January 6, 2015 - The Constantine Report    
Image
March 5th 2020 12

Are you using the best credit card when ordering food for delivery?

The key to more success is to have a lot of pillows. Always remember in the jungle there’s a lot of they in there, after you will make it to paradise. Egg whites, turkey sausage, wheat toast, water.

Continue reading
Image
March 5th 2020 12

Are you using the best credit card when ordering food for delivery?

The key to more success is to have a lot of pillows. Always remember in the jungle there’s a lot of they in there, after you will make it to paradise. Egg whites, turkey sausage, wheat toast, water.

Continue reading
Image
March 5th 2020 12

Are you using the best credit card when ordering food for delivery?

The key to more success is to have a lot of pillows. Always remember in the jungle there’s a lot of they in there, after you will make it to paradise. Egg whites, turkey sausage, wheat toast, water.

Continue reading
Image
March 5th 2020 12

Are you using the best credit card when ordering food for delivery?

The key to more success is to have a lot of pillows. Always remember in the jungle there’s a lot of they in there, after you will make it to paradise. Egg whites, turkey sausage, wheat toast, water.

Continue reading
Image
March 5th 2020 12

Are you using the best credit card when ordering food for delivery?

The key to more success is to have a lot of pillows. Always remember in the jungle there’s a lot of they in there, after you will make it to paradise. Egg whites, turkey sausage, wheat toast, water.

Continue reading
Image
March 5th 2020 12

Are you using the best credit card when ordering food for delivery?

The key to more success is to have a lot of pillows. Always remember in the jungle there’s a lot of they in there, after you will make it to paradise. Egg whites, turkey sausage, wheat toast, water.

Continue reading

Who Was Emil Augsburg? (A: Nazi Holocaust Executioner of Jews & Postwar U.S. Military Intelligence Hero)

This is a modified py-6 that occupies the entire horizontal space of its parent.

Nazi Data Dump by Alex Constantine

“… Most prominent among the thousands of Nazi war criminals rescued from the gallows and employed by the United States are [Reinhard] Gehlen, Walter Rudolph, Walter Rauff, developer of the Nazi gas chamber, Walter Emil Schreiber, Otto Skorzeny, Emil Augsburg whose specialty was the mass murder of Polish Jews and other ‘undesirables.’ …” — “Bullshit At Nuremberg, Kissinger Joins The Boys, Experiment In Hiroshima, Installing Fascists And It’s Not A War Crime When We Do It, MAKING THE WORLD SAFE FOR HYPOCRISY Website.

http://mtwsfh.blogspot.com

Emil Augsburg, “American Military Counter-Intelligence” Officer

From Wikipedia

Polish-born SSStandartenführer and Nazi war criminal.

Career

Emil Augsburg was born in Congress Poland in 1904 and learned to speak fluent Polish and Russian.

“Studious and dedicated, Augsburg earned a doctorate three decades later studying about the press in the Soviet Union. In 1934 he joined the SD; membership in the S Sfollowed. In 1937, Augsburg became associated with the Wannsee Institute.”

Between 1939 and 1941 he worked for the Security Police. As part of his duties during World War II Augsburg was responsible for planning the SS executions of Jews and other “enemies of the Reich” in occupied Poland.

“After Augsburg was wounded in an air attack in Smolensk in September 1941, he returned to Berlin to conduct research on Eastern European matters. The RSHA foreign intelligence branch formally absorbed the Wannsee Institute in 1943.”

Just before the war ended Augsburg hid at a Benedictine cloister in Ettal, Germany. There he joined a sympathetic Polish monsignor and the pair escaped to the Vatican inRome.

Postwar

After the war, Augsburg was tried in absentia by the Communist Polish authorities. He escaped punishment because from 1947-1948 he was employed by an American military counter-intelligence agency as an expert on Soviet affairs.

After 1949 he worked for West German intelligence under Reinhard Gehlen.

“By the late 1950s, it was known that Soviet agents were trying to contact Augsburg. In the early 1960s, many people operating in intelligence circles believed Augsburg was working as a double agent…. He was increasingly viewed as a liability and a record of his nefarious wartime activities was compiled to force his quiet resignation. In 1966 Augsburg was dismissed for “unauthorized intelligence activities.”

———————

“… Richard Helms interviewed Adolf Hitler for UPI during the 1936 Olympics. In 1948, Helms welcomed Hitler’s spymaster, Reinhart Gehlen, and his spy network into the CIA (U.S. government payroll) as a ‘great intelligence producer.’ Gehlen’s network included some of the most dangerous individuals on the planet; SS Captain Otto Albrecht von Bolschwing, SS Major EMIL AUGSBURG, Gestapo Captain Klaus Barbie, SS Captain Josef Mengele. …” — IN SEARCH OF  BLACK ASSASSINS Website

———————

From: Historical Analysis of 20 Name Files from CIA Records

By Dr. Richard Breitman, Professor of History,
American University, IWG Director of Historical Research

1704802225264504898Emil Augsburg:  The name file of Emil Augsburg (alias Althaus, alias Alberti) reveals interesting details concerning intelligence cooperation between the U.S. and West German intelligence communities. Born in Lodz, Poland in 1904, Emil Augsburg obtained his doctorate in 1934 with a dissertation on the Soviet press. Fluent in Polish and Russian, he joined the SD the same year and began to make his way up the SS ranks, reaching major (Sturmbannfuehrer) in 1944. In 1937 he joined the Wannsee Institute, which performed ideologically-based research on Eastern Europe. He soon became a departmental director. In 1939-40 and again in the summer and fall of 1941 he joined the Security Police to carry out what were called “special duties (spezielle Aufgaben), a euphemism for executions of Jews and others the Nazis considered undesirable. Wounded in an air attack in Smolensk in September 1941, he returned in 1942 to Berlin for research on Eastern European matters. The RSHA foreign intelligence branch formally absorbed the Wannsee Institute in 1943. All this information, gleaned from Augsburg’s SS file, was available to the CIA and was in Augsburg’s file.

In a document not found in the Augsburg name file, a Nazi official named Mahnke stated that the Wannsee Institute exploited documents captured by German forces in the Soviet Union. It produced strictly secret intelligence reports on Russia for a select clientele of high Nazi officials, including Heinrich Himmler and Hermann Goering. Augsburg was described as the intellectual leader of this institute.

Despite being wanted by Poland for war crimes, Augsburg was used by CIC from 1947 to 1948 as an expert on Soviet affairs, thanks in part to his insistence that at the end of the war he had cashiered eight trunks of files about Comintern activities (these were never found). Augsburg was dropped as a CIC informant, perhaps the result of a negative appraisal by Klaus Barbie, who also worked for CIC. Barbie passed on word to CIC that Augsburg’s brother was part of a network of former SS officials with connections to the French.

Even before then Augsburg was picked up by the Gehlen organization, thanks mainly to his contacts within the anti-Communist émigré community and his ability to recruit agents from this group. By 1953 the Gehlen organization viewed Augsburg as a “shining star” in counterespionage and counterintelligence work: in 1959 one official referred to him as “a godsend.” Still, Gehlen himself insisted as late as 1954 that Augsburg work outside of the organization’s headquarters at Pullach because of Augsburg’s SS past and service in the RSHA, which made him vulnerable to Soviet coercion. As early as 1955 there were reports that the Soviets indeed were trying to contact him. In 1961 Augsburg came under renewed suspicion in the midst of the scandal over Heinz Felfe. In 1964-65 some of Augsburg’s eastern European contacts were exposed as suspected war criminals and as Soviet spies. In late 1965 the BND concluded that Augsburg too could be a double agent. Augsburg’s SS file was reviewed in 1964 with the hope that enough derogatory information about his Nazi past could be found to induce his voluntary resignation from the BND, but in the end, unauthorized intelligence activity led to his dismissal in 1966.

Sourve: http://www.archives.gov/iwg/declassified-records/rg-263-cia-records/rg-263-report.html

“… Like the neocons who were desperate for a pretext to invade Iraq, the Obamaites have an agenda of their own: targeting North Korea and citing the alleged threat of a ‘cybernetic Pearl Harbor’ in order to gin up public support for ‘cyber-security’ legislation that would give the government greater power to regulate the Internet as a ‘public utility.’ They’ve been agitating for this for quite a while and clearly see the Sony hack as their doorway to success. …”

The Sony Hack Fraud

A classic case of confirmation bias

By Justin Raimondo (Excerpt)

… A rising chorus of independent cyber-security professionals are virtually unanimous in the opinion that the Obama administration muffed it. The North Koreans, they say, didn’t hack Sony – and our “retaliation” is looking more and more like unprovoked aggression. As [computer security expert Jeffrey] Carr writes:

“Under international law, ‘the fact that a cyber operation has been routed via the cyber infrastructure located in a State is not sufficient evidence for attributing the operation to that State’ (Rule 8, The Tallinn Manual). The White House must responsibly evaluate other options, such as this one, before taking action against another nation state. If it takes such action, and is proved wrong later, which it almost certainly will be, the reputation of the U.S. government and the intelligence agencies which serve it will be harmed.”

Eviscerated is more like it.

So, if it wasn’t the North Koreans, then who are the hackers – and what was their motive? Marc Rogers, principal security researcher at Cloudflare, gave us a clue early on:

“Hard-coded paths and passwords in the malware make it clear that whoever wrote the code had extensive knowledge of Sony’s internal architecture and access to key passwords. While it’s (just) plausible that a North Korean elite cyber unit could have built up this knowledge over time and then used it to make the malware, Occam’s razor suggests the simpler explanation of a pissed-off insider.  Combine that with the details of several layoffs that Sony was planning and you don’t have to stretch the imagination too far to consider that a disgruntled Sony employee might be at the heart of it all.”

It looks like Rogers was right on the money. An independent investigation carried out by Norse Security, a respected Silicon Valley company, came up with what they regard as conclusive evidence as to the identity of at least one of the hackers – a ten-year Sony employee with major technical skills who was recently laid off, a woman called “Lena” in news accounts. According to Norse Vice President Kurt Stammberger, the group consists of six people residing in Thailand, Canada, Singapore, and the US. How did Norse arrive at this conclusion? As a writer for Slashdot put it: ”

“Rather than starting from the premise that the Sony hack was a state sponsored attack, Norse researchers worked their investigation like any other criminal matter: starting by looking for individuals with the ‘means and motive’ to do the attack.”

The hackers, it seems, outed themselves when they released that massive data dump, which included files from Sony’s human resources department. Last spring Sony fired an awful lot of people – and the Norse team traced their virtual footprints. The culprits had an intimate knowledge of the structure of Sony’s computer system, and this was therefore the logical place to look. Norse uncovered posts on social media where ex-employees vented their anger at being let go, and uncovered Internet Relay Chat forums where these disgruntled types got in touch with known hackers – including one person linked to a server on which the original version of the malware had been constructed in the summer of this year.

sony-hack-suspects-send-fbi-a-video-you-are-an-idiotThe Norse team has met with the FBI and presented their findings, but the feds don’t seem too interested. They are sticking by their totally debunked story, at least so far. Just like the neocons who maintain to this day that Saddam Hussein really did have those “weapons of mass destruction” – and that we were right to invade Iraq and murder more than half a million Iraqis in cold blood.

Indeed, the Obama administration’s absurd “investigation” seems to have been modeled on the Bush administration’s propaganda campaign in the run up to the Iraq war, in which every possible bit of pseudo-“evidence” was twisted to conclude that Saddam Hussein was building “weapons of mass destruction.” Starting with apreordained conclusion, they proceeded to construct a case based on factoids that seemed to confirm it.

Like the neocons who were desperate for a pretext to invade Iraq, the Obamaites have an agenda of their own: targeting North Korea and citing the alleged threat of a “cybernetic Pearl Harbor” in order to gin up public support for “cyber-security” legislation that would give the government greater power to regulate the Internet as a “public utility.” They’ve been agitating for this for quite a while and clearly see the Sony hack as their doorway to success.

Can the Obama administration “stay the course,” as the Bushies used to say, and ignore the rising tide of skepticism? We’ll see. I somehow don’t think they’ll be backing down and offering that apology demanded by Kim Jong-un.

In any case, the lessons of the Sony hack harken back to basic libertarian principles:

1) Never take the government’s word for anything – they always have an agenda and will make up “facts” to fit the occasion.

2) The private sector is invariably more efficient than the public sector – the government’s phony investigation was and is bullshit, while it took independent Internet entrepreneurs to uncover the truth.

3) Government-connected companies are just as bad as the government itself – as Jeffrey Carr puts it:

Sony Hack Theaters“Federal agencies’ demand for cyber threat intelligence is voracious and they pay well. That demand is frequently met by companies like Mandiant, now part of FireEye – the company handling Sony’s incident response. The problem is that these companies have no oversight and no standardized vetting of sources.”

I wrote about Mandiant and the great “cyber-war” scam here, but there’s another angle not mentioned by Carr: the enormous amount of government money that goes into “cyber-security” is incentive for these companies to tell the feds only what they want to hear. The result is an echo chamber effect that blinds both parties to reality.

Which brings us back to the Iraq model and the causes of the “intelligence failure” that enabled the neocons to lie us into war. The simple fact of the matter is that our rulers aren’t interested in the truth because they believe they can create their own reality. As one top Bush administration official told journalist Ron Suskind during the run-up to the war:

“The aide said that guys like me were ‘in what we call the reality-based community,’ which he defined as people who ‘believe that solutions emerge from your judicious study of discernible reality.’ … ‘That’s not the way the world really works anymore,’ he continued. ‘We’re an empire now, and when we act, we create our own reality. And while you’re studying that reality – judiciously, as you will – we’ll act again, creating other new realities, which you can study too, and that’s how things will sort out. We’re history’s actors…and you, all of you, will be left to just study what we do.’”

This is precisely what the “mainstream” media has been doing all throughout this episode: studying the pronouncements of government officials and relaying this new “reality” to the American people with the kind of shameful subservience once only found in totalitarian countries. The result is that even if the government’s narrative is definitively debunked, the average person – who isn’t following this story as closely as the computer experts – will continue to believe Sony was hacked by those evil North Koreans, and that we have to take “defensive” measures like bringing down Pyongyang’s Internet and empowering the government to regulate the online world. As George W. Bush once put it: Mission accomplished.

Full Story

http://original.antiwar.com/justin/2014/12/30/the-sony-hack-fraud/

 

Books: Eichmann… He wasn’t only following orders

Saul David on a new study of Adolf Eichmann, the bureaucratic mastermind of the Holocaust

Saul David

January 4,2015

In 1963 the political theorist Hannah Arendt published Eichmann in Jerusalem: a Report on the Banality of Evil. A Jew who had fled Germany in the 1930s, Arendt had been at the trial of Adolf Eichmann, the so-called “Manager of the Holocaust”, and believed his claim to be an overworked bureaucrat who was simply “doing his job”. He “not only obeyed orders”, she wrote, “he also obeyed the law”.

Arendt concluded that Eichmann, the head of the SS’s department for Jewish Affairs who personally oversaw the deportation and extermination of 400,000 Hungarian Jews in 1944, was neither a psychopathic “monster” nor a virulent anti-Semite. Instead, his appalling acts were driven more by stupidity and a desire for professional advancement than by ideology. Thus was coined the term “the banality of evil”, implying that there is a potential Eichmann in all of us.

Arendt’s theory has been challenged before. But only now, with the publication (originally in German) of this book by the award-winning political philosopher Bettina Stangneth, can we see how completely Arendt (and later historians) were hoodwinked by Eichmann.

Stangneth uses newly discovered documents, including Eichmann’s own notes and the transcripts of conversations he had with comrades in Argentina in the 1950s, to reconstruct the post-war lives of Nazis in exile. Stangneth’s new portrait of Eichmann is very different from Arendt’s. Instead of the reclusive, taciturn and boring war criminal on the run, she reveals a skilled social manipulator with a pronounced ability to reinvent himself, an ideological warrior unrepentant about the past and eager to continue the racial war against the Jews.

Stangneth charts in detail Eichmann’s movements from his escape from Germany in 1948 to his capture by Mossad agents in 1960. We discover just how organised the Nazi escape route to South America was, complete with Vatican officials helping to provide false identity documents, and how openly and brazenly former National Socialists lived in Argentina and elsewhere after the war. Protected by the regime of Juan Perón, they ran businesses, advised on security matters and plotted a political comeback in Germany. In Eichmann’s case, he even arranged for his wife and sons to be brought over from Germany to join him.

What ultimately did for Eichmann – as opposed to his former partner in crime Dr Josef Mengele, Auschwitz’s “Angel of Death”, who had also fled to Argentina – was his egotistical need for his “achievements” to be recognised.

He never denied his true identity, allowed his sons to apply for German passports in the name of Eichmann and discussed openly with fellow Nazis his true feelings about the Holocaust. He even allowed a former Dutch SS journalist, Willem Sassen, to record some conversations for a potential book. It was during the “Sassen interviews” that Eichmann came clean.

His only regret, he told Sassen, was not killing more Jews. “If we had killed 10.3 million [instead of six], I would be satisfied, and would say, ‘good, we have destroyed an enemy…’ We would have fulfilled our duty to our blood and our people… if we had exterminated the most cunning intellect of all the human intellects alive today.”

Part of the reason Sassen and his colleagues had begun the discussion was to get Eichmann to deny that genocide had ever been intended. Only then could they distance National Socialism from “the one thing of which we are always accused” – the Holocaust. But Eichmann refused. He was proud to have taken part in the extermination of the Jews, and his only criticism of this lunatic National Socialist project was that “we could and should have done more”.

If Eichmann’s feelings are hard to stomach, so too are Stangneth’s revelations that the German Foreign Office and intelligence services had enough information on Eichmann’s whereabouts to have pursued his arrest and trial in Germany long before the Israelis did. As various official papers are yet to be released, she can only speculate on their motive. But the most likely one is that many former Nazis who had never been brought to book and who still had jobs in German public service, feared being exposed by Eichmann.

For example, the “inability” of the German Embassy in Buenos Aires to find Eichmann in 1958 “looked embarrassingly like aiding and abetting a wanted criminal”.

Fortunately, Eichmann’s misdeeds, and the Israeli secret service, eventually caught up with him. Taken to Israel, he was tried and found guilty of crimes against humanity and hanged on May 31, 1962. For many decades since, his cunning depiction of himself as a “small cog in Adolf Hitler’s extermination machine” has blinded many people to his central role in the Holocaust and the nature of the key participants.

But no longer. Thanks to this brilliant book, exhaustively researched and convincingly argued, the veil has at last been lifted.

“Like a mirror,” writes Stangneth, “he reflected people’s fears and expectations, whether they were fearing for their own lives or hoping he would confirm a theory of evil. Behind all the mirror images lay Eichmann’s will to power and desire to control.”

100 Days to Victory: How the Great War Was Fought and Won 1914-1918 by Saul David published by Hodder is now available in paperback.

 

HISTORY

Eichmann Before Jerusalem: the Unexamined Life of a Mass Murderer, Bettina Stangneth, Bodley Head, 608pp, £25

Available with free P&P on www.kennys.ie or by calling 091 709350

http://www.independent.ie/entertainment/books/books-eichemann-he-wasnt-only-following-orders-30870967.html