NameBase is a web-based cross-indexed database of names that focuses on individuals involved in the international intelligence community, U.S. foreign policy, crime, and business. The focus is on the post-World War II era and spooky activities.
Founder Daniel Brandt began collecting clippings and citations pertaining to influential people and intelligence agents after becoming a member of the Students for a Democratic Society, an organization which opposed US foreign policy, in the 1970s. With the advent of personal computing, he developed a database which allowed subscribers to access the names of US intelligence agents.
In the 1980s, through his company Micro Associates, he sold subscriptions to this computerized database, under its original name, Public Information Research, Inc (PIR). At PIR's onset, Brandt was President of the newly formed non-profit corporation and investigative researcher, Peggy Adler, served as its Vice President. The material was described as "information on all sorts of spooks, military officials, political operators and other cloak-and-dagger types." He told The New York Times at the time that "many of these sources are fairly obscure so it's a very effective way to retrieve information on U.S. intelligence that no one else indexes." One research librarian calls it "a unique part of the 'Deep Web'", equally useful to investigative journalists and students.
In 1995, Brandt's efforts became the basis of NameBase. As of 2003, the site contained "over 100,000 names with over 260,000 citations drawn from books and serials with a few documents obtained under the Freedom of Information Act." The website is structured so that users can follow hyperlinked information "and thus uncover potential relationships or connections between individuals and groups". The way this is formatted on the website is referred to as a social network and, though the user has to click further to actually determine the relationship between names on a given social network, as they are not specifically listed, NameBase was described by Paul B. Kantor as being the "only web-based tool readily available for visualizing social networks of terrorism researchers."
Namebase on Wikispooks
| ||Has namebase||Description|
|"Weapon of mass destruction"||http://www.namebase.net/books39.html|
|Aginter Press||http://www.namebase.net/names/nn01.cgi?AGINTER-PRESS |
|James Jesus Angleton||http://www.namebase.net/names/nn01.cgi?ANGLETON JAMES JESUS||"The dominant counterintelligence figure in the non-communist world", according to Richard Helms, DCI.|
|Juval Aviv||http://www.namebase.org/cgi-bin/nb01?AVIV JUVAL ||A terrorism expert and Mossad operative who once remarked on live TV: "It's easy to put a truck bomb, as we did, er, as happened in London."|
|Mehmet Ali Ağca||http://www.namebase.net/names/nn01.cgi?AGCA MEHMET ALI|
|Norman Bailey||http://www.namebase.org/cgi-bin/nb01?BAILEY NORMAN A|
|Harry van den Bergh||http://www.namebase.org/cgi-bin/nb01? VAN DEN BERGH HARRY |
|George H. W. Bush||http://www.namebase.org/cgi-bin/nb01?Na=BUSH+GEORGE+H||Skull and bones mastermind of the bush family busine$$.|
|CIA||http://www.namebase.net/books01.html||The most high profile of the US intelligence agencies, a covert agent of foreign policy. Funded by a 'black budget' derived from the global drug trade, the CIA is experienced at assassination, blackmail, instigating coups and other such covert deep state actions. Its scrutiny in the early 1970s however led to the development of more secure bases for the most sensitive deep state operations.||
|Ray S. Cline||http://www.namebase.org/cgi-bin/nb01?Na=Cline,+Ray|
|Cold War||http://www.namebase.net/books30.html||The official narrative had 2 diametrically opposed systems locked in combat with one another since soon after WW2. Each of the "superpowers" and its team of allies needed to outdo each other by creating ever more and deadlier weapons, creating a kind of perpetual war for perpetual peace, with the warring parties engaging mainly in covert/proxy wars. Deep state interests blossomed in the climate of fear and paranoia.|
|Lester Coleman||http://www.namebase.org/cgi-bin/nb01?COLEMAN LESTER KNOX III|
|Corporate media||http://www.namebase.net/books38.html||The corporate media refers to itself as 'mainstream' in an effort to marginalize so-called "alternative" media. While some instances (e.g. BBC) are not strictly commercial, all the corporate media is hierarchically structured, so a very small number of editors can censor or modify its output.|
|CovertAction Quarterly||http://www.namebase.net/names/nn01.cgi/CK||A magazine focused on US covert operations, relaunched in 2018.|
|Christopher Curwen||http://www.namebase.org/cgi-bin/nb01?Na=Curwen,+Christopher||Head of MI6|
|DGSE||http://www.namebase.net/books25.html||French foreign intelligence agency|
|Deep state milieu||http://www.namebase.net/books16.html|
|John J. Dziak||http://www.namebase.org/cgi-bin/nb01?Na=Dziak,+John|
|Perry Fellwock||http://www.namebase.org/main4/Winslow- 28perry-fellwock 29-Peck.html||The first NSA whistleblower|
|Allan Francovich||http://www.namebase.org/cgi-bin/nb01? FRANCOVICH ALLAN||Francovich was a talented and courageous filmmaker who produced unparalleled exposés of various misdeeds by the powerful. Termed a 'charlatan' by some, a "conspiracy theorist" by others (though not by Wikipedia).|
|Dick Franks||http://www.namebase.org/cgi-bin/nb01?Na=Franks+Arthur+Temple||Head of MI6|
|Hugh Gaitskell||http://www.namebase.net/names/nn01.cgi?GAITSKELL HUGH TODD||A UK Labour politician who reportedly died of a rae illness in hospital.|
|Monique Garnier-Lançon||http://www.namebase.org/nb01.cgi? GARNIER-LANCON MONIQUE |
|Max Geldens||http://www.namebase.net/names/nn01.cgi?GELDENS MAX |
|Manucher Ghorbanifar||http://www.namebase.org/main3/Manucher-Ghorbanifar.html||Arms dealer and central figure in the Iran-Contra Affair.|
|Grey Wolves||http://www.namebase.net/names/nn01.cgi?GRAY WOLVES |
|Oswald Allen Harker||http://www.namebase.org/cgi-bin/nb01?Na=Harker.+O Harker O.Allen (Jasper)|
|Arthur S. Hulnick||http://www.namebase.org/cgi-bin/nb01?Na=Hulnick,+Arthur|
|Michael Hurley||http://www.namebase.org/cgi-bin/nb01?HURLEY MICHEAL T||A DEA official accused of involvement in the Lockerbie Bombing.|
|Fred C. Iklé||http://www.namebase.org/cgi-bin/nb01?Na=Ikle,+Fred|
|Illegal drug trade||http://www.namebase.net/books15.html|
|JFK/Assassination||http://www.namebase.net/books03.html||The assassination of US President John F. Kennedy. This is the seminal deep political event of modern times. And no, it wasn't a 'lone nut'… There were much bigger motives. The facts remain that JFK was on terrible terms with the CIA and the Joint Chiefs of Staff as-well as every other element of the deep state.|
|Carl Elmer Jenkins||http://www.namebase.org/main1/Carl-E-Jenkins.html|
- ↑ a b http://www.highbeam.com/doc/1G1-18696782.html
- ↑ Daniel Brandt (December 1992), "An Incorrect Political Memoir", Lobster-magazine.co.uk (24)Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ Morley, Jefferson; Corn, David (November 7, 1988). "Beltway Bandits: Tinker, Tailor, Soldier, Spywatcher". The Nation. Retrieved January 16, 2012.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ Gerth, Jeff (October 6, 1987). "Washington Talk: The Study of Intelligence; Only Spies Can Find These Sources". New York Times. Retrieved January 16, 2012.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ a b O'Hanlon, Nancy (May 23, 2005). "The Right Stuff: Research Strategies for the Internet Age". Ohio State University Libraries. Retrieved 2008-02-24.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ Hand, Mark. "Searching for Daniel Brandt". CounterPunch (January 3, 2003). Retrieved 15 June 2007.
- ↑ Perrault, Anna H.; Ron Blazek (2003). United States History: A Multicultural, Interdisciplinary Guide to Information Sources. Westport, Connecticut; London: Libraries Unlimited. p. 35. ISBN 1-56308-874-6.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ Kantor, Paul B. (2005). Intelligence and security informatics. Springer. pp. 324–325. Retrieved January 16, 2011.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").