HOUSE_OVERSIGHT_017595.jpg

2.84 MB

Extraction Summary

12
People
10
Organizations
12
Locations
2
Events
3
Relationships
4
Quotes

Document Information

Type: Investigative memo / book excerpt analysis
File Size: 2.84 MB
Summary

This document appears to be a composite of excerpts and analysis from a House Oversight production. It extensively quotes Peter Dale Scott's 'The American Deep State' regarding the 9/11 Commission's alleged protection of intelligence connections and the role of Saudi/Qatari royals. The text transitions into a conspiratorial analysis linking 'Clinton's daughter' to terrorism ops and notably mentions a 'Bud Horton' (formerly of Accenture) moving to South Carolina after being implicated in a 'continuing child sex scandal,' suggesting a nexus between intelligence operations, cyber crime, and illicit activities.

People (12)

Name Role Context
Khalid Sheikh Mohammed Terrorist
Identified as principal architect of 9/11 attacks; received protection from royal families.
Khalid al-Mihdhar Hijacker
Presence in US concealed from FBI by CIA.
Nawaf al-Hazmi Hijacker
Presence in US concealed from FBI by CIA.
Jamie Gorelick 9/11 Commission Member
Accused of being charged with protecting intelligence connections.
Dietrich Snell 9/11 Commission Staff
Accused of being charged with protecting intelligence connections.
Patrick Fitzgerald Witness
Described as figuring among the terrorists' protectors.
Scott Author
Refers to Peter Dale Scott, author of 'The American Deep State'.
Rumsfeld Former Secretary of Defense
Mentioned regarding objectives after 9/11 to 'get Iraq'.
Clinton's daughter Global Health Initiative Worker
Chelsea Clinton (implied); author suggests her work is cover for terrorism 'ops'.
Steve Colo Interviewee
Discusses partnership between Secret Service, FBI, and SLED.
Bud Horton IT Security / Accenture CTO
Moved to South Carolina after being implicated in a continuing child sex scandal.
Luke Harding Author
Author of 'Expelled: A Journalist's Descent into the Russian Mafia State'.

Organizations (10)

Name Type Context
9/11 Commission
Accused of creating a false picture of al-Qaeda and protecting intelligence connections.
FBI
Concealed from by CIA; partner in Computer Crime Center.
CIA
Concealed hijackers; ignored by Commission.
al-Qaeda
Terrorist network.
Secret Service
Partner in Computer Crime Center.
SLED
South Carolina State Law Enforcement Division.
Accenture
Former employer of Bud Horton.
FSB
Russian intelligence agency.
British Intelligence
Coordinated with US on 2005 London Bombings.
House Oversight Committee
Source of the document (Footer).

Timeline (2 events)

2005
London Bombings
London
US Intelligence British Intelligence

Locations (12)

Location Context
Country.
Royal family accused of protecting terrorists.
Royal family accused of protecting terrorists.
Alliance partner.
Government overthrown.
Government overthrown.
Subverted with US support.
Sanctioned.
Location where Bud Horton moved.
Previous location of Bud Horton.
Cooperation partner.
Site of 2005 bombings.

Relationships (3)

CIA Concealment Khalid al-Mihdhar
presence in the United States was concealed from the FBI by CIA officers
Bud Horton Employment Accenture
his title at Accenture was Chief technology officer
Bud Horton Implication Child Sex Scandal
implicated in a continuing child sex scandal

Key Quotes (4)

"one purpose of protecting these individuals had been to protect a valued intelligence connection"
Source
HOUSE_OVERSIGHT_017595.jpg
Quote #1
"Clinton's daughter is now poised to work global health initiatives which I would suggest is little more than a cover for on-going terrorism 'ops'."
Source
HOUSE_OVERSIGHT_017595.jpg
Quote #2
"Bud Horton... happened to have just moved to South Carolina from Loudoun County after being implicated in a continuing child sex scandal"
Source
HOUSE_OVERSIGHT_017595.jpg
Quote #3
"The reality is more the opposite; trust me when I say that the US doesn't work 'ops' alone"
Source
HOUSE_OVERSIGHT_017595.jpg
Quote #4

Full Extracted Text

Complete text extracted from the document (3,913 characters)

Khalid Sheikh Mohammed;
3. Khalid Sheikh Mohammed, identified in the 9/11 Commission Report as "the principal architect of the 9/11 attacks";
4. Khalid al-Mihdhar and Nawaf al-Hazmi, two of the alleged 9/11 hijackers, whose presence in the United States was concealed from the FBI by CIA officers for months before 9/11.
It might sound from these citations that the 9/11 Commission marked a new stage in the U.S. treatment of these terrorists, and that the report now exposed those terrorists who in the past had been protected. On the contrary, a principal purpose of my chapter is to show that
1. one purpose of protecting these individuals had been to protect a valued intelligence connection (the "al-Qaeda connection," if you will);
2. one major intention of the 9/11 Commission Report was to continue protecting this connection;
3. those on the 9/11 Commission staff who were charged with this protection included at least one commission member (Jamie Gorelick), one staff member (Dietrich Snell), and one important witness (Patrick Fitzgerald) who earlier had figured among the terrorists' protectors.
In the course of writing this chapter [Scott continues], I came to another disturbing conclusion I had not anticipated. This is that a central feature of the protection has been to defend the 9/11 Commission’s false picture of al-Qaeda as an example of non-state terrorism, ignoring not just the CIA but also the royal families of Saudi Arabia and Qatar. In reality, as I shall show, royal family protection from Qatar and Saudi Arabia (concealed by the 9/11 Commission) was repeatedly given to key figures like Khalid Sheikh Mohammed, the alleged "principal architect of the 9/11 attacks." The establishment claims that the wars fought by America in Asia since 9/11 have been part of a global "war on terror." But this "war on terror" has been fought in alliance with Saudi Arabia, Qatar, and Pakistan - precisely the principal political and financial backers of the al-Qaedist networks the United States has supposedly been fighting. Meanwhile the most authentic opponents in the region of these Sunni al-Qaedists - the governments of Iraq, Libya, Syria, and Iran - have found themselves overthrown (in the case of Iraq and Libya), subverted with U.S. support (in the case of Syria), or sanctioned and threatened as part of an "axis of evil" (in the case of Iran). We should not forget that, just one day after 9/11, "Rumsfeld was talking about broadening the objectives of our response and 'getting Iraq.'"
(pp. 44-45, The American Deep State)
Clinton's daughter is now poised to work global health initiatives which I would suggest is little more than a cover for on-going terrorism "ops".
To return to Steve Colo - in the interview he speaks of a partnership between the Secret Service, the FBI, and South Carolina's SLED (State Law Enforcement Division) to open a Computer Crime Center. Bud Horton (mentioned above) (long-affiliated with IT Security; his title at Accenture was Chief technology officer of it's cyber security practice) happened to have just moved to South Carolina from Loudoun County after being implicated in a continuing child sex scandal (see details below). Further, cyber-crime just so happens to be another of the arenas in which our Intelligence Community coordinates with the Russians: "The US cooperates with the FSB and Russia's interior ministry on counter-terrorism, organized crime, bio-terrorism, and cyber-crime." -- p. 243, Expelled: A Journalist's Descent into the Russian Mafia State, by Luke Harding) Most would interpret this quote to suggest that the nations work together to prevent these various threats. The reality is more the opposite; trust me when I say that the US doesn't work "ops" alone - the 2005 London Bombings is one notable example of a instance in which the US coordinated with also British intelligence in the
HOUSE_OVERSIGHT_017595

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document