Obama, ISIS and the Muslim Brotherhood. The PSD-11 “Secret Blueprint” to Implement Regime Change across the Middle East – Global Research

“In 2010 the US Administration under President Barack Obama developed a top secret blueprint for the most ambitious and far-ranging series of US-backed regime change across the Islamic Middle East since World War I and the Anglo-French Sykes-Picot agreement. It was to set off a wave of wars and chaos, of failed states and floods of war refugees unimaginable to the most cynical veteran diplomat, and beyond the belief of most lay persons in the world.

In August, 2010, six months before Tunisia’s Jasmine Revolution was launched by the Washington NGOs including the NED, the Soros Foundations, Freedom House and others, President Obama signed Presidential Study Directive-11 (PDS-11), ordering Washington government agencies to prepare for “change.”  The change was to be a radical policy calling for Washington’s backing for the secret fundamentalist Islamic Muslim Brotherhood sect across the Middle East Muslim world, and with it, the unleashing of a reign of terror that would change the entire world.”

Source: Obama, ISIS and the Muslim Brotherhood. The PSD-11 “Secret Blueprint” to Implement Regime Change across the Middle East – Global Research


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more