Wednesday, November 03, 2010


F-35 Joint Strike Fighter worthless?


By Gordon Duff, STAFF WRITER/Senior Editor

“Another spy disaster like Pollard, shoved under the rug too long due to pressure from the powerful Israeli lobby.”

On April 21, 2009, the Department of Defense announced the theft of 1.5 terabytes of data on the F-35 Joint Strike Fighter, the platform meant give the United States and her allies air superiority for the next 40 years. In a flash, all that was gone, $300 billion dollars of funding down the drain, every system, defense, offense, stealth, everything needed to build one or shoot it down, all gone. Day one, China was accused but it wasn’t China, it wasn’t Iran, it wasn’t Pakistan. The theft left a clear signature, one identical to the data Wikileaks has been receiving, sources inside the Pentagon repeating the actions of Israeli-Soviet spy, Jonathan Pollard. As vital as the F-35 is to America’s defense, Pollard’s triumph on behalf of Soviet Russia and Israel dwarfs the current espionage coup.

Since the 2009 announcement, there has been nothing but silence.

When the theft was announced, Pentagon “damage control” went into action immediately branding the disaster as “unimportant” while scrambling to look for any possible way to “put the toothpaste back into the tube.” What Secretary Gates came up with was a simple denial and to pretend it never happened. With the continual efforts by the Israeli government to secure the release of master spy Jonathan Pollard, a “witch hunt” for another Israeli spy would endanger America’s hopes of winning a settlement between Israel and the Palestinians.

There was no real question, this was another Israeli operation, their “signature” was all over it.


What did America lose? 15 years of research and development? That doesn’t come close. Key components of the F-35, from stealth materials, flight and weapons systems, to tens of thousands of man-hours of systems programming are now “out there,” available to any potential rival, military or commercial. At best, it could be considered a $300 billion dollar bank robbery, by American standards, nothing new in today’s financial world.

Another spy disaster like Pollard, shoved under the rug too long due to pressure from the powerful Israeli lobby.

At worst, nations whose defense capabilities were decades behind the US can now be at par, as the F-35 was estimated to be “air superiority capable” until at least 2040. Data stolen could make production of a comparable aircraft possible in as little as 36 months, particularly with several projects in the offing, Russia/India and in China, each of which are capable of quickly adapting upgraded systems.

The JSF (Joint Strike Fighter) in its three variants, conventional takeoff/landing (CTOL), carrier variant (CV) and short takeoff/vertical landing (STOLV), are scheduled for production through 2026 with estimates of service life until 2060 and beyond. Export versions of the F-35, “detuned” are available for American allies, NATO and Israel. The F-35 delivers more “punch” per dollar than any current “legacy” fighter by a margin of as much as 8 to 1. The economics of “stealing” the F-35 and auctioning it off, system at a time, is tremendous.

Any nation with a substantial defense industry will have immediately gained a decade or more in, not just stealth fighter/bomber design, but hundreds of areas of science applicable to UAV drones, missiles, including nuclear ICBMs (intercontinental ballistic missiles), and smaller systems, not only air defense but helicopters and armour as well. Every advanced technology America has is in the F-35 somewhere.


In March, 1999, on the 4th day of American involvement in the Bosnian war, Serbian forces shot down an F-117 stealth bomber using a Soviet SA 300 air defense system with radar modifications based on data secured through espionage.

YouTube - Veterans Today -

Data on the resonant frequencies of the materials and surfaces of the F-117 made it possible for radar to, not only detect a plane previously believed “invisible’ at a range of 13 kilometers, but to successfully destroy one, an embarrassment the US feels the sting of even today.

The stolen data on the F-35 covers more than simple materials but all jamming and other defensive systems and performance characteristics. Air defense systems can now be tuned specifically to find only the F-35 if so required.


Wikileaks are called “leaks.” Julian Assange darts from country to country, hotel to TV studio, always ahead of the security forces hunting him down, a veritable “Nordic” bin Laden. Newspapers are peppered with photographs of a boyish face in the uniform of the American army, identified as the potential “leaker.” The 46,000 intelligence/counter-intelligence officers of the Department of Defense, supplemented by the FBI and 16 other agencies and 40 other departments, more “bodies” than currently serve in Afghanistan, we are told, are unable to rein in this “dangerous duo.”

Documents by the hundreds of thousands are leaked, upon qualified examination, showing careful screening with many documents edited and more selected out of series with careful gaps and omissions. A single non-commissioned officer, watched 24 hours a day by tens of thousands of security officers and threatened with life in prison, is an unlikely suspect. However, there has been no mention of any others nor has there been a mention of an investigation of any kind. In fact, there seems to me no attempt whatsoever to curtail these current leaks.

What does this tell us?


It was never announced when, exactly, the theft of the F-35 data occurred. The press release was April 21. 2009, long enough after President Bush left office for the blame to evade his administration, one infamous for “leaks” such as the “Scooter” Libby (Liebowitz) “outing” of CIA nuclear proliferation specialist Valerie Plame.

Israeli citizen, Jonathan Pollard, convicted for spying on America and sentenced to life in prison in 1987, is, we believe but can never be sure of, the most successful spy in world history. As with the F-35, the “cover story” is always carefully deceptive as to not panic the public or cause a lack of confidence, perhaps rightly so, in America’s ability to secure secrets. Pollard had two primary targets, our nuclear response capability and NATO’s defense capabilities against the Soviet Union. Both were destroyed by Pollard whose materials were passed through Israel directly to the Soviet Union at the height of the Cold War.

Every weapon design, yes, our stealth aircraft capabilities and our NATO battle plans were among the truckload of papers Pollard sold to Israel, a country where he is considered a national hero. Pollard may have been our last “paper” spy. Everything today is electronic and spies who steal American secrets can be compared to unruly chatroom members or video game enthusiasts.

Despite the “cute” attempt by the Department of Defense and Secretary Gates to refer to espionage as “hacking,” there is nothing either innocent or harmless about it. As all data is formatted for electronic media and secured by firewalls and passwords, all espionage is “hacking.”

The difference between “leaking” and “spying” is semantics. The goal is the same, destruction of the defense capabilities of the United States, except “spying” pays better.

The people responsible for each, particularly when they access the same systems and overcome the same roadblocks, all requiring the same physical access, are one in the same. Those who “leak” perform an identical task to those who spy. Those who leak, those who have leaked appear to be, to any reasonable person, exactly the same people who are spying now and who were supporting Pollard.

The first place we look, before new Russian, Indian, Iranian or Chinese version of the F-35 take flight or our first F-35 meets a fiery end is Israel. No Chinese or Pakistani’s or Iranians have gained by the F-35 espionage “clone” operations styled after “Wikileaks.” Wikileaks has proven one thing, there is a major spy operation in the Pentagon with broad access. It is immune to investigation. Only political power can generate this kind of protection.

Assange is a recipient of information he likely believes is real. Our investigations prove different. The Pentagon leaks were carefully edited, thousands of reports were reconstructed and falsified and hundreds of thousands were removed as inconsistent with an unknown political agenda. This requires full access to Pentagon computer systems, PROMIS software and hundreds of man hours.

It requires, in fact, a broad spy operation inside the Pentagon that enjoys its ability to operate with impunity. Wikileaks carries an Israeli signature, the leaks damn only Israeli enemies, shield Israeli operations and are time to serve Israeli interests. Hundreds of Israeli citizens work in the Pentagon. None of this should be a surprise to anyone.

The F-35 debacle is exactly the same. Where there was some cursory discussion of investigation Wikileaks, the F-35 thefts were, can we say “forgiven?”

Tuesday, November 02, 2010

Latest "Al-CIAda" bomb plot, not halal but kosher baloney...

November , 2010 -- Latest "Al-CIAda" bomb plot, not halal but kosher baloney...

On Halloween 2010, the terrorism-military-intelligence complex pulled out of its pre-election bag of tricks the same old "Al-CIAda" treat that George W. Bush, Dick Cheney, and Karl Rove pulled out of their bag of tricks on Halloween 2004....

On Halloween of 2004, the American electorate was subjected to a fake Osama Bin Laden videotape warning America of another impending terrorist attack. In an election that saw malfeasance and rigging at every level, the Bin Laden tape helped provide the cover story that undecided Americans decided to support Bush and Cheney for re-election amid a new terror threat. John Kerry's chances to beat Bush, although seen by polling data as favorable going into the election, were nixed...

The newest Halloween trick of cargo planes flying into the United States with special delivery bombs "from Yemen with love" is just another ploy to instill fear into the American body politic prior to a major mid-term election. The more the Mossad and its CIA friends concoct these phony "Al Qaeda" stories, the more ridiculous they appear. Underwear bombs, Times Square fizzle bombs, shoe bombs, and now UPS and Fedex printer cartridge bombs are all out of the Austin Powers school of campy spy comedies. The only item missing is Maxwell Smart's shoe phone, although that is probably where the terror spinmeisters got the idea for Richard Reid's ill-fated shoe bomb.

Yemen has become the newest neocon "Island of Dr. Moreau" for terrorist training... Iraq, Afghanistan, and Pakistan have surpassed their shelf lives for the neocon imagineers. Somalia never quite made the cut: modern-day pirates became old hat for the Fox News purveyors of bovine excrement masked as news and Somalia is "so nineties" anyway. But Yemen, next door to Saudi Arabia and a nation involved in a civil war and, moreover, the site for the successful "October Surprise" false flag attack on the USS Cole prior to the 2000 election that helped propel Bush and Cheney into office, perfect. Yemen is, once again, ready for its close up, Mr. DeMille. Lights, camera, action: package bombs from Yemen away!

First, the false flag experts, working with a brand new script, needed a source. Enter one Jabir al-Fayfi, former detainee of the United States in Guantanamo Bay. Al-Fayfi was released by the United States to Saudi Arabia where he had undergone "rehabilitation", and upon his release, hurriedly rejoined "Al-CIAda" forces, this time a new franchise, "Al-CIAda" in the Arabian Peninsula" or AQAP, not to be confused with AQIM, "Al-Qaeda in the Islamic Maghreb;" AQM, "Al-Qaeda in Mesopotamia;" or any of the other "Al-CIAda" fast food-like franchises that have sprung up from the Philippines and Indonesia to Somalia and the Sahara....

Al-Fayfi then conveniently surrendered to Saudi authorities on October 16, just prior to the latest terror scare. The Saudis sent a private jet to Sanaa, the Yemeni capital, to retrieve al-Fayfi after he first contacted his Saudi controllers in September. It appears from what Yemeni authorities claim that al-Fayfi was a Saudi double agent who just so happened to know the tracking numbers on the two "bomb" parcels and their contents, printer toner cartridges. Saudi intelligence works closely with the Mossad and CIA. Game, set, match...

But U.S. enemy number one in Yemen, U.S. national Anwar al-Awlaki, had to be dealt with as the new media fantasy story about package bombs was about to hit the wires. According to an October 21 report by ABC News, al-Awlaki had attended a private luncheon at the Pentagon in the months after the inside Job of 9/11. U.S. authorities announced the package bomb plot was the idea of AQAP's master bombmaker Ibrahim Hassan al Asiri/CIA and his "spiritual leader" al-Awlaki/CIA. Obama's chief counter-terrorism adviser John O. Brennan kept the focus on Al-Asiri... Al-Awlaki's post-9/11 luncheon at the neocon-run Pentagon was still fresh in the minds of many....

Two package bombs, intercepted in Dubai and London, were said to be addressed to a Chicago synagogue, identified as Congregation Emanuel, which provides meeting space for the Or Chadash, a gay and lesbian Jewish congregation. Emanuel, gay, hmmm! Interesting, considering Rahm Emanuel is running for mayor of Chicago. Brother Ari Emanuel's writers in Hollywood must be working overtime on these details...

Yemenia Airways says there is a problem with the story. No Chicago-bound packages addressed to Chicago left Yemen on UPS or DHL flights during the 48-hour period the package bombs were said to have been mailed. And get this nice gem: UPS Yemen is located at P.O. Box 1696 on "Al-Qiyada" Street in Sanaa. That's right, Al-Qiyada Street!

One of the bomb parcels, said to contain a printer cartridge, circuit board, wires, and PETN explosive, was reportedly sent by FedEx on a Qatar Airways flight from Sanaa to Doha, Qatar, and then placed on an onward flight to Dubai for shipment to Chicago. The other, also containing a printer cartridge, circuit board, and a coating of white powder was supposedly sent from Cologne, Germany on board a UPS flight to East Midlands Airport in the UK. The East Midlands package tested negative for explosives. Another problem with the story has arisen. British Prime Minister David Cameron was not told of the bomb plot at East Midlands Airport for sixteen hours.

Apparently, President Obama was informed of the plot right away while the British Prime Minister was kept in the dark for almost an entire day. Cameron recently announced sweeping cuts to the defense budget in the UK, a move that infuriated Washington. Cameron was then made to look like a lightweight on defense and counter-terrorism when he was not informed of the parcel bomb plot, or hoax, if you will. Also embarrassed by the parcel bomb plot, or hoax, was British Airways chairman Martin Broughton, who a week earlier bashed U.S. airport security is redundant and irrational...

Ryanair CEO Michael O'Leary criticized new air passenger security measures in the wake of the discovery of explosive-laden printer cartridges, telling CNBC, “We’re going to have a week now where 'securicrats' will emerge from rocks they live on generally." Former U.S. Homeland Security Michael "Skeletor" Chertoff emerged from his Halloween crypt to warn of new terrorist threats to the traveling public. No one mentions that Chertoff is in the business of making money from security consulting, along with his ghoulish partner-in-crime, former CIA and NSA director, Michael "Uncle Fester" Hayden.

U.S. authorities apparently told Yemeni authorities to arrest a 22-year old Yemeni female college student named Hanan al-Samawi, whose identity was stolen by the shipper of the parcels. The actual shipper of the parcels gave the Yemeni shipping agent Ms. Samawi's full name, address, and phone number. Yemeni authorities released Samawi from custody. Someone forged Samawi's signature on the shipping documents. The actual perpetrator of the parcel mailings remains unknown but stealing identities and passports is a well-known tactic of the Mossad...., which has dozens of Israeli Navy Commandos roaming Yemen for years undetected...because they are Jewish of Yemeni origin...

Coming on top of the false flag parcel bombs from Yemen, came news from Athens that a shadowy Gladio-like "anarchist" group called "Conspiracy Nuclei of Fire" had attempted to send parcel bombs to the embassies of Belgium, Netherlands, Switzerland, Russia, and Mexico in Athens, Greece, as well as to French President Nicolas Sarkozy, himself needing a poll boost after forcing through highly unpopular pension reforms in France.

The national security hobgoblins came out to harass us again this Halloween. Time to stuff them all back into Harry Potter's footlocker. Maybe we can keep them locked up there this time for good....