http://digital-intifada.blogspot.com/2012/04/digital-intifada-exclusive-interview.html

Thursday, 1 May 2014

PROOF: Hacked U.S. State Dept. E-mail Shows U.S. Ordering Terrorist Attacks in Ukraine to "frame-up" Russia and provide excuse for War!

March 12, 2014 -- (TRN) -- Hackers from the group "Anonymous" have allegedly broken into the email account of a U.S. State Department attache' from the US Army and publicly released PROOF the United States is conducting state-sponsored terrorism inside Ukraine.  The emails make clear this is being done to "frame-up" Russia and thereby provide an excuse for the US Military to intervene.  We analyze and report on the allegedly hacked e-mails, so you can draw your own conclusions!

The e-mail below was allegedly obtained by computer hackers and it provides what purports to be irrefutable, traceable, verifiable proof that the United States government, via official US State Department e-mail, is Ordering acts of state sponsored terrorism in the Ukraine.

The e-mail, allegedly from Lt. Col. Jason P. Gresh, a United States Army attache' assigned to the State Department,  makes clear the U.S. is giving orders for attacks against transportation hubs in southeastern Ukraine, "to frame-up the neighbor"  (i.e. Russia) and provide an excuse for the United States military to intervene.  If this is true, it is clear poof the US Government is staging actual criminal terrorist attacks in a foreign country, Ukraine, with the intent of blaming such attacks on the Russians for the purposes of sending US troops to war!!!!!!

Below is how the hack was announced to the world by "Anonymous:" (We are NOT linking directly to the web site which claims to have committed a criminal act of computer hacking, but rather merely reporting what that site is claiming, as is our right under the freedom of the press guarantees of First Amendment to the United States Constitution as interpreted by the US Supreme Court in the case Florida Star v. B. J. F.491 U.S. 524(1989) .)

Anonymous Ukraine hack correspondence of US Army Attache Assistant in Kiev and discover a plot against Ukraine

Hello
We are Anonymous Ukraine
We have hacked e-mail correspondence of US Army Attache Assistant in Kiev Jason Gresh and a high ranking official from Ukrainian General Staff Igor Protsyk.
It appears that they are planning to conduct a series of attacks on Ukrainian military bases in order to destabilize the situation in Ukraine.
Particularly, Jason Gresh writes to Igor Protsyk that it’s time to implement a plan that implies “causing problems to the transport hubs in the south-east of Ukraine in order to frame-up the neighbor. It will create favorable conditions for Pentagon to act”, says Jason Gresh.
In his turn, Protsyk writes to some "Vasil" and tells him to arrange an attack on an airbase of 25 aviation brigade of Ukrainian air force stationed in Melitopol.
This "Vasil" is responsible for arranging the details of the attack, gathering of the gunmen and providing them with a map of sites that are chosen to be attacked.
We strongly recommend everyone to look through these documents. There you will find all the details.

(SNIP - Turner Radio Network will not directly reproduce the Hyper-Links to the 7.9 MB files full of allegedly stolen emails)

--------------------- END of Anonymous' Announcement -----------------

Behold, what is alleged to be one of the hacked e-mails, complete with IP addresses, e-mail addresses and full internet server routing information PROVING state-sponsored terrorism, perpetrated by the United States government, specifically designed to start a war with Russia:

From: "Gresh, Jason P" < GreshJP@state.gov>
To: igor.protsyk@gmail.comi.v.protsyk@mil.gov.ua
Subj: Peninsula
Date: Sun, 9 Mar 2014 17:57:09 +0200

Delivered-To: igor.protsyk@gmail.com
Received: by 10.220.4.2 with SMTP id 2csp62561vcp;
Sun, 9 Mar 2014 08:57:15 -0700 (PDT)
X-Received: by 10.224.51.74 with SMTP id c10mr35436450qag.33.1394380635325;
Sun, 09 Mar 2014 08:57:15 -0700 (PDT)
Return-Path: < GreshJP@state.gov>
Received: from haig2.state.gov (haig-ee.state.gov. [169.253.194.10])
by mx.google.com with ESMTPS id f6si8135208qap.24.2014.03.09.08.57.14
for < igor.protsyk@gmail.com>
(version=TLSv1.2 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
Sun, 09 Mar 2014 08:57:15 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of GreshJP@state.govdesignates 169.253.194.10 as permitted sender) client-ip=169.253.194.10;
Authentication-Results: mx.google.com;
spf=pass (google.com: best guess record for domain of GreshJP@state.gov designates 169.253.194.10 as permitted sender) smtp.mail= GreshJP@state.gov
Received: from EEAPPSEREDG02.appservices.state.sbu ([10.47.98.102])
by haig2.state.gov with ESMTP id s29FgT0w013967-s29FgT0x013967;
Sun, 9 Mar 2014 11:42:29 -0400
Received: from EEAPPSEREX06.appservices.state.sbu (10.47.98.206) by
EEAPPSEREDG02.appservices.state.sbu (10.47.98.102) with Microsoft SMTP Server
(TLS) id 14.3.158.1; Sun, 9 Mar 2014 11:57:13 -0400
Received: from KIEVMB01.eur.state.sbu (10.168.34.7) by
EEAPPSEREX06.appservices.state.sbu (10.47.98.206) with Microsoft SMTP Server
id 14.3.158.1; Sun, 9 Mar 2014 11:57:13 -0400
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-MimeOLE: Produced By Microsoft Exchange V6.5
Subject: Peninsula
Date: Sun, 9 Mar 2014 17:57:09 +0200
Message-ID: < 71C9088C4C6F7A4582772808F54C25520349E214@KIEVMB01.eur.state.​sbu>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Peninsula
Thread-Index: Ac87sDqNfxCUW94zShqj0tXF8YAqGQ==
From: "Gresh, Jason P" < GreshJP@state.gov>
To: < igor.protsyk@gmail.com>, < i.v.protsyk@mil.gov.ua>
X-FEAS-SYSTEM-WL: 10.47.98.102

Ihor,

Events are moving rapidly in Crimea. Our friends in Washington expect more decisive actions from your network.
I think it's time to implement the plan we discussed lately. Your job is to cause some problems to the transport hubs in the south-east in order to frame-up the neighbor.
It will create favorable conditions for Pentagon and the Company to act.
Do not waste time, my friend.

Respectfully,
JP

Jason P. Gresh
Lieutenant Colonel, U.S. Army
Assistant Army Attaché
U.S. Embassy, Kyiv
Tankova 4, Kyiv, Ukraine 04112
(380-44) 521 - 5444 | Fax (380-44) 521 - 5636

To members of the United States Military, we at Turner Radio Network ask "Is this what you signed-up for?"  For your own government to conduct terrorist attacks in other countries to create a phony reason to send YOU into war?  Phony reasons that get you shot at, blown-up or killed?  Is THIS why you joined the U.S. military?

Given that the IP addresses factually trace to the US State Department public IP address range as listed in ICANN and WHOIS, it appears this communication is legitimate.  That said, such an email would prove the federal government of the United States has become nothing more than an criminal terrorist organization.  Would anyone blame the US Military if all of them resigned?  Would anybody blame the US Military if it rose up and threw-off such a corrupt, dangerous, criminal administration which was caught red-handed, setting-up false terror attacks in a foreign country as an excuse to send them to war?

The Founding Fathers are watching.  The American people are watching.  Many are waiting to see what the US Military - which is sworn to defend the Constitution of the United States from all enemies, foreign and domestic-- is prepared to do now that the Executive Branch of the government itself has become a domestic enemy by being caught red-handed being a state sponsor of terrorism.

UPDATE 12:31 AM EDT MARCH 13, 2014:
Further research on the alleged author of the email above indicates as follows:

LINKED-IN PROFILE:

Jason P. Gresh's Summary

Currently serving as the Assistant Army Attache at the U.S. Embassy, Kyiv, Ukraine.

Advises the U.S. Ambassador to Ukraine, European Combatant Command, Headquarters U.S. Army, and the Joint Chiefs of Staff on Ground Force military issues pertaining to the country of Ukraine. Helps formulate and synthesize U.S. security strategy towards the greater Black Sea region.

A Foreign Area Officer with 16 plus years experience in the U.S. Army. Formerly commanded as an Armor Officer at the platoon and company level.

Jason P. Gresh's Experience

Assistant Army Attache
U.S. Embassy, Kyiv, Ukraine

2011 – Present (3 years)
Assistant Army Attache
U.S. Embassy Kyiv

June 2011 – Present (2 years 10 months)
Graduate Research Assistant
Woodrow Wilson International Center for Scholars

Nonprofit; 51-200 employees; Think Tanks industry

June 2009 – August 2009 (3 months) Washington D.C. Metro Area
Assistant to the ODC
U.S. Embassy, Dushanbe

January 2008 – May 2008 (5 months)
Company Commander
1st Battalion, 63rd Armor

November 2004 – December 2005 (1 year 2 months) Vilseck, Germany
Platoon Leader
1st Squadron, 3rd ACR

1998 – 2001 (3 years)
Jason P. Gresh's Languages

*
English
(Native or bilingual proficiency)
*
Russian
(Professional working proficiency)
*
Ukrainian
(Professional working proficiency)

Jason P. Gresh's Skills & Expertise

1. Security Clearance
2. International Relations
3. National Security
4. Policy Analysis
5. Research
6. Government
7. Counterterrorism


Jason P. Gresh's Education

Georgetown University
Master of Arts (M.A.), Russian, Central European, East European and Eurasian Studies

2008 – 2010

George C. Marshall Center

2007 – 2008

United States Military Academy at West Point
B.S., Civil Engineering

1993 – 1997

Activities and Societies: Chapel Ushers, Cadet Orienteering Team

UPDATE 1:43 AM EDT  MARCH 13, 2014

A map of an Melitopol.airport was attached to one of the allegedly hacked emails showing exactly what parts of an airport the U.S. wanted attacked by terrorists they were paying. According to one of the allegedly hacked emails, this airport was/is to be attacked on March 15.  That map, with Russian writing on the image, is shown below (Click image to enlarge):


For verification purposes, Melitopol' Airport is, in fact, located in the southeastern part of Ukraine as shown on the Wikipedia Map below:
More information of this nature will be forthcoming right here from the Turner Radio Network. Check back often.

No comments:

Post a Comment