ABDELKRIM BENSAMAIL | Abdelkrim Bensamail | Isamic Armed Group | Europe | 20041025 | |||||
ABU DUJANA AL ANSARI | Abu Doujana al-Ansari | al-Qaeda in Iraq | Iraq-Jordan | At Large | 20050602 | Link | |||
Announced formation of al-Bara Bin Malek brigade of al-Qaeda in Iraq | |||||||||
Abu Doujana al-Ansari | al-Bara Bin Malek brigade | Iraq-Jordan | At Large | 20050602 | Link | ||||
Announced formation of al-Bara Bin Malek brigade of al-Qaeda in Iraq | |||||||||
AFTAB ANSARI | Aftab Ansari | al-Qaeda | Afghanistan/South Asia | In Jug | 20050426 | Link | |||
ANSAR AHMED DAR | Ansar Ahmed Dar | Lashkar-e-Taiba | India-Pakistan | 20071123 | Link | ||||
BENSAIAH BELKACEM | Bensayah Belkacem | al-Qaeda | Home Front: WoT | 20041117 | |||||
DR WAHID ANSARI | Dr Wahid Ansari | al-Qaeda | Afghanistan/South Asia | 20040717 | Link | ||||
FAHIM AHMED ANSARI | Fahim Ahmed Ansari | Lashkar-e-Taiba | India-Pakistan | 20080327 | Link | ||||
FAHIM ANSARI | Faheem Ansari | Lashkar-e-Taiba | 20090210 | ||||||
HASAN AL ANSARI | Hasan al Ansari | JNIM | 20180305 | ||||||
MAQSUD ANSARI | Maqsood Ansari | Jundullah | Afghanistan/South Asia | 20040814 | |||||
MOHAMED BENSAKHRIA | Mohammed Bensakhria | al-Qaeda in Europe | Europe | 20041009 | |||||
MOHAMED BENSAKRIA | Mohamed Bensakria | al-Qaeda in Europe | Europe | 20041006 | |||||
MUNSAF KHAN | Munsaf Khan | Amr Bil Maroof Wa Nahi Anil Munkar | 20080814 | ||||||
MUSAR ANSAR | Musar Ansar | Abu Sayyaf | Southeast Asia | 20040801 | Link | ||||
MUZAMIL ANSARI | Muzammil Ansari | al-Qaeda | Afghanistan/South Asia | 20040717 | Link | ||||
NAZIR TAUNSAVI | Nazir Taunsavi | Learned Elders of Islam | Afghanistan/South Asia | 20041022 | |||||
NUR MOHAMED ANSARI | Noor Mohammed Ansari | al-Qaeda | Afghanistan/South Asia | 20040717 | Link | ||||
RASHID ANSARI | Rashid Ansari | al-Qaeda | Afghanistan/South Asia | 20040717 | Link | ||||
SHAKIL ANSARI | Shakeel Ansari | Hizbul-Mujahideen | India-Pakistan | 20071225 | Link | ||||
SHARIF ENSALEM | Sharif Ensalem | Islamic Jihad | Israel-Palestine | 20041024 | |||||
SHEIKH ANSAR | Shaikh Ansar | Indian Mujaheddin | 20080924 |
Government Corruption |
A band of innovators reimagines the spy game for a world with no cover By David Ignatius July 10, 2025 |
2025-07-11 |
[WAPO] Aaron Brown was working as a CIA case officer in 2018 when he wrote a post for an agency blog warning about what he called "gait recognition." He cautioned his fellow officers that computer algorithms would soon be able to identify people not just by their faces, or fingerprints, or DNA — but by the unique ways they walked. Many of his colleagues, trained in the traditional arts of disguise and concealment, were skeptical. One called it "threat porn." But Brown’s forecast was chillingly accurate. A study published in May reported that a model called FarSight, using gait, body and face recognition, was 83 percent accurate in verifying an individual at up to 1,000 meters, and was 65 percent accurate even when the face was obscured. "It’s hard to overstate how powerful that is," Brown said. Brown’s story illustrates a profound transformation that is taking place in the world of intelligence. For spies, there is literally no place to hide. Millions of cameras around the world record every movement and catalogue it forever. Every action leaves digital tracks that can be studied and linked with others. Your cellphone and social media accounts tell the world precisely who and where you are. Further, attempts at concealment can backfire in the digital age. An intelligence source told me that the CIA gave burner phones to a network of spies in a Middle Eastern country more than a decade ago and instructed them to turn the phones on only when sending operational messages. But the local security service had devised an algorithm that could identify "anomalous" phones that were used infrequently. The network was exposed by its attempt at secrecy. "The more you try to hide, the more you stand out," Brown explained. He wouldn’t discuss the Middle East case or any other operational details. But the lesson is obvious: If you don’t have a cellphone or a social media profile these days, that could signal you’re a spy or criminal who’s trying to stay off the grid. Brown, a wiry former Army Ranger and CIA counterterrorism officer, is one of a small group of ex-spies who are trying to reinvent American intelligence to survive in this age of "ubiquitous technical surveillance," or UTS. He launched a new company this year called Lumbra. Its goal is to build AI "agents" that can find and assess — and act upon — data that reveals an adversary’s intentions. Lumbra is one of nearly a dozen start-ups that I’ve examined over the past several months to explore where intelligence is headed in 2025. It’s a dazzling world of new technology. One company uses data to identify researchers who may have connections to Chinese intelligence. Another interrogates big data systems the way an advertising company might, to identify patterns through what its founder calls "ADINT." A third uses a technology it calls "Obscura" to bounce cellphone signals among different accounts so they can’t be identified or intercepted. Most of these intelligence entrepreneurs are former CIA or military officers. They share a fear that the intelligence community isn’t adapting fast enough to the new world of espionage. "Technologically, the agency can feel like a sarcophagus when you see everything that’s happening outside," worries Edward Bogan, a former CIA officer. He now works with a nonprofit called 2430 Group — the number was an early CIA cover address in Washington — that tries to help technology companies protect their work from adversaries. The Trump administration recognizes this intelligence revolution, at least in principle. CIA Director John Ratcliffe said during confirmation hearings he wants to ramp up covert operations, with officers "going places no one else can go and doing things no one else can do." That’s a commendable goal, but if the agency doesn’t reinvent its tradecraft, Ratcliffe’s bold talk may well fail. Traditional operations will only expose the CIA and its sources to greater risk. A CIA spokesperson said this week in response to a query: "Today’s digital environment poses as many opportunities as it does challenges. We’re an adaptable agency, and it is well within the ingenuity and creativity of our officers to develop ways to navigate effectively in complex environments. In fact, we are exploiting many of the same technologies to recruit spies and steal information." Brown takes hope from the work that younger CIA officers are doing to reimagine the spy business: "Some of the agency’s smartest people are working on these tradecraft problems from sunup to sundown, and they are coming up with unique solutions." The CIA’s technology challenge is a little-noted example of a transformation that’s happening in every area of defense and security. Today, smart machines can outwit humans. I’ve written about the algorithm war that has revolutionized the battlefield in Ukraine, where no soldier is safe from drones and precision-guided missiles. We’ve just seen a similar demonstration of precision targeting in Israel’s war against Iran. For soldiers and spies everywhere, following the old rules can get you killed. (Illustration by Raven Jiang/For The Washington Post) The art of espionage is thousands of years old. The Bible speaks of it, as do ancient Greek, Persian and Chinese texts. Through the ages, it has been based on two pillars: Spies operate in secret, masking who they are and what they’re doing (call it "cover"), and they use techniques to hide their movements and communications (call it "tradecraft"). Modern technology has shattered both pillars. To recall the mystique of the CIA’s old-school tradecraft, consider Antonio J. Mendez, the agency’s chief of disguise in the 1980s. He described in a memoir how he created ingenious facial masks and other deceptions that could make someone appear to be a different race, gender, height and profile. Some of the disguises you see on "The Americans" or "Mission Impossible" use techniques developed by Mendez and his colleagues. The CIA’s disguises and forgeries back then were like works of fine art. But the agency in its first few decades was also a technology pioneer — innovating on spy planes, satellite surveillance, battery technology and covert communications. Its tech breakthroughs were mostly secret systems, designed and built in-house. The Silicon Valley tech revolution shattered the agency’s innovation model. Private companies began driving change and government labs were lagging. Seeing the disconnect, CIA Director George Tenet in 1999 launched the agency’s own venture capital firm called "In-Q-Tel" to connect with tech start-ups that had fresh ideas that could help the agency. In-Q-Tel’s first CEO was Gilman Louie, who had previously been a video game designer. In-Q-Tel made some smart early investments, including in the software company Palantir and the weapons innovator Anduril. But the CIA’s early attempts to create new tradecraft sometimes backfired. To cite one particularly disastrous example: The agency developed what seemed an ingenious method to communicate with its agents overseas using internet addresses that appeared to be news or hobby sites. Examples included an Iranian soccer site, a Rasta music page and a site for Star Wars fans, and dozens more, according to investigations by Yahoo News and Reuters. The danger was that if one agent was caught, the technology trick could be exposed — endangering scores of other agents. It was like mailing secret letters that could be traced to the same postbox — a mistake the CIA had made with Iran years before. Iran identified the internet ruse and began taking apart CIA networks around 2010. China soon did the same thing. The agency’s networks in both countries were largely destroyed from 2010 to 2012. In a 2012 speech during his stint as CIA director, Gen. David H. Petraeus warned that the fundamentals of spying had changed: "We have to rethink our notions of identity and secrecy. ... Every byte left behind reveals information about location, habits, and, by extrapolation, intent and probable behavior." But machines moved faster than humans in the spy world. That’s what I learned in my weeks of on-the-record discussions with former CIA officers working to develop the espionage tools of the future. They describe a cascade of commercial innovations — instant search, mobile phones, cheap cameras, limitless accessible data — that came so quickly the CIA simply couldn’t adapt at the speed of change. Duyane Norman was one of the CIA officers who tried to move the system. In 2014, he returned from overseas to take a senior operations job. The agency was struggling then to recover from the collapse of its networks in Iran and China, and the fallout from Edward Snowden’s revelation of CIA and NSA secrets. Norman remembers thinking that "the foundations of our tradecraft were being disrupted," and the agency needed to respond. Norman convinced his superiors that in his next overseas assignment, he should try to create what came to be called "the station of the future," which would test new digital technology and ideas that could improve offensive and defensive operations. This experiment had some successes, he told me, in combating surveillance and dropping outmoded practices. But the idea of a "station," usually based in an embassy, was still a confining box. "You’re the CEO of Kodak," Norman says he warned Director Gina Haspel when he retired in 2019, recalling the camera and film company that dominated the industry before the advent of digital photography. Kodak missed the chance to change, and the world passed it by. When I asked Norman to explain the CIA’s resistance to change, he offered another analogy. "If Henry Ford had gone to transportation customers and asked what they wanted, they would have said ’faster horses.’ "That’s what the CIA has been trying to build. Faster horses." The intelligence community’s problem was partly that it didn’t trust technology that hadn’t been created by the government’s own secret agencies. Mike Yeagley, a data scientist who runs a company called cohort.ID, discovered that in 2016 when he was working with commercial mobile phone location data. His business involved selling advertisers the data generated by phone apps. As a cellphone user moves from work to home — visiting friends, stores, doctors and every other destination — his device reveals his interests and likely buying habits. Yeagley happened to be studying refugee problems back then, and he wondered if he could find data that might be useful to NGOs that wanted to help Syrians fleeing the civil war into Turkey. He bought Syrian cellphone data — cheap, because it had few commercial applications. Then, on a whim, he began looking for devices that dwelled near Fort Bragg, North Carolina — where America’s most secret Special Operations forces are based — and later appeared in Syria. And guess what? He found a cluster of Fort Bragg phones pinging around an abandoned Lafarge cement plant in the northeast Syrian desert. Bingo! The cement factory was the headquarters of the Joint Special Operations Command task force that was running America’s war against the Islamic State. It was supposed to be one of the most secret locations on the planet. When I visited several times over the past decade as an embedded journalist, I wasn’t allowed to walk more than 50 yards without an escort. And there it was, lighting up a grid on a commercial advertising data app. Yeagley shared that information with the military back in 2016 — and they quickly tightened phone security. Commanders assumed that Yeagley must have hacked or intercepted this sensitive data. "I bought it," Yeagley told them. Even the military’s security experts didn’t seem to realize that mobile phones had created a gold mine of information that was being plundered by advertisers but largely ignored by the government. Thanks to advice from Yeagley and many other experts, data analytics is now a growing source of intelligence. Yeagley calls it "ADINT," because it uses techniques developed by the advertising industry. Who would have imagined that ad salespeople could move faster than secret warriors? (Illustration by Raven Jiang/For The Washington Post) Glenn Chafetz had been station chief in three countries when he returned to Langley in 2018 to take an assignment as the first "Chief of Tradecraft" in the operations directorate. It was the agency’s latest attempt to adapt to the new world, succeeding the Ubiquitous Technical Surveillance Working Group, which in turn had replaced the CCTV Working Group. "People realized that the problem wasn’t just cameras, but payment systems, mobile apps, WiFi hubs — any technology that produced data that lived permanently," Chafetz recalls. But there was still a lack of understanding and resistance from many officers who had joined the CIA when there were no cellphones, digital cameras or Google. For the older generation, tradecraft meant executing "surveillance detection routes" to expose and evade trackers. Case officers had all gone through field training to practice how to detect surveillance and abort agent meetings that might be compromised. They met their assets only if they were sure they were "black," meaning unobserved. But when cameras were everywhere, recording everything, such certainty was impossible. Chafetz lead a team that tried to modernize tradecraft until he retired in 2019. But he remembers that an instructor in the agency’s training program admonished him, "New officers still need to learn the basics." The instructor didn’t seem to understand that the "basics" could compromise operations. The tradecraft problem wasn’t just pervasive surveillance, but the fact that data existed forever. In the old days, explains Chafetz, "If you didn’t get caught red-handed, you didn’t get caught." But now, hidden cameras could monitor a case officer’s meandering route to a dead drop site and his location, long before and after. His asset might collect the drop a week later, but his movements would be recorded, before and after, too. Patterns of travel and behavior could be tracked and analyzed for telltale anomalies. Even when spies weren’t caught red-handed, they might be caught. The CIA’s default answer to tradecraft problems, for decades, was greater reliance on "nonofficial cover" officers, known as NOCs. They could pose as bankers or business consultants, say, rather than as staffers in U.S. embassies. But NOCs became easier to spot, too, in the age of social media and forever-data. They couldn’t just drop into a cover job. They needed an authentic digital history including things like a "LinkedIn" profile that had no gaps and would never change. For some younger CIA officers, there was a fear that human espionage might be nearly impossible. The "station of the future" hadn’t transformed operations. "Cover" was threadbare. Secret communications links had been cracked. The skeptics worried that the CIA model was irreparably broken. After all my conversations with veteran CIA officers, I’ve concluded that the agency needs an entirely new tool kit. Younger officers inside recognize that change is necessary. Pushing this transformation from the outside are scores of tech-savvy officers who have recently left the CIA or the military. It’s impossible at this stage to know how many of these ventures will prove successful or important; some won’t pan out. The point is the urgent need to innovate. Let’s start with cellular communications. That’s a special worry after Chinese intelligence penetrated deep inside the major U.S. telecommunications companies using a state-sponsored hacking group known as "Salt Typhoon." A solution is offered by a company called Cape, which sells customers, in and out of government, a mobile network that can disappear from the normal cellular grid and protect against other vulnerabilities. Cape was founded in 2022 by John Doyle, who served as a U.S. Army Special Forces sergeant from 2003 to 2008 and then worked for Palantir. His "Obscura" technology bounces mobile phone identifiers among thousands of customers so it’s impossible to trace any of them. He calls his tactic "opportunistic obfuscation." One of the most intriguing private intelligence companies is Strider Technologies, founded in 2019 by twin brothers Greg and Eric Levesque and chief data officer Mike Brown. They hired two prominent former CIA officers: Cooper Wimmer, who served in Athens, Vienna, Baghdad and Peshawar, and other locations; and Mark Pascale, a former station chief in both Moscow and Beijing. The company also recruited David Vigneault, former head of Canadian intelligence. Strider describes itself as a "modern-day economic security agency." To help customers secure their innovation and talent, it plucks the secrets of adversaries like China and Russia that steal U.S. commercial information. China is vulnerable because it has big open-source databases of its own, which are hard to protect. Using this data, Strider can analyze Chinese organizations and their employees; it can study Chinese research data, and how it was obtained and shared; it can analyze the "Thousand Talents" programs China uses to lure foreigners; it can track the contacts made by those researchers, at home and abroad; and it can identify connections with known Chinese intelligence organizations or front companies. Eric Levesque explained to me how Strider’s system works. Imagine that a software engineer is applying to work for an international IT company. The engineer received a PhD from a leading American university. What research did he conduct there? Was it shared with Chinese organizations? What research papers has he published? Who in China has read or cited them? What Chinese companies (or front companies) has he worked for? Has this prospective employee touched any branch of the Chinese civil-military conglomerate? Strider can operate inside what China calls the "Great Firewall" that supposedly protects its data. I didn’t believe this was possible until Levesque gave me a demonstration. On his computer screen, I could see the links, from a researcher in the West, to a "Thousand Talents" program, to a Ministry of State Security front company. It turns out that China hasn’t encrypted much of its data — because the authorities want to spy on their own citizens. China is now restricting more data, but Levesque says Strider hasn’t lost its access. We’ve entered a new era where AI models are smarter than human beings. Can they also be better spies? That’s the conundrum that creative AI companies are exploring. Scale AI sells a product called "Donovan," named after the godfather of the CIA, William J. "Wild Bill" Donovan. The product can "dig into all available data to rapidly identify trends, insights, and anomalies," says the company’s website. Alexandr Wang, the company’s founding CEO (who was just poached by Meta), explains AI’s potential impact by quoting J. Robert Oppenheimer’s statement that nuclear weapons produced "a change in the nature of the world." Vannevar Labs, another recent start-up, is creating tools to "influence adversary behavior and achieve strategic outcomes." Its website explains: "We develop sophisticated collection, obfuscation, and ML (machine learning) techniques to provide assured access to mission relevant data." The company’s name evokes Vannevar Bush, an MIT engineer who headed the U.S. Office of Scientific Research and Development, which oversaw all major U.S. research projects during World War II, including the launch of the Manhattan Project. Lumbra.ai, the company launched in March by Brown, seeks to create what he describes as a "central nervous system" that will connect the superintelligence of future AI models with software "agents." After leaving the CIA in 2021, Brown met with Sam Altman, the founder of Open AI, to refine his thinking. To describe what agentic AI can do, he offers this hypothetical: "We can find every AI researcher, read all the papers they’ve ever written, and analyze any threats their research may pose for the United States." Human spies could never be so adept. LUMBRA "No one said we have to collect intelligence only from humans," Brown tells me. "When a leader makes a decision, someone in the system has to take a step that’s observable in the data we can collect." Brown’s AI agents will create a plan and then build and use tools that can gather the observable information. Brown imagines what he calls a "Case Officer in a Box." Conceptually, it would be a miniaturized version of an agentic system running a large language model, like Anthropic’s Claude. As an offline device, it could be carried in a backpack by anyone and left anywhere. It would speak every language and know every fact ever published. It could converse with an agent, asking questions that elicit essential information. "Did you work in the Iranian weaponization program?" our Case Officer in a Box might ask a hypothetical Iranian recruit. "Where was your lab? In the Shariati complex? Okay, then, was it in the Shahid Karimi building or the Imam Khomeini building? Did you work on neutron triggers for a bomb? How close to completion was your research? Where did you last see the prototype neutron triggers? Show me on a map, please." The digital case officer will make a great movie, but it’s probably unrealistic. "No one is going to put their life in the hands of a bot," cautioned Wimmer, a fabled CIA recruiter. The agent would suspect that the AI system was really a trick by his own country’s spies. Brown agrees that recruiting a human spy will probably always require another human being who can build the necessary bond of trust. But once that bond is achieved, he believes technology will enhance a spy’s impact in astonishing ways. Here’s the final, essential point. Human spies in the field will become rare. Occasionally, a piece of information will be so precious that the CIA will risk the life of one of its officers, and the life of an agent, to collect the intelligence in person. But that kind of face-to-face spying will be the exception. The future of espionage is written in zeros and ones. The CIA will survive as a powerful spy agency only if it makes a paradigm shift. |
Link |
Syria-Lebanon-Iran |
US-backed forces to launch anti-ISIS operation in Syria: Brigade spox. |
2025-06-30 |
[Rudaw] US-backed forces in Syria are preparing to launch a large-scale military operation against Islamic State![]() Allaharound with every other sentence, but to hear western pols talk they're not reallyMoslems.... (ISIS) cells, a spokesperson for a faction aligned with the Kurdish-led Syrian Democratic Forces (SDF) told Rudaw on Sunday. The campaign comes amid a growing threat from ISIS across the country, especially in northeast Syria (Rojava). Mahmoud Habib, spokesperson for the North Democratic Forces - a component of the SDF - said the campaign is in response to a recent uptick in ISIS activities. "The details of the operation are not yet known. We do not know when it will be launched, what its nature will be, or which forces will take part alongside the SDF and coalition troops," Habib stated. The US-backed SDF functions as the de facto military force in Rojava and is the primary local partner of the Washington-led Global Coalition to Defeat ISIS. The North Democratic Forces operate mainly in northern Syria and share the SDF’s objective of combating terrorism. According to Habib, the upcoming operation may see the participation of other US-backed groups, namely, the Syrian Free Army (SFA). He noted that the campaign aims not only to dismantle ISIS cells but also to prevent potential attacks on major population centers, including the capital Damascus, its surrounding countryside, and the central Homs province. The Syrian Free Army (SFA), originally a broad rebel coalition, has evolved over the past decade from earlier US-backed groups such as the New Syrian Army (NSA) and the Revolutionary Commando Army (RCA). These factions were trained and supported by the US and have operated primarily from the al-Tanf garrison - a strategically located US military base near the Syrian, Iraqi, and Jordanian borders - carrying out counter-ISIS operations. Following the fall of Syrian dictator Bashir Pencilneckal-Assad Supressor of the Damascenes... in early December, the SFA is reportedly being integrated into the newly established 70th Division of the unified Syrian army, currently being formed by the incumbent transitional government. Importantly, Habib noted that the upcoming operation follows recent intelligence reports indicating that ISIS cells are planning attacks near urban areas. "The goal of the operation is to stop these kinds of attacks," he said. ISIS was territorially defeated in Syria in 2019. However, a woman is only as old as she admits... in recent months, the group has seemingly been trying to make a comeback, capitalizing on the shifting security landscape following Assad’s ouster. Last week, a deadly bombing struck the Mar Elias Church in Damascus during Sunday mass. Two assailants opened fire on worshippers before detonating an explosive vest, killing 25 people and injuring 63 others, according to the Syrian health ministry’s final toll. On Tuesday, the Syrian interior ministry attributed the attack to an ISIS cell. Ministry spokesperson Noureddine al-Baba claimed the two jacket wallahs were "non-Syrian" and had infiltrated the capital from al-Hol camp, located in SDF-controlled northeast Syria (Rojava). al-Hol camp houses thousands of individuals, many of whom are family members of suspected ISIS murderous Moslems. However, a woman is only as old as she admits... the Syrian Democratic Forces (SDF) swiftly rejected the ministry’s claims, emphasizing that al-Hol primarily shelters women and kiddies rather than imported muscle. The SDF also noted that any individuals released from the camp in recent months, were freed at the request of Damascus authorities. Notably, the upcoming military campaign also comes amid a surge of ISIS attacks across SDF-controlled areas, with both civilians and security forces increasingly being targeted. In mid-May, the UK-based Syrian Observatory for Human Rights (SOHR) reported that it had documented 84 ISIS operations in Rojava since the beginning of 2025. These included armed assaults, targeted liquidations, and bombings. |
Link |
Israel-Palestine-Jordan |
Cost of damages from Iran war forecast at double October 7 and ensuing attacks |
2025-06-26 |
![]() The cost of property damages from Iranian missile and drone attacks on Israel over the past 12 days is estimated to be around double the sum of claims stemming from the October 7 attack and all 615 days since, the head of the Tax Authority’s compensation department said Monday. The likely NIS 5 billion ($1.47 billion) price tag calculated by Amir Dahan underlined the destructive power of the few Iranian missiles to make it through Israel’s air defense shield, carrying massive warheads that reduced whole apartment buildings to rubble and sent out blast waves that shattered windows and caused other damage over a wide area. "These are figures we have never seen for direct property damage," Dahan told the Knesset Finance Committee on Monday. According to Dahan, damage claims resulting from ballistic missile attacks from Iran ...a theocratic Shiite state divided among the Medes, the Persians, and the (Arab) Elamites. Formerly a fairly civilized nation ruled by a Shah, it became a victim of Islamic revolution in 1979. The nation is today noted for spontaneouslytaking over other countries' embassies, maintaining whorehouses run by clergymen, involvement in international drug trafficking, and financing sock puppet militiasto extend the regime's influence. The word Iranis a cognate form of Aryan.The abbreviation IRGCis the same idea as Stürmabteilung (or SA).The term Supreme Guideis a the modern version form of either Duceor Führeror maybe both. They hate had already reached NIS 4.5 billion ($1.32 billion) as of Monday and were expected to climb by another NIS 500 million. By comparison, Israeli property owners had incurred some NIS 2.5 billion ($735 million) in damage resulting from the October 7 attack and since, including months of heavy fighting in the north. Some 40,000 property claims over the war have already been filed, a figure that Dahan predicted would likely reach 50,000 or more, including claims from factories still assessing the extent of damage. It was not clear if the forecast was based on a longer timeline for the war, which appeared to end abruptly Tuesday morning following a US-brokered ceasefire. Despite the higher cost, the number was less than the 70,000 claims filed for damages between October 7, 2023, and June 12, 2025, including by those harmed by attacks from Hamas ![]() in Gazoo ...Hellhole adjunct to Israel and Egypt's Sinai Peninsula, inhabited by Gazooks. The place was acquired in the wake of the 1967 War and then presented to Paleostinian control in 2006 by Ariel Sharon, who had entered his dotage. It is currently ruled with a rusty iron fist by Hamas with about the living conditions you'd expect. It periodically attacks the Hated Zionist Entity whenever Iran needs a ruckus created or the hard boyz get bored, getting thumped by the IDF in return. The ruling turbans then wave the bloody shirt and holler loudly about oppressionand disproportionate response... , Hezbollah in Leb ...home of the original Hezbollah, which periodically starts a war with the Zionist Entity, gets Beirut pounded to rubble, and then declares victory and has a parade.... and the Iran's Houthi sock puppets ...a Zaidi Shia insurgent group operating in Yemen. They have also been referred to as the Believing Youth. Hussein Badreddin al-Houthi is said to be the spiritual leader of the group and most of the military leaders are his relatives. The legitimate Yemeni government has accused the them of having ties to the Iranian government. Honest they did. The group has managed to gain control over all of Saada Governorate and parts of Amran, Al Jawf and Hajjah Governorates. Its slogan is God is Great, Death to America™, Death to Israel, a curse on the JewsThey like shooting off... ummm... missiles that they would have us believe they make at home in their basements. On the plus side, they did murder Ali Abdullah Saleh, which was the only way the country was ever going to be rid of him... s in Yemen ...an area of the Arabian Peninsula sometimes mistaken for a country. It is populated by more antagonistic tribes and factions than you can keep track of... According to Israeli figures, Iran fired over 550 ballistic missiles at Israel during the war, though only 31 ballistic missile impacts were reported in populated areas. A single drone also hit a home in Beit She’an, out of around 1,000 launched by Tehran. Shrapnel from missiles and interceptors also caused scattered damage. Direct hits from Iran on the Weizmann Institute of Science in Rehovot and the Bazan oil refinery in Haifa were particularly destructive, Dahan said, without providing specific values. Of 38,700 claims filed before the rocket barrage Tuesday morning, which destroyed a building in Beersheba and killed four people, some 31,000 claims were made for damage to buildings, 3,700 for vehicle damage, and 4,000 for other property, including furniture and appliances, according to the Tax Authority. These included some 25,000 claims made in Tel Aviv, 10,800 in Ashkelon, 2,600 in Haifa and Acre, and 94 in Jerusalem, among other districts, according to incomplete Tax Authority data. For those evacuated from homes damaged by rockets, about 11,000 people have been placed in hotels, and an estimated 4,000 have gone to live with friends and relatives, according to the Federation of Local Authorities. Owners of properties rendered unusable due to damage from the war will not be liable for property taxes, the Interior Ministry ruled last week. Israel’s funds for property reparations stood at NIS 9 billion ($2.64 billion) before the start of Israel’s preemptive attack on Iran’s nuclear facilities on June 13, Dahan said. It currently has claims on the table of NIS 6 billion ($1.76 billion) from the Iran attack, including NIS 1.5 billion ($440 million) in outstanding claims from October 7 and ensuing fighting. The Tax Authority has 130 teams of appraisers charged with visiting every site filing a claim, ideally on the day the claim is filed, Dahan said. A new computerized system will allow claimants to upload photos of their damages to receive up to NIS 30,000 ($8,815) within 72 hours, he noted. Regarding damages to the contents of a home, Israeli law provides that owners can be compensated up to a certain value for different objects. For example, families can be compensated up to NIS 25,187 ($7,400) for damaged furniture and up to NIS 30,914 ($9,084) for electronics and appliances. The Tax Authority offers insurance for higher payouts, at a premium of 0.3 percent of the additional value. While only 600 Israelis had signed up for this additional coverage before the war, more than 50,000 have joined since the beginning of the Rising Lion operation, according to a report in the Hebrew daily Calcalist. COMPENSATION FOR BUSINESSES Economic damage from the war has extended far beyond missile damage, with businesses and schools closed due to restrictions on gatherings. On Monday, Israel’s Finance Ministry revealed a plan to compensate those affected financially, including grants for businesses and furloughed workers. Businesses bringing in less than NIS 300,000 ($86,000) a year will be eligible for a fixed business continuity grant "depending on the level of damage to the business," while businesses earning NIS 300,000 to NIS 400 million will be eligible for the reimbursement of 7%-22% of their expenses, "depending on the rate of damage to business turnover, as well as a refund of 75% of salary expenses in relation to the level of damage." Businesses with an annual turnover of NIS 300,000 to NIS 100 million ($28 million) will have compensation capped at NIS 600,000 ($172,000). Employees placed on unpaid leave due to the cessation of economic activity during the war will receive payments from the National Insurance Institute and will not be forced to use any of their accrued vacation days. |
Link |
Fifth Column |
The Dragon's Hidden Hand: How Chinese Organized Crime Could Serve as a Fifth Column in America |
2025-06-23 |
[GatewayPundit] Lessons from Taiwan’s defense planning reveal serious vulnerabilities in U.S. homeland security, particularly the risk that Beijing could activate sleeper cells composed of gangsters already inside the United States. Each year, Taiwan conducts the Han Kuang military exercises, a nationwide defense drill in which the military, public servants, civilians, and even schoolchildren participate in simulated responses to a Chinese invasion. These scenarios are drawn from ongoing assessments of the People’s Liberation Army (PLA) and recent Chinese military activity, using U.S.-designed simulation software that models invasion strategies based on current PLA trends. These exercises test Taiwan’s preparedness against a wide range of threats far beyond a conventional military assault. Scenarios include cyberattacks on critical infrastructure, disinformation campaigns aimed at undermining public morale, naval blockades to cripple the economy, and amphibious assaults targeting key ports and airports. The U.S. intelligence community and Department of Defense monitor these exercises and use the information to assess how a Chinese attack might unfold, taking steps to deter or counter such tactics. However, one scenario emphasized in Taiwan’s planning remains largely overlooked in the United States: the potential presence of a Chinese fifth column. This refers to sleeper agents, sympathizers, or covert operatives already inside the country who could activate pre-positioned assets and conduct sabotage operations targeting power grids, telecom networks, and transportation infrastructure, seriously undermining national defense and internal stability. Chinese criminal networks are firmly established in the United States. These organizations include traditional triads such as the 14K Triad, led by Wan Kuok Koi, “Broken Tooth,” a key figure in global organized crime. While the 14K dominates meth trafficking in the Asia-Pacific, it also exemplifies a criminal enterprise providing services to the Chinese government. Other major networks include Sun Yee On, Wo Shing Wo, and Tongs like the Fuk Ching and Flying Dragons. Additional actors include Snakehead smugglers involved in human trafficking, the Fujian Gang, the Cantonese Mafia, and diaspora gangs with mainland links that operate through business fronts and student associations. Chinese organized crime in America operates through a loose but disciplined confederation overseen from New York by mafias rooted in southern China, according to U.S. officials. Known as “triads” after historic secret society emblems, these groups wield influence both within China and across the diaspora, and are believed to maintain ties to the Chinese Communist Party. The coordination is extensive. In 2019, the DEA discovered that triad bosses had traveled from China to New York for sit-downs to issue directives and broker peace among factions. New York had become a command hub for narcotics and money laundering. Even more concerning is the documented connection between Chinese organized crime and state intelligence services. Beijing has built a broad surveillance network on U.S. soil. Between 2016 and 2022, four Chinese public security bureaus reportedly established 102 overseas police service stations across 53 countries. In the U.S., these stations have been identified in cities like New York, Los Angeles, Houston, and San Francisco, as well as in smaller communities in Nebraska and Minnesota. In the event of a conflict, Beijing could activate Chinese criminal networks to advance broader strategic objectives. These groups, with technical expertise and ties to the Chinese government, are well-positioned to support both cyber and physical operations. Chinese cybercriminals—early adopters of artificial intelligence—could assist state-sponsored attacks targeting ports, railways, airports, 5G infrastructure, fiber-optic lines, power grids, energy facilities, and water treatment plants. U.S. agencies including CISA, the NSA, and the FBI have already warned that PRC cyber actors are pre-positioning themselves within American IT networks in preparation for potential attacks. |
Link |
Syria-Lebanon-Iran |
All U.S. Navy vessels forward-deployed at NSA Bahrain have departed port amid rising tensions |
2025-06-17 |
[Telegram-NoelReports] All U.S. Navy vessels forward-deployed at NSA Bahrain have departed port amid rising tensions. At least 1 Littoral Combat Ship, 4 Mine Countermeasure ships, and special ops mothership M/V Ocean Trader are now operating in CENTCOM's AOR. Related: Bahrain: 2025-06-15 'The Young and Evil Will Come.' What the Media Writes About Iran's Prospects Bahrain: 2025-06-15 What will happen to the 'nuclear deal' after mutual strikes between Israel and Iran Bahrain: 2025-06-12 President Trump has convened a security meeting with top military officials in the White House, Defense Sec’ty Hegseth orders mil. dependents home from MidEast, nonessential diplo. staff sent home from Iraq |
Link |
-Signs, Portents, and the Weather- |
Mount Etna has begun to erupt on the island of Sicily |
2025-06-03 |
Direct Translation via Google Translate. Edited. [Regnum] An eruption of Mount Etna has begun on the Italian island of Sicily. Volcanic tremors had previously occurred in this area, the first of which was recorded on the evening of June 1. Local residents posted videos on social media taken in the vicinity of the volcano. The footage shows a powerful ash cloud rising above the crater. The height of the ash emission reached almost three kilometers. The intensity of the emission of hot rocks is increasing, the ANSA news agency reported, citing the Italian National Institute of Geophysics and Volcanology. "According to preliminary observations, the hot material apparently did not pass the edge of Valle del Leone. At the same time, explosive activity from the Southeast Crater was replaced by a lava fountain," the article says. The eruption is also reported to be visible in all parts of the island. The region was initially placed on red alert, later downgraded to orange. Etna is the highest and most active volcano in Europe and is considered one of the most dangerous on the planet. In April 2024, the volcano emitted smoke rings, photos and videos of which were distributed in the press and social networks. Later, in July, Etna emitted lava fountains, a column of ash and smoke. |
Link |
Government Corruption |
Deep Dive into FBI Scandal on Prohibited Files in Sentinel System |
2025-06-02 |
[ConservativeTreehouse] Details Surface of FBI Record System Containing “Prohibited Access” Files, Exclusively Controlled by 7th Floor FBI Officials As previously noted, Senate Judiciary Chairman Chuck Grassley released some of the FBI investigative files related to a congressional referral of Nellie Ohr for false testimony to congress. Within the Grassley release the declassified FBI investigative notes show that Trump-Russia files were compartmentalized, allowing control over access to them by the FBI Director and FBI Deputy Director. The 7th floor level classification within the FBI’s Sentinel record-keeping system was previously unknown, and now people are starting to ask questions about what other information may be filed yet invisible due to the classification designation of “Prohibited Access.” The Sentinel record-keeping system allows FBI officials and investigators to review and research the status of investigations both past and current. The Sentinel system is also the information system that is searched for responsive documents to legal cases and FOIA inquires. The Sentinel system contains all the information used by the FBI. Within the Sentinel system there are “Restricted Access” files that are used to control who can view the file information. The FBI official can see the file but cannot access the information within it without a higher clearance level. However, now people are discovering there is a “Prohibited Access” designation that makes the file invisible to searches or queries and is controlled by the FBI Director and FBI Deputy Director. Margot Cleveland is asking some good questions about how the use of the “Prohibited Access” designation may circumvent the FBI’s legal requirements (brady material) and FOIA searches. [SEE HERE] However, I would also note this approach hides information not only from congress and from the public, but also from the Executive branch itself. The DNI wouldn’t even know what information exists. Additionally, we can expand the overall issue to highlight this same approach at work in various other governmental agencies. This is one of the reasons I refer to the agencies within government more aptly as information “silos.” The same “secrecy filtering” system outlined in the FBI Sentinel system, “restricted access” (visible but needing a higher clearance) vs “prohibited access” (totally invisible) exists in other govt systems. The NSA, DHS and CIA contain the same issue, information hidden and kept secret. This is the core reason I have historically called them “silos.” The same ‘what the heck’ realization encountered with the FBI file keeping, as noted by the Grassley revelations, extends far beyond the FBI. This is also why I have said the Intelligence Community has created a “caste system” within the surveillance and information space. Now do you see why elements of the IC, and by extension their political enablers, were going bananas about DOGE access? Simmer on it for a moment, because it gets worse. Right now, like right now while you are reading this, the same framework is being applied to the DHS surveillance network, where “restricted access” and “prohibited access” (invisible) are being applied to PEOPLE. Our government, via Palantir, is currently building the domestic identity surveillance system, where every identity will be stored. However, within the storage, and by extension the parameters of the surveillance search results, there will be people who are defined by placing their identity in the “prohibited access” category. Great job realizing the secrecy ramifications of the issue within the FBI and their exploitation therein. Now extend that realization to the ramifications for us of other silos doing the same. I was told in August 2020 that the FBI investigative file into James Wolfe leaking the Carter Page FISA application, is in the “prohibited access” tier of the FBI because it outlines Senate Select Committee on Intelligence Vice-Chairman Mark Warner participating and directing the leak. That was how/why SSCI Security Director James Wolfe was never charged with leaking a TSCI classified file. Is the President of the United States really in charge of the executive branch, when the agencies can easily hide information from him? Related: Chuck Grassley 05/29/2025 Nellie Ohr, Justice Department official's wife, perjured herself with ‘demonstrably false' Trump-Russia testimony: bombshell FBI records Chuck Grassley 04/02/2025 House GOP advance bill which will halt ''rogue'' judges from pausing Trump''s executive orders Chuck Grassley 03/15/2025 Biden White House turned over Trump, Pence government cellphones to FBI as part of anti-Trump agent''s case Related: Nellie Ohr 05/31/2025 Recent release by Sen. @ChuckGrassley suggests systemic violations of Brady by FBI. Nellie Ohr 05/29/2025 Nellie Ohr, Justice Department official's wife, perjured herself with ‘demonstrably false' Trump-Russia testimony: bombshell FBI records Nellie Ohr 05/18/2023 Durham report: Ex-DOJ official and wife had bigger roles in Steele dossier than known Related: James Wolfe 12/12/2021 Federal watchdog: Customs and Border Protection anti-terror unit investigated journalists James Wolfe 08/19/2020 Substantive Elements of The Big Story Behind The Mueller Special Counsel Purpose… James Wolfe 02/24/2020 More sleeping with sources in the swamp: Trump-hating DIA analyst pleads guilty to leaks to honeytrap reporter |
Link |
Home Front: Politix |
Trump Post Memorial Day Message, Calls Out "Scum" Who Tried to Destroy America |
2025-05-27 |
[Patriot Journal] Well, Americans, if you’re looking for someone who doesn’t mince words, President Donald Trump delivered a Memorial Day message that was pure, unadulterated Trump. While many were firing up the grill, he was firing off a statement that had the Swamp gasping for air. He took to Truth Social with an all-caps greeting that was less about gentle remembrance and more about a full-throated defense of the nation against those he sees determined to undermine it. From ’Fox News’: "HAPPY MEMORIAL DAY TO ALL, INCLUDING THE SCUM THAT SPENT THE LAST FOUR YEARS TRYING TO DESTROY OUR COUNTRY THROUGH WARPED RADICAL LEFT MINDS, WHO ALLOWED 21,000,000 MILLION PEOPLE TO ILLEGALLY ENTER OUR COUNTRY, MANY OF THEM BEING CRIMINALS AND THE MENTALLY INSANE, THROUGH AN OPEN BORDER THAT ONLY AN INCOMPETENT PRESIDENT WOULD APPROVE, AND THROUGH JUDGES WHO ARE ON A MISSION TO KEEP MURDERERS, DRUG DEALERS, RAPISTS, GANG MEMBERS, AND RELEASED PRISONERS FROM ALL OVER THE WORLD, IN OUR COUNTRY SO THEY CAN ROB, MURDER, AND RAPE AGAIN — ALL PROTECTED BY THESE USA HATING JUDGES WHO SUFFER FROM AN IDEOLOGY THAT IS SICK, AND VERY DANGEROUS FOR OUR COUNTRY," |
Link |
Home Front: Politix |
Top Connecticut Dem Jim Himes admits GOP SALT increase would ''be good'' for his state |
2025-05-27 |
[NYPOST] A key House Democrat on Sunday admitted there is ''one little portion'' of the GOP's megabill that he likes — the raising of the state and local tax deduction (SALT) cap from $10,000 to $40,000. Rep. Jim Himes (D-Conn.), the top Democrat on the House Intelligence Committee, voted against the proposed One Big Beautiful Bill Act alongside the rest of his party last week — but is acknowledging that his constituents would get a boost from its SALT change. ''That one little portion is going to be good for my constituents,'' Himes told CBS' ''Face the Nation.'' Republicans had capped the SALT deduction at $10,000 under the Tax Cuts and Jobs Act of 2017, disproportionately impacting blue states with high state and local taxes. The new bill would raise the SALT cap to $40,000 for households making $500,000 or less in annual income, amid fierce lobbying from blue-state Republicans. Rep. Jim Himes Related: Jim Himes 04/04/2025 US NSA director Timothy Haugh fired, Washington Post reports Jim Himes 03/09/2025 Some House members have mental faculties so diminished they can no longer do their jobs — and others voting drunk, high: lawmakers Jim Himes 03/28/2023 Revelation of FBI Informants Shakes Proud Boys' January 6 Trial, Congress pondering adding protections to surveillance law |
Link |
-Lurid Crime Tales- |
Not a girl, but a 'fruit platter.' Why do the Epstein defendants die? |
2025-05-08 |
Direct Translation via Google Translate. Edited. by Olga Kuznetsova [REGNUM] In the last days of April, those who are commonly called conspiracy theorists once again had a reason to worry. ![]() On the 25th, 41-year-old Virginia Giuffre was found dead - the one who is commonly called the first and key witness in the case of financier Jeffrey Epstein and socialite Ghislaine Maxwell, who provided sex services to the powerful. It was Virginia who first threw off the veil of anonymity and directly accused both Epstein and several celebrities - including Britain's Prince Andrew - of sexually exploiting minors and described in detail what had happened to her. In essence, Giuffre has condemned herself in advance to a bloody legal battle with her former offenders, the American media, and Western justice. This is quite a serious step that requires courage, a strong character and fighting endurance. And it is even stranger that Virginia's own family calls her death a suicide, and law enforcement officials do not see any criminal motive in the incident. ORGANIZERS AND CLIENTS At the age of seven, Giuffre was molested by a close friend of her parents, later the girl was placed in foster families, she ran away from home, at 14 she lived on the streets, was repeatedly subjected to physical violence, and at one point even spent six months with an elderly sex trafficker. And against the backdrop of such a life, she, working at a resort in Mar-a-Lago, met people who offered her to earn two hundred dollars a day from just one client instead of nine dollars a day. At first, just doing massages, and then not only massages. According to Giuffre herself, one can conclude that she understood from the very beginning what the matchmakers wanted from her. She just decided that she could not refuse because of her life and financial situation. The story unfolded in a way that was quite predictable for this “industry.” Ghislaine Maxwell sought out the right girls, persuaded them to cooperate, and, together with Epstein, taught them “how to properly handle wealthy clients.” Epstein himself "tried out" girls together with his friends, and then rented them out to influential people for a while. One of Giuffre's "clients" was the younger brother of the current British king, Prince Andrew. "They passed me around like a fruit platter," Giuffre said, describing her "work" for Epstein and Maxwell. Several years later, Virginia, having lost most of her illusions, entered a massage school in Thailand, where she met her future husband and subsequently gave birth to three children. In 2009, Giuffre filed her first lawsuit, against Maxwell, accusing the socialite of engaging in sex trafficking. Giuffre kept her name anonymous, appearing in the documents as " Jane Doe 102." The lawsuit prompted several similar lawsuits from other victims — all of whom were satisfied with undisclosed compensation awards. In January 2022, it was reported that Giuffre had received about $500,000 in compensation. However, after the birth of her daughter in 2010, Virginia decided that she could no longer remain anonymous. In 2011, she gave her first scandalous interview, to which she attached a photograph of herself standing hugging Prince Andrew at Maxwell's house in Belgravia. In 2014, Giuffre founded a nonprofit organization that brings together survivors of sexual exploitation and abuse. In 2021, she filed a civil lawsuit against Prince Andrew. Giuffre denied the claims, but the following year the parties reached an out-of-court settlement that included a significant donation from the royal to a nonprofit headed by Giuffre. Virginia's allegations led to Prince Andrew being suspended from his royal duties and charities, and reportedly being banished from Buckingham Palace. CIRCUMSTANCES OF DEATH In early April this year, Virginia Giuffre came forward with a statement that she had been in a car accident that left her with kidney failure, and doctors had "given her four days to live" and transferred her to a special urology hospital. Giuffre also posted a photo of herself with a bruised face. A little later, authorities in Australia, where the car crash occurred, reported that they had no reports of casualties as a result of the incident. Police, however, shared information that a "minor" collision between a car and a school bus occurred on March 24. The car was damaged, Virginia herself is in hospital, her life is not in danger. The Giuffre family did not provide details, saying only that the mother of the family published the data thinking she was doing it for her personal page on a social network. Then the media featured mutually exclusive stories: Virginia got worse, then everything was fine, then her condition was again stable and serious. Along the way, it turned out that the woman had previously accused her husband of domestic violence and before her death had fought for custody of the children. On April 25, the world media was abuzz with news that Giuffre had been found dead. Given the notoriety of the deceased, the department specializing in the investigation of particularly serious crimes was immediately brought into the case. However, investigators did not have any suspicions about Virginia's death in the first hours after examining the body. Her father expressed doubts that his daughter had committed suicide, and her lawyer publicly made it clear that "not everything is so clear-cut in the case." However, a little later, Virginia Giuffre's family acknowledged the non-violence of her death, and also expressed regret that someone who "was a fighter all her life" still could not bear the burden of violence inflicted on her. The lawyer, who until recently doubted that her client had committed suicide, began giving interviews in the style of “everyone misunderstood me,” and she says she doesn’t see anything suspicious in what happened, doesn’t criticize the police, doesn’t interfere in the personal affairs of the Giuffre family, and doesn’t advise others to do so. DIARIES OF THE DECEASED However, the brand that Virginia Giuffre's name has become will live on. Her brother and sister-in-law have announced their desire to continue the deceased's work and plan to advocate for the victims of Epstein and Maxwell. They did this by “accidentally leafing through” the deceased’s diaries and finding there many “words of support for the victims.” Apparently, one should not be surprised if the recordings also contain circumstances of her “interaction” with Epstein and Co. that were not voiced by the deceased herself. A SERIES OF SUICIDES The history of Jeffrey Epstein's crimes has long attracted attention due to the mysterious suicides of key participants in the criminal process. Epstein himself - according to the official version - committed suicide while in prison, just at the moment of questioning about the most interesting thing about his work - the list of clients. It is worth recognizing that people like Epstein die “just like that” extremely rarely, and rumors about “difficult deaths in this case” have some basis. In May 2023, Caroline Andriano, who also came forward with allegations against Ghislaine Maxwell and Epstein, who raped her when she was 14, died of a drug overdose. Even earlier, in 2017, another victim of Epstein, Lee Sky Patrick, also died from drug use. In both cases, the deaths were ruled the result of accidental drug overdoses, which both girls were heavily addicted to "trying to forget the stress of the violence they had experienced." American criminologists and psychologists do not see anything suspicious in such situations, since crimes against sexual inviolability can seriously damage the psyche and cause “worse things.” But what to make of the fact that one of Epstein's accomplices, modeling agent Jean-Luc Brunel, committed suicide in Paris's Sante prison in 2022? THERE WAS NO SENSATION When he took office, US President Donald Trump promised not only to reveal secrets about the assassination of John F. Kennedy, 9/11, or UFOs. He also guaranteed to tell the public what the FBI covered up in the Jeffrey Epstein case. In February, US Attorney General Pam Bondi declassified the first batch of documents, which included copies of Epstein's private jet logbooks, a list of 254 "masseuses," and an address book. The case also included a list of 150 pieces of evidence, including sex toys, massage tables, nude paintings and the like. However, journalists immediately realized that all these lists and logbooks in one form or another had been circulating on the Internet for several years. There was no sensation. The Prosecutor General's Office stated that so far they have only been able to obtain 200 pages on this criminal case, but they do not intend to stop and will continue to put pressure on the FBI. Of course, we can wait a little longer, but there is an opinion that the public will not receive any “extra” information even under Trump. And all the inconvenient characters – victims, criminals, and investigators – will gradually be taken out of the game. Some will (or have) gone into honorable retirement, and some will go to the next world. The American political machine will never shoot itself in the foot by telling truly inconvenient facts. Well, is this the first time? Related: Virginia Giuffre 04/26/2025 Virginia Giuffre, a survivor of Jeffrey Epstein’s sexual abuse, has died aged 41 Virginia Giuffre 02/07/2025 Question on Jeffrey Epstein ties prompts reported foul-mouthed response from new UK ambassador to US Virginia Giuffre 01/10/2024 Gwendolyn Beck, the female banker and ex-girlfriend of disgraced NJ Senator Bob Menendez, took part in orgies with Jeffrey Epstein and his victim Virginia Giuffre, unsealed dispositions claim |
Link |
Europe | |
AfD files lawsuit against German spy agency’s extremist classification | |
2025-05-06 | |
A German court said on Monday that far-right party Alternative for Germany had filed a lawsuit challenging the domestic intelligence agency’s decision to classify it as an murderous Moslem organization. A spokesperson for the administrative court in Cologne ![]() said the lawsuit and a corresponding emergency petition had been submitted, both of which would be reviewed once the BfV domestic intelligence agency had confirmed that it had been notified. The murderous Moslem classification announced on Friday allows the spy agency to step up monitoring of the AfD, the biggest opposition party in parliament, for example by recruiting informants and intercepting party communications. The agency’s 1,100-page experts’ report, which is not to be released to the public, found the AfD to be a racist and anti-Moslem organization. The German parliament could now attempt to limit or halt public funding for the AfD. The incoming government will also review whether to launch an attempt at an outright ban of the party, Social Democratic Party (SPD) leader Lars Klingbeil said last week. The AfD has denounced the designation as a politically motivated attempt to discredit and criminalize it. Its lawsuit comes one day before conservative leader Friedrich Merz is due to be elected chancellor by Germany’s lower house of parliament and amid a heated debate within his party over how to deal with the AfD. AfD extremist label: Almost half of Germans in favor of ban, more think ban will damage democracy than bolster it [DeutscheWelle] Almost half of Germans favor banning the Alternative for Germany (AfD) after the far-right party was officially categorized as a right-wing extremist organization by the domestic intelligence service. According to a representative survey conducted by the polling institute INSA for the Bild am Sonntag newspaper this weekend, 61% of Germans agreed with the categorization of the AfD by the Federal Office for the Protection of the Constitution (BfV) as "confirmed right-wing extremist endeavor," with 48% supporting a ban. Thirty-seven percent said they would oppose a ban; 15% said they didn't know. As for the effects of any potential AfD ban, 35% of respondents said they thought such a measure would bolster democracy, while 39% thought it would damage democracy. Some 16% didn't think there would be any effect, while 10% didn't know. | |
Link |