NameBase is a web-based cross-indexed database of names that focuses on individuals involved in the international intelligence community, U.S. foreign policy, crime, and business. The focus is on the post-World War II era and spooky activities.
Founder Daniel Brandt began collecting clippings and citations pertaining to influential people and intelligence agents after becoming a member of the Students for a Democratic Society, an organization which opposed US foreign policy, in the 1970s. With the advent of personal computing, he developed a database which allowed subscribers to access the names of US intelligence agents.
In the 1980s, through his company Micro Associates, he sold subscriptions to this computerized database, under its original name, Public Information Research, Inc (PIR). At PIR's onset, Brandt was President of the newly formed non-profit corporation and investigative researcher, Peggy Adler, served as its Vice President. The material was described as "information on all sorts of spooks, military officials, political operators and other cloak-and-dagger types." He told The New York Times at the time that "many of these sources are fairly obscure so it's a very effective way to retrieve information on U.S. intelligence that no one else indexes." One research librarian calls it "a unique part of the 'Deep Web'", equally useful to investigative journalists and students.
In 1995, Brandt's efforts became the basis of NameBase. As of 2003, the site contained "over 100,000 names with over 260,000 citations drawn from books and serials with a few documents obtained under the Freedom of Information Act." The website is structured so that users can follow hyperlinked information "and thus uncover potential relationships or connections between individuals and groups". The way this is formatted on the website is referred to as a social network and, though the user has to click further to actually determine the relationship between names on a given social network, as they are not specifically listed, NameBase was described by Paul B. Kantor as being the "only web-based tool readily available for visualizing social networks of terrorism researchers."
Namebase on Wikispooks
| ||Has namebase||Description|
|James Jesus Angleton||http://www.namebase.net/names/nn01.cgi?ANGLETON_JAMES_JESUS||"The dominant counterintelligence figure in the non-communist world", according to Richard Helms, DCI.|
|Assassination||http://www.namebase.net/books08.html||Assassination is the extra-judicial killing of particular people, often indicative of deep politics at work. Illegal under most legal systems, the Western commercially controlled media has recently been introducing a euphemism for this: if carried out by "us" (Western democracies such as the USA) against "them" (demonized bogeymen), the preferred term is "targeted killing", the legality of which goes unquestioned.|
|Juval Aviv||http://www.namebase.org/cgi-bin/nb01?AVIV_JUVAL_||A terrorism expert and Mossad operative who once remarked on live TV: "It's easy to put a truck bomb, as we did, er, as happened in London."|
|Mehmet Ali Ağca||http://www.namebase.net/names/nn01.cgi?AGCA_MEHMET_ALI|
|Harry van den Bergh||http://www.namebase.org/cgi-bin/nb01?_VAN DEN BERGH_HARRY_|
|George H. W. Bush||http://www.namebase.org/cgi-bin/nb01?Na=BUSH+GEORGE+H||Skull and bones mastermind of the bush family busine$$.|
|Ray S. Cline||http://www.namebase.org/cgi-bin/nb01?Na=Cline,+Ray|
|Lester Coleman||http://www.namebase.org/cgi-bin/nb01?COLEMAN_LESTER_KNOX III|
|Christopher Curwen||http://www.namebase.org/cgi-bin/nb01?Na=Curwen,+Christopher||Head of MI6|
|Deep politician||http://www.namebase.net/books17.html||Planners of deep events, who establish deep state milieux and direct deep state operations.|
|Deep state milieu||http://www.namebase.net/books16.html||Informal, clandestine to a greater or lesser degree. Organisations and venues of the deep state, created and governed by deep politicians. Like criminal syndicates, some are ephemeral, some perennial. They have varying procedures and protocols, but are generally characterised by secrecy and frequented by agents of the deep state.|
|John J. Dziak||http://www.namebase.org/cgi-bin/nb01?Na=Dziak,+John|
|Perry Fellwock||http://www.namebase.org/main4/Winslow-_28perry-fellwock_29-Peck.html||The first NSA whistleblower|
|Allan Francovich||http://www.namebase.org/cgi-bin/nb01?_FRANCOVICH_ALLAN||Francovich was a talented and courageous filmmaker who produced unparalleled exposés of various misdeeds by the powerful. Termed a 'charlatan' by some, a "conspiracy theorist" by others (though not by Wikipedia).|
|Dick Franks||http://www.namebase.org/cgi-bin/nb01?Na=Franks+Arthur+Temple||Head of MI6|
|Manucher Ghorbanifar||http://www.namebase.org/main3/Manucher-Ghorbanifar.html||Arms dealer and central figure in the Iran-Contra Affair.|
|Oswald Allen Harker||http://www.namebase.org/cgi-bin/nb01?Na=Harker.+O Harker O.Allen (Jasper)|
|Michael Hurley||http://www.namebase.org/cgi-bin/nb01?HURLEY_MICHEAL_T||A DEA official accused of involvement in the Lockerbie Bombing.|
|Fred C. Iklé||http://www.namebase.org/cgi-bin/nb01?Na=Ikle,+Fred|
|Illegal drug trade||http://www.namebase.net/books15.html||An extremely profitable business, which is also extremely low risk when undertaken on a large enough scale, with protection from the various law enforcement agencies. A natural for deep state groups, which can be safely assumed to control the overwhelming majority of global drug trafficking.|
|Intelligence agency||http://www.namebase.net/books11.html||The distinction between secret societies, intelligence agencies or international groups may be slightly moot on occasions. Many are officially allowed to commit serious crimes such as murder, and are subject to minimal effective oversight anyway.|
|Carl Elmer Jenkins||http://www.namebase.org/main1/Carl-E-Jenkins.html|
|Knights of Malta||http://www.namebase.net/names/nn01.cgi?KNIGHTS_MALTA_|
- ↑ a b http://www.highbeam.com/doc/1G1-18696782.html
- ↑ Daniel Brandt (December 1992), "An Incorrect Political Memoir", Lobster-magazine.co.uk (24)
- ↑ Morley, Jefferson; Corn, David (November 7, 1988). "Beltway Bandits: Tinker, Tailor, Soldier, Spywatcher". The Nation. Retrieved January 16, 2012.
- ↑ Gerth, Jeff (October 6, 1987). "Washington Talk: The Study of Intelligence; Only Spies Can Find These Sources". New York Times. Retrieved January 16, 2012.
- ↑ a b O'Hanlon, Nancy (May 23, 2005). "The Right Stuff: Research Strategies for the Internet Age". Ohio State University Libraries. Retrieved 2008-02-24.
- ↑ Hand, Mark. "Searching for Daniel Brandt". CounterPunch (January 3, 2003). Retrieved 15 June 2007.
- ↑ Perrault, Anna H.; Ron Blazek (2003). United States History: A Multicultural, Interdisciplinary Guide to Information Sources. Westport, Connecticut; London: Libraries Unlimited. p. 35. ISBN 1-56308-874-6.
- ↑ Kantor, Paul B. (2005). Intelligence and security informatics. Springer. pp. 324–325. Retrieved January 16, 2011.