Sunday, July 31, 2011

NYC Dept. of Buildings: No Records for Pre-9/11 WTC Elevator Rebuild, One of the “Largest, Most Sophisticated” Ever

"The New York City Department of Buildings (DoB) has reported within a June 6, 2011 Freedom of Information (FOI) response, that no records could be located regarding the following request for information pertaining to the massive elevator modernization project underway at World Trade Center buildings 1 and 2 until the very morning of September 11, 2001, one of the largest ever [1]. The DoB governs elevator construction and use within New York City.

An April 15, 2011 FOI appeal request sought:

“Permits or certifications provided by the NYC Department of Buildings regarding elevator modernization/renovation work performed at the former World Trade Center buildings 1 and 2 during the 1990s and 2000s."

The DoB’s June 6, 2011 FOI answer reads as follows:

“BIS shows no elevator records for the time period in question...”

http://911blogger.com/news/2011-06-16/nyc-dept-buildings-no-records-pre-911-w...

9/11 Large White And Blue Mystery Jet Flys Past The Towers Before The South Tower Strike‬‏ - YouTube

Larry Silverstein - Who Wants To Work At Ground Zero‏

Despicable.

9/11: Explosive Evidence - Experts Speak Out, Trailer

9/11: INTERCEPTED (2011) Full Length‬‏

9/11 Pilot Interview - Boeing Designed These Planes To Be Flown By The Computer‬‏ - YouTube

GM Crops Farmer to Farmer‬‏

Friday, July 29, 2011

From BAE to Iran-Contra, 9/11 & Beyond

Pastedgraphic-2

"Money makes the world go ‘round. Whose money spins your planet? In recent decades, Saudi Arabia emerged as a skillful puppeteer, pulling the strings of its expanding influence. Dare to see the big picture, out of the context of pseudo-political loyalties, free of the intoxicating opiate of the mainstream media. Look behind the mask of false pretenses to see the awful truth: riches seeking ever more money, celebrity looking for more notoriety, propaganda masquerading as the truth and the deprivation of liberties posturing as the savior in the “war on terror”.

To uncover who is truly in control, all you have to do is follow the money. Since the mid-eighties, British and American politicians have been operating under suspicion of being compromised by al-Yamamah, the $80 billion Anglo-Saudi black operations slush fund. It is the product of the 20-year oil-for-arms barter deal, wherein BAE Systems (formerlyBritish Aerospace), Britain’s largest defense contractor, reportedly paid bribes to sell combat fighter planes, helicopters, tanks and ammunitions to Saudi Arabia. In return for the arms, the Saudi’s agreed to supply hundreds of thousands of barrels of oil a day to the British. It was the largest arms deal in UK history that was arranged in a way that circumvented any potential objections by the U.S. Congress.

BAE (the world’s second largest defense company) was said to have paid millions into accounts controlled by Saudi Prince Bandar bin Sultan, a highly influential former ambassador to Washington, DC. Prince Bandar’s close ties to the Bush family prompted the nickname “Bandar Bush”. Bandar’s children reportedly attended school with Cheney’s grandchildren. The power Bandar wielded was extraordinary. For decades he was a close friend to five U.S. Presidents and numerous CIA directors, as well as heads of state and monarchs of other countries. In the Bush years, Bandar became virtually part of the administration, able to enter the White House unannounced. Ever a master manipulator, Bandar skillfully controlled the mainstream media, with the Washington Post being his paper of choice when it came to royal leaks..."

http://www.boilingfrogspost.com/2011/07/26/brushfire-with-julia-the-saudi-sta...

Handling of Drake Leak Case was “Unconscionable,” Court Said

"The government’s treatment of former National Security Agency official Thomas Drake was abusive and akin to acts of British tyranny in pre-Revolutionary War days, said Judge Richard D. Bennett at the July 15 sentencing hearing which concluded the Drake case, one of the Obama Administration’s record number of anti-”leak” prosecutions. A transcript (pdf) of that hearing was prepared at the request of Secrecy News.

Mr. Drake was originally suspected of leaking classified information to a reporter and had been charged with ten felony counts, all of which he denied. The prosecution was unable to sustain any of those charges, and the case was settled after Mr. Drake pleaded guilty to a misdemeanor charge of exceeding authorized use of a government computer. He was sentenced (pdf) at the hearing to a year of probation and 240 hours of community service..."

http://www.fas.org/blog/secrecy/2011/07/drake_transcript.html

How did 'the Zetas' drug cartel obtain weapons for criminal activity?

Pastedgraphic-1

"Since Barack Obama took office in 2009, the commonly-accepted mantra of the Administration, and many within the major news organizations, is that the violence associated with Mexican drug cartels is fueled by guns that came from the United States due to its 'lax gun control laws.' Indeed, the dangerous 'Zetas' drug cartel obtained weapons in the United States for their criminal activity both in Mexico and throughout the American Southwest.

However, the manner in which the Zetas obtained those weapons directly contradicts the official Administration stance on the consequences of lax gun control laws.

The Zetas obtained their weapons through a little-publicized program implemented by the U.S. State Department called 'U.S. Direct Commercial Sales.' The program was intended to regulate the sale of U.S. firearms to other countries, and a direct commercial sale of a firearm requires an export license. However, as it has been demonstrated repeatedly with the Project Gunwalker Scandal at the ATF, honorable intentions often go terribly awry, particularly when widespread corruption infects a multiplicity of government agencies..."

http://www.examiner.com/conservative-in-national/how-did-the-zetas-drug-carte...

9/11 mother to make legal history seeking damages for son's terror aboard United flight 175

Smart Meters‬‏

9/11 Eyewitness WPIX Producer - We All Thought We Were In The Center Of The Bomb‬‏

...No, the bomb was in the subway...

Bush explains slow reaction to September 11 attacks

"LOS ANGELES (Reuters) - Former President George W. Bush says his apparent lack of reaction to the first news of the September 11 2001 attacks was a conscious decision to project an aura of calm in a crisis.

In a rare interview with the National Geographic Channel, Bush reflects on what was going through his mind at the most dramatic moment of his presidency when he was informed that a second passenger jet had hit New York's World Trade Center.

Bush was visiting a Florida classroom and the incident, which was caught on TV film, and has often been used by critics to ridicule his apparently blank face..."

http://news.yahoo.com/bush-explains-slow-reaction-september-11-attacks-171135...

Former HBGary Federal CEO bows out of DEFCON talk

Masonic media agents

“Masonic sorcery is all about creating fake narratives and getting us to buy into them” [9]

“There is a popular misconception that the Nazis closed down existing newspapers and radio stations when they came to power. They did not. Instead, they installed a hidden and centralized system of censorship. Editors in all the newspapers received their instructions on what events to cover – and, more significantly, what events to be silent about – from a central office.” - Jane Burgermeister

“A half truth is a whole lie” - Yiddish proverb

Contents [hide]

• 1 Intro
• 2 Alternative media reporters
• 2.1 Alex Jones
• 2.2 Greg Palast
• 2.3 Noam Chomsky
• 2.4 G. Edward Griffin
• 2.5 Aaron Russo
• 2.6 Amy Goodman
• 2.7 Jeff Rense
• 2.8 Bill Deagle
• 2.9 Devvy Kidd
• 2.10 Alan Watt
• 2.11 Jim Tucker
• 2.12 Daniel Estulin
• 2.13 Leo Lyon Zagami
• 2.14 Benjamin Fulford
• 2.15 Ted Gunderson
• 2.16 Ray McGovern
• 2.17 David Ray Griffin
• 2.18 Webster Tarpley
• 2.19 Paul Craig Roberts
• 2.20 John F. McManus
• 2.21 Michael Parenti
• 2.22 Alex Ansery
• 2.23 Judith Miller
• 2.24 Barrie Zwicker
• 2.25 Stew Webb
• 2.26 Tom Henneghan
• 2.27 David Shayler
• 2.28 Annie Machon
• 2.29 Rod Barton
• 2.30 Eric Hufschmid
• 2.31 Daryl Bradford Smith
• 2.32 Michael Collins Piper
• 2.33 Henry Makow
• 2.34 Luca Scantamburlo
• 2.35 Patrick Fitzgerald
• 2.36 John Loftus
• 2.37 Texe Marrs
• 2.38 Jim Marrs
• 2.39 Hal Turner
• 2.40 Jesse Ventura
• 2.41 Robert Steven Duncan
• 2.42 Cindy Sheehan
• 2.43 Ognir
• 2.44 Doubt cases
• 2.44.1 Ian Crane
• 2.44.2 David Emory
• 2.44.3 John Perkins
• 2.44.4 Steve Lendman
• 3 New Age reporters
• 3.1 Daniel Winter
• 3.2 Jordan Maxwell
• 3.3 David Icke
• 3.4 Michael Tsarion
• 3.5 David Wilcock
• 3.6 Nassim Haramein
• 3.7 Steven M. Greer
• 3.8 Zecharia Sitchin
• 3.9 Richard Hoagland
• 3.10 Leonard George Horowitz
• 3.11 Stewart Swerdlow
• 3.12 Eckhart Tolle
• 3.13 Doubt cases
• 3.13.1 Thomas E. Bearden
• 3.13.2 Drunvalo Melchizedek
• 3.13.3 Jacques Vallée
• 3.13.4 Neil Kramer
• 4 Mainstream media reporters
• 4.1 Tim Russert
• 4.2 John McLaughlin
• 4.3 Tony Snow
• 5 Artists
• 5.1 Tom Cruise
• 5.2 John Travolta
• 5.3 Will smith
• 5.4 Quentin Tarantino
• 5.5 Dan Brown
• 5.6 Michael Moore
• 5.7 Oliver Stone
• 5.8 Mel Gibson
• 5.9 George lucas
• 5.10 Martin Sheen
• 5.11 Charlie Sheen
• 5.12 Emilio Estevez
• 5.13 Bono Paul David Hewson
• 5.14 Madonna Louise Ciccone
• 5.15 Beatles
• 5.16 Jimmy Page
• 6 To research / unfiled..."


http://wikicompany.org/wiki/911:Masonic_media_agents#Henry_Makow

Tuesday, July 26, 2011

9/11 A Decade Later: Remains From WTC Tested By Latest DNA Tech‬‏

Time Travel Impossible, Say Scientists

The Forgotten JFK Assassination Tapes‬‏

URGENT!! Sentinels of Liberty!

Media_httppolitedisse_omdjw

Alternative Title: Captain America Recruits Scavenging Americans To Fight The Unholy Japs.

Anders Behring-Breivik Facebook Page

Nice masonic apron.

Screen_shot_2011-07-26_at_8

Anders-Behring-Breivik-FACEBOOK.pdf Download this file

Little-known firms tracking data used in credit scores

Sibel Edmonds Documentary - Kill The Messenger‬‏

Experiments with nanothermite‬‏

Sunday, July 24, 2011

"WHO WAS LEE HARVEY OSWALD?" (1993 PBS-TV DOCUMENTARY)

The Order of Death- Full Length (2005)‬‏

Anonymous & Lulz Security Statement

" • Hello thar FBI and international law authorities,
• • We recently stumbled across the following article with amazement and a certain amount of amusement:
• • http://www.npr.org/2011/07/20/138555799/fbi-arrests-alleged-anonymous-hackers
• • The statements made by deputy assistant FBI director Steve Chabinsky in this
• article clearly seem to be directed at Anonymous and Lulz Security, and we are
• happy to provide you with a response.
• • You state:..."

http://pastebin.com/RA15ix7S

Inside Darpa’s Secret Afghan Spy Machine

Media_httpwwwwiredcom_edrpi

Darpa Searches for Life’s Master Clock

Media_httpwwwwiredcom_thwlg

Live Memory Forensic Analysis

Pastedgraphic-4

"As memory forensics has become better understood and more widely accomplished, tools have proliferated. More importantly, the capabilities of the tools have greatly improved. Traditionally, memory analysis has been the sole domain of Windows internals experts, but recent tools now make analysis feasible for the rank and file forensic examiner. Better interfaces, documentation, and built-in detection heuristics have greatly leveled the playing field. We are also seeing novel ways to attack the problem. One of the more interesting developments I have been following lately is the advent oflive memory analysis.

I credit the free Mandiant Memoryze tool with popularizing the idea of performing live memory analysis, and I believe it is a revolutionary change. The idea itself could be as controversial as creating a memory image was just a few years ago. Do you remember the naysayers questioning how our forensic analysis could possibly be valid if we were to run our imaging applications on the live system? Shouldn't we still be pulling the plug? What would they say if we now told them we were going to play "Find the Hacker" on that same live system? Luckily it turns out that the system impact of doing a live analysis versus (or in addition to) taking a memory image is minimal. And the benefits are great:

• Inclusion of the system pagefile, providing a more complete picture of memory
• Digital signature checks of process and driver executables
• More accurate heuristics matching
• Faster triage capability

Keep in mind that live analysis occurs by accessing physical memory, and notrelying upon API calls, open handles, or debuggers. Thus it is just as effective at defeating advanced malware and rootkits as analyzing a standard memory image. Convinced yet? If so, here is how to perform a live memory analysis with the new free tool, Redline..."

http://computer-forensics.sans.org/blog/2011/07/21/live-mem-forensic-analysis

All of Breivik’s Document.no Postings in Wordle Analysis

Boeing Pulse Jet Concept Video

From: Doug Feith, Subject: President's Speech on Iraq ((tags, Donald Rumsfeld, Douglas Feith, Iraq, politics))

"Before I left work Tuesday evening, I got an email from my wife asking me to pick up some things from the grocery store on the way home. You know, some grape tomatoes, some tortellini, pasta sauce, a few cucumbers ... no big deal. Then I get home and see that Matt Yglesias has posted an item on the most magical foreign policy memo in U.S. history, where then-Secretary of Defense Donald Rumsfeld basically asked his undersecretary for policy, Douglas Feith, to go and solve all of the world's thorny geopolitical situations with all the casualness of the grocery list my wife had sent me..."

http://www.huffingtonpost.com/2011/02/23/donald-rumsfeld-sent-doug_n_827118.html

feith-rumsfeld.pdf Download this file

DOJ casts serious doubt on its own claims about the anthrax attack

"Ever since the FBI claimed (for a second time) that it had discovered in 2008 the identity of the anthrax attacker -- the recently-deceased-by-suicide Army researcher Bruce Ivins -- it was glaringly obvious, as I documented many times, that the case against him was exceedingly weak, unpersuasive and full of gaping logical, scientific, and evidentiary holes. So dubious are the FBI's claims that serious doubt has been raised and independent investigations demanded not by marginalized websites devoted to questioning all government claims, but rather, by the nation's most mainstream, establishment venues, ones that instinctively believe and defend such claims -- including the editorial pages of the nation's largest newspapers, leading scientific journals, the nation's preeminent science officials, and key politicians fromboth parties (led by those whose districts, or offices, were most affected by the attacks). To get a sense for the breadth and depth of the establishment skepticism about Ivins' guilt, just click on some of those li.."

http://www.salon.com/news/opinion/glenn_greenwald/2011/07/19/anthrax/index.html

FBIS Compilation of UBL Statements (1994-2004)

CIA FBI'S Bin Laden Statements 1994-2004.pdf Download this file

Amdocs

Pastedgraphic-1

"It turns out that Israel has had a potential wiretap on every phone in America for years, along with the ability to monitor and record who any person is calling, anywhere in America; information of great value even if one does not listen to the calls themselves. Amdocs, Inc. the company which sub contracts billing and directory services for phone companies around the world, including 90 percent of American phone companies, is owned by Israeli interests. Yet another company, Comverse Infosys, is suspected of having built a "back door" into the equipment permanently installed into the phone system that allows instant eavesdropping by law enforcement agencies on any phone in America. This includes yours..."

http://whatreallyhappened.com/WRHARTICLES/blackmail.html
http://www.amdocs.com/About/Pages/Customer-List.aspx

Pastedgraphic-3

"Amdocs Limited (NYSE: DOX) is a provider of software and services for billing, customer relationship management (CRM),operations support systems (OSS). Its traditional clients aretelecommunications "Tier-1" and "Tier-2" providers such as AT&T,BT Group, Sprint, T-Mobile, Vodafone, Bell Canada, Telus, Rogers Communications, Telekom Austria, Cellcom, Comcast, DirecTV,Elisa Oyj and O2-Ireland. The company also offers outsourcedcustomer service and data center operations. Headquartered inChesterfield, Missouri, Amdocs has more than 20,000 employees and serves customers in more than fifty countries (the Registered office of the company is in the Island of Guernsey). [4].."

http://en.wikipedia.org/wiki/Amdocs

Thursday, July 21, 2011

FEMA / Homeland Security Training Video

Goldman Sachs Shorted Greek Debt After It Arranged Those Shady Swaps

greece acropolis

Goldman Sachs arranged swaps that effectively allowed Greece to borrow 1 billion Euros without adding to its official public debt. While it arranged the swaps, Goldman also sought to buy insurance on Greek debt and engage in other trades to protect itself against the risk of a default on those swaps. Eventually, Goldman sold the swaps to the national bank of Greece.

Despite its role in creating swaps that may have allowed the Greek government to mask its growing debts, Goldman has no net exposure to a default on Greek debt, a person familiar with the matter says.

Goldman is “flat” when it comes to Greece, the person said. Which is to say, its long and short exposure to a potential Greek default are in balance.

In light of this combination of arranging structured financing while shorting the customer's debt, Goldman may find itself in a familiarly uncomfortable public light. Goldman has come under a barrage of criticism for structuring mortgage backed securities while its traders shorted that market. As a result of those short trades, Goldman lost far less money than its rivals when the US housing market imploded.

Something similar is at work here and the criticism will likely follow along the same track. Goldman was uniquely well-positioned to understand that Greek debt service obligations were higher than they would have appeared just by looking at its official debt levels, making Greece a riskier credit. This knowledge may have allowed Goldman to acquire credit protection on the trades on the cheap.

To our eyes, this entire line of criticism is off-base. Take mortgages. While some media accounts claim that Goldman made billions by shorting the housing market, the truth is that Goldman actually lost money during the worst of the mortgage meltdown. The billions it made on short trades were out-weighed by the billions lost on the long trades.

Similarly, Goldman may have sought to protect itself against heavy losses from Greece because it was uniquely exposed to those losses. The terms of the swap meant that Goldman essentially made an upfront payment to Greece in exchange for a revenue stream later. If Greece defaulted on its obligation to keep that revenue stream flowing, Goldman stood to lose money. In such circumstances, Goldman’s short-trades against Greek debt may be nothing more than prudent precaution. It is quite common for banks to take out credit protection--that is, buy short trades--against assets such as loan and swap obligations due to them.

Goldman first put the swap in place in 2001. It immediately sought to hedge its risk to the Greek obligations by making side deals with other parties. In 2005, the entire swap was sold to the National Bank of Greece. But last year, Goldman was back talking to the Greek government about a similar deal that would delay debt obligations.

In some ways, this latest “scandal” must feel like déjà vu for Goldman Sachs. The Greek swap transactions were first reported in risk magazine as far back as 2003. Der Spiegel picked them up recently, the New York Times revisited the story on Sunday, and today Bloomberg has a hold of it.

Tuesday, July 19, 2011

NATO and the ungratefulness of the Libyan people

Investigate Bush, Other Top Officials for Torture

Media_httpwwwhrworgen_bhdfz

FBI Raids Homes of Three ‘Anonymous’ Suspects

Media_httpwwwwiredcom_dfxec

December 4, 2001: Stratcom Report Says US Backed Some Forerunners of Al-Qaeda

Pastedgraphic-2

"The United States Strategic Command (Stratcom) produces a document mentioning that the US backed some of al-Qaeda’s forerunners. The document, an after-action report for Stratcom’s Global Guardian exercise in 2001, contains summaries about terrorist groups from around the world. Its section on al-Qaeda states: “The group was originally brought together from elements of various insurgent military groups which have fought continuously in the Middle East since the 1980s. Some of these groups had US backing in the past.” Al-Qaeda was formed in 1988 (seeAugust 11-20, 1988) by Arabs who had fought for the US-sponsored mujaheddin in the Soviet-Afghan war (see 1985-1986 and 1986-1992). [US STRATEGIC COMMAND, 12/4/2011]"

http://www.historycommons.org/context.jsp?item=a120401StratcomAlQaeda#a120401...
http://www.scribd.com/doc/54400368/FOIA-11-023-Response-Pgs-260-290

Phone-hacking whistle-blower found dead

Media_httpwwwcnncomvi_hckfc

Monday, July 18, 2011

Monsanto on Anonymous hacker attack: ‘We remain vigilant’

9/11 Willie Nelson Questions The World Trade Center Implosions On Larry King‬

Campaigners seek arrest of former CIA legal chief over Pakistan drone attacks

Pastedgraphic-1

"July 15, 2011

Campaigners against US drone strikes in Pakistan are calling for the CIA's former legal chief to be arrested and charged with murder for approving attacks that killed hundreds of people.

Amid growing concern around the world over the use of drones, lawyers and relatives of some of those killed are seeking an international arrest warrant for John Rizzo, until recently acting general counsel for the American intelligence agency.

Opponents of drones say the unmanned aircraft are responsible for the deaths of up to 2,500 Pakistanis in 260 attacks since 2004. US officials say the vast majority of those killed are "militants". Earlier this week 48 people were killed in two strikes on tribal regions of Pakistan. The American definition of "militant" has been disputed by relatives and campaigners.

The attempt to seek an international arrest warrant for Rizzo is being led by the British human rights lawyer Clive Stafford Smith of the campaign group Reprieve, and lawyers in Pakistan. The lawyers are also building cases against other individuals, including drone operators interviewed or photographed during organised press facilities.

A first information report, the first step in seeking a prosecution of Rizzo in Pakistan, will be formally lodged early next week at a police station in the capital, Islamabad, on behalf of relatives of two people killed in drone strikes in 2009. The report will also allege Rizzo should be charged with conspiracy to murder a large number of Pakistani citizens.

Now retired, Rizzo, 63, is being pursued after admitting in an interview with the magazine Newsweek that since 2004 he had approved one drone attack order a month on targets in Pakistan, even though the US is not at war with the country.

Rizzo, who was by his own admission "up to my eyeballs" in approving CIA use of "enhanced interrogation techniques", said in the interview that the CIA operated "a hit list". He also asked: "How many law professors have signed off on a death warrant?..."

http://www.uruknet.de/?s1=1&p=79613&s2=16
http://web.archive.org/web/20090805100519/https://www.cia.gov/about-cia/leade...

The truth behind the U.S./NATO war on Libya

Sunday, July 17, 2011

(U//FOUO) DHS LulzSec Bulletin: Hacktivist Groups Target U.S. and Foreign Networks

2011 CWE/SANS Top 25 Most Dangerous Software Errors

"The 2011 CWE/SANS Top 25 Most Dangerous Software Errors is a list of the most widespread and critical errors that can lead to serious vulnerabilities in software. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.

The Top 25 list is a tool for education and awareness to help programmers to prevent the kinds of vulnerabilities that plague the software industry, by identifying and avoiding all-too-common mistakes that occur before software is even shipped. Software customers can use the same list to help them to ask for more secure software. Researchers in software security can use the Top 25 to focus on a narrow but important subset of all known security weaknesses. Finally, software managers and CIOs can use the Top 25 list as a measuring stick of progress in their efforts to secure their software.

The list is the result of collaboration between the SANS Institute, MITRE, and many top software security experts in the US and Europe. It leverages experiences in the development of the SANS Top 20 attack vectors (http://www.sans.org/top20/) and MITRE's Common Weakness Enumeration (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the support of the US Department of Homeland Security's National Cyber Security Division, presenting detailed descriptions of the top 25 programming errors along with authoritative guidance for mitigating and avoiding them. The CWE site contains data on more than 800 programming errors, design errors, and architecture errors that can lead to exploitable vulnerabilities..."

https://cwe.mitre.org/top25/

Project Gunrunner

Welcome to Post-Legal America

"Is the Libyan war legal? Was Bin Laden’s killing legal? Is it legalfor the president of the United States to target an American citizen for assassination? Were those “enhanced interrogation techniques” legal? These are all questions raised in recent weeks. Each seems to call out for debate, for answers. Or does it?

Now, you couldn’t call me a legal scholar. I’ve never set foot inside a law school, and in 66 years only made it onto a single jury (dismissed before trial when the civil suit was settled out of court). Still, I feel at least as capable as any constitutional law professor of answering such questions.
My answer is this: they are irrelevant. Think of them as twentieth-century questions that don't begin to come to grips with twenty-first century American realities. In fact, think of them, and the very idea of a nation based on the rule of law, as a reflection of nostalgia for, or sentimentality about, a long-lost republic. At least in terms of what used to be called “foreign policy,” and more recently “national security,” the United States is now a post-legal society. (And you could certainly include in this mix the too-big-to-jail financial and corporate elite.)

It’s easy enough to explain what I mean. If, in a country theoretically organized under the rule of law, wrongdoers are never brought to justice and nobody is held accountable for possibly serious crimes, then you don’t have to be a constitutional law professor to know that its citizens actually exist in a post-legal state. If so, “Is it legal?” is the wrong question to be asking, even if we have yet to discover the right one..."

http://www.tomdispatch.com/post/175398/tomgram%3A_engelhardt%2C_welcome_to_po...

Cynthia McKinney Libya Speech LA 6-18-11‬‏

9/11: Starting Over With The Truth–Part One

Inside Job: More Proof of 9/11 Duplicity

The CIA's Secret Sites in Somalia

Pastedgraphic-1

"Nestled in a back corner of Mogadishu’s Aden Adde International Airport is a sprawling walled compound run by the Central Intelligence Agency. Set on the coast of the Indian Ocean, the facility looks like a small gated community, with more than a dozen buildings behind large protective walls and secured by guard towers at each of its four corners. Adjacent to the compound are eight large metal hangars, and the CIA has its own aircraft at the airport. The site, which airport officials and Somali intelligence sources say was completed four months ago, is guarded by Somali soldiers, but the Americans control access. At the facility, the CIA runs a counterterrorism training program for Somali intelligence agents and operatives aimed at building an indigenous strike force capable of snatch operations and targeted “combat” operations against members of Al Shabab, an Islamic militant group with close ties to Al Qaeda..."

http://www.thenation.com/article/161936/cias-secret-sites-somalia?page=full

Wednesday, July 13, 2011

One Mainframe To Rule Them All

Nothing Too Threatening to Publish

10 July 2011

Nothing Too Threatening to Publish

Cryptome responds to an inquiry:

Have a seat, here is a follow-up to the oft-asked question, "is there any threatening information Cryptome would not publish," and Cryptome's answer, "no, there is nothing we would not publish," may be understood that nothing truly threatening to persons, institutions and nations will be sent to Cryptome. Nor to the media, nor any other public interest outlet, Wikileaks and the rest. Claims of receiving this kind of material are bogus or based on stupidity and ignorance, all too often lying to conceal being deceived.

The reason is simple, such information is too valuable to give away for free, patriotic rationales notwithstanding (patriots are all too often misinformed due to the myopia patriotism fosters).

This kind of information is worth much more on the black market, under the negotiating table, in drop boxes, to spies, to nations, to extorionists, to blackmailers, and the full range of cheaters for profit.

Fake threatening material is amply distributed, some given away freely to promote a source, there is perhaps more of that than the genuine material, especially from those who ignorantly believe the fake material is genuine -- the insiders conceit.

Redactions of so-called threatening material is similarly bogus, a technique for exaggerating the importance of the material and more importantly, to enhance value of the redactor.

In the case of national threats, it should be understood that such threats are never conveniently assembled as tranferrable packages. Only fools think that. Instead national protections are diversely distributed in order to prevent their theft or corruption, and are booby-trapped with markers and tracers that can track the entire path of meddling, access and transfer.

That is why it takes sophisticated, prolonged analysis to constitute diverse sources of information into a credible account and weed out the false and misleading -- again in particular the false and misleading believed by a source to be genuine who is most likely being exploited as an unwitting dupe.

It is no accident, for example, that Daniel Ellsberg withheld material from the New York Times in the Pentagon Papers affair -- withholding is enhancement of value. And no accident that the Times and Ellsberg cannot give up touting their role as instances of higher responsiblity. Disclosure of tiny selections from a vast official literature on the war like this requires commensurate exaggeration of significance by editorial masquerade.

Masquerade, entertainment, is what brings in the profits , never the undoctored material which is nearly always tedious and demanding and incomplete. A blazingly effective disclosure is always bogus, and for that it is to be enjoyed and celebrated as fictional output like intelligence briefs and investigative journalism exposes.

To be sure, it can be argued that all "information," a fabricated neologism, a kissing cousin to vanity-driven "intelligence," and as bogus as "news" or "gospel" or "disclosures."

Not to overlook that official secrets are the greatest threat to democracy no matter who is coerced or duped into protecting them by being seduced with insider privileges.

In opposition to secrets and their complicit dramatic disclosure, democracy requires patient trial and error, study and understanding of how to make it work against those who desire to asymmetrically dominate its openness whether by government, commerce, education or belief distortion of what is publicly known of authoritative deception.

To level the playing field of information exaggeration, it would be fair to ask Cryptome and its kissing cousins whether they would sell truly threatening information underhandedly rather than publish free samples to build a market for the rest. The answer will always be a lie wrapped in indignation. Followed by a confidential come hither note like this.

As we see in the forever breaking and threatening news world of porcine spies and pig kissing "public interest" barbecuers.

If nothing else, disbelieve Cryptome. Think for yourself.

Afghan president's half-brother shot dead

Pastedgraphic-2

"Kabul, Afghanistan (CNN) -- The half-brother of Afghan President Hamid Karzai was shot dead at his home in Kandahar on Tuesday, authorities said.

Ahmed Wali Karzai, the Kandahar provincial council chief, was killed during a gathering, said provincial governor Tooryalai Wesa. He did not know a motive.

While the governor initially said a friend killed Karzai, his spokesman later clarified that the death was at the hands of a guard..."

http://www.cnn.com/2011/WORLD/asiapcf/07/12/afghanistan.karzai.brother/index....

"In October 2009 the New York Times reported that Ahmed Wali Karzai received payments from the CIA for "a variety of services", including the recruitment of the Kandahar Strike Force, an Afghan paramilitary force run by the CIA in the Kandahar region. It also stated that he was paid for allowing the CIA and U.S. special forces to rent the former residence of Taliban supreme leader Mullah Omar.[16] However, Karzai has denied taking any payment from the CIA.[17..."

http://en.wikipedia.org/wiki/Ahmed_Wali_Karzai

The dangers of the internet: Invisible sieve

Pastedgraphic-1

"The Filter Bubble: What the Internet is Hiding From You.By Eli Pariser. Penguin Press; 294 pages; $25.95. Viking; £12.99.Buy from Amazon.com, Amazon.co.uk

ELI PARISER is worried. Why? Call a friend in another city or a foreign country, and ask them to Google something at the same time as you. The results will be different, because Google takes your location, your past searches and many other factors into account when you type in a query. In other words, it personalises the results. As Larry Page, the chief executive of Google, once put it, “the ultimate search engine would understand exactly what you mean, and give back exactly what you want.” Eric Schmidt, executive chairman of Google, muses that someday it might be possible for people to ask Google which college they should apply for, or which book to read next.

This is only one example of internet personalisation. Mr Pariser, an internet activist best known as a leading light at MoveOn.org, a progressive online campaign group, sees this as a dangerous development. Netflix, Amazon and Pandora can predict with astonishing accuracy whether you will enjoy a particular film, book or album, and make appropriate recommendations. Facebook shows you updates from the friends you interact with the most, filtering out people with whom you have less in common. “My sense of unease crystallised when I noticed that my conservative friends had disappeared from my Facebook page,” Mr Pariser writes. The result is a “filter bubble”, which he defines as “a unique universe of information for each of us”, meaning that we are less likely to encounter information online that challenges our existing views or sparks serendipitous connections. “A world constructed from the familiar is a world in which there’s nothing to learn,” Mr Pariser declares. He calls this “invisible autopropaganda, indoctrinating us with our own ideas..”

http://www.economist.com/node/18894910
http://www.thefilterbubble.com/

9/11 Concocted Caveman Conspiracy Theory - Judith Miller‬‏

Al Qaeda has "...literally thousands of well-educated people..."

7/7: Seeds of Deconstruction

AQ's Size

A few hundred, or tens of thousands.

"...Hirsh'sNewsweek article said that the intelligence community “generally agrees that the number of true A-list Al Qaeda operatives” at the time of 9/11 probably between 500 and 1,000, most of them in and around Afghanistan...."

http://www.harpers.org/archive/2006/07/sb-al-qaeda-new-members-badly-needed-1...

"In addition to Al Qaeda’s Pakistani-based high command and the hundreds of other operatives in its core organization, “Al Qaeda Prime”, Osama bin Laden’s terrorist syndicate includes dozens of affiliates located in over sixty countries throughout the world. Although America’s post-9/11 campaign appears to have eliminated most of Al Qaeda Prime’s operatives within its former stronghold of Afghanistan, the two most crucial targets have eluded the superpower. The syndicate’s operational director Ayman al-Zawahiri still controls Al Qaeda, issuing regular communications to the world at large and strategic guidance to the syndicate in private, while Bin Laden remains the indomitable symbolic leader of this anti-American insurgency. Additionally, many of the Al Qaeda Prime operatives who were sent from Afghanistan and Pakistan to other areas of the world remain at large. This dispersed group constitutes an unknown number of terrorist agents recruited from the tens of thousands of trainees that filtered through Al Qaeda’s camps, located either in Afghanistan prior to 9/11 or in Pakistan after 9/11. Following America’s disastrous public relations fallout from the Iraq invasion, the 2007 U.S. National Intelligence Estimate’s classification of Al Qaeda being “as strong as ever” suggests that Al Qaeda Prime may in time regenerate its depleted membership with a surge of new recruits motivated to join Bin Laden’s anti-American insurgency. Furthermore, nearly a decade after 9/11 Al Qaeda’s numerous affiliates remain largely in tact, as evinced by such catastrophic terrorist attacks as the Mumbai Massacre executed via the Pakistani-based affiliate Lashkar-e-Taiba at the behest of the Al Qaeda command sub-unit known as the “313 Brigade”. Perhaps most troublesome, Al Qaeda Prime has fortified its base in Afghanistan and Pakistan with the large percentage of Taliban operatives allied to Bin Laden under the leadership of Mullah Omar and the “Mehsud” coalition, along with affiliates like the Haqqani and Hekmatyar networks. The total membership of this umbrella organization that Bin Laden and Zawahiri have cobbled together numbers in the tens of thousands and provides Al Qaeda Prime with a global reach unmatched by any other terrorist network..."

http://www.binladensplan.com/AQ_s_Size.html

9/11 families demand to reopen case

Media_httprtcomfilesu_xfoug
via rt.com

Yep, that about sums it up.

Media_httpiimgurcomby_mhgsh

Pictures of sand: Close up photographs reveal its incredible beauty

Tuesday, July 12, 2011

7/7 Inquests Blog

"7/7 Inquest: Examining and documenting the proceedings of the Coroner's Inquest into the London Bombings of 7 July 2005, including analysis of the hearing transcripts and the evidence presented."

http://77inquests.blogspot.com/

Monday, July 11, 2011

What I have been afraid to blog about: The ESF and Its History_Part 5‬‏

Source of terror threat is in UK Government, says a police Principal Intelligence Analyst

9-11 Deception Dollar

Ghostfunk

Ghostfunk - downloadalternate downloadsample information

Released in July 2011, Ghostfunk pairs one of my favorite hip-hop artists, Wu-Tang member Ghostface Killah, with vintage African funk, high-life, and psychedelic rock music. Artwork by Joe Dichiara.

9/11 WTC 7 Eyewitness - Looked Like A Skyscraper Implosion Done By A Demolition Crew‬‏

9/11 North Tower Demolition - Decending Horizontal Blasts At Speed Of Falling Debris‬‏

Index of enablers for the successful 9/11 hijackings

"The actual reasons why so many actions were not taken to prevent the 9/11 hijackings have been carefully withheld from the clueless American public. The evidence of misconduct by people and groups in the United States that had a far greater role as enablers to the hijackings and murder of 3,0000 people on September 11, 2001, remains one of America's greatest and most catastrophic scandals—if not the worse, by far.

This site provides factual, documented, insider evidence about deep-seated misconduct that enabled the easy hijackings of four airliners on September 11, 2001, leading to two of the longest wars in U.S. history. The events on that day were simply a continuation of the ripple effects that had been occurring for years. The relationship between the various forms of corruption and ripple effects were very carefully withheld from the people by the systemic cover-ups of the systemic high-level corruption in government.

The system will never change these conditions; only a group of informed, dedicated, and outraged people can do this. The information at this site and related sites and not-for-profit document books written by a former federal agent with the help of a collation of dozens of former intelligence and law enforcement personnel and other professional insiders.

Central to the efforts to expose and eliminate the systemic corruption and systemic cover-ups is former federal agentRodney Stich and his dozens of intelligence and law enforcement personnel, a mole in the primary al Qaeda cell prior to the series of major terrorist successes, including 9/11. Stich was first motivated by the series of horrific aviation disasters occurring in his area of federal airline safety responsibilities during the period when air disasters were a common occurrence..."

http://www.defraudingamerica.com/911_index.html

43 Weapons in Phoenix Traffic Stop Linked to ATF's 'Fast and Furious'‬‏

Australia's ties to Abu Ghraib‬‏

Saturday, July 9, 2011

Symptoms of Facism

Thank God all these horrors are totally absent in the US.

Pastedgraphic-1

"Dr. Lawrence Britt has examined the fascist regimes of Hitler (Germany), Mussolini (Italy), Franco (Spain), Suharto (Indonesia) and several Latin American regimes. Britt found 14 defining characteristics common to each:

• Powerful and Continuing Nationalism - Fascist regimes tend to make constant use of patriotic mottos, slogans, symbols, songs, and other paraphernalia. Flags are seen everywhere, as are flag symbols on clothing and in public displays.

• Disdain for the Recognition of Human Rights - Because of fear of enemies and the need for security, the people in fascist regimes are persuaded that human rights can be ignored in certain cases because of “need.” The people tend to look the other way or even approve of torture, summary executions, assassinations, long incarcerations of prisoners, etc.

• Identification of Enemies/Scapegoats as a Unifying Cause - The people are rallied into a unifying patriotic frenzy over the need to eliminate a perceived common threat or foe: racial , ethnic or religious minorities; liberals; communists; socialists, terrorists, etc.

• Supremacy of the Military - Even when there are widespread domestic problems, the military is given a disproportionate amount of government funding, and the domestic agenda is neglected. Soldiers and military service are glamorized.

• Rampant Sexism - The governments of fascist nations tend to be almost exclusively male-dominated. Under fascist regimes, traditional gender roles are made more rigid. Divorce, abortion and homosexuality are suppressed and the state is represented as the ultimate guardian of the family institution.

• Controlled Mass Media - Sometimes the media is directly controlled by the government, but in other cases, the media is indirectly controlled by government regulation, or sympathetic media spokespeople (Like Bill O'Reilly) and executives. Censorship, especially in war time, is very common.
• Obsession with National Security - Fear is used as amotivational tool by the government over the masses.

• Religion and Government are Intertwined - Governments in fascist nations tend to use the most common religion in the nation as a tool to manipulate public opinion. Religious rhetoric and terminology is common from government leaders, even when the major tenets of the religion are diametrically opposed to the government’s policies or actions.

• Corporate Power is Protected - The industrial and business aristocracy of a fascist nation often are the ones who put the government leaders into power, creating a mutually beneficial business/government relationship and power elite.

• Limiting and surpressing organizing powers- Because the organizing power of labor is the only real threat to a fascist government, labor unions are either eliminated entirely, or are severely suppressed.

• Disdain for Intellectuals and the Arts - Fascist nations tend topromote and tolerate open hostility to higher education, and academia. It is not uncommon for professors and other academics to be censored or even arrested. Free expression in the arts and letters is openly attacked.

• Obsession with Crime and Punishment - Under fascist regimes, the police are given almost limitless power to enforce laws. The people are often willing to overlook police abuses and even forego civil liberties in the name of patriotism. There is often a national police force with virtually unlimited power in fascist nations.

• Rampant Cronyism and Corruption - Fascist regimes almost always are governed by groups of friends and associates who appoint each other to government positions and use governmental power and authority to protect their friends from accountability. It is not uncommon in fascist regimes for national resources and even treasures to be appropriated or even outright stolen by government leaders.

• Fraudulent Elections - Sometimes elections in fascist nations area complete sham. Other times elections are manipulated by smear campaigns against or even assassination of opposition candidates, use of legislation to control voting numbers or political district boundaries, and manipulation of the media. Fascist nations also typically use their judiciaries to manipulate or control elections."

FBI Claims Oklahoma City Bombing Tapes Missing

Ladies And Gentlemen, We Have A Totally New Scariest Jobs Chart Ever

Overkill: The Rise of Military Police Raids in the US

balko_whitepaper_2006.pdf Download this file

Top court lets stand Saudi immunity in 9/11 case

Pastedgraphic-1

"(Reuters) - The U.S. Supreme Court on Monday let stand a ruling that Saudi Arabia, four of its princes and other Saudi entities cannot be held liable for the September 11, 2001, hijacked plane attacks in the United States.

The justices refused to review the ruling by a U.S. appeals court in New York that the Saudi defendants were protected by sovereign immunity in the lawsuit brought by victims of the attacks and their families.

The appeals court had upheld a lower court's dismissal of the lawsuit claiming Saudi Arabia, four princes, a Saudi charity and a Saudi banker provided material support to al Qaeda before the September 11 attacks..."

http://www.reuters.com/article/2009/06/29/us-sept11-saudi-lawsuit-idUSTRE55S3...


Lest we forget Elena Kagans involvement and subsequent nomination to the Supreme Court:


"NEW YORK – President Obama's nominee for the Supreme Court, Elena Kagan, helped shield Saudi Arabia from lawsuits filed by families of 9/11 victims seeking to target countries and leaders who helped finance al-Qaida.

"I'm very concerned about her views on executive power and her views with respect to the separation of power," Stephen A. Cozen, the lead attorney in the case for 9/11 victims, told WND..."

http://www.wnd.com/?pageId=152949

7/7 Ripple Effect‬‏

The Kingdom and the Towers

Ferrofluid Sculpture‬‏

9/11 and American Empire: Intellectuals Speak Out‬‏

The Shift is About to Hit the Fan! Shepard Ambellas Earth Shifting Observations Confirmed?‬‏

Friday, July 8, 2011

RFC 6274 on Security Assessment of the Internet Protocol Version 4

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Folks,

The IETF has just published RFC 6274, entitled "Security Assessment of
the Internet Protocol Version 4". It contains a large amount of
information on how to improve the security of IPv4 implementations and
IPv4 deployments.

This document is the result of quite a few years of work, as part of a
project I carried out on behalf of the UK CPNI (http://www.cpni.gov.uk),
and is the product of pursuing the CPNI's technical report on IPv4
security (http://www.gont.com.ar/papers/InternetProtocol.pdf) at the IETF.

The RFC is available at: http://www.rfc-editor.org/rfc/rfc6274.txt

Once again, I'd like to thank CPNI for their continued support.

Best regards,,
Fernando


- -------- Original Message --------
Subject: RFC 6274 on Security Assessment of the Internet Protocol Version 4
Date: Tue, 5 Jul 2011 09:45:51 -0700 (PDT)
From: rfc-editor@rfc-editor.org
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
CC: opsec@ietf.org, rfc-editor@rfc-editor.org


A new Request for Comments is now available in online RFC libraries.


RFC 6274

Title: Security Assessment of the Internet
Protocol Version 4
Author: F. Gont
Status: Informational
Stream: IETF
Date: July 2011
Mailbox: fernando@gont.com.ar
Pages: 75
Characters: 179909
Updates/Obsoletes/SeeAlso: None

I-D Tag: draft-ietf-opsec-ip-security-07.txt

URL: http://www.rfc-editor.org/rfc/rfc6274.txt

This document contains a security assessment of the IETF
specifications of the Internet Protocol version 4 and of a number of
mechanisms and policies in use by popular IPv4 implementations. It
is based on the results of a project carried out by the UK's Centre
for the Protection of National Infrastructure (CPNI). This document
is not an Internet Standards Track specification; it is published for
informational purposes.

This document is a product of the Operational Security Capabilities for
IP Network Infrastructure Working Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
http://www.ietf.org/mailman/listinfo/ietf-announce
http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org. Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJOE3ZXAAoJEJbuqe/Qdv/xvQsIAK8/yiXLsxyxvAiBkozRUtXM
zb3MvsQ+ena37bFhc0yT6JoMRUBr5RQgj3PKkWSSqD/TsasqFaYY5SuA4WBCZXsX
zUpfY5MStUvcp4Im2+XMmuWg2vh7QSdcJkE1uusQf+WhSKiC3qoUr++5urAME3O3
1683VCPP+gUuosvq7nadRzxq5vfY9zncHuSH+tCdxK8QAWk1wUelLIaJp0tnxLLb
1UrDGSBr24Fske9KXxZ54ImmQaRDYxxTl81uQ5IF95mXHEIawtAiQo0/m+FiEaLm
icuh+sc8HGuz2DIQZ5jCxwmDKm13J5iuyGcFzuhF0bh9xsozGKddvbzYSye1WIU=
=lJaK
-----END PGP SIGNATURE-----

I Am Iraq

Screen_shot_2011-06-26_at_2

I Am Iraq

Screen_shot_2011-06-26_at_2

9/11: What Was Israel's Role?

Evidence

'Download the audio from the infamous and astonishing four-part series by reporter Carl Cameron presenting credible evidence suggesting Israeli intelligence had foreknowledge of the 9/11 attacks. The second and third parts show they had the means to acquire this knowledge. According to Cameron, 

"Some American terrorist investigators fear certain suspects in the Sept. 11 attacks may have managed to stay ahead of them, by knowing who and when investigators are calling on the telephone."

"Evidence linking these Israelis to 9/11 is classified. I cannot tell you about evidence that has been gathered, it's classified information..."

Guy calls Cops Nazi's

I'm the law.

Tuesday, July 5, 2011

Wiki: Mohammad Mosaddegh

Pastedgraphic-2

"Mohammad Mosaddegh or Mosaddeq (Persian: محمد مصدّق,IPA: [mohæmˈmæd(-e) mosædˈdeɣ] (

This is a message from the MailScanner E-Mail Virus Protection Service
----------------------------------------------------------------------
The original e-mail attachment "13px-Speaker_Icon.svg.png"
is on the list of unacceptable attachments for this site and has been
replaced by this warning message.

Due to limitations placed on us by the Regulation of Investigatory Powers
Act 2000, we were unable to keep a copy of the original attachment.

At Tue Jul 5 23:19:04 2011 the virus scanner said:
Attempt to hide real filename extension (13px-Speaker_Icon.svg.png)

listen)*), also Mossadegh, Mossadeq, Mosadeck, or Musaddiq (16 June 1882 – 5 March 1967), was the democratically elected[1][2][3] Prime Minister of Iranfrom 1951 to 1953 when he was overthrown in a coup d'étatorchestrated by the United States Central Intelligence Agency.

From an aristocratic background, Mosaddegh was an author, administrator, lawyer, prominent parliamentarian, and politician. During his time as prime minister, a wide range of progressive social reforms were carried out. Unemployment compensation was introduced, factory owners were ordered to pay benefits to sick and injured workers, and peasants were freed from forced labor in their landlords' estates. Twenty percent of the money landlords received in rent was placed in a fund to pay for development projects such as public baths, rural housing, and pest control.[4]

He is most famous as the architect of the nationalization of the Iranian oil industry, which had been under British control since 1913 through the Anglo-Iranian Oil Company (AIOC) (later British Petroleum or BP). The Anglo-Iranian Oil Co. was controlled by the British government.[5] Mosaddegh was removed from power in acoup on 19 August 1953, organised and carried out by the United States CIA at the request of the British MI6 which chose Iranian General Fazlollah Zahedi to succeed Mosaddegh.[6] While the coup is commonly referred to as Operation Ajax[7] after its CIA cryptonym, in Iran it is referred to as the 28 Mordad 1332 coup, after its date on the Iranian calendar.[8] Mosaddegh was imprisoned for three years, then put under house arrest until his death..."

http://en.wikipedia.org/wiki/Mosaddeq