HOUSE_OVERSIGHT_015020.jpg

2.64 MB

Extraction Summary

15
People
10
Organizations
13
Locations
2
Events
3
Relationships
3
Quotes

Document Information

Type: Investigative note / government record (house oversight)
File Size: 2.64 MB
Summary

This document appears to be a page from a House Oversight Committee release (indicated by the footer) containing notes or an investigative memo. It largely consists of a block quote from Peter Dale Scott's book 'The American Deep State' regarding the protection of al-Qaeda terrorists by US intelligence and the 9/11 Commission's alleged cover-up of Saudi and Qatari involvement. The document concludes with the author's own notes alleging that 'Clinton's daughter' is using global health initiatives as a cover for terrorism operations and detailing a cyber security partnership involving Steve Colo, the FBI, and South Carolina law enforcement.

People (15)

Name Role Context
Ali Mohamed Terrorist
Identified as leader of 1998 Nairobi Embassy bombing
Mohammed Jamal Khalife Financier
Osama bin Laden's close friend, financier of Ramzi Yousef and KSM
Osama bin Laden Terrorist Leader
Mentioned as friend of Khalife
Ramzi Yousef Terrorist
Principal architect of the first World Trade Center attack
Khalid Sheikh Mohammed Terrorist
Principal architect of the 9/11 attacks
Khalid al-Mihdhar Hijacker
One of the alleged 9/11 hijackers
Nawaf al-Hazmi Hijacker
One of the alleged 9/11 hijackers
Jamie Gorelick 9/11 Commission Member
Accused in text of protecting terrorist connections
Dietrich Snell 9/11 Commission Staff
Accused in text of protecting terrorist connections
Patrick Fitzgerald Witness
Accused in text of figuring among terrorists' protectors
Scott Author
Referenced as the author of the quoted chapter (likely Peter Dale Scott)
Donald Rumsfeld Former Official
Quoted regarding broadening objectives to Iraq
Clinton's daughter Subject of commentary
Accused of using global health initiatives as cover for terrorism ops (Chelsea Clinton implied)
Steve Colo Interview Subject
Spoke of partnership between Secret Service, FBI, and SLED
Bud Horton IT Security Executive
CTO of Accenture's cyber security practice, moved to South (Carolina)

Organizations (10)

Timeline (2 events)

1998
Nairobi Embassy bombing
Nairobi
September 11, 2001

Relationships (3)

CIA Withholding Information FBI
presence in the United States was concealed from the FBI by CIA officers
Royal Family of Saudi Arabia Protection/Backing al-Qaeda
royal family protection... was repeatedly given to key figures like Khalid Sheikh Mohammed
Steve Colo Partnership SLED
partnership between the Secret Service, the FBI, and South Carolina's SLED

Key Quotes (3)

"Clinton's daughter is now poised to work global health initiatives which I would suggest is little more than a cover for on-going terrorism 'ops'."
Source
HOUSE_OVERSIGHT_015020.jpg
Quote #1
"one purpose of protecting these individuals had been to protect a valued intelligence connection (the 'al-Qaeda connection,' if you will)"
Source
HOUSE_OVERSIGHT_015020.jpg
Quote #2
"We should not forget that, just one day after 9/11, 'Rumsfeld was talking about broadening the objectives of our response and getting Iraq.'"
Source
HOUSE_OVERSIGHT_015020.jpg
Quote #3

Full Extracted Text

Complete text extracted from the document (3,602 characters)

once, but repeatedly, almost predictably. We shall see that, among the al-Qaeda terrorists who were
first protected and then continued their activities were the following:
1. Ali Mohamed, identified in the 9/11 Commission Report as the leader of the 1998 Nairobi
Embassy bombing;
2. Mohammed Jamal Khalife, Osama bin Laden's close friend and, while in the Philippines, financier
of both Ramzi Yousef (principal architect of the first World Trade Center [WTC] attack) and his uncle
Khalid Sheikh Mohammed;
3. Khalid Sheikh Mohammed, identified in the 9/11 Commission Report as "the principal architect of
the 9/11 attacks";
4. Khalid al-Mihdhar and Nawaf al-Hazmi, two of the alleged 9/11 hijackers, whose presence in the
United States was concealed from the FBI by CIA officers for months before 9/11.
It might sound from these citations that the 9/11 Commission marked a new stage in the U.S.
treatment of these terrorists, and that the report now exposed those terrorists who in the past had
been protected. On the contrary, a principal purpose of my chapter is to show that
1. one purpose of protecting these individuals had been to protect a valued intelligence connection
(the "al-Qaeda connection," if you will);
2. one major intention of the 9/11 Commission Report was to continue protecting this connection;
3. those on the 9/11 Commission staff who were charged with this protection included at least one
commission member (Jamie Gorelick), one staff member (Dietrich Snell), and one important witness
(Patrick Fitzgerald) who earlier had figured among the terrorists' protectors.
In the course of writing this chapter [Scott continues], I came to another disturbing conclusion I had
not anticipated. This is that a central feature of the protection has been to defend the 9/11
Commission's false picture of al-Qaeda as an example of non-state terrorism, ignoring not just the
CIA but also the royal families of Saudi Arabia and Qatar. In reality, as I shall show, royal family
protection from Qatar and Saudi Arabia (concealed by the 9/11 Commission) was repeatedly given
to key figures like Khalid Sheikh Mohammed, the alleged "principal architect of the 9/11 attacks." The
establishment claims that the wars fought by America in Asia since 9/11 have been part of a global
"war on terror." But this "war on terror" has been fought in alliance with Saudi Arabia, Qatar, and
Pakistan - precisely the principal political and financial backers of the al-Qaedist networks the United
States has supposedly been fighting. Meanwhile the most authentic opponents in the region of these
Sunni al-Qaedists - the governments of Iraq, Libya, Syria, and Iran - have found themselves
overthrown (in the case of Iraq and Libya), subverted with U.S. support (in the case of Syria), or
sanctioned and threatened as part of an "axis of evil" (in the case of Iran). We should not forget that,
just one day after 9/11, "Rumsfeld was talking about broadening the objectives of our response and
'getting Iraq.'"
(pp. 44-45, The American Deep State)
Clinton's daughter is now poised to work global health initiatives which I would suggest is little more
than a cover for on-going terrorism "ops".
To return to Steve Colo - in the interview he speaks of a partnership between the Secret Service, the
FBI, and South Carolina's SLED (State Law Enforcement Division) to open a Computer Crime
Center. Bud Horton (mentioned above) (long-affiliated with IT Security; his title at Accenture was
Chief technology officer of it's cyber security practice) happened to have just moved to South
HOUSE_OVERSIGHT_015020

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document