Iceland Prime Minister: Obama Administration Sent FBI To Frame Assange In 2011

In an interview with Katoikos, Iceland Prime Minister Ögmundur Jónasson said that in June 2011, the Obama administration sent a plane full of FBI agents to frame Julian Assange.

“You are ‘the minister’ who refused to cooperate with the FBI because you suspected their agents on mission in Iceland were of trying to frame Julian Assange. Do you confirm this?,” Katoikos journalist  asked.

Jónasson responded:

“Yes. What happened was that in June 2011, U.S. authorities made some approaches to us indicating they had knowledge of hackers wanting to destroy software systems in Iceland. I was a minister at the time. They offered help. I was suspicious, well aware that a helping hand might easily become a manipulating hand.

Later in the summer, in August, they sent a planeload of FBI agents to Iceland seeking our cooperation in what I understood as an operation set up to frame Julian Assange and WikiLeaks.

Since they had not been authorized by the Icelandic authorities to carry out police work in Iceland and since a crack-down on WikiLeaks was not on my agenda, to say the least, I ordered that all cooperation with them be promptly terminated and I also made it clear that they should cease all activities in Iceland immediately and that they were to leave the country. They were unable to get permission to operate in Iceland as police agents, but I believe they went to other countries, at least to Denmark. I also made it clear at the time that if I had to take sides with either WikiLeaks or the FBI or CIA, I would have no difficulty in choosing: I would be on the side of WikiLeaks.

If I had to take sides with either WikiLeaks or the FBI or CIA, I would have no difficulty in choosing: I would be on the side of WikiLeaks.”

Jónasson also discussed giving Edward Snowden asylum and protecting future whistleblowers. He said he sees “whistleblowers are a public service,” and that credit it due to Snowden, Chelsa Manning and Assange.

Jónasson was then asked if he thought Iceland could be a “safe haven” for whistleblowers.

He said:

“By granting Snowden asylum we would be paying tribute to democracy, to openness and to all the whistle-blowers of the world.”

Jónasson defended Wikileaks, saying that without the organization and Assange, international trade agreements such as TISA, TTIP and CETA would have never been known.

“The stakes are high in these negotiations,” Jónasson said. “This is not just about trade, it is about giving international capital access to the infrastructure of our societies. We are talking about handing over the very heart of democracy.”

“Do you think that whistle-blowers should be protected?” Pacheco asked.

Jónasson responded:

“Yes, I think that it is very important. The role played by whistleblowers could be seen as public service. We owe a lot to Chelsea Manning. We owe a lot to Edward Snowden. We owe a lot to Assange. We owe a lot to WikiLeaks. It’s not only about the Iraqi war and other illegal military aggression and immoral power-political maneuvers, but also the recent international trade agreements TISA, TTIP and CETA.

Who were the people originally giving us insight into these behind-closed-doors negotiations? It was WikiLeaks who revealed what was meant to be secret. The stakes are high in these negotiations. This is not just about trade, it is about giving international capital access to the infrastructure of our societies. We are talking about handing over the very heart of democracy.”

Pacheco then asked what Jónasson thinks about Assange. “I don’t know him personally, although I met him when he came to Iceland,” Jónasson said. “But I look at what he stands for and that is where I side with him; his endeavours to open the secret world of the military and of power-politics.”

When asked about whether the Icelandic Modern Media Initiative resolution be strong enough to protect future whistleblowers, Jónasson said:

“I think this is quite a long way off. It is an idea that has to be developed much further. The good thing about it is that we concentrate on freedoms and democracy, on whistleblowers and on protecting these people. But then of course when it comes to protection of freedom on the Internet there are darker sides as well. We certainly don’t want to be a haven for paedophiles. I do not want to talk this idea down because I see its positive side, namely the protection of whistleblowers. But there are more dimensions to this and we should avoid being naïve on this issue.”

It was revealed earlier this week that Assange was framed by Swedish police. In response, Assange released a statement to Swedish prosecutor Marianne Ny that exonerated him from the rape charge he was accused of.

It is also worth noting that earlier this year, when WikiLeaks began leaking Clinton campaign chair John Podesta’s emails, there was an attempted setup of Assange by a shady company posing as a dating service called “ToddAndClare,” that claimed he was a pedophile.

Internet sleuths on Reddit found that the company shared its address with a private intelligence corporation named Premise Data Corporation. Wikileaks released a press release calling a story from the DailyKos a “smear campaign plot to falsely accuse Julian Assange of pedophilia.”

Wikileaks later tweeted out a picture of the businesses location a garage door at a warehouse.

Interestingly, Larry Summers, who is connected to the Clinton Campaign, was also on the board of directors of Premise Data Corporation.

This new revelation that Assange was potentially set up by U.S. authorities as far back as in 2011 should come as no surprise to anyone.

We Are Change’s Luke Rudkowski covered the attempted setup of Assange in 2011, and why it should result in President Obama being impeached in this video.

avatar
I am an Activist a writer a blogger and an investigative journalist writing for (www.wearechange.org)

A Radio host of the Blog-talk Radio Series:
#SmokeScreenDisclosure

My Sources are everywhere..
Enemy of the New World Order.

Tips For Journalists: How to Identify and Counter Physical Surveillance

Image result for counter surveillance

Written with the assistance of Rory Byrne Co-Founder of @securityfirst, “building tools for the security of human rights defenders.”

[ Today’s ] journalists and activists are increasingly under threat from digital and physical surveillance.

Basic training;

Here are some very basic steps on how to protect yourself when you feel like you might be being tailed, tracked, or followed. Note this article is not meant to trigger or inspire any occurrence of targeted individualism but only as a brief guide line for those who wish to learn how to identify and neutralize physical surveillance. Let’s be clear: if the professionals are following you, you probably won’t know it. Well trained spies use a host of tricks that make sure you’ll never know you’re being followed.

What is Surveillance?

Surveillance is the monitoring of people’s behavior, activities, or other patterns for the purpose of harming, influencing, managing, directing, or protecting them.

Why might people be interested in keeping you under physical surveillance?

  • Break-in/ theft of sensitive materials
  • Arrest
  • Monitor who is coming and going from the office
  • Intimidation
  • Physical attack on staff

Who might be interested in keeping you under surveillance?

  • Authorities of the country in which you conduct your journalist or activism work
  • External security agencies of other countries in the region
  • Criminals?—?including kidnappers and stalkers
  • Terrorists
  • Private contractors
  • Embassy officials of “friendly” countries
  • Local people in your community
  • Individuals (may be disgruntled with your organisation)

What techniques are available to carry out surveillance?

• Digital surveillance (monitoring of digital communications, mobile phones etc.)

• Human surveillance (on foot, in a vehicle)

• Technical surveillance (bugs, listening devices, video cameras, number plate readers etc.)

How to Identify if Your Office is Under Surveillance

Surveillance generally requires that the adversary is able to observe the activities of its targets. This means there are a limited number of physical sites they can use for surveillance. The best thing to do when looking for surveillance is to try to think like an adversary?—?what might you do is you were trying to monitor your office? From where might you carry out such surveillance?

Take a baseline
It is important to gain an understanding of what “normal” conditions look like. (For example, where cars normally park or people normally stand).

Identify and record
From this, try to identify and record any unusual activities. (For example, people in locations where they shouldn’t be or aren’t normally).

Filter out coincidence
Filter out the chances that something could be a coincidence by concentrating on unusual activities and applying common sense filters (e.g. if someone is standing in a place where people don?t normally stand pay more attention to them. Do they look like they are from the area? Are they paying an unusual amount of attention to your activities?) Look for 3 signs that something is out of the ordinary or 3 repeat sightings.

Notify others
It is important to notify others of any suspicions and to keep a log of them. This allows the monitoring of patterns which otherwise might not emerge. For example, if you notice someone suspicious and then a colleague notices something else suspicious on a separate occasion but this information is not shared, then a valuable opportunity to confirm a security threat is missed.

Trust your senses
Trust your senses – there may be clues of a potential arrest or violent attack. Often, journalists and activists report that there were warning signs prior to an attack, but they chose to ignore the warning signs or dismissed it as paranoia.

What To Do If Your Office Is Under Surveillance

  • Consider the risks
    Confrontation with suspicious people should be done with caution, before doing so, consider the risks. For example, what might that person be doing? What is the past history of threats against your organisation or yourself? Is it likely that they will attack you immediately if you confront them or is it more likely that they will just leave and send someone else? If you confront someone they are likely to be replaced by another (unknown) agent, and you then lose the benefit of being able to monitor the surveillance being carried out against you.
  • Increase protection
    Increase your office protection by reducing the ability of an adversary to conduct surveillance. For example by putting up screening near your building, using CCTV and/or guards, closing blinds, locking gates, selecting sites which are not easily overlooked, strict access controls to your building etc.
  • Continue monitoring
    Continue to monitor the general security environment and increase your observation of threats during periods of higher tension ? e.g. protests, elections, sensitive national holidays etc.

Countering Physical Surveillance

Physical surveillance continues to be a significant danger to those working on journalism and human rights. Other than a human source, it is the only way to build detail on what is occurring things like meetings. It is obviously important to know how to identify if you, your colleagues, or partners are under surveillance.

Counter-surveillance is the process of detecting and mitigating hostile surveillance.

Tells that might give away someone who is conducting surveillance on foot include:

— Readjusting personal equipment

— Touching earpiece

— Visibly talking into their microphones

— Glazed eyes

— Unusual behavior or demeanor

— Trying to avoid the target’s gaze

— Looking around corners/through windows

— Mirroring behaviour

— Stopping in unusual places

Identifying Teams

If you identify one potential surveillance member, you can use that knowledge to identify others. Members of a surveillance team can cross-contaminate other members:

• By speaking directly to them

• By looking in their direction

• By using hand signals

• By appearing or dressing in a similar manner

What can you do to spot them?

The most important thing to remember when conducting counter-surveillance is that you need to be discreet as you do not want any potential surveillance teams to know that you are looking for them. This would raise suspicions further about what you intended to do. The primary aim is to ascertain whether or not you are being followed, not to lose them.

Remember, if you discover you are in fact under surveillance, you have three options:

Change your plans: This is the safest and recommended option ? it will allow you to keep your original plans to yourself and reassure whoever had you under surveillance that you aren’t up to anything suspicious or worthy of surveillance.

Lose the surveillance covertly: This is losing the surveillance team without them knowing you were aware of them by making it look accidental. This should be used if you absolutely must keep your plans and you feel it is safe to do so.

Lose the surveillance overtly: This trying to identify or lose the surveillance team in a way that makes them aware of what you are trying to do. This is a risky tactic because it confirms to the team that you are indenting to do something that you don’t want them to see and so are increases the likelihood of you being under continued surveillance. You should only conduct your counter-surveillance overtly if absolutely vital and it is not possible to do so covertly.

Five Rules of Counter-Surveillance

1. Trigger

This is the person who initially alerts the rest of the surveillance team when the target is on the move. The easiest person to find.

2. 10 to 2

The person carrying out the surveillance will try to stay out of a the 10 t0 2: the immediate eye line of the person they have put under surveillance

3. 3 times

This is the number of sightings of a surveillance team member you are aiming to achieve before you can confirm that you are under surveillance.

4. 3 sides of a square

This is the minimum number of turns you take to filter and reduce the possibility of seeing the same person by coincidence.

5. Breaking the box

This is the process of breaking out of the surveillance a team will try to keep you in. By breaking the box you increase the likelihood that they will make mistakes which you can observe and use to identify them.

Simple example of a surveillance operation. You are the Green A being followed, when you enter a shop Red B walks past you and Blue C takes over the “eye-ball”?—?becoming the trigger. Black D and Yellow E are part of the surrounding surveillance box. The easiest person to locate is Blue C as you have more control over where they are when you choose locations to stop?—?you want to ensure they only have a limited amount of places to keep their eyes on you. The orange triangle is your natural line of sight when you leave a shop?—?e.g the area where they are less likely to be in.

Tactics: Identify the Trigger

The trigger is the surveillance team member who initially alerts the rest of the surveillance team members (who will be spread out in a box around the target). They are unlikely to move when you leave your location as that may draw attention to themselves.

The easiest place for them to be located is in or outside your location. They will usually try to stay stationary. If the place you have entered has a number of exits then a number of team members may be spread around each as a trigger. Think about where you would be if you were on a surveillance team look for locations and situations where it would not be suspicious for a surveillance person to be hanging around.

Tactics: How to find the eyeball on foot

The eyeball refers to the member of the surveillance team who currently has you in their sights. Firstly?—?don’t look over your shoulder! Instead try to create situations to look observe all around you naturally?—?including behind you:

Image result for how to get away if you being tailed

• Try using windows; either looking through them or in their reflection; or car mirrors;

• Hold open doors for other people to enter and let them overtake you;

• Cross a busy street and see who follows you;

• Stop to look at posters or bus timetables, use an ATM, or buy something from a street vendor.

Tactics: Create a force-past

A force-past is when you create a situation in which someone following you would have to go past you or expose their position. There are several easily created force-past points:

• Traffic crossing point

• Bus stop

• Taking an escalator

• Using a lift to go up (until all passengers have left), then go down and exiting via an underground car park

• Rapidly turning a corner then suddenly entering into a shop

• Go into a shop/pub/building through one entrance and then rapidly exit via another

• Corner hanging: turn a corner then rapidly stop

• Change your clothing to make it harder to identify you.

A quick, simple version of a Surveillance Detection Route. Three stops are made along the way, each time looking for the trigger upon exit. This can also be done with other people supporting you in a team or on an individual you are meeting who does not suspect you are looking for signs of surveillance on them.

Three Sides to a Square

This is a technique used to identify several members of a team, create pressure on them and thin down their surveillance. It can be conducted alone or with a team.

It means taking a longer route than would logically make sense for someone going from point A to B.

Pick three or more reasons to be a) using such an unusual route and b) stopping along the way. These reasons should take the following things into account:

• It should be genuine and not suspicious, there should be a believable reason for the detour. Remember, this is because you do not want any possible surveillance to know that you are checking for surveillance

• It should force a surveillance team member to go into the location with you to establish what you are doing, who you are meeting, or check for any signs that you may have a counter-surveillance team with you

• It should be a position where you can:

– Observe what is occurring

– Observe the various exits/entrances

– Be out of the target’s 10 to 2 eye line

• You should be able to quickly get on the move again, so pay bills in advance, don’t get hot food, etc.

Additional Tactics:

 – Get on a bus

It is difficult for surveillance teams to keep up if you suddenly get on a bus, going from on foot to mobile. This is particularly true because buses are slower than other vehicles so are difficult to follow by car too. Ensure you have change for the fare. Sit as far back in the bus as possible and if it?s left-hand drive, sit on the right side of the bus to be able to observe any vehicles which might over take the bus

If conducting overt anti-surveillance get on, get off at the next stop, and then rapidly get on the next bus. If you want to appear covert ? get on a bus with one number, then get off and get a bus with another number, to make it look like you might be lost.

 – Get in a Taxi or on a Train or Ferry.  

Trains are difficult to follow with multiple forms of surveillance because they are faster than other vehicles. When getting on the train, hang back and try to be the last person to get on. Stand at the end of the platform where the train driver stops and where you will have a good view. Try buying a ticket to a destination and observe?—?get off before that destination.

If conducting overt anti-surveillance, get off then rapidly change trains. If you want to appear covert get on a train with one destination, then get off and get a train with another destination, to make it look like you might be lost.

Taxis can be useful for local knowledge and the fact that in some countries they can use bus lanes which surveillance vehicles might not be able to use without drawing attention to themselves.

exit-in-the-maze

[Learn More Here]

Thank you !

Rory Byrne

Co-Founder of @_securityfirst, building tools for the security of human rights defenders. Helped setup and was Head of Security & Research.

Learn about Rory’s  Umbrella Program Here. 

This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License

Follow WE ARE CHANGE on SOCIAL MEDIA


Sign up become a patron and Show your support for alternative news

for Just 1$ a month you can help Grow We are change
patreon
We use Bitcoin Too !  
12HdLgeeuA87t2JU8m4tbRo247Yj5u2TVP
 
Join and Up Vote Our STEEMIT

OBSTRUCTION OF JUSTICE: The Clintons’ Long History Of Losing Documents

clinton-shhh-quiet

Bill and Hillary Clinton have a long history of losing documents during various investigations and scandals over the years going all the way back to their time in Arkansas.

It’s not just the current investigation into deleted emails in which the State Department’s own internal probe found former Secretary of StatW Hillary Clinton violated federal record keeping laws. It’s not just whitewater, it’s several investigations where documents have turned up missing, exonerating the Clintons and clearing them of guilt, despite huge violations of obstruction of justice.

HISTORY OF LOSING DOCUMENTS DURING INVESTIGATIONS:

In 1999, investigators looked into then First Lady Hillary and President Bill Clinton’s scandals, which included Whitewater, Travelgate, Filegate and other scandals. It was discovered that more than 1 million subpoenaed emails were mysteriously “lost” due to a “glitch” in a West Wing computer server.

During the Project X email scandal, career White House staffers and contractors found that someone close to the first lady had basically turned off the White House’s automated email archiving system.

WHITEWATER:

The first notable case is the whitewater land scandal fiasco, which started in Arkansas when Bill Clinton was governor. The allegation is that the Clintons used the Rose Law Firm and the Arkansas Financial Department Authority, as well as Madison Guaranty Savings and Loan owned by Susan and Jim McDougal, to scam Arkansas residents. An investigation was started when the Clintons invested and lost money in the Whitewater Development Corporation.

An entire article could be dedicated to the Whitewater scandal, but what is important here is that documents for the whitewater investigation turned up missing were later discovered at the Clintons’ home.

Ben Shapiro of Breitbart noted in his own article on Hillary’s long history of hiding documents:

In 1996, a special Senate Whitewater committee released a report from the FBI demonstrating that documents sought in the Whitewater investigation had been found in the personal Clinton quarters of the White House. The First Lady’s fingerprints were on them. The documents had gone mysteriously missing for two years.

Mark Fabiani, special White House counsel, immediately stated that there was no problem, according to the Times: “He added that she had testified under oath that she had nothing to do with the documents during the two years they were missing and did not know how they ended up in the family quarters.” Hillary remains the only First Lady in American history to be fingerprinted by the FBI. Those weren’t the only missing Whitewater documents later found in the Clinton White House.

VINCE FOSTER:

The next notable case, which is also connected to Whitewater is Vince Foster. Foster worked alongside the Clintons as a top Rose Law firm attorney who had worked intimately with then First Lady Hillary Clinton throughout their career together.  After Foster’s “suicide,” documents went missing from his office. Secret Service officer Henry O’Neill testified that he witnessed aides removing documents.

Several years later, more documents pertaining to Hillary Clinton and Vince Foster again vanished, this time from the National Library including a document from Ken Star’s investigation that proves that the “suicide” of Vince Foster was actually a murder.  In those documents is the smoking gun that shows that Vince Foster sustained not one but two bullet wounds. One to the neck and one to the head an impossible suicide scenario.

In addition to that, experts have called Foster’s suicide note “a forgery.” One of my rules is once, twice, okay, but three times is not a coincidence—it’s a criminal conspiracy. Conspiracy, as in the legal definition of criminality not a theory none of this is a theory when it’s well sourced.

TRAVEL GATE:

In 1996, the day before the Whitewater documents were found at the White House, a two-year-old memo emerged written by a former Presidential aide. According to the New York Times it proved that Hillary Clinton “had played a far greater role in the dismissal of employees of the White House travel office than the Administration has acknowledged.”

PROJECT X EMAIL GATE:

According to Tom Fitton, President of Judicial Watch, Hillary’s top lawyer and top aide, Cheryl Mills “helped orchestrate the cover-up of another major scandal, often referred to as ‘Project X Email-gate.’” Over the course of several years, the Clinton Administration allegedly withheld 1.8 million email communications from Judicial Watch’s attorneys, as well as federal investigators and Congress. In addition, Judicial Watch says that when a White House computer contractor attempted to reveal the emails, White House officials “instructed her to keep her mouth shut about the hidden e-mail or face dismissal and jail time.”

2015-2016 EMAIL GATE:
Where do I start about the botched investigation of Hillary’s private email server? The obstruction of justice is so broad, it’s insane. She used “bleach bit” software the day after being subpoenaed, smashed several BlackBerrys and iPads with hammers, was tipped off by the DoJ and DoS into the investigation, according to Wikileaks, etc.

Clinton’s close ally Terry McAulife gave a donation to the wife of the Deputy Director Of The FBI. Bill Clinton met with Attorney General  Loretta Lynch towards the end of the investigation. The list goes on…

2 TERABYTES OF DATA MISSING:

Yet even with all of the evidence, the current FBI director—who has been revealed to be connected to the Clintons—has once again refused to acknowledge the corrupt career nature of the Clintons.

Director James Comey told Congress Sunday that the FBI does not recommend charges against Clinton, even after an additional 650,000 emails were discovered on the laptop of her aide’s estranged husband, Anthony Weiner.

Whether it’s deleting emails or covering up documents to prevent prosecution, it has always been the Clinton way. Why is it that journalists can uncover this past historic information, but the FBI investigators can’t?

Something isn’t right. Drain the swamp and nominate AK for FBI Director 2017, and stay tuned to We Are Change. This case is closed. The Clintons are corrupt. That, or documents have somehow developed an artificial intelligence to stay away from the Clintons. It must be a right wing conspiracy. I would be willing to put my deplorable eggs into one basket and say it’s the latter.

avatar
I am an Activist a writer a blogger and an investigative journalist writing for (www.wearechange.org)

A Radio host of the Blog-talk Radio Series:
#SmokeScreenDisclosure

My Sources are everywhere..
Enemy of the New World Order.

HILLARY CLINTON WILL BE INDICTED BECAUSE OF THE FBI

In this video Luke Rudkowski covers the breaking news of the obviously likely indictment of Hillary Clinton and the Clinton foundation fot the pay to play scandels. With new information coming from wikileaks, Huma Abedin shared laptop and secret records this is sure making for an interesting election year. For more and to help step up our game to defeat the msm go to https://www.patreon.com/wearechange to invest in us.

Sources

https://i.sli.mg/IYLqtE.gif

https://twitter.com/hashtag/HillaryIn…

https://www.facebook.com/topic/Clinto…

http://www.realclearpolitics.com/vide…

https://twitter.com/ggreenwald/status…

https://twitter.com/wikileaks/status/…

http://dailycaller.com/2016/11/03/sec…

http://nypost.com/2016/11/03/feds-pro…

http://www.dailymail.co.uk/news/artic…

http://www.cnn.com/videos/tv/2016/11/…

https://twitter.com/dcexaminer/status…

http://www.washingtontimes.com/news/2…

Support WeAreChange by Subscribing to our channel HERE http://www.youtube.com/subscription_c…

Visit our main site for more breaking news https://wearechange.org/
Patreon https://www.patreon.com/WeAreChange?a…
SnapChat: LukeWeAreChange
Facebook: https://facebook.com/LukeWeAreChange
Twitter: https://twitter.com/Lukewearechange
Instagram: http://instagram.com/lukewearechange

Rep WeAreChange Merch Proudly: https://wearechange.org/store

OH YEAH since we are not corporate or government WHORES help us out https://wearechange.org/donate

We take BITCOIN too
12HdLgeeuA87t2JU8m4tbRo247Yj5u2TVP

avatar
For news tips on media censorship, medical breakthroughs, alternative energy and more, contact Andrew Meyer, WeAreChange’s Editor-In-Chief. You can email him at Andrew@WeAreChange.org and follow him on Twitter @TheAndrewMeyer, and at TheAndrewMeyer.com

HILLARY CLINTON’S TOP MINION TWEETS “Please God, let this end soon”

In this video Luke Rudkowski covers the latest Hillary Clinton scandals with the FBI finding 650,000 emails through Anthony Weiner’s crimes. We start at Donna Brazile’s tweet asking “god” to “let end this” publicly as the FBI has just announced its warrant for the newly found emails. Don’t forget to keep this operation going invest in us on https://wearechange.org/donate/

Pin It on Pinterest