capitalism, against a background of communism and socialism. However, the real organizing power
behind the Bilderberg Group were the secret services of NATO and their purpose was to escalate the Cold War. The
attendees were selected to influence their respective governments and opinion-makers to support the NATO Alliance
worldview, that soon went as far as to assert there was a “communist world conspiracy”. In effect, key insiders had
plotted a Psy-Op (or Psychological Operation) on the attendees. As opinion-makers themselves, the participants were
expected to disseminate the ruling cliques’ ideological construct in their home countries, so that the mass populaces’
attention would be diverted to restrictions on freedom in places such as Eastern Bloc states, while failing to notice
the incremental curtailment of rights at home. It was through the NATO Alliance, and its top secret ‘false flag’ Black
Ops, Gladio, that the US was able to continue to use terrorism to destabilize governments that opposed submission to the
will of the world’s most powerful ‘pinstriped’-suited oligarchs
: the North Atlantic capitalist class.
In July 1972, David Rockefeller hosted 250 oligarchs and elites at his country estate in Pocantico Hills, Hudson Valley,
New York. At the time, he was chairman of Chase Manhattan Bank’s board of directors, because he owned a controlling
stake, and since this meant Chase owned a significant share in the New York Federal Reserve Bank, Rockefeller was also a
Class A director on the New York Fed’s board. David Rockefeller was also chairman of a New York-based global
policy-shaping think-tank, the Council on Foreign Relations (CFR). At the Pocantico Hills meeting, Rockefeller and his
posh guests formed a new global-policy shaping think tank called the Trilateral Commission. This new global-policy
shaping group was designed to formulate policies, strategies and tactics to further what The Economist later called a “counterrevolution”.
This counter-revolution, amply detailed in The Shock Doctrine
, which sought to establish a ‘new world economic order’ between America, Europe and Japan, was designed to usurp the
sovereignty of national governments through incremental changes rather than the frontal assaults of the past. By
joining forces with oligarchs from Japan, the Trilateral Commission’s task was to drive the roll-out of the “1980’s
Project”, which included globalizing neo-liberal ideology, in order create a worldwide technocratic system. At face
value, a technocracy suggests a benign economic system that allocates energy and resources equitably through quotas,
rather than through capitalism’s current price system.
However, the Greek root words from which ‘technocracy’ is derived, suggests a form of government run by technocrats. The
word technocracy is a construction of the root Greek words “techne” or skill and “kratos” or rule. Technocracy, which
promises economic freedom, was first theorized during the Great Depression of the 1930s, principally by a University of
Chicago-trained geologist, Marion King Hubbert. As mentioned at the beginning of this section, a technocratic form of totalitarianism is a system of government
administered by scientists, engineers and technicians.  By globalizing neo-liberal ideology, the global reformers
intended to avoid risky military coups in developed civil oligarchies, or western democracies, where overt
state-sponsored violence would likely cause the collapse of governments. 
In 1973, David Rockefeller’s brother, John D. III, published a book called The Second American Revolution, in which he argued for a radical transference of state “functions and responsibilities” to private interests. The
following year, Columbia University academic Richard Gardner published an article called Hard Road to World Order in the Council on Foreign Relations magazine Foreign Affairs, in which he wrote that the building a new world economic order would require “an end run around national sovereignty,
eroding it piece by piece” because “the old-fashioned frontal assault” had become less effective. Gardner’s
think-piece expressed the same sentiment as that espoused by another Columbia University professor Zbigniew Brzezinski,
who stated in his 1969 book called Between Two Ages: America’s Role in the Technetronic Era that “[i]nternational banks and multinational corporations are acting and planning in terms that are far in advance of
the political concepts of the national-state”. Brzezinski, who later co-founded the Trilateral Commission with David
Rockefeller, stated that “political innovation” was unlikely to occur with open debate, but rather through covert
incrementalism. Gardner, who had been a member of president Nixon’s Commission on International Trade and Investment
Policy, argued that the construction of a new world economic order would appear as a “great ‘booming, buzzing
confusion.” Indeed, such confusion was the linchpin of neo-liberal ideology.
As US under-secretary of State of Economic Affairs, George Ball, implied in his presentation entitled
“Internationalization of Business” at the 1968 Bilderberg meeting at Mont Tremblant Canada, the major obstacle to a
neo-colonial world empire, or ‘world company’ (as he worded it), were nation states committed to the common welfare of
their respective citizenries.  Therefore, a cover story that promoted freedom and prosperity through economic
growth, or a consumerist-investor cult, was needed to hide the gradual deployment of a technocratic world system. That
cover story was neo-liberal ideology, which was sold universally to the world’s public with the made-for-media
catch-phrase – the ‘trickle-down effect.’ This mocking promise was predicated on the notion that the rich were needed in
order for society to prosper, without emphasizing that the rich would control the tap and make sure it never more than
The key insiders of the North Atlantic capitalist class that were behind the ’1980s Project’ – the blueprint for
transforming the world with ‘free market’ economic frameworks – were mocking the world because they covertly controlled
capitalism. These key insiders, therefore, knew that capitalism is a private political system that uses economic
means to control society by limiting people’s access to land, as Frances Hutchinson (1998) argued in,What Everyone Wants to Know About Money and Jonathan Nitzan and Shimson Bichler presented in Capital as Power. This political control is primarily achieved through a deliberate scarcity of cash and an abundance of credit/debt, as
Michael Rowbotham (1998) showed in his book, The Grip of Death: A Study in Modern Money, Debt Slavery and Destructive Economics. This scarcity of debt-free cash is controlled by the oligarchic bankers, such as David Rockefeller, because it is the
wealthiest that own the major banking cartels that, in turn, have come to control the governments of the world through
coercion. By gaining control of credit creation over several centuries, through military, economic and psychological warfare
,dynastic banking families have captured states that are forced to borrow to meet revenue shortfalls
As with dripping taps, the amount and interval would be regulated by the market’s ‘Invisible Hand’, which was a
euphemism for an oligarchy and their army of unseen professionals, who have constructed a Worldwide Financial-secrecy
Haven Complex. Oligarchs are super-rich people who use their enormous wealth to influence the politics of society. At
the superficial level, news outlets manufactured the idea that in a ‘free market’ system, where government intervention
was prevented, the Invisible Hand would price goods and services efficiently through rigorous competition. However, the
highly-networked North Atlantic capitalist class used private political mechanisms to ensure that wealth accumulated
upward, so that there was only just enough income trickling-down to avert rebellion. Meanwhile, fees for ‘public’
services increased, even as the universal tax system remained in place.
The Shock Doctrine
is the denied part of the global neo-colonial project. During the field-testing stage of ‘free markets’ in the
mid-1960s to mid-1970s, US-backed terrorism was required to clear opposition for the ‘free market economic shock
treatments’ that followed. Five countries – Brazil, Indonesia, Chile, Uruguay and Argentina – pursued a developmentalist
economic framework and were all subjected to military juntas and/or CIA-backed coups. In the Chilean case, General
Augusto Pinochet’s CIA-backed coup of September 11 1973 was ordered by US National Security Adviser Henry Kissinger, who
viewed president Salvador Allende’s socialist government as a “contagious example”, because he had nationalized key
infrastructure and resources, owned by American and Chilean corporations. But, these ‘developmentalist’ countries
were not the only ones in need of ‘free market’ discipline.
Henry Kissinger had already conspired to foment a bolder shock treatment that would reverberate around the world.
Together with his close accomplices, David Rockefeller and Zbigniew Brzezinski, Kissinger attended the May 1973
Bilderberg meeting at the island resort of Saltsjöbaden, owned by the Swedish Wallenberg banking dynasty, to discuss a
plot to trigger oil price shocks, which would return enormous profits for key banks and the oil majors, including
Rockefeller’s Chase Manhattan Bank and the Standard Oil cartel. (These shocks would also reinvigorate the indebted US
dollar, through which oil was traded universally). The Bilderberger Nexus Oil Price Shocks of 1973-1974 were
anticipated to cause a 400% hike in oil prices, according to the 1973 Saltsjöbaden Bilderberg Meeting Report. The Oil
Price Shocks caused an inflationary spiral in the cost of energy and transportation, that in six years to the end of
1979 had risen by 1300%, according to William Engdahl in A Century of War.
In keeping with the anti-competitive behaviour of cartels, Henry Kissinger explained at one session of a US Federal
Staff Energy Seminar, (which ran for four years), that the US was seeking to “create a world price for oil”, according to former US Air Force Colonel L. Fletcher Prouty
. This ‘energy crisis’ served as a pretext for the Wall Street-Washington-City of London Complex to increase the cost of
credit to 20% (amid runaway inflation), and when combined with the underlying Bilderberg Nexus-induced economic crisis,
a world debt crisis emerged. Thus, the ‘deep state’ oil price shocks laid the groundwork for further ‘free market
economic shock therapies’, which were themselves mechanisms of coercion, because all governments and sectors of society
were thrown further into crisis. Everyone suffered, except key insiders, who became richer and accumulated more
9/11 and Full Spectrum Dominance
Investigators such as Peter Dale Scott, Webster Griffin Tarpley, Mike Ruppert and Kevin Ryan have gone further than the
high profile critics of US foreign policy such as Chomsky, Klein, Jarecki and Pilger, who have already been cited.
Scott, Tarpley, Ruppert and Ryan say thatdeep state criminals periodically conduct deep state events
, or “re-adjustments” to extend the power of the transnational capitalist class. Their studies are part of citizens’-initiated 9/11 investigations
that argue that the official core claims are implausible
. These citizens’-initiated 9/11 investigations vary according to expertise,
such as technical studies of: the near-free fall speed collapses of the three towers that imploded at the World Trade Center
;tracking the four hijacked flights
; and presenting the more likely suspects
Professional group Architects and Engineers for 9/11 Truth (AE911Truth)
, who together represent over 25,000 years worth of experience, point out that only three steel-reinforced concrete
towers have ever been officially claimed to have collapsed by cause of fire. Remarkably, all three of these instances
occurred on the same day, September 11 2001. AE911Truth assert that the World Trade Center Twin Towers, and Building 7 (WTC 7)
, which was not hit by a plane, could not have collapsed due to office fires
. Indeed, the BBCannounced the collapse of Building 7, prior to its failure
. One of the British broadcaster’s reporters was filmed with the 47-storey tower still standing in the background of her
live shot as she broke the news of its collapse!
The picture (above) of the South Tower (or World Trade Center 2) shows that as it begins to collapse, the top section
falls asymmetrically, that is, it topples at a uneven angle. This image alone refutes the possibility of a symmetrical
“pancake” implosion, wherein the mass of floors were deemed officially to have fallen evenly on each of the successive
floors below them as they failed instantaneously, yielding a chain reaction of collapse. Yet, once this collapse of
World Trade Center 2 started, the rest of the tower imploded at near free-fall speed. Since this upper section fell
unevenly, the floors below could not have collapsed in a uniform ‘pancake’ style implosion without the help of
pre-planted demolitions explosives. It is therefore very telling that the North Tower (or World Trade Center 1)
collapsed symmetrically at near free-fall speed too.
When it is remembered that the Twin Towers were identical in construction, and both imploded at near free-fall speeds,
the give-away that the South Tower had pre-planted explosives to assist its collapse lays in the fact that its top
section is clearly seen toppling rather than falling straight down. The smoke, or squibs, of such explosives can be seen
ejecting ahead of the field of collapse, as marked by the red rectangles in the above photo. In short,symmetrical collapse is impossible as a result of asymmetrical damage
. Unless, the black satirists who scripted the 9/11 terror attacks could make almost everyone suspend their disbelief in
order that they would appreciate the special FX of the newest scariest B-Gradeblockbuster movie, in which the laws of physics failed temporarily, so that the only three steel-reinforced towers to have ever collapsed due to office fires
, could happen all in one infamous day! The 9/11 blockbuster script required the absence of forensic scrutiny
, or a cover-up. (See: Active Thermite Science Paper
In his book 9/11 Revealed: The New Evidence, researcher Ian Henshall stated that there was a ‘wall’ created by 9/11 Commissioner Jamie Gorelick back in 1996 when
he was at the US Justice Department, which meant that if the FBI was investigating cases and required information
defined as intelligence (or INTEL), it put those FBI agents working in the INTEL section under the control of the CIA.
This meant the INTEL FBI agents could not automatically share that information with criminal investigators at the FBI.
This ‘wall’ also separated agents at the bureau from those at other departments including the State Department, the CIA
and the Pentagon. This separation was critical because as the author of 9/11 Synthetic TerrorWebster Tarpley has found, there were up to 46 terror drills and war games that occurred on September 11 2001
. These exercises provided the necessary cover for criminal actors within the state-corporate nexus to make the terror drills and war games go live
This is critical, because a now-defunct Washington-based think-tank called the Project for a New American Century (PNAC)
, argued the United States needed to transform its military to conform to the concurrent US military’s Joint Chiefs of Staff
doctrine, ‘Full Spectrum Dominance
’. This doctrine set a goal for the United States to dominate the world, whether on land, sea, air, space and cyberspace, by the year 2020, permanently (Emphasis added). Indeed, it is highly suspect that in the immediate aftermath of
9/11, the NSA was ready to go ahead (by the end of October 2001), with new highly invasive mass surveillance
technologies in a top secret project called ‘The Program’, and code-named ‘Stellar Wind’
. As the Snowden scooping litigator-turned-journalist Glenn Greenwald stated, the NSA has bragged it wants to “own
A full year before 9/11, PNAC members had called for a ‘revolution in military affairs’, or the reconfiguration of
American forces into smaller more mobile units, capable of exploiting new war-fighting technologies. Crucially, in a
paper titled “Rebuilding America’s Defences”
, this revolution, wrote the authors in September 2000, would take a long time, “absent some catastrophic and catalyzing
event – like a new Pearl Harbor”. Otherwise, the PNAC’s white paper, “Rebuilding America’s Defences”
argued, the United States risked losing its sole super-power status if it was not seen to be fighting two major wars at
once. PNAC members included many Washington technocrats
that soon became members of President George Walker Bush’s administration: Richard Perle, Paul Wolfowitz, Dick Cheney,
Donald Rumsfeld, L. Paul Bremer, and Robert Zoellick. The intention of key Pentagon, armaments industrialists,
banking and oil oligarchs, and Washington technocrats and politicos, is for the United States clique to be able to
dictate the economic, political and military order of the planet, permanently, as William Engdahl makes clear in his
book Full Spectrum Dominance: Totalitarian Democracy in the New World Order, and his earlier works, A Century of War andGods of Money.
he sub-terrain connections of many PNAC members to what is known as the ‘deep state’, are revealed in Kevin Ryan’s
intriguing book, Another Nineteen: Investigating 9/11 Suspects.Kevin Ryan, presents a more likely list of top suspects
that fit the picture of a far more realistic 9/11 narrative than the ridiculously over-simplified official story. These
included key PNAC members: Vice-President Dick Cheney (2001-2009), Secretary of Defense, Donald Rumsfeld (2001-2006),
and Richard Clark, Chairman of the Counter-terrorism Security Group (1992–2003); who together were part of a covert
group during the Reagan presidency that planned and practiced Continuity of Government (COG) operations, or the takeover
of the United States government in the event of an emergency. (Back in the Reagan era, this COG group included Oliver
North, of Iran-Contra Affairs fame). Ryan shows that key insiders
, that held top posts in the US state apparatus, had the means, motive and histories of ‘deep state’ activity to
organize a coup d’état with their counterparts from the US corporate world, along with vital help from the Saudi and
Among them, L. Paul Bremer, who was an assistant to Henry Kissinger (1972 -1976), of the 1973 CIA-backed Chilean coup
fame. While he was managing director at Kissinger Associates in the 1990s, Bremer was also on the International Advisory Board of Japanese mining and machinery company, Komatsu, that had a joint
venture with Dresser Industries
(an oil services and intelligence front once owned by Averill Harriman, an American oligarch that willingly supported
the Nazis, and for whom Prescott Bush Snr. worked for). In 1996, Komatsu-Dresser’s mining division patented a thermite
demolitions device. Dresser Industries merged with Halliburton in 1998, while fellow PNAC member Dick Cheney was
chairman and CEO of Halliburton. After leading the National Commission on Terrorism (1999-2000), Bremer worked for
insurance conglomerate Marsh & McLennan, which occupied the exact eight floors of North Tower that were struck by a jetliner resembling American
Airlines Flight 11. Bremer, who was CEO of Marsh Political Risk Practice, survived because he was not at work at the
time of the impact. This was unfortunate for the world, because he was then able toappear on NBC at lunchtime the same day
to make a number of brazen claims in order to manipulate public perceptions. Bremer agreed with the male host that
Osama bin Laden was the most likely suspect, and that maybe Iraq and Iran were involved too.
It is ironic that the female host introduced Bremer as a terrorism expert, a claim he quickly rebutted by saying his
expertise was counter-terrorism. NBC could have introduced Bremer as a close associate of a known war criminal that is still at-large, Henry Kissinger, who
ordered the CIA-backed Chilean coup of September 11 1973. (After all, Harper’s Magazine had published excerpts from Christopher Hitchens’ book The Trials of Henry Kissinger, in February and March 2001, in which the author argues that Kissinger used his position as US National Security
Advisor, (and for a time as Secretary of State), to order genocidal scale killings in Bangladesh, Chile, Cyprus, East
Timor and Indochina). NBC (and all the other major news outlets) should have been more skeptical.
Had NBC done its job properly tracking US ‘deep state’ actors, particularly after the publicity of US-sponsored terrorism in
Operation Gladio, its audience would then have been more critical of Bremer’s audacious claim that “apparently we don’t
have any forensic evidence”. This claim pre-empted any serious investigation of the 9/11 crimes scenes. It also worked
as an encoded message to those in key leadership positions to take the hint of the leading expert on counter-terrorism
that a crisis management narrative was being established. Bremer was subsequently chosen by fellow PNAC member Donald
Rumsfeld to be the Iraq Occupation Governor in 2003, a post that he could be trusted with to serve big corporate
interests, particularly as he and Rumsfeld had participated in a terrorism commission that failed to find that the US
was a terrorism-sponsoring state when it published its report in 1999, as Kevin Ryan points out in his book, Another Nineteen.
The chair of the House Appropriations Committee
Rep. Lewis was flippant about the oversight of the unaccounted for transactions, stating that the matter could be
talked about at another time. Given the magnitude of the breach, this was a remarkable dismissal of the matter. Rumsfeld
responded, saying that the Comptroller of the Currency, Dov Zakheim, was looking into the audit failure situation and
had “got a handle; it’s just a little hot”. Lewis burst into laughter and much of the room joined the chairman of the
House Appropriations Committee in appreciating the in-joke, including Zakheim, who was chuckling as he sat beside
The immediate cover-up of the terror attacks that began on September 11 2011, together with the official account of
9/11, read like deep state criminal satirists scripted them. Those black satirists are likely to be Ryan’s 9/11
suspects. When it is also learned that the CIA-backed Mujahideen were the predecessor ‘freedom fighters’ to Al Qaeda
, we begin to see the traces of a deep state network still at-large
. And when the investigations of experts independent of the state apparatus are taken into account
, the evidence leads to the reasonable conclusion that a network of deep state criminal actors
were integral to making the terrorism of 9/11 more spectacularly successful than what 19 hapless ‘hijackers’ with
box-cutters could have made it.
The ‘Al Qaeda’ ‘hijackers’ served as the gullible patsies.
No place to hide from cyber-carpetbaggers?
To those who know this Shock Doctrine history
, it was no surprise that the NSA and GCHQ had spied on world leaders from the G20 industrial nations
, as revealed by the Snowden leaks. Nor would it have been a surprise for those that have tracked the development of
the Echelon spy network, such as James Bamford
and Nicky Hager
, that major companies had descended down the Five Eyes’ rabbit hole, helping the NSA and GCHQ collect data on their
respective mass populaces.
But, the news did not lesson the disturbing ramifications for those who understand and care about the importance of
being able to peacefully contest the growing concentration and merger of state and corporate power by the transnational
capital class. For such individuals, groups and institutions, the intrusive capacity of the Five Eyes’ states to
eavesdrop on private conversations, remotely attend private meetings, and analyze internal organizational
communications, it is a critical development that signals a major affront to the defence of free and open societies.
How can people effectively gather to hatch ideas, develop frameworks and coordinate strategies to challenge the
wrongdoing perpetrated by the super-rich, that has become so evident amid a five-year long deepening global depression,
if the Five Eyes’ states ‘get the jump’ every time? Indeed, former constitutional lawyer and Guardian reporter Glenn Greenwald, who broke Edward Snowden’s story, stated while promoting his new book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State, the NSA would like everyone to just think it only has ‘bad people’ in its sights
. Greenwald argues that it is the nature of those who head powerful institutions to defend power interests and that
translates into spying on dissenting groups that are deemed a threat because they are effective at communication,
mobilization and challenging injustices. Greenwald argues that the NSA has trained its personnel to target what the government regards as “radicals”
, a broad term to describe people who oppose the politically, economically and militarily powerful of the United States.
Furthermore, Greenwald revealed last year that the NSA’s British counterpart, the GCHQ, has trained its personnel to infiltrate activist groups online
, to undermine their credibility, create internal division, and disrupt their communications. The intention of the
Government Communications Headquarters (GCHQ) was to circumvent the limitations of the law by using these powerful
technologies and the cover of secrecy to attack groups that dissent against the United Kingdom’s government and that of
its Anglo-Saxon Five Eyes spy partners. As Greenwald made clear, the GCHQ is targeting groups and individuals that have
not been charged or convicted of any criminal offenses.
Adding weight to this argument that the Echelon network is at least as much about undermining home-grown dissent as it
is about playing geopolitical chess, the NSA’s codeword for its decryption program, “BULLRUN”, is taken from two major
battles of the American civil war. BULLRUN is the successor program to a prior decryption program called “MANASSAS”,
that refers to the more conventional name for the two battles at Bullrun. These are potent names for the American
people, because the US government realized the war was going to be a long hard-fought one since their forces lost the first major battle between the two armies in Manassas in 1861
. In a second major battle at nearby Bullrun, Union forces won a decisive victory against the Southern Confederate opponents in 1862
. Its British decryption counterpart, “EDGEHILL”, is named after the first major engagement of the English civil war, the Battle of Edgehill
, of 1642, that was a shock to the Royalists fighting for the monarchy against the landed oligarchy’s parliamentary
forces. It ended as an inconclusive “bloody draw”. Thus, the names chosen for these decryption programs indicate
that the top spooks of the Five Eyes’ global surveillance system had the stifling of domestic dissent in mind. Encoded
as they are with symbolism of civil wars, these names used by both spy agencies also shows a commitment to advance ‘the
game’ together, as cartel game theory predicts.
Gaming the People
The five states that comprise the Five Eyes’ global spy apparatus are constructing a totalitarian super-state (or
Transnational Corporate Empire), by stealth. A Fraternity in these institutions are linked to the ‘deep state’ that was
responsible for Operation Gladio, and other acts of terror conducted by the US-NATO Alliance. It is this ‘deep state’
network that were key to the 9/11 plot.
Following the terrorism of September 11 2001, the NSA wasted no time increasing its capacity for mass surveillance and
the US government stretched the law to make it seem legal. Numerous legal experts, including lawyers at the US
Department of Justice, stated in the PBSdocumentary, United States of Secrets
, that the White House and Justice Department deliberately subverted the 4th Amendment of the US Constitution. Because
the 4th Amendment prohibits unlawful searches and seizures, and requires a warrant from a judge, these legal experts say
that mass surveillance of the US population is unlawful.
In a brazen attempt to protect itself from a backlash, the NSA rides on its creation myth that says it was formed to
prevent another ‘Pearl Harbor’. But, a trip to the Library of Congress to read a copy of Robert Stinnett’s meticulously
researched book Day of Deceit: The Truth about FDR and Pearl Harbor, would collapse this myth that the Japanese attack on Pearl Harbor was a surprise. Likewise, if NSA staff and outsourced
contractors would only read the various books cited here about American banking and industrial corporations that traded
with the Nazis prior to and throughout World War II, the NSA’s worker spy bees would realize that numerous dynastic
families of America head a criminal Fraternity.
While the US and UK news media has been critical of their respective governments in regard to the NSA’s and GCHQ’s mass
surveillance, they are yet to provide the broader context that is touched upon here. This is in no small part because
key insiders of the major media outlets have attended the Bilderberg meetings, kept them secret and manipulated the
world’s mass populaces to serve the plans of North Atlantic capitalist class (now a transnational in scope), as Daniel
Estulin’s book The True Story of the Bilderberg Group shows. Furthermore, key insiders of the major media outlets have also played an active role in other global-policy
shaping groups such as the Council on Foreign Relations and the Trilateral Commission. It is not surprising, therefore,
that the major media outlets have failed to conduct sustained serious investigations into the event that justified the
expansion of NSA surveillance, and one that key insiders wasted no time capitalizing on: 9/11.
After-all, the mainstream media (MSM) still reproduces the fiction that Pearl Harbor was a surprise.
Almost 13 years after 9/11, the major media have barely begun to scratch the surface of the ‘deep state’. This is in
spite of the fact that much credible evidence has been presented to them. Thousands of experienced people from diverse
backgrounds such as: aviation and construction professionals, former and current officials, intelligence professionals,
military officers, scientists, structural engineers and architects, and legal scholars, independent researchers,
journalists and filmmakers are critical of the official 9/11 narrative. This deficiency is in spite of some early
efforts by the mainstream media to investigate 9/11, amid the conspicuous absence of an authentic reflexive response
from US authorities into their culpability.
The major Anglo-American media outlets are pulling their punches due to their institutional ties to the US and UK states
and other major US and UK-based transnational corporations. Therefore, it is also crucial that we defend our minds from the psychological warfare
(or Psy-Ops) emanating from the White House-Pentagon-CIA-NSA-GCHQ-Wall Street-City of London-Hollywood-News
Propaganda-Think Tank Complex. Because just six US-based global media conglomerates – Time Warner, Disney, NewsCorp, NBC Universal, CBS and Viacom – dominate the
USA America and world propaganda media system
– they are able to present arelentless barrage of subterfuge as black and white truth
, with near-impunity. News is a serialized black satire
. News commentary, as black satire, regularly deploys doublethink.
As readers familiar with George Orwell’s dystopian novel Nineteen Eighty-four will recall,doublethink is defined as “the power of holding two contradictory beliefs in one’s mind simultaneously, and accepting both of them”
(1993 : 223). This brainwashing provides the capacity to dispense with unwelcome truths by forgetting them, yet
being able to recall them when convenient and deliberately deceive others while maintaining an inner conviction that the
choices are right. Henry Kissinger is committed to the idea of larger and larger political units being formed out of
conflicts, like the three super-states described in Nineteen Eighty-four, because he is in the orbit of the American Rockefeller banking and oil dynasty. Like other deep state criminal actors among the Transnational Capitalist Class, David Rockefeller and Henry Kissinger have been
long-associated with the global policy-shaping groups, such as the Council on Foreign Relations, the Trilateral
Commission and the Bilderberg Group, that seek a one-world invisible government endgame (as numerous investigators have
found). These investigations include: Daniel Estulin’s The True Story of the Bilderberg Group; James Perloff’s The Shadows of Power; Laurence Shoup and William Minter’s Imperial Brain Trust; William Engdahl’s A Century of War: Anglo-American Oil Politics and the New World Order; Michel Chossudovsky’s The Globalization of Poverty and the New World Order; and Jason Bermas’ Invisible Empire: A New World Order Defined.
Therefore, Snowden’s leaks have revealed power crimes, to a point. In response to the leaks, that reveal the
construction of a global surveillance state, numerous high placed people have been forced to acknowledge that the US
National Security Agency began conducting mass surveillance on US citizens following 9/11, as shown in the PBS documentary, United States of Secrets
. Thus, these admissions to subvert the 4th Amendment of the US Constitution and Article 12 of the Universal Declaration
of Human Rights come with the justification that the terrorism of September 11 2001 made the almost unlimited expansion
of surveillance necessary. However, the bubble gum-free history of United States-sponsored terrorism sketched here shows
that the United States of America is afflicted with a ‘deep state’ criminal network that crosses the corporate-state
apparatus. This deep state criminal network are masters of mass deception since they were able to get whole populations
to disbelieve their eyes and ears in regard to the 9/11 coup, and instead go along with a narrative wherein the laws of
physics did not work properly on September 11 2001. Therefore, such ‘power crimes’ are the ‘big picture’ context that is
missing in the news coverage of Edward Snowden’s leaks of the Five Eyes spy network, so far.
Multi-disciplinary investigations of power crimes can determine whether or not there is collusion or conspiracy
underpinning current or historical events. Such investigations require studying the power relations of those that
control or seek to control power resources. Conspiracies are secret agreements for political gain through the infliction
of harm on society. With collusion, the goal is for economic gain. Both frequently overlap. Conspiracy and collusion
require propaganda to hide their planning, existence and history, particularly with large-scale projects.
Elite criminals who practice fraud, corruption and terrorism, argues professor of international law Eric Wilson,
“optimize” their power and prestige through the construction of networks that work to minimize the risks of detection
and maximize the payoffs . By exploiting speed, criminal elites and oligarchs are able distort perceptions about the facts of events
and why they occur. Thus, “low velocity political deliberation and public accountability” is overtaken by high-velocity
events created by highly-networked private interests. It is in this way, that “politics ‘disappears into aesthetics’ ” – as Eric Wilson puts it. In this process, the splicing of space and time and kinetic image sequences mask
“speed-politics” with a copy of reality. Thus, the mainstream media (MSM), acting as ‘vectors’ or transmitters of
‘emotional contagion’, assist the ‘speed-politics’ that underpin such ‘crises,’ amid an ‘atmosphere of catastrophe.’
The real value of power crime scholarship lays in the findings, which can reveal ‘deal breakers’ for society. If it became common knowledge that key power institutions have beenmanufacturing our consent
for projects that have hidden purposes, societies would rightlyrevolt against the authorities, and redeploy key insiders to those institutions most suited to their actions: the prisons of
the world’s Incarceration Complex.
Confronting the Construction of a Totalitarian Super-State
USA America, the nation state that leads the project to transform the American Empire into a Transnational Corporate
Empire, is famous for boasting it’s accomplishments. But, it is coy about leading this project to construct a
totalitarian super-state via a covert global neo-colonial project
The United States has so much going for it. It has the best media propaganda system. Media cartels with profit autism
busily reproduce syndicated Bubble Gum TV News History for Hollywood to reconstruct reality. USA America is so good at
manufacturing consent. Also, in the ‘going for it’ stakes, USA America’s state-sponsored terrorism is ‘state of the
art’. This makes the American Empire formidable because frightened mass populaces often do not realize who exactly is
victimizing them. The US ‘deep state’, responsible for the expression of this violent fascist aesthetic, must surely
gloat in private about their horrific work that we see daily on ‘the news’.
USA America has the very best mass surveillance system in the world. Indeed, it’s leading spy agency, the NSA, is so
busy snooping on everyone’s private lives that it has not found the time or will to read up on the ‘deep state’ of the
United States. It is sticking to its creation myth, when a stroll to the Library of Congress to read Day of Deceit: The Truth about FDR and Pearl Harbor, would collapse this myth that Japan’s attack on Pearl Harbor was a surprise. The NSA applies this ‘default setting’ to
all the critical books cited in this investigation because, as a vital part of America’s ‘deep state’ apparatus, the NSA
would be breaking ranks if it did otherwise. If more personnel and outsourced contractors connected to the American
state apparatus did break ranks, all hell would break loose, no matter how much propaganda America’s anti-competitive
media cartels throw at the truth.
Why? Because even totalitarian states are susceptible to fatal losses of legitimacy. The propaganda has to be relentless
to sucker the gullible. The surveillance has to be total to deter the suspicious who can still think and to catch
dissenting thoughtcriminals. And terrorism, including torture, is needed to scare everyone into submission.
When Black Things Propel Us
Ultimately though, it’s an impossible system to maintain. Why?
Because the power of love is universal. Love sets people free in the most unlikeliest, unpredictable and spontaneous of
ways. Even in totalitarian super-states, where so much resource is committed to control. By infusing projects that
educate, provoke and inspire bona fide freedom, the potent creative energy of love has the power to win over weak hearts to be brave ones.
Masses of people will come to see that it is psychopaths who run the world, when they realize that they have glimpsed
the deepest fear of the powerful thousands of times. Ironically, their most guarded fear is that they are scaredy-cat
cowards. Psychopaths project confidence to win the trust of their intended victims. Their power lays with exploiting
secret knowledge and intent. In other words, psychopaths must maintain the perception that they are kind people,
otherwise their power over others will collapse.
Thus, the ‘penny will drop’ that the myriad cover-ups, the denials upon denials, the forced resignations, the
back-peddling, and the changing justifications, that we continue to see on ‘the news’ are the tell-tale signs of their
cowardice. These ‘delete’, ‘force quit’ and ‘backspace’ moves are also evidence that deceit is the covert currency of
high-conspiring powers. When critical masses of people see that conspiracy, collusion and corruption is systemic, they
will realize that the love that binds ordinary people constitutes the real bonds with which to rebuild community.
Individually, people will feel propelled to find the resolve to brave an authentic life because their realizations about
the black satire that the ‘deep state’ orchestrates will repulse them.
By day, Snoopman works undercover as an ordinary mortal, editing news at a television station. By night, Snoopman researches the wicked
deeds of the powerful. The Snoopman News website (http://snoopman.net.nz/
) publishes well-researched, referenced and fully-illustrated articles that investigate power-crimes (conspiracies for
political power and collusion for economic gain).
 Goodman, Amy. (2014, May 13). “Collect It All”: Glenn Greenwald on NSA Bugging Tech Hardware, Economic Espionage & Spying on U.N. Retrieved from http://www.democracynow.org/2014/5/13/collect_it_all_glenn_greenwald_on?autostart=true_clicky_key=suggested_related; Greenwald, Glenn & MacAskill, Ewen. (2013, June 11). Boundless Informant: the NSA’s secret tool to track global surveillance data. The Guardian. http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining; Greenwald, Glenn. (2013, July
31). XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’. The Guardian. Retrieved fromhttp://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
; Glenn Greenwald & Spencer Ackerman (2013, June 27). NSA collected US email records in bulk for more than two years under Obama. The Guardian. Retrieved fromhttp://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama; Hermann, Burkely. (2013,
June 10). The NSA’s Greatest Hits: “We’re the Only Ones Not Spying on the American People”. Global Research. Retrieved from
 United Nations. (2014). Universal Declaration of Human Rights of 1948. Retrieved from
 Burghardt, Tom. (2013, November 10). The U.S. Secret State and the Internet: “Dirty Secrets” and “Crypto Wars” from
“Clipper Chip” and ECHELON to PRISM. Global Research. Retrieved from http://www.globalresearch.ca/the-u-s-secret-state-and-the-internet-dirty-secrets-and-crypto-wars-from-clipper-chip-to-prism/5357623
 Daily Mail Reporter. (2013, September 6). NSA and GCHQ unlock encryption programs that EVERYONE uses to email and
make purchases on their phones and tablets. Daily Mail.Retrieved from
James Ball, Julian Borger and Glenn Greenwald (2013, September 6). Revealed: how US and UK spy agencies defeat internet
privacy and security. The Guardian. Retrieved from http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security; Pelroth, Nicole, Larson,
Jeff & Shane, Scott. (2013, September 5). N.S.A. Able to Foil Basic Safeguards of Privacy on Web. The New York Times. Retrieved from http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?_r=0
 Greenwald, Glenn & MacAskill, Ewen. (2013, June 7). NSA Prism program taps in to user data of Apple, Google and others. The Guardian. Retrieved from http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data; Hopkins, Nick. (2013, June 7). UK
gathering secret intelligence via covert NSA operation. The Guardian.Retrieved from http://www.theguardian.com/technology/2013/jun/07/uk-gathering-secret-intelligence-nsa-prism; Glenn
Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman and Dominic Rushe. (2013, July 12). Microsoft handed the NSA
access to encrypted messages.The Guardian. Retrieved fromhttp://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
 Greenwald, Glenn. (2013, July 31). XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’. The Guardian. Retrieved from http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
 Spying on Americans, Cellphones, Emails: The NSA is on the Line – All of Them. Retrieved from
WashingtonsBlog. (2013, June 24). The SINGLE Most Important Step to Protect Yourself from Government Spying. Retrieved
 WashingtonsBlog. (2013, September 28). NSA’s Spying On Metadata Violates Our Freedom of Association. Global Research. Retrieved from http://www.globalresearch.ca/nsas-spying-on-metadata-violates-our-freedom-of-association/5351947
 Goodman, Amy. (2014, May 13). “Collect It All”: Glenn Greenwald on NSA Bugging Tech Hardware, Economic Espionage & Spying on U.N. Retrieved from http://www.democracynow.org/2014/5/13/collect_it_all_glenn_greenwald_on?autostart=true_clicky_key=suggested_related; Gellman, Barton & Poitras, Laura. (2013, June 7). U.S., British intelligence mining data from nine U.S. Internet companies in broad
secret program. The Washington Post. Retrieved from
 James Ball, Luke Harding and Juliette Garside. (2013, August 2). BT and Vodafone among telecoms companies passing
details to GCHQ. The Guardian. Retrieved from http://www.theguardian.com/business/2013/aug/02/telecoms-bt-vodafone-cables-gchq
 Black, Edwin. (2012). IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation. Washington D.C.: Dialog Press. SEE ALSO: Black, Edwin. (2009). Nazi Nexus: America’s Corporate Connections to Hitler’s Holocaust. Washington D.C.: Dialog Press; Elston, P. (1998). Banking with Hitler. [Motion picture]. London: BBC; Engdahl, W. (2004). A Century of War: Anglo-American Oil Politics and the New World Order (Rev. ed.). London, England: Pluto Press; Engdahl, F. W. (2009). Gods of Money: Wall Street and the Death of the American Century. Wiesbaden, Germany:edition.engdahl; Higham Charles (1983). Trading with the Enemy: The Nazi-American Money Plot 1933-1949 (1983). Delacorte Press; Preparata, Guido Giacomo. (2005). Conjuring Hitler: How Britain and America Made the Third Reich. London: Pluto Press; Sutton, Anthony (2002).Wall Street and the Rise of Hitler. San Pedro, CAL: GSG & Associates.
 Gilmore, Jim (Producer), Kirk, Michael (Producer, Director & Writer), Wiser, Mike (Producer & Writer). (2014, May 13). United States of Secrets. Part I: The Program. Frontline. PBS. Retrieved from http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/; Goodman, Amy. (2014,
May 13). “Collect It All”: Glenn Greenwald on NSA Bugging Tech Hardware, Economic Espionage & Spying on U.N. Retrieved from http://www.democracynow.org/2014/5/13/collect_it_all_glenn_greenwald_on?autostart=true_clicky_key=suggested_related; Greenwald, Glenn (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. London, UK: Hamish Hamilton. Madsen, Wayne. Washington Spies on NATO; Other Allies. Strategic Culture Foundation. Retrieved from http://www.strategic-culture.org/pview/2014/05/18/washington-spies-on-nato-other-allies.html
 Engdahl, F. W. (2009). Gods of Money: Wall Street and the Death of the American Century. Wiesbaden, Germany: edition.engdahl; Estulin, D. (2009). The True Story of the Bilderberg Group, 183-184. (North American Union ed.). Walterville, OR: Trine Day LLC. Shoup, L. H. & Minter, W. (2004 ). Imperial Brain Trust: The Council on Foreign Relations and United States Foreign Policy, 254-284. New York, NY: Authors Choice Press.
 Gilmore, Kirk, & Wiser. (2014, May 13). United States of Secrets. Part I: The Program. PBS.
 Stinnett, Robert (2001). Day of Deceit: The Truth About FDR and Pearl Harbor. New York: NY. Touchstone Books; Pearl Harbor Review- Pearl Harbor. National Security Agency/Central Security Service. Retrieved from http://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/pearl_harbor_review/pearl_harbor.shtml
 Chomsky, N. (2004). Hegemony or Survival: America’s Quest for Global Dominance. NSW, Australia: Allen & Unwin; Chomsky, N. (2006). Failed States: The Abuse of Power and the Assault on Democracy. Crows Nest, NSW: Allen & Unwin; Jarecki, Eugene (2006). Why We Fight. [Motion Picture]. Sony Pictures Classics; Klein, Naomi. (2007). The Shock Doctrine: The Rise of Disaster Capitalism. Camberwell, Australia: Penguin Books; Nazemroaya, Madhi Darius. (2012). The Globalization of NATO. Atlanta, USA: Clarity Press; Pilger, John. (2007).The War on Democracy. Retrieved from http://www.maoritelevision.com/tv/shows/tuesday-festival-documentaries
; Pilger, J. (2002). The New Rulers of the World. London: Verso; Pilger, J. & Lowry, A. (2001). The New Rulers of the World. Carlton Television; Whitecross, M & Winterbottom, A. (Directors) & Eaton, A. (Producer). (2009). The Shock Doctrine. [Motion picture]. A Renegade Pictures/Revolution Films Production. Retrieved fromhttp://www.youtube.com/watch?v=7iW1SHPgUAQ
; Wintonick, P. (Director/Producer) & Achbar, M. (Director/Producer). (1992). Manufacturing Consent: Noam Chomsky and the Media [Motion picture]. Canada: Necessary Illusions.
 Bureau d´Études (2009). Bureau d´Études publishes new network map: Administration of Terror. Operation Gladio:
Studies of NATO stay-behind networks and other clandestine resurgence operations. Retrieved from
http://operation-gladio.net/bureau-d%C2%B4%C3%A9tudes-publishes-new-network-map-administration-terror; Nazemroaya, Madhi
Darius (2012). The Globalization of NATO. Atlanta, Georgia, USA: Clarity Press.
 Webster Tarpley’s 9/11 Synthetic Terror; Alex Jones’ Terrorstorm (2010).
 Golinger, Eva. (2014, March 5). Colored Revolutions: A New Form of Regime Change, Made in the USA. Global Research. Retrieved from http://www.globalresearch.ca/colored-revolutions-a-new-form-of-regime-change-made-in-the-usa/27061;
Marshall, Andrew Gavin (2009, November 3). Colour-Coded Revolutions and the Origins of World War III. Global Research. Retrieved from http://www.globalresearch.ca/colour-coded-revolutions-and-the-origins-of-world-war-iii/15767; Meyssan,
Thierry. (2012, August 7). Perfecting The Method of “Color Revolutions”. Global Research. Retrieved from http://www.globalresearch.ca/perfecting-the-method-of-color-revolutions/32261; Muhho, Sam (2014, April
28). Color Revolutions. Getting Our Facts Straight on the “Arab Spring”. Global Research. Retrieved from http://www.globalresearch.ca/color-revolutions-getting-our-facts-straight-on-the-arab-spring/5379479
 Carroll, W. K. (2010). The Making of a Transnational Capitalist Class: Corporate Power in the 21st Century. London: Zed Books; Coghlan, Andy & MacKenzie, Debora Revealed – the capitalist network that runs the world. (2011, October 24). Retrieved from
Hedges, Chris. (2014, January 6). The Last Gasp of American Democracy. Truthout. Retrieved from http://www.truth-out.org/opinion/item/21052-chris-hedges-the-last-gasp-of-american-democracy; Edwards,
Steve. (2012). It’s the financial oligarchy, stupid. Retrieved fromhttp://hdl.handle.net/10292/5536
; Phillips, Peter & Osborne, Brady (2013, September 13). Exposing the Financial Core of the Transnational Capitalist Class. Retrieved from
http://www.globalresearch.ca/exposing-the-financial-core-of-the-transnational-capitalist-class/5349617; Phillips, Peter & Soeiro, Kimberley. (2012, August 14). The Global 1%: Exposing the Transnational Ruling Class. Retrieved from
 Shoup & Minter. (1977). Imperial Brain Trust.
 Klein. (2007). The Shock Doctrine; Pappas, R. K. (Director/Writer), Blackburn, T. (Writer), Foley, M. (Producer). (2004). Orwell Rolls
in his Grave [Motion picture]. USA: Buzzflash.com;
 de Angelis, M. (2001, May). Global capital, abstract labour, and the fractal panopticon.The Commoner. Retrieved from http://www.commoner.org.uk/fractalpanopt.pdf; Klein. (2007). The Shock Doctrine; Shoup & Minter. (1977). Imperial Brain Trust.
 Engdahl, F. W. (2009). Gods of Money: Wall Street and the Death of the American Century, p. 273-378 Wiesbaden, Germany: edition.engdahl; Estulin, D. (2009). The True Story of the Bilderberg Group, 137-147. (North American Union ed.). Walterville, OR: Trine
Day LLC; Meyssan, Thierry. (2011, May 9). Voltaire Network.org. What you don’t know about the Bilderberg-Group. Retrieved from
 Gosling, Tony. (2014, May 17). The World’s Most Powerful Private Club, Bilderberg’s Silent Takeover of Britain’s
$60bn Defense Budget. Retrieved from
Jones, Alex. (2010). Terrorstorm. Prison Planet.com; Marshall, Andrew Gavin. (2011, June 16). Bilderberg 2011: The Rockefeller World Order and the “High
Priests of Globalization” Global Research. Retrieved from
Meyssan, Thierry. (2011, May 9). What you don’t know about the Bilderberg-Group. Voltaire Network. Retrieved from
http://www.voltairenet.org/article169651.html; Nazemroaya, Mahdi Darius. (2012). The Globalization of NATO. Clarity Press.
 Committee on Banking, Currency and Housing. (1976). Staff Report of the Committee on Banking, Currency, and
Housing, House of Representatives, 94th Congress, Second session, May 1976; Estulin 2009). The True Story of the Bilderberg Group, p.137.
 Klein (2007). The Shock Doctrine. p. 78.
 Engdahl 2009: 273-275; Estulin 2009: vi, 137, 142, 145-146; Klein 2007; Shoup & Minter 1977: 254-281).
 Estulin 2009; Klein 2007; Shoup & Minter 1977: 254-281.
 Knight Frank & Citi Private Bank (2012). The Wealth Report 2012: A global perspective on prime property and weath. Knight Frank LLP & Citi Private Bank, Citigroup Inc. Retrieved from http://www.thewealthreport.net/The-Wealth-Report-2012.pdf; Pattel,
Raj. (2013). Stuffed and Starved: From Farm to Fork – The Hidden Battle for the World Food System. Portobello Books.
 Estulin 2009; Klein 2007.
 Rockefeller John D. III. The Second American Revolution. New York: Harper & Row. In: Engdahl, F. W. (2009). Gods of Money: Wall Street and the Death of the American Century, p.275. Wiesbaden, Germany: edition.engdahl
 Gardner, Richard. (1974, July). Hard Road to World Order. Foreign Affairs. As cited in Estulin (2009: 83).
 Brzezinski, Zbigniew (1969). Between Two Ages: America’s Role in the Technetronic Era.Viking Press.
 Estulin 2009: 93-94.
 Brown, E. H. (2008). The Web of Debt: The Shocking Truth About Our Money System and How We Can Break Free (2nd ed.). Baton Rouge, LA: Third Millennium Press; Griffin, G. E. (2008). The Creature from Jekyll Island: A Second Look at the Federal Reserve (4th ed.).Westlake Village, CA: American Media; Grignon, P. (2009). Money as Debt II: Promises Unleashed. Retrieved from http://www.moneyasdebt.net/; Hutchinson, F. (1998). What Everyone Really Wants To Know About Money. Charlbury, England: Jon Carpenter; Nitzan, J. & Bichler, S. (2009). Capital as Power: A Study of Order and Creorder. New York, NY: Routledge; Palan, R., Murphy, R., & Chavagneux, C. (2010). Tax Havens: How Globalization Really Works. Ithaca, NY: Cornell University Press; Quigley, C. (1966). Tragedy and Hope: A History of the World in Our Time, p.37. New York, NY: The Macmillan Company; Rowbotham, M. (1998). The Grip of Death: A Study of Modern Money, Debt Slavery and Destructive Economics. Charlbury, England: Jon Carpenter; Shaxson, N. (2011). Treasure Islands: Uncovering the Damage of Offshore Banking and Tax Havens. New York, NY: Palgrave Macmillan; Winters, J. A. (2011). Oligarchy. New York: Cambridge University Press.
 Edwards, Steve. (2012). It’s the Financial Oligarchy, Stupid: A study of Anglo-American news coverage during the
2007-2008 financial crisis and bank bailouts. AUT University. Retrieved from
http://aut.researchgateway.ac.nz/handle/10292/5536; Klein (2007). The Shock Doctrine; Whitecross & Winterbottom. (2009). The Shock Doctrine. [Motion picture]. A Renegade Pictures/Revolution Films Production. Retrieved fromhttp://www.youtube.com/watch?v=7iW1SHPgUAQ
 Chomsky (2006: 111). Failed States.; Jarecki (2002). The Trials of Henry Kissinger. BBC; Klein (2007: 60, 63-70, 128). The Shock Doctrine.
 These oil price shocks, which were orchestrated by the Rockefeller’s Standard Oil cartel and Henry Kissinger (in
collusion with the Bilderberger Group), set off an inflationary period around the world. Mohammad Reza Pahlavi, better
known as the Shah of Iran, was induced to buy US-made weaponry, but he lacked the cash. The
Rockefeller-Kissinger-Bilderberger nexus worked out that they needed a trigger event that would work as a cover for the
Shah of Iran to hike oil prices so that he could afford his military spending. Kissinger, with the assistance of ‘back
channels’ in London, orchestrated the Yom Kippur War of 1973 by deceiving the Egyptians, Syrians and Israeli’s about
each others’ agendas. The ensuing oil embargoes meant that countries were forced to pay 400% more for petroleum, which
was traded in US dollars, amid the reduced supply of oil. In turn, this meant that Wall Street banks, especially
Rockefeller’s Chase Manhattan Bank made enormous profits. The Chase Manhattan Bank was the Iranian government’s bank, as
well as the bank of the National Iranian Oil Company and also the Shah’s family bank Thus, the world was subjected to a
far-reaching shock treatment that served the Anglo-American oligarchy’s interests. (Engdahl 2004: 127-141; 2009:
265-272); A Century of War; Engdahl 2009: 265-275). Gods of Money; Estulin (2009: 46). The True Story of the Bilderberg Group.
 Ruppert, Michael C. (2004). Crossing the Rubicon – The Decline of the American Empire.New Society Publishers; Ryan, Kevin. (2013). Another Nineteen: Investigating Legitimate 9/11 Suspects. USA: Microbloom; Scott, Peter Dale. (2012, September 24). “Systemic Destabilization in Recent American History: 9/11,
the JFK Assassination, and the Oklahoma City Bombing.” The Asia-Pacific Journal, Vol 10 Issue 39, No. 2. Retrieved from http://japanfocus.org/-Peter_Dale-Scott/3835; Scott, Peter Dale. (2014, April
6). “The American Deep State, Deep Events, and Off-the-Books Financing,” The Asia-Pacific Journal, Vol. 12, Issue 14, No. 3. Retrieved from http://www.japanfocus.org/-Peter_Dale-Scott/4104; Tarpley, Webster Griffin.
(2007). 9/11 Synthetic Terror: Made in USA. Joshua Tree, CAL: Progressive Press; Scott, Peter Dale. (2013, April 27). 9/11, the JFK Assassination, and the
Oklahoma City Bombing as a Strategy of Tension. Voltaire Network. Retrieved from
http://www.voltairenet.org/article178312.html; Unwelcome Guests Radio. (2013, December 10). Peter Dale Scott on The US
War Machine (Deep Politics and the CIA Global Drug Connection). Retrieved from
 Avery, Dylan. (2007). Loose Change: Second Edition and Final Cut. loosechange911.com; Fetzer, James H. (Ed.). (2007).The 9/11 Conspiracy: The Scamming of America. Peru, Illinois, USA: Catfeet Press; Gage, Richard. (2008). 9/11: Blueprint for Truth. Architects and Engineers for 9/11 Truth. http://www.AE911truth.org; Henshall, Ian & Morgan (2005). 9/11 Revealed – Challenging Facts Behind the War on Terror. London: Robinson; Smallstorm, Sophia. (2007).Demolitions: 9/11 Mysteries. http://www.9/11weknow.com; Thompson, Paul et al. “The Complete 911 Timeline Project.” Cooperative Research History
 9/11: Blueprint for Truth. Architects and Engineers for 9/11 Truth. Retrieved from http://www.AE911truth.org
 Global Research. (2009, April 3). Active Thermitic Material Discovered in Dust from the 9/11 World Trade Center Catastrophe. Retrieved
Hoffman, Jim (2009, December 7). Explosives Found in World Trade Center Dust. 9-11 Research. Retrieved from http://911research.wtc7.net/essays/thermite/explosive_residues.html; Ryan, Kevin. (2013, December 9).
9/11 Truth: How to Debunk WTC Thermite at Ground Zero. Global Research. Retrieved from http://www.globalresearch.ca/how-to-debunk-wtc-thermite/5360964; Ryan, Kevin R., Gourley, James R.,
Jones, Steven E. (2009, March). Environmental anomalies at the World Trade Center: evidence for energetic materials. The
Enviromentalist, Volume 29, Issue 1, pp 56-63. Retrieved from
 Henshall, Ian. (2007). 9/11 Revealed: The New Evidence . New York: Carroll & Graf Publishers.
 Tarpley, Webster Griffin. (n.d.). The 46 Drills, Operations, War Games, And Activities Of 9/11. Retrieved from
tarpley.net/docs/drills_of_911.pdf; Wilson, E. (2009). Speed/pure war/power crime: Paul Virilio on the criminogenic
accident and the virtual disappearance of the suicidal state. Crime, Law & Social Change, 51, 413-434. doi:10.1007/s10611-008-9168-7
 Donnelly, Thomas, Kagan, Donald & Schmitt, Gary (2000). “Rebuilding America’s Defenses: Strategy, Forces and Resources for a New American Century” Part V
Creating Tomorrow’s Dominant Force. A Report of The Project for a New American Century. Retrieved from
http://web.archive.org/web/20070807020846; Shelton, General Henry H. (2000, June). “Joint 2020 Vision – America’s
Military: Preparing for Tomorrow.” US Government Printing Office; Washington: DC.
 Gilmore, Jim (Producer), Kirk, Michael (Producer, Director & Writer), Wiser, Mike (Producer & Writer). (2014, May 13). United States of Secrets. Part I: The Program. Frontline. PBS. Retrieved from http://www.pbs.org/wgbh/pages/frontline/united-states-of-secrets/
 Donnelly, Kagan & Schmitt, Gary (2000). “Rebuilding America’s Defenses”, p. 51. Retrieved from http://web.archive.org/web/20070807020846
 Engdahl, F. William. (2011). Full Spectrum Dominance: Totalitarian Democracy in the New World Order. California, USA: Progressive; Right Web, Profiles – Individuals, Organizations, Governments. (n.d.). Project for a New
American Century. Retrieved from http://www.rightweb.irc-online.org/list_of_pnac_signatories_and_contributing_writers
 Ryan, Kevin. (2013). Another Nineteen: Investigating Legitimate 9/11 Suspects. SEE ALSO: Ryan, Kevin. (2009, August 9). Demolition access to the WTC Towers. Retrieved from
http://www.911review.com/articles/ryan/demolition_access_p1.html; Dell, Thomas. (n.d.). L. Paul Bremer. NNDB: Tracking
the entire world. Retrieved from http://www.nndb.com/people/289/000023220/
 Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger and James Ball (2013, June 17). GCHQ intercepted foreign
politicians’ communications at G20 summits. The Guardian.Retrieved from http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits; Ewen MacAskill & Borger, Julian. (2013, June 30). New NSA leaks show how US is bugging its European allies. The Guardian. Retrieved from http://www.theguardian.com/world/2013/jun/30/nsa-leaks-us-bugging-european-allies
 Goodman, Amy. (2014, May 13). “Collect It All”: Glenn Greenwald on NSA Bugging Tech Hardware, Economic Espionage & Spying on U.N. Retrieved from http://www.democracynow.org/2014/5/13/collect_it_all_glenn_greenwald_on?autostart=true_clicky_key=suggested_related
 James Ball, Luke Harding and Juliette Garside. (2013, August 2). WashingtonsBlog. (2014, May 15). Spying is Meant
to Crush Citizens’ Dissent, not Catch Terrorists. Retrieved from
(2014, January 9). 500 Years of History Shows that Mass Spying Is Always Aimed at Crushing Dissent. Retrieved from
 Greenwald, Glenn. (2014, February 24). How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and
Destroy Reputations. The Intercept. Retrieved from https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/
 CWSAC Battle Summaries: Manassas, First. (n.d.). National Park Service. Retrieved from
http://www.nps.gov/hps/abpp/battles/va005.htm; CWSAC Battle Summaries: Manassas, Second. (n.d.). National Park Service.
Retrieved from http://www.nps.gov/history/hps/abpp/battles/va026.htm; UK Battlefields Resource Centre. (n.d.). Battle of
Edgehill 23rd October 1642. Battlefields Trust. http://www.battlefieldstrust.com/resource-centre/medieval/battleview.asp?BattleFieldId=3
 Ayres, I. (1987). How Cartels punish: A structural theory of self-enforcing collusion.Columbia Law Review, 87(2), 295-325. Retrieved from http://www.columbialawreview.org; Katyal, N. K. (2002). Conspiracy theory. The Yale Law Journal, 112, 1307-1398. Retrieved from http://yalelawjournal.org/; Marcus, P. (1977). Conspiracy: The criminal agreement, in theory
and practice. The Georgetown Law Journal, 65, 925-969. Retrieved from http://www.georgetownlawjournal.org/; Marks, R. D. (1986). Can conspiracy theory solve the
“oligopoly problem”? Maryland Law Review, 45, 387-431. Retrieved from http://www.law.umaryland.edu/academics/journals/mdlr/
 Carroll, W. K. (2010). The Making of a Transnational Capitalist Class: Corporate Power in the 21st Century. London: Zed Books; Chossudovsky, Michel. (2014, January 29). Imperial Conquest: America’s “Long War” against Humanity. Global Research. Retrieved fromhttp://www.globalresearch.ca/imperial-conquest-americas-long-war-against-humanity/5364215
; Lendman, Stephen. (2013, July 19). US Courts Approve Indefinite Detention and Torture. Global Research. Retrieved from http://www.globalresearch.ca/us-courts-approve-indefinite-detention-and-torture/5343269
; Lendman, Stephen. (2013, November 12). America’s Global Gulag: Challenging Wrongful Convictions Global Research.
Retrieved from http://www.globalresearch.ca/americas-global-gulag-challenging-wrongful-convictions/5357796?print=1
; Perloff, J. (2008). The Shadows of Power: The Council on Foreign Relations and the American Decline. Appleton, WI: Western Islands; Phillips, Peter, Osborne, Brady (2013, September 13). Exposing the Financial Core of
the Transnational Capitalist Class. Retrieved from
http://www.globalresearch.ca/exposing-the-financial-core-of-the-transnational-capitalist-class/5349617; Phillips, Peter,
Thornton, Bridget & Vogler, Celeste (2010, May 2). The Global Dominance Group: 9/11 Pre-Warnings & Election Irregularities in Context Retrieved from http://www.projectcensored.org/the-global-dominance-group/; Snoopman.
(2014, March 10). “Code Purple: Whistle Blowing on ‘Free markets’, the ‘Shock Doctrine’ and ‘New Constitutionalism’” Snoopman News. Retrieved from at http://snoopman.net.nz/2014/03/10/code-purple/; WashingtonsBlog. (2013, December 18). Former Top NSA Official: “We Are
Now In A Police State”. Retrieved fromhttp://www.washingtonsblog.com/2013/12/former-top-nsa-official-now-police-state.html
; Winters, J. A.(2012, February 27). Oligarchy in the U.S.A.: The wealth defense industry protects the richest of the
rich. In These Times. Retrieved fromhttp://inthesetimes.com/article/12698/oligarchy_in_the_u.s.a/
; World Socialist Web Site. (2013, December 18). “Almost Orwellian”: US Judge indicts NSA spying. Retrieved fromhttp://www.wsws.org/en/articles/2013/12/18/pers-d18.html
 United Nations. (2014). Universal Declaration of Human Rights of 1948. Retrieved from
 SEE Chapter 3 of: Edwards, Steve. (2012). It’s the financial oligarchy, stupid: A study of Anglo-American news
coverage during the 2007-2008 financial crisis and bank bailouts. Retrieved from http://hdl.handle.net/10292/5536;
Goodman, Amy. (2014, May 14). Glenn Greenwald: U.S. Corporate Media is “Neutered, Impotent and Obsolete”. Democracy Now!
Retrieved from http://www.democracynow.org/2014/5/14/glenn_greenwald_us_corporate_media_is
 SEE Chapter 2 of: Edwards, Steve. (2012). It’s the financial oligarchy, stupid: A study of Anglo-American news
coverage during the 2007-2008 financial crisis and bank bailouts. Retrieved from http://hdl.handle.net/10292/5536;
 Wilson, E. (2009). Speed/pure war/power crime: Paul Virilio on the criminogenic accident and the virtual
disappearance of the suicidal state. Crime, Law & Social Change, 51, 413-434. doi:10.1007/s10611-008-9168-7; Wilson, E. (2010, February). Crimes against reality: The global credit crisis, simulation, and criminogenic cyber-capitalism. Paper presented at the International Studies Association Annual Convention, New Orleans, LA. Retrieved from
International Studies Association website: http://convention2.allacademic.com/one/isa/isa10/; Wilson, E. (2011).
Criminogenic cyber-capitalism: Paul Virlio, simulation, and the global financial crisis. Springer Science+Business Media. doi: 10.1007/s10612-011-9139-7.