Archives for category: counter intelligence

Sant Feliu de Guixols - 1

These are mixed memories from my life in Sant Feliu de Guixols, a very Catalan (as opposed to ethnically Spanish) town on the coast north of Barcelona. The photo at the top is on a somewhat hazy day, overlooking the town’s marina. The massive concrete blocks in a line on the left are an addition to the ‘breakwater’, protecting the original breakwater that is a causeway creating the artificial harbor. There are annual sailing regattas out of sight to the left, the main portion of town is out of view to the right. I lived in Catalonia from the end of December 2008, to the beginning of July 2010.

Sant Feliu map - 1

The Province of Girona (I use the Catalan spelling) is the most northeast province of what ‘was’ Spain, prior to the current circumstance of civil  schism, bordered on the north by France and on the south by the (also Catalan) province of Barcelona.

The circumstance of my living in Sant Feliu de Guixols could be considered bizarre, depending on one’s perceptions. Our world(s) of experience are multi-dimensional when one considers the world of a trained spook provides an entire extra view of your surroundings superimposed on ‘normal’ and I had, within the previous few years, ‘reintegrated’ to ‘normal’ society from an environment of awareness, very much wider-deeper, than any training provided in the world of spooks, but didn’t yet understand the implications of my experience.

The 14 odd months previous to my arrival in Catalonia had been an intense game of survival, in Germany, from Berlin to Lindau (Bodensee) to Limburg to Wiesbaden back to Berlin, contesting for my life with the forces of both; CIA & MOSSAD. By this time of my arrival in Catalonia, I understood I had a remarkable skill set but I was mentally TIRED and by no means convinced of my survival; and is why I was now on the northeast coast, in the post Rome culture of Iberia. It was as simple as I wished to live whatever short time I thought I might have left on this planet in a warmer climate than Germany.

Flying into Barcelona from Berlin, I bought a new phone with unregistered chip and with help from people that is another story altogether, I became ‘invisible’, at least to MOSSAD. Central Intelligence would have access to my ATM card transactions, and general location, when I began using that bankers’ snitch when settled, but for the first time in what seemed like eternity, I could actually relax. After a first few weeks of wandering about, initially in Barcelona and finally through towns north of that city, sticking to the coast, I rented a flat. My most therapeutic experience to now was finding a mound of small pebbles or water worn gravel, created by high tide, lying down on my belly and wiggling enough to conform those pebbles like a sculptor’s mold to my body shape and just lay there, soaking up the sun warmed energy of the small stones like a sponge. My feeling was as though my umbilical were connected direct to the earth. With no one within 100 meters of my prone body, the relief and stress off was nothing short of a religious experience. This is my most memorable experience on arrival to reside at Sant Feliu de Guixols in January of 2009.

At this time, although it had been well over a  year already, I was still making the major psychological change over to understanding/coping with the firm knowledge I was an intensively hunted man. Does/can anyone ever really adjust to this? I didn’t know. What I did know was, as soon as I’d settled in and was using my ‘lifeline’, or ATM card, to access my veteran’s pension, at one location for more than a few weeks, at most, the hunt would be on again.

As a friend had once observed, concerning my circumstance, “you came in the wrong door.” What he had been referring to is, I had arranged to notify German police (via 3rd party, a lawyer) I was hunted in Europe and arranged to be monitored in circumstance where it was understood I would take care  of myself, the police only need watch and discover the criminal parties behind the attempts at murder. This initial arrangement was based on misapprehension of who I was dealing with. I had thought I was ‘only’ dealing with hired hit-men due to my past involvement with anti-corruption cases. That arrangement with German police was made in November, 2007. By July, 2008, with my USA cell phone having been routed around the German network (behaving exactly as though I were in the USA, not Germany) and my knit hat having captured a poison pellet intact, I understood my adversaries were intelligence agencies, not ‘only’ hired killers. I had some ideas why this could be the case but I wasn’t certain. But it was German police, not intelligence, the invitation for surveillance had been initiated with. ‘The wrong door” was the police in the sense of record keeping and a wider or ‘civilian’ authority that is not necessarily (should not be) exempt from having to move on criminals, even if those criminals are intelligence assets. I was determined to expose as many complicit parties as I could, no matter their sponsor. What is amazing to me, in retrospect is, my stalkers having either 1) no idea I was playing them into giving their identities up, even after this had gone on for five years before I tired of the game and spilled the score, or 2) if indeed they had sorted this immediate preceding prior to my finally, openly, communicating what I’d been doing, that they would have continued trying, at tremendous risk of being identified. How could taking me out possibly be that important? Over the years I’ve asked myself that question, again and again. I think I may finally have some answers. More on that later.

Meanwhile, mid-January 2009, I had come to live in Sant Feliu de Guixols, and the police surveillance had eventually followed, this much is certain.

My recollection is, it was about six weeks of respite before the action began again, about the beginning of March. I was sitting on the harbor beach in the late afternoon when I ‘noticed’ a couple sitting about 75 meters or more to my left. What this couple could not know is, I had them marked before she noticed me, and watching this couple with my peripheral vision, which is very good, I saw her lock in on me and then draw attention to the man she was with. All they saw was my gazing off into the harbor even as I was clearly observing their interactions. Not just anyone can convincingly appear to be looking off into the distance, lost in thought, and yet be closely studying events at a 90 degree angle. I can.  They spoke for a few moments, and then, with studied disinterest, as though tired and moving on, got up and began strolling down the beach towards me, no doubt to get a closer look and positive identity. But what they were actually doing, completely oblivious to the fact was, allowing myself to closely study them, body language, facial demeanor, gait, dress, interaction, these sort of things will tell the highly trained a LOT. He was cocksure to arrogance, she was uncertain, there was no real familiarity, no bond, no deep trust. They were a fake couple. I understood there was no danger in that moment, this was scouting, nothing more. She might be the bait that would accost me later but I wanted nothing to do with taking it any farther. I posted their very accurate descriptions online, where I knew my every word was monitored by my adversaries (and perhaps unknown to them, also by the police) and if you have any sense of my satire, you might also have some sense of the mocking terminology employed. I didn’t see them again. But the game was on.

It should seem counter-intuitive someone in my circumstance would keep routines. But I established routines, deliberately, to draw in my aspiring assassins, to the field of my choice. On one occasion it went like this: I had established a route where I turned right out of my apartment door, walk to the first intersection, bought a croissant (or two), cross the street and then to my left, cross the street. Now I am walking towards the marina along a wide dirt walkway with benches. At the end of this short street, I turn right, walk another few blocks and cross the street, buy my International Herald Tribune at a corner shop, turn to my left and cross the street. Now I turn right onto a wide, dirt walking avenue, between the town and the harbor. Normally, I would stop along this walkway and sit on a bench to enjoy my croissant while reading the newspaper.

But on this day I immediately noticed Americans had my route staked out. Casual dress Caucasian-American males are strategically placed on the benches along my route. Altering my habit slightly (which I do time to time, only so it won’t seem unusual), instead of stopping at a bench on the dirt walkway facing the harbor, I keep walking and then turn right, crossing the street again, into the Rambla (a paved walking street in the business center) and walk another 100 or so meters and find a vacant bench. I’ve put myself out of view of the pre-positioned spotters but not so far as to prevent a plan B kicking into action. A tall, suited, male Asian-American followed me (Ray-Bans don’t hide cheekbones) and GPS sent my location for a pale (very white, seldom sees the sun & clearly not from Spain) Caucasian female assassin with white frock, carrot hair, and receded chin, this was clearly an American team. But when I noticed the Asian had GPS marked my location, I waited a few moments, until he is out of sight, and retreat about forty meters (at most) back down the Rambla, towards the harbor, and take another bench, open my paper as though reading and watch the bench where I’d been GPS located. The woman gave herself away, when following the directions in her  earpiece, stopped where she should have found me and spun 360 degrees looking for what clearly was not there (myself.) Stupidly standing there, she looked up and down the Rambla, and locked in on my new location, when I deliberately looked up from my paper and made steady eye contact; when she turned and retreated down the street she had appeared from:

SFG_Assassin_bench - 1 (2)

The bench on the Rambla I’d been GPS located at is to the left & behind the woman at the center of this photo. The assassin arrived and departed from the side street behind the benches. My new location is out of view on the right, directly across from the second set of benches, with people on them, farther down the Rambla. At the far right of the photo the Rambla opens to the dirt walking avenue, facing the harbor, where I more typically would find a bench to read. Antoni Vidal photo (cropped)

This killer would have had hit me from behind, most likely with poison needle or pellet, at this bench, if things had gone to plan. Instead, I returned to my apartment, penned ‘My Life as a Joke Personal Ad‘, then walked to a wifi location and posted it online.

What I’d just encountered was the CIA contracted, Blackwater assassination program, blessed initially by (and now months into the Obama administration, still answering to) Dick Cheney who ordered it concealed from Congress, the very program run by morons Cofer Black and Enrique Prado that Leon Panetta had revealed about this time, when that idiot ran up to Capitol Hill and denied the Blackwater assassinations contract had ever been anything more than a power-point presentation.

This operation to hit me was too complicated (over-engineered), and the dumb red-head who’d been tasked with ‘trigger-man’ duty likely had no clue much of the set-up was designed in such a way as to leave her stranded, abandoned to take on all of the legal consequence, if the hit were picked up with CCTV surveillance and the red-head apprehended.

I didn’t have internet at my apartment, but would compose offline and then walk up and over a hill on the north side of town, to Hotel Barcarola, in S’Agaró, an adjacent resort village, to post the details in the news feed at MySpace:

Hotel_Barcarola - 1

Hotel Barcarola in S’Agaró, on 9 March 2010, after a freak snowstorm of the previous day, which oddly, coincided with the restart of CERN’s Large Hadron Collider. Power was out throughout the region with numerous high voltage transmission towers down. My apartment was freezing and I rented a room here until their generator broke down, at which time I relocated to Girona and rented a room until the grid was repaired –

Of the 2 dozen plus attempted assassinations of myself over the period of a year and one half I was located at Sant Feliu de Guixols, this had been the second to last employing a large team. It was February 2010 was the last team of several members (6), run by former CIA officer, and subsequently hired hit man, Gary Berntsen, who I’d surprised and trapped on CCTV together with myself at Hotel Barcarola reception desk on the morning of 20 February, seems to have ended that particular experiment in relation to myself. All of the subsequent attempted hits appear to have been singles, mostly, with the occasional double.

Sant Feliu de Guixols - 1 (1)

The author in Catalonia, February 2010

The several unanswered but inter-related questions are:

  1. (a) whether the CIA and MOSSAD were in a joint venture to take me out, or were these were separate but convergent intelligence agency projects.

Prior to my arrival in Spain, my first encounters with attempted hits consisted of two operations to take me out (with many to follow) in Germany, inside the span of two weeks, in October, 2007. The first is clearly traceable to CIA because I was able to positively identify the attempted assassin, Vince Langen, and work out his affiliation. The second operation, where the operative was killed, is equally clear to have originated with MOSSAD, due to how the event unfolded. There are arguments for joint operations, as well as independent but convergent operations in efforts to take me out. Before I had bailed out of the USA, when working a corruption case, I had penetrated an American intelligence operation using a charter school, East Mountain High School (with sponsors belonging to Council on Foreign Relations), using the school as a cover for CIA operations, with field trips abroad. This operation in turn, had been penetrated by MOSSAD. Albuquerque FBI office analyst, Sylvia Maruffi, appears to have been providing cover for, and/or assisting both. Both agencies would have an interest in taking me out, for reasons of operational security. I believe the FBI Albuquerque office (Maruffi) had been the origin of a ‘national security letter’ enabling tracking my whereabouts via ATM card. Whether the FBI’s Maruffi, who profiles as, is not necessarily but easily could be, a MOSSAD asset, was providing MOSSAD information independently, or this was straightforward ‘shared’ information via established intelligence channels for purpose of joint efforts, is unknown to me. With access to my banking details via an FBI issued National Security Letter, providing MOSSAD access to my ATM use and location, would be as easy as providing my online banking login details (user name & password) with instruction to route the login through a VPN in the country where I’m residing.

  1. (b) with the sustained and severe risk of unmasking these agencies operatives in ongoing attempted assassination of a target with superior skills set, how could taking me down possibly be this important?

My background documentation to be deposited with the German police was sent via regular post in Germany to a third party, a lawyer, not over the internet. Serious, subsequent communications, were taken with the lawyer, in person. It’s certainly possible the intelligence agencies missed this, even with all of their criminal spies and spyware, they are not omnipresent entities.

More than this, narcissism is a form of retardation according to the superior skills set in my possession (my training), and can certainly look as though it had been exploited. The management at Central Intelligence is narcissistic in the extreme, to a point of stupidity, as are those operatives engaging in renditions and assassination. This is a form of mercenary narcissism, where the operative lies to himself concerning motive or, perhaps better said, a self-deceit of ‘patriotism.’ Any narcissism based in a self-deceit at the meta-level of consciousness will misinform; compounding, more often than not, previous mistakes from this misapprehension of reality. A sort of ‘the coming 12th attempt germinating in the plans office should work’, following on eleven failures. Paraphrasing Einstein, when contemplating this kind of mentality, ‘these people will never be able to unscrew their world, with the same thinking that screwed it’, which it just so happens, is the only thinking they know.

MOSSAD’s narcissism is a bit different but is narcissism nevertheless. Rooted in Jewish nationalism, their Mosaic law’s ‘an eye for an eye’ inspired honor code demanding any loss to the MOSSAD be avenged, undoubtedly causes greater harm than good, since their agent got himself killed, not by my hand, but because he (and MOSSAD) weren’t properly informed, prepared and equipped to compete at the level I was operating, in a very hostile (to the Israelis) environment. Because they could not even assess my level (at that time), they kept coming after me, quite literally speaking, ‘with a vengeance.’ Excuse me, but I’m not just going to roll over because the Sephardic MOSSAD officer, posing as a Palestinian member of Hamas, was part of a hare-brained scheme to dupe Hezbollah into assisting with my assassination; the Israeli operative got himself killed because the operation unraveled and he was unmasked at a critical moment. I do not glory in his death, nor do I feel sorry for him, as he was out to murder me, not vice-versa. Shit happens. I’m clearly not their messiah, but I would dare to suggest a changed attitude (and related behaviors) could inform the Israelis at a higher level of ‘intelligence.’

One more possible motive, the most intriguing one is, a mutation in one or more of the intelligence agencies thinking; when, over time and numerous failures when coming after me, it was considered whether I would ‘sell’ my skills kit to, or somehow employ it on behalf of some 3rd party. Worse still, might be the idea of my training persons hostile to what I openly refer to as ’empire.’ Had ongoing, even increased, imperative been born of this possibility?

My skills set had been born of immersion in a world, or better said, a ‘dimension’ Central Intelligence, and the Defense Intelligence Agency before that, had attempted to exploit for decades, without accomplishing any real mastery, because a wider understanding of this phenomenon or skill set derives from a non-western culture even most anthropologists would experience great difficulty penetrating. A short abstract concerning a single aspect of this multiple-dimensions reality, may be found HERE (PDF file.)

Would this plausible fear of the intelligence agencies be well founded? I will say I’ve not done this to now. Could it be done? In the right circumstance and environment, I believe I could transfer my skills set, I’ve worked on translating the concepts to western understanding for nearly forty years, concurrent to my beginning learning. Beyond this, I’ve experimented with whether western mentalities can be trained so far as mastery in closely related skills (excluding ‘trade craft’ or investigations, espionage, assassination and geopolitical intrigue.)

The answer is a qualified, but definitive, yes. That said, I just don’t think it is a good idea to hand off an understanding, example given, of how to appear to vanish before someone’s eyes, without props, to people in a culture that behaves as the western culture does.

  1. (c) why the police of Spain never moved on the criminal actors exposed to them, despite my being in covert but direct communication with Spanish law enforcement and the same thanking me on several occasions.

The short answer is, narcissism (corruption) at the very apex of the hierarchy. When I had finally become altogether tired of the game, towards the end of 2012 I began blowing the whistle to various institutions concerned with justice, and related personalities, with a complaint; namely five full years of playing myself bait for law enforcement was more than long enough to unravel the murder rings pursuing me. One of my suggestions had been, in the face of a recalcitrant refusal of German law enforcement to move on my case, was for these institutions and associated personalities to inquire of Spanish authorities concerning the veracity of my statements. Lo, a miracle occurred! Out of the clear, blue, blessed Mary’s skies, within a mere few weeks of this suggestion of mine, Mutti Merkel’s Germany suddenly stopped disparaging Spain as one of the EU’s economic PIIGS and instead offered Spain programs and financial assistance you did not see offered to Portugal, Ireland, Italy and Greece. Was this sudden, very much out of character, German generosity a mere coincidence? Or a price paid by the Merkel administration to buy silence in a case that could unwind to reveal MOSSAD had been running around Germany (not only Catalonia) attempting to kill people (with plausible German intelligence complicity, not only CIA.) Spain doesn’t have the same political  ‘sensitivities’ concerning Israel. Meanwhile, there had been ample experience informing myself the German police had restarted surveillance in my case, on my return from Catalonia.

This decision not to prosecute ultimately had to have been a decision taken in consultation with Spain’s Prime Minister Mariano Rajoy, who bathes in narcissistic opportunism, and leaps at opportunities to take revenge on any and all of his perceived enemies, irrespective of any noble intentions of the law. Blackmail between allies is, after all, nothing new in geopolitics.

Rajoy, surrounded by Popular Party corruption that is breathtaking in scope, for years (1, 2), is Spain’s leader behind the charges against the recently fired Catalan police chief for the fact the police chief had issued orders to his officers to exercise “restraint” in dealing with the recently banned (by Madrid’s government) plebiscite on independence. The clear implication is, because the Catalan police did not beat their own people bloody at Catalonia’s polling stations (like the national police did), the Catalan police chief is guilty of sedition. That’s only the start.

It was Mariano Rajoy behind Spain’s Constitutional Court striking down a negotiated compromise, in 2010, previously approved under Madrid’s Socialists and accepted by the Catalans, that would have averted today’s crisis. The result? Pushing the Catalans’ sympathies towards full independence. The reactionary Rajoy’s answer? Jailing the Catalan government’s ministers with charges that could keep them in prison for up to 30 years. The reptile Rajoy clearly does not possess the cognitive ability to grasp this ‘Francoesque’ action will only further alienate the millions of Catalans that already despise him, in addition to radicalizing the Catalans, and moreover, add to their numbers.

As Rajoy jails the elected Catalan leadership that dared attempt allowing millions of Catalans exercise their perceived ‘right of self-determination’ at the ballot box, a right enshrined in international law, but conversely, a right only when it suits the several hierarchies of Europe, meanwhile, an established fascist sedition of a truly grotesque and violent nature, a seditious militia closely resembling a set of GLADIO cells that is naturally aligned with Rajoy’s Popular Party and its’ legacy descending from Franco, for years, has gone un-prosecuted in Spain:

So far, all accusations pertaining to this group have been in vain, even though Article 22 of the Spanish Constitution and Article 515 of the Penal Code prohibit secret associations”

The unbalanced hypocrisy of Rajoy is practically stupefying. Moreover, those shilling comparisons of Catalonia to Kosovo are comparing apples to oranges; the Catalans have been in Catalonia for as long as Spaniards have existed elsewhere in Spain. Kosovo, on the other hand, could be looked at with a metaphor; it’s as if the recently arrived Muslim refugee wave in Germany had overwhelmed the German state of Saarbruken with their numbers, and seceded (with neo-Ottoman Pasha Erdogan’s support) to form a Republic of Gerkistan.

From the European Union’s point of view, the recently arrived ethnic Albanians in historically Serbian Kosovo, who were allowed to dramatically increase their numbers under a humanitarian policy of Tito’s Yugoslavia, are entitled to self-determination, whereas the Catalans, occupying their own land since the era of the Roman empire, are not. What should a hypocrisy of this magnitude say to us?

Mariano Rajoy’s fascism only differs from the fascism of the other European Union states in its’ crude application. In effect, Rajoy is too stupid to understand how to finesse the European Union’s desired outcomes. To now, little better can be said of Spain’s King Felipe, whose medieval title ‘Count of Barcelona’ would appear more important to him than the legitimate aspirations of the Catalan people.

At the end of the day, in Mariano Rajoy’s Spain, ‘justice’ is a relative thing, whether it concerns the life of a single individual hunted by intelligence agencies, ultimately with state sanctioned impunity, or whether it concerns the lives of millions; seeking to live their own destiny –

Related: The Alpha Chronology

For those unfamiliar with ‘GLADIO’, this is the name assigned a known history of western democracies intelligence agencies unleashing terror on their own citizens for purpose of influencing or manipulating public opinion to the advantage (historically-typically) of the right wing in politics. In the history developed since GLADIO first spilled into the open in Europe in 1990, we see the Central Intelligence Agency was central to setting up the original cells. Although exposed for mass murders falsely blamed on left wing political movements, the initial GLADIO actors were never prosecuted and the apparatus behind GLADIO never shut down. There is a video documentary of GLADIO  (NATO’s secret armies) farther down this page, followed by more print information. Meanwhile, presented here are the holes in the stories of several USA mass shootings, raising the specter of ongoing GLADIO operations –

Most recent update 10 October 2017:

Gunshot victim testimony of what went on from inside the venue matches the previous analysis of multiple shooters:

Las Vegas, gunfire from at least two automatic weapons, analysis:

2nd, 19 second recording, clearly two automatic weapons:

All for the ‘fact’ of a lone shooter who must simultaneously work two automatic weapons like Rambo (and then conveniently commit suicide.) BUT, What I clearly hear is two separate calibers, two rates of fire, the heavier caliber a lower rate of fire at distance but steady, indicating it is belt fed. The lighter caliber with higher rate of fire is much closer and in bursts. It’s been 45 years but you never forget the nature of the noise, in fact you need to learn to accurately interpret the noise because it can give you critical information in a fluid combat circumstance. These are 2 separate weapons without question, employed from distinct locations.

Then, the Las Vegas Sheriff (going ‘off script’, read on) says the shooter had to have had help, at least in pulling the act together (setting it up)

If you follow the Sheriff over the entire (longer, following) interview, what becomes clear is, in his own words, the ‘facts’ he reports are coming from the FBI. Is the FBI corrupt? Oh yes. So, when we hear two automatic weapons discharging from separate locations, you have to look for openings in the ‘lone shooter’ story the FBI is feeding us.

Interesting ‘facts’ are 1) the ‘hero’ security guard is sent packing before the room is breached by the police team. Is this sanitizing witnesses? The other interesting fact is, the Sheriff states there was a second team hauled a large, heavy bag of weapons to the location in the midst of the operation. Is this opportunity to swap out weapons used? Did large quantities of ammo and, spent brass with associated weapons come up to the room and, a belt fed machine gun and associated ammo and spent brass & belt links go back down in that bag? 3) It has been reported there was a full hour passed after the shooting had stopped, with police on location, before the police forced their way into the ‘shooters’ room. This, coupled with ‘the adjacent room’ (adjoining suite) spoken of by the Sheriff, provides plausible separate entry and exit, with ample time to swap out the evidence.

Also, the Sheriff’s investigators don’t have access to the ‘shooters’ girlfriend, all this information will be fed via the FBI who appear have total control over all information.

An interesting aside, the ‘gentlemen’ (includes FBI ‘investigative’ leader) standing behind the Sheriff like minders, while giving very close attention to every reporter and every question asked, pass a note from one to the other at minute 32:17. What couldn’t wait to be known at that moment? These two guys seemed more interested in the reporting than the crime.

The full interview:

Prior ‘gladio’ updates:

Updated 23 July 2016:

GLADIO returns to Munich: “A Munich police spokesman says witnesses have reported seeing three shooters with “long guns” who attacked a McDonald’s in a city mall”

Munich_3_Shooters.jpg - 1

Three gunmen then magically morph into a single shooter who commits suicide: “A teenage German-Iranian gunman who killed nine people in a shooting spree at a busy Munich shopping centre and then committed suicide had likely acted alone, German police said Saturday”

Munich_3_Shooters_(2).jpg - 1

This preceding would appear to be the more recent USA GLADIO model re-exported to Europe; recalling there has never been a satisfactory explanation for how a recently sold in the USA military grade assault rifle was reported to be employed in the Paris Bataclan massacre: “Milojko Brzakovic of the Zastava arms factory told The Associated Press that the M92 semi-automatic pistol’s serial number matched one his company delivered to an American online arms dealer in May 2013. It was not clear how the gun got back to Europe”

As well at the Bataclan, a member of the band stating: “When I first got to the venue and walked in, I walked past the dude who was supposed to be the security guard for the backstage. I immediately went to the promoter and said: ‘Who’s that guy? I want to put another dude on. Eventually I found out that six or so [band security detail] wouldn’t show up at all.”

Moving on to the USA and the recent killing of police in Dallas, immediately, it is apparent the reporting is problematic; with initial reports of multiple snipers firing from elevated positions, which would be consistent with an initial high rate of police casualties. Most of the police appear to have been gunned down in the first minutes. It was also reported the fire (from multiple snipers) was “triangulated” or a professionally set up, coordinated ambush. Former CIA officer & clandestine service Afghanistan veteran William Hurd stated: “When gunfire started exchanging, you had folks in cross positions that were moving towards the target,” the Texas Republican told Fox News’ “Fox & Friends” program. “Usually, most folks that have never been in that situation are going the opposite direction. The level of coordination, there seemed to be some type of triangulation”

This information is also stated by the Dallas Chief of Police: “We believe these suspects were positioning themselves in a way to try to triangulate against officers,” Brown said”

But within 48 hours the narrative had dramatically changed; it is now a ‘lone gunman’ whom the police took care to blow up with a robot after they had him cornered (never-mind they’d initially reported he’d shot himself.) Question: Why, after cornering the suspect, instead of holding out for a negotiated surrender and possible critically important intelligence gains, would they take him out with an explosive device?  How could  the professional police of Dallas, many of them military veterans qualified  to make an accurate first assessment, get it all so wrong as to have to change the entire story?

At San Bernardino; three shooters, tall with athletic build: eye witness account. Of course we all are subsequently informed this was a (conveniently dead) lone gunman…

 

Orlando nightclub shooting; eyewitnesses claim more than one shooter and accomplices preventing escapes, blocking exit doors from the outside, while shooting went on. Of course this morphed into a single, dead shooter…

Orlando eyewitnesses part 1:

Orlando eyewitnesses part 2:

 

The Navy Yard shootings generated initial reports of multiple gunmen at more than one location, but ultimately a single lone gunman is dead at the scene. But this one gets a little stickier; a swat team on location was ordered not to intervene and leave scene of the ongoing shooting: “A tactical response team from the force was told by a supervisor to leave the scene instead of aiding municipal officers, police sources told the BBC”

BBC_Navy_Yard_SWAT.jpg - 1

Aurora: The evidence covered up by law enforcement and the court in the ‘Batman’ theater shooting is nothing short of overwhelming. Video of close eyewitness accounts (<preceding link is expanded witness accounts) clearly detail the shooter(s) had inside help and this evidence is suppressed:

The only difference between the old domestic Gladio which had been western intelligence agencies engineering terror and the current version of domestic Gladio (Gladio B) is the label put on the enemies supposedly responsible; today’s boogeyman is radical Islam whereas previous to the fall of the Soviet Union the terror boogeyman was communism. A fifty minutes documentary of social engineering via GLADIO terror cells employed by intelligence agencies in Europe is a good place to start:

A postscript observation would be concerning historian Daniele Ganser’s otherwise excellent conclusions in his 2004 book NATO’s Secret Armies:

‘Prudent Precaution or source of Terror?’ the international press pointedly asked when the secret stay-behind armies of NATO were discovered across Western Europe following the Gladio revelations in Italy in late 1990.

After more than ten years of research and investigation the answer is now clear: Both. The secret stay-behind armies of NATO were a prudent precaution, as the available documents and testimonies amply demonstrate. Based on the experiences of the Second World War and the rapid and traumatic occupation of most European countries by the German and Italian forces, military experts feared the Soviet Union and became convinced that a stay-behind army could be of strategic value when it came to the liberation of the occupied territory. Behind enemy lines the secret army could have strengthened the resistance spirit of the population, helped in the running of an organised and armed national resistance, sabotaged and harassed the occupying forces, exfiltrated shot down pilots, and gathered intelligence for the government in exile.

Based on the fear of a potential invasion after the Second World War highly placed officials in the national European governments, in the European military secret services, in NATO as well as in the CIA and the MI6 therefore decided that a secret resistance network had to be set up already during peacetime. On a lower level in the hierarchy citizens and military officers in numerous countries of Western Europe shared this assessment, joined the conspiracy and secretly trained for the emergency. These preparations were not limited to the 16 NATO member countries, but included also the four neutral countries in Western Europe, namely Austria, Finland, Sweden and Switzerland, on which the author is preparing a second publication. In retrospect it has become obvious that the fear was without reason and the training had been futile for the invasion of the Red Army never came. Yet such a certainty was not available at the time. And it is telling that the cover of the network, despite repeated exposures in many countries during the entire Cold War, was only blown completely at exactly the same moment when the Cold War ended and the Soviet Union collapsed. The secret stay-behind armies of NATO, however, were also a source of terror, as the evidence available now shows. It has been this second feature of the secret war that has attracted a lot of attention and criticism in the last decade, and which in the future will need more investigation and research. As of now the evidence indicates that the governments of the United States and Great Britain after the end of the Second World War feared not only a Soviet invasion, but also the Communist Parties, and to a lesser degree the Socialist Parties. The White House and Downing Street feared that in several countries of Western Europe, and above all in Italy, France, Belgium, Finland and Greece, the Communists might reach positions of influence in the executive and destroy the military alliance NATO from within by betraying military secrets to the Soviet Union. It was in this sense that the Pentagon in Washington together with the CIA, MI6 and NATO in a secret war set up and operated the stay-behind armies as an instrument to manipulate and control the democracies of Western Europe from within, unknown to both European populations and parliaments. This strategy lead to terror and fear, as well as to “humiliation and maltreatment of democratic institutions’, as the European press correctly criticised.

Experts of the Cold War will note that Operation Gladio and NATO’s stay-behind armies cast a new light on the question of sovereignty in Western Europe. It is now clear that as the Cold War divided Europe, brutality and terror was employed to control populations on both sides of the Iron Curtain. As far as Eastern Europe is concerned, this fact has long been recognised, long before it had been openly declared. After the Red Army had in 1968 mercilessly crushed the social reforms in Prag, Soviet leader Leonid Breschnew in Moscow with his infamous ‘Breschnew doctrine’ had openly declared that the countries of Eastern Europe were only allowed to enjoy ‘limited sovereignty’. As far as Western Europe is concerned the conviction of being sovereign and independent was shattered more recently. The data from Operation Gladio and NATO’s stay-behind armies indicates a more subtle and hidden strategy to manipulate and limit the sovereignty, with great differences from country to country. Yet a limitation of sovereignty it was. And in each case where the stay-behind network in the absence of a Soviet invasion functioned as a straightjacket for the democracies of Western Europe, Operation Gladio was the Breschnew doctrine of Washington. The strategic rationale to protect NATO from within cannot be brushed aside lightly. But the manipulation of the democracies of Western Europe by Washington and London on a level which many in the European Union still today find difficult to believe clearly violated the rule of law and will require further debate and investigation. In some operations the secret stay-behind soldiers together with the secret military services monitored and filed left-wing politicians and spread anti-Communist propaganda. In more violent operations the secret war led to bloodshed. Tragically the secret warriors linked up with right-wing terrorists, a combination that led – in some countries including at least Belgium, Italy, France, Portugal, Spain, Greece and Turkey – to massacres, torture, coup d’etats and other violent acts. Most of these state-sponsored terrorist operations, as the subsequent cover-ups and fake trials suggest, enjoyed the encouragement and protection of selected highly placed governmental and military officials in Europe and in the United States. Members of the security apparatus and the government on both sides of the Atlantic who themselves despise being linked up with right-wing terrorism must in the future bring more clarity nd understanding into these tragic dimensions of the secret Cold War in Western Europe.

If Cold War experts will derive new data from NATO’s stay-behind network for their discourse on limited sovereignty during the Cold War, then international legal experts and analysts of dysfunctions of democracies will find data on the breakdown of checks and balances within each nation. The Gladio data indicates that the legislative was unable to control the more hidden branches of the executive, and that parliamentary control of secret services is often non-existing or dysfunctional in democracies on both sides of the Atlantic. Totalitarian states have long been known to have operated a great variety of largely uncontrolled and unaccountable secret services and secret armies. Yet to discover such serious dysfunctions also in numerous democracies comes as a great surprise, to say the least. Within this debate of checks and balances military officials have been correct to point out after the discovery of Operation Gladio and NATO’s stay-behind network that there can never be such a thing as a ‘transparent stay-behind army’, for such a network would be exposed immediately in case of invasion and its members would be killed by the invasion force. Parliamentarians and constitutional lawyers meanwhile have been equally correct to emphasise that both the armed forces and the secret services of a democracy must at all times be transparent, accountable, controlled and supervised closely by civilian representatives of the people as they represent the most powerful instruments of the state.

This clash between mandatory secrecy and mandatory transparency, which lies at the heart of the Gladio phenomenon, directly points to the more general question of how much secrecy should be granted to the executive branch of a democracy. Judged from the Gladio evidence, where a lack of transparency and accountability has lead to corruption, abuse and terror, the answer is clear: The executive should be granted no secrecy and should at all times be controlled by the legislative. For a secret government, as it manifested itself in the United States and parts of Western Europe, can lead to abuse and even state terrorism. The growth of Intelligence abuses reflects a more general failure of our basic institutions’, US Senator Frank Church had wisely noted after a detailed investigation of CIA covert operations already in the 1970s. Gladio repeats this warning with a vengance.

It can hardly be overemphasised that running a secret army and funding an unaccountable intelligence service entails grave risks every democracy should seek to avoid. For the risks do not only include uncontrolled violence against groups of citizens, but mass manipulation of entire countries or continents. Among the most far-reaching findings on the secret war, as seen in the analysis, ranges the fact that the stay-behind network had served as a tool to spread fear amongst the population also in the absence of an invasion. The secret armies in some cases functioned as an almost perfect manipulation system that transported the fears of high-ranking military officers in the Pentagon and NATO to the populations in Western Europe. European citizens, as the strategists in the Pentagon saw it, due to their limited vision were unable to perceive the real and present danger of Communism, and therefore they had to be manipulated. By killing innocent citizens on market squares or in supermarkets and blaming the crime on the Communists the secret armies together with convinced right-wing terrorists effectively translated the fears of Pentagon strategists into very real fears of European citizens.

The destructive spiral of manipulation, fear and violence did not end with the fall of the Soviet Union and the discovery of the secret armies in 1990, but on the contrary gained momentum. Ever since the vicious terrorist attacks on the population of the United States on September 11, 2001 and the beginning of the ‘War on Terrorism’ fear and violence dominate not only the headlines across the globe but also the consciousness of millions. In the West the ‘evil Communist’ of the Cold War era has swiftly been replaced with the ‘evil Islamist’ of the war on terrorism era. With almost 3,000 civilians killed on September 11, and several thousands killed in the US-led war on terrorism so far with no end in sight, a new level of brutality has been reached.

Such an environment of fear, as the Gladio evidence shows, is ideally suited to manipulate the masses on both sides into more radical positions. Osama Bin Laden and his Al Qaida terror network manipulated millions of Muslims, above all young male adults, to take up a radical position and believe in violence. On the other side also the White House and the administration of George Bush junior has fuelled the spiral of violence and fear and lead millions of Christians and seculars in the United States and in Europe to believe in the necessity and justice of killing other human beings in order to enhance their own security. Yet human security is not being advanced, but on the contrary decays, as the atmosphere is drenched with manipulation, violence and fear. Where the manipulation and the violence originate from and where they lead to, is at times very difficult to dissect. Hitler and the Nazis had profited greatly from manipulation and the fear in the wake of the mysterious Reichstagsbrand in Berlin in 1933, whereupon the Third Reich and Second World War followed. In 2001 the war on terrorism began, and once again radical critics have argued that the White House had manipulated 9/11, the largest terrorist attack in history, for geostrategic purposes.

As people across the globe share a vague sensation ‘that it cannot go on like that’ many search for an exit strategy from the spiral of violence, fear and manipulation. In Europe a consensus is building that terrorism cannot be defeated by war, as the latter feeds the spiral of violence, and hence the war on terrorism is not part of the solution but part of the problem. Furthermore also more high-tech – from retina scanning to smart containers – seems unable to really protect potential targets from terror attacks. More technology might even increase the challenges ahead when exploited for terrorist purposes and asymmetric warfare, a development observable ever since the invention of dynamite in the nineteenth century. Arguably more technology and more violence will therefore not solve the challenges ahead. A potential exit strategy from the spiral of fear, manipulation and violence might have to focus on the individual human being itself and a change of consciousness. Given its free will the individual can decide to focus on non-violent solutions of given problems and promote a dialogue of understanding and forgiveness in order to reduce extremist positions. The individual can break free from fear and manipulation by consciously concentrating on his or her very own feelings, thoughts, words and actions, and by focusing all of them on peaceful solutions. As more secrecy and more bloodshed are unlikely to solve the problems ahead the new millennium seems a particularly adequate time to begin with such a shift in consciousness which can have positive effects both for the world and for oneself.

Following on his excellent deconstructive analysis of GLADIO, Ganser’s epic fail is in the last paragraph where…

A potential exit strategy from the spiral of fear, manipulation and violence might have to focus on the individual human being itself and a change of consciousness. Given its free will the individual can decide to focus on non-violent solutions of given problems and promote a dialogue of understanding and forgiveness in order to reduce extremist positions. The individual can break free from fear and manipulation by consciously concentrating on his or her very own feelings, thoughts, words and actions, and by focusing all of them on peaceful solutions

…naively presuming the class of psychopaths risen to rule from the shadow will somehow magically correct the organic deficit in their personalities. What’s more and what’s worse is, on top of ‘leopards don’t shed their spots’ or criminals do not voluntarily surrender their business models, utterly missing is the ‘how’ that will be required; to weed out a pervasive criminal ‘deep state’ apparatus rooted in every branch and at every level across western democratic institutions. This septic infection of western democratic institutions has become the world’s largest and most entrenched organized crime family, where military-industrial corporate boards are fused with rogue intelligence agencies and ‘terror’ is essential to their bottom line: PROFIT. The stark reality is, generating terror has become a money making venture of such magnitude, were the symbiotic relationship between deliberately generated terror, and the armaments and related industries that derive immense profits from the same, were interrupted, the western culture’s economic engine would collapse.

Insofar as Genser’s ‘non-violence’ proposal, that is well and good, provided it is not manipulated akin to the Gene Sharp model where Ghandi’s moral and ethical principles had been suborned to amoral utilitarian ends based in ‘color revolutions.’ This evil, and those who’ve perpetrated it, must be put away. As well, Genser’s last paragraph should not be construed to allow the GLADIO criminal elements forgiveness along the lines of a ‘truth and reconciliation’ process, which is inconsistent with accountability and the rule of law. If the criminals were to walk free, the principle of deterence is not only rendered meaningless, recidivism would reinfect every institution.

The cycle of revolution attending the ‘rise and fall’ phenomena of the western civilized hierarchies throughout history demonstrates a failed model. At the end of the day, that required going forward will be more along the lines of a ‘reverse’ Social Darwinism where decentralization is the habit and the rule, and all those aspiring to the rise of hierarchy are speedily and effectively squelched; demanding an entirely new social perspective. The impediments to this are formidable.

Example given, rather than initiate a program to convert eastern Europe’s small farmers to organic production, when expanding, the European Union has forced tens (perhaps hundreds) of thousands of small farmers off the land with required equipment and farm to market ‘upgrades’ these small farmers could not afford or had no access to where the infrastructure did not exist, effectively handing ‘food security’ to multinational conglomerates such as Monsanto and Syngenta. Already a new generation is coming up having lost critical knowledge in community self-sufficiency. There have been few less criminal and anti-democratic acts in the annals of democracy; where the actual facts demand surrender of a community right to self-sufficiency. On the pretext of ‘sanitation’ the EU took away the largest source of clean, community produced foodstuffs and has positioned the likes of Monsanto and Syngenta to replace this vanished community produce with product that, were it labelled honestly, would sport a skull and crossed bones.

Every day that passes with these sort of events left unchecked, reduces the chances of intelligent dismantling of a system gone horrendously wrong; sans violence and escalated social trauma. Everyday that passes under the current criminal class of leadership, those GLADIO false flag actors represented in Obama, Cameron, Merkel, Hollande & company, who either cannot or will not look and act beyond the amorality of ‘Realpolitik’ and move on behalf of people rather than a corporate system which feeds on people, compounds the problem.

Each day of deferred action determines increased gravity in coming, inevitable, social collapse. It is the undeniable repeat history of western civilization. Short of intelligent dismantlement, a radical event in the age of the most lethal weapons the world has ever seen, there almost certainly will be no ‘phoenix’ rise from the western civilization’s ashes, this time. C’est la mort.

*

Related:

Deep State IV NATO & Gladio

Deep State V Economics & counter-insurgency

*

Ron10

In any democracy, ethics, self restraint, tolerance and honesty will always take a second seat to narcissism, avarice, bigotry & persecution, if only because people who play by the rules in any democracy are at a disadvantage to those who easily subvert the rules to their own advantage (Ronald’s Maxim)

What follows should be viewed as a more honest ‘part two’ of the preceding post authored by Andreago Ferreira of Akamai Tree blog, noting Andreago Ferreira is a pseudonym, the author does not publish under his authentic identity –

I’d moved on to read part two of the Akamai Tree assessment, part one being on Snowden, part two being on Wikileaks, and one should never be surprised at a second result at seeming cross-purposes with a first result. I spotted several ‘weaknesses’ (read mistakes) in the 2nd article and when I touched on those mistakes with a comment, the ‘mistakes’ morphed into disinformation with the author’s reply.

Akamai - 1

My comment:

There has been a growing ‘preponderance of the evidence’ the DNC mails were leaked by Rich. You can find that in the title ‘incompetent espionage and wikileaks’ at my blog, if interested. Also, the article disappoints in its’ missing ‘the other family’ which Mike Pence and Jeff Sessions (and more) belong to (of ‘C Street’ infamy, exposed by Jeff Sharlet.)

The Snowden piece (part one) is much stronger

Was met with this reply:

As far as I can tell, there is virtually no even remotely compelling evidence that Rich leaked the DNC emails. The ‘forensicator’ report is highly misleading and many of the claims in it are outright false (particularly the claims regarding data transfer rates/download speeds).

Mike Pence and Jeff Sessions are way outside the scope of this blog post as well as the two-part series as a whole, so I really don’t feel as though their exclusion is of any consequence at all or that including them would have added anything to the core points being made here

Clearly, while throwing Snowden (probably deservedly/accurately) and Assange (deservedly but very inaccurately) under the bus, the blog author appears to be shielding Mike Pence and Jeff Sessions, and covering for the assassins of Seth Rich. Oops.

I will address self-labeled “propagandist” Andreago Ferreira’s (I have a screenshot of his old Blogspot ‘about me’) rebuttals to my comment in reverse order, dealing with his following, first:

Mike Pence and Jeff Sessions are way outside the scope of this blog post as well as the two-part series as a whole, so I really don’t feel as though their exclusion is of any consequence at all or that including them would have added anything to the core points being made here

Well, I’m not really certain how Ferreira expects he can drive that particular square peg into this round hole:

Akamai - 1 (1)

If Trump were truly a dire threat to the deep state and the media was entirely in the pocket of the Clinton crime family as the altmedia goons suggest, subtle orders filtered down through media executives and top editors (nearly all of whom play ball with the power-elite and have intelligence connections) would have made sure that Trump be utterly blacked out in the media and treated as a mere nuisance as opposed to a legitimate threat to democracy, guaranteeing that he be relegated to obscurity, as for example Ron Paul and Pat Buchanan were. Political outsiders are simply not given full control of the news cycle. The truth is that Donald Trump, contrary to both the alternative and mainstream media, is a long-time political insider who’s throughout his life had intimate ties to some of the most powerful men in the world and installed into the Oval Office by very same kinds of people his base loathes; he’s the latest in the line of phony political outsiders which includes Ross Perot, Ronald Reagan, Barack Obama, Bill Clinton, Ted Cruz, etc. and has been thrust into power by an alliance of the American conservative/defense establishment and the international Zionist syndicate under former CIA director and top neoconservative Zionist James Woolsey. These groups are vying for power within the administration as well as consorting and scheming with the liberal “globalist” establishment, which has managed to install numerous members in the administration

His preceding is actually a somewhat astute observation but cannot be squared with excluding Mike Pence and Jeff Sessions as “way outside the scope of this blog post” as Ferreira maintained in his comment/rebuttal of myself. How’s that? It is as simple as his paragraph’s last sentence:

These groups are vying for power within the administration as well as consorting and scheming with the liberal “globalist” establishment, which has managed to install numerous members in the administration

There is no group “vying for power in the administration” more successfully than the group represented in Mike Pence (whose role model is Dick Cheney), the administrations highest ranking member of the Coe cult, also known as ‘The Fellowship’ and ‘The Family’ which now holds the office of the Vice Presidency. Who’re these people? Here’s a small sampling:

Men under the Family’s religio-political counsel include, in addition to Ensign, Coburn and Pickering, Sens. Chuck Grassley, R-Iowa, and Jim DeMint and Lindsey Graham, both R-S.C.; James Inhofe, R-Okla., John Thune, R-S.D., and recent senators and high officials such as John Ashcroft, Ed Meese, Pete Domenici and Don Nickles. Over in the House there’s Joe Pitts, R-Penn., Frank Wolf, R-Va., Zach Wamp, R-Tenn., Robert Aderholt, R-Ala., Ander Crenshaw, R-Fla., Todd Tiahrt, R-Kan., Marsha Blackburn, R-Tenn., Jo Ann Emerson, R-Mo., and John R. Carter, R-Texas. Historically, the Family has been strongly Republican, but it includes Democrats, too. There’s Mike McIntyre of North Carolina, for instance, a vocal defender of putting the Ten Commandments in public places, and Sen. Mark Pryor, the pro-war Arkansas Democrat responsible for scuttling Obama’s labor agenda. Sen. Pryor explained to me the meaning of bipartisanship he’d learned through the Family: “Jesus didn’t come to take sides. He came to take over.” And by Jesus, the Family means the Family

Other than Vice President Pence, known top ‘family’ members in the  administration include Jeff Sessions who neatly abandoned Trump, resulting in special counsel Robert Mueller’s ‘the Russians did it’ coming travesty of Justice (Mueller should be famous for what he DID NOT investigate when heading up the FBI, like CIA narcotics trafficking and related money laundering), as well Dan Coats, the Director of National Intelligence, plugging ‘the family’ into American intelligence across the spectrum.

My source closely investigating these people states Mike Pompeo is a suspected member and it would appear Betsy DeVos is aligned and closely collaborating.

Who was present when then president-elect Trump was introduced to the movement’s leader? Mike Pence, who is responsible for General Mike Flynn’s departure from the administration.

coe_trumo_meet-1

Every president since Dwight D. Eisenhower in 1953 has spoken at the breakfast, a point made at the meeting to Trump by the evangelical lay minister Douglas Coe, a leader in The Fellowship religious organization, according to Coons. Also attending the meeting with Trump was Boozman, Vice President-elect Mike Pence, and several of Trump’s faith advisers

Now, somehow these people are outside the purview of Ferreira’s “groups … vying for power within the administration” with his “Mike Pence and Jeff Sessions are way outside the scope of this blog post” despite they’ve not only fired Flynn, and have undermined Trump with stepping out of the  way of appointing Robert Mueller special counsel, they seem to have mostly brought Tillerson to heel (if indeed Tillerson was ever ‘friendly’ towards the Russians) and they’re likely behind having rid Trump of Bannon, related to Pence aligned generals consolidating control; recalling it was General Kelly sent Bannon packing:

Akamai - 1

Now, going to the ‘vying for control’, lets have a look a little closer at who’s actually doing the ‘vying.’ Would you believe Bannon’s nationalists versus the Coe Cult’s (read Pence’s) internationalists?

Akamai - 1 (2)

Khan, meanwhile, told me he was sought out by Doug Coe, head of The Family, the secretive fundamentalist group which, as Jeff Sharlet reported in his book The Family and C Street, facilitates prayer and meetings for the elite politicians and businessmen that group considers to be Jesus’s “key men”

So, we have Coe’s people (preceding) locked into a fight with (Bannon aligned) Islamophobes:

Akamai - 1 (3)

And May’s Sharia panel, which featured former CIA director James Woolsey

Huh. Why does Woolsey ring a bell? Probably because he’s a main bad guy (he TRULY IS bad) picked on by Ferreira, recalling his claiming accurately:

Donald Trump, contrary to both the alternative and mainstream media, is a long-time political insider who’s throughout his life had intimate ties to some of the most powerful men in the world and installed into the Oval Office by very same kinds of people his base loathes […] and has been thrust into power by an alliance of the American conservative/defense establishment and the international Zionist syndicate under former CIA director and top neoconservative Zionist James Woolsey

WHY, then, would self-labeled “propagandist” Ferreira use the classic disinformation technique of simply making a false and unsupported assertion (he’s too savvy not to  know better) of…

Mike Pence and Jeff Sessions are way outside the scope of this blog post

…when Pence and Sessions are clearly big-league players in his:

groups […] vying for power within the administration”

This brings us to the other portion of his comment/rebuttal of my short remarks at his blog:

As far as I can tell, there is virtually no even remotely compelling evidence that Rich leaked the DNC emails. The ‘forensicator’ report is highly misleading and many of the claims in it are outright false (particularly the claims regarding data transfer rates/download speeds)

Because if you were a Clintonista…

Akamai - 1 (1)

^ Ferreira’s old Blogspot ‘about me’

…and Ferreira most certainly is, you’d have a lot invested in ‘the Russians hacked the election’ (a Hillary mantra, and Hillary, by the way, has more than flirted with the Coe cult in the past) and this requires not only supporting the aligned (through pretending they are outside the scope of discussion) Doug Coe cult’s Pence, whose people are also deeply invested in ‘the Russians did it’ bullshit, but also requires covering for the assassins of Seth Rich, the leaker who accordingly needed removed from every sense of reality, not only this life. But first, let’s go to his…

The ‘forensicator’ report is highly misleading and many of the claims in it are outright false (particularly the claims regarding data transfer rates/download speeds)

…and then have a look at what the supporting and dissenting experts say.

Akamai - 1 (4)

Given that the Snowden leaks didn’t really reveal much that we didn’t already know from William Binney, Tom Drake, James Bamford as well as whistleblowers from other agencies and exposes from the ’70s onward about the “Five Eyes”/ECHELON comprehensive electronic surveillance network

Noting Ferreira tossed a bone to both William Binney and Thomas Drake in his part one (the very good Snowden piece), the reader can examine how these two came down on opposite sides of the ‘forensicator report’ Ferreira claims is patently falsified in his comment to me at his Wikileaks article:

Drake’s group, in its challenge on interpretations of evidence, also maintains there is no verifiable evidence the ‘Russians did it’ (the Guccifer claims promoted by Ferreira) but maintain a ‘hack’ (as opposed to a leak) cannot be ruled out:

However, this VIPS memo could have easily raised the necessary and critical questions without resorting to law-of-physics conclusions that claim to prove beyond any shadow of a doubt that it was an inside-network copy only and then asserting the “fact” that the Russians (or anybody else for that matter) did not hack the DNC

Binney’s group, in it’s rebuttal, says the Drake group dropped the ball:

Many of the points raised suggest the authors do not fully understand the analysis

Moreover, Binney’s group seems more strongly credentialed in the cyber world of intelligence whereas Drake’s group is more of a straightforward military and/or intelligence background. There’s a bit of crossover in both groups but they appear to be weighted just as stated. One can read the backgrounds of each group at the respective links. In any case, there is clearly a hung jury, but solely reflecting on the technical aspect, bringing us to the HUMIT (human intelligence.) Here is where I have to come down solidly on the side of Binney’s group because they’ve noted the statements of former UK ambassador Craig Murray:

Akamai - 1 (2)

An associate of Assange, former UK ambassador Craig Murray, has said the WikiLeaks source was a leak from an insider. “To my certain knowledge,” said Murray, “neither the DNC nor the Podesta leaks involved Russia.” Oddly, Murray has not been questioned by any US official or journalist

What do you know about that. Wikileaks has pulled some good people into its web, notably Baltsar Garzon who ordered the arrest of Pinochet and hardly could be sympathetic to Clinton or Trump, it was on Obama’s watch he was forced off the bench in Spain via USA pressure for his ‘crusading’ against among other international crimes, the USA’s renditions and assassinations. Another misled soul sucked into the Wikileaks web is Craig Murray, who notably tied (the likely MI6 assassinated) Russian FSB anti-corruption officer Livenenko to uncovering the NATO export of heroin from Afghanistan:

My knowledge of all this comes from my time as British Ambassador in neighbouring Uzbekistan from 2002 until 2004. I stood at the Friendship Bridge at Termez in 2003 and watched the Jeeps with blacked-out windows bringing the heroin through from Afghanistan, en route to Europe. I watched the tankers of chemicals roaring into Afghanistan. Yet I could not persuade my country to do anything about it. Alexander Litvinenko – the former agent of the KGB, now the FSB, who died in London last November after being poisoned with polonium 210 – had suffered the same frustration over the same topic

This Murray guy cannot be ignored. Contrary to honorable, when Ferreira states…

As far as I can tell, there is virtually no even remotely compelling evidence that Rich leaked the DNC emails

…he’d had to ignore not only Murray but my drawing his attention to Murray:

There has been a growing ‘preponderance of the evidence’ the DNC mails were leaked by Rich. You can find that in the title ‘incompetent espionage and wikileaks’ at my blog, if interested

Because this follows is verbatim what I’d drawn propagandist Ferreira’s attention to; what more would one need to know to understand the Akamai Tree blog’s author has not only covered for The Coe cult’s Mike Pence and Jeff Sessions but has covered for the likely assassins of Seth Rich? Not only Craig Murray, but Seymour Hersh has weighed in and they’re the ones who truly can’t get any press:

Incompetent Espionage and Wikileaks

The entire sand-castle (a product of Obama CIA Director John Brennan’s imagination) the “Russians hacked the election” is finally washing away with an incoming tide. How this plays out is anyone’s guess.

The open question is, how the new information will be leveraged, if it were to actually break into the open widely, with the bad boy Trump essentially captured by the surreal evil that surrounds him. Other than pure evil (e.g. Pence), only a narcissist or a fool would ever desire to be president of this particular republic. In ‘The Donald’, we have both.

1 August 2017 an audio tape is leaked in which Seymour Hersh states the FBI knows it was Seth Rich leaked the DNC mails:

“What the [FBI] report says is that some time in late Spring… he makes contact with WikiLeaks, that’s in his computer. Anyway, they found what he had done is that he had submitted a series of documents — of emails, of juicy emails, from the DNC” -Seymour Hersh

On 9 August 2017 The Nation magazine publishes a column on a group of independent experts…

“Forensic investigators, intelligence analysts, system designers, program architects, and computer scientists of long experience and strongly credentialed are now producing evidence disproving the official version of key events last year”

…demonstrating the DNC mails were leaked, not hacked.

On 18 August 2017 Antiwar.com reports Congressman Dana  Rohrabacher has met with Assange concerning the DNC mails and [the article] further credibly suggests Assange is holding the DNC leak evidence hostage as a bargaining chip to possibly acquire a pardon for himself and leverage wikileaks into legitimacy with a President of the United States who at this point is owned by the USA’s intelligence agencies, a hare-brained scheme destined to fail. Assange & company waited too long.

But this would fit Julian Assange’s self-centered, persecuted-savior complex which never ceases to amaze, this guy (as well, Craig Murray) has allowed the idiots surrounding Trump to push us towards the brink with Russia, for months. All because Assange is tired of his embassy confinement in London, a circumstance that is entirely his own fault for the fact he didn’t have the self-discipline to keep his dick in his pants (whether Assange’s admitted intercourse was a case of rape or not.)

What’s more is, this blog pointed to strong circumstantial evidence it was Seth Rich leaked the DNC mails this past January, and recalling this, it still stretches the imagination a former UK ambassador would make an amateur espionage move worthy of a cub scout playing spy. But that’s what Craig Murray had done in the case of the DNC emails leaked to WikiLeaks.

Seymour Hersh states Seth Rich is the source of the DNC mails. Craig Murray states he had met with the source of the DNC mails. A + B = C:

Craig Murray met with Seth Rich

That Murray would be a high value target for American counter-intelligence to monitor for the reason of his high profile association with WikiLeaks is beyond obvious. For Murray then to state

murray_wikileaks-1

“I know who leaked them. I’ve met the person who leaked them, and they are certainly not Russian and it’s an insider. It’s a leak, not a hack; the two are different things”

…goes to the practically bizarre when coming from a former United Kingdom ambassador to Uzbekistan. The UK is little different to the USA in the case of embassies providing cover for spies; in which case Murray should at least have some rudimentary espionage understanding such as YOU DO NOT MEET YOUR SOURCE DIRECTLY WHEN YOU ARE A HIGH PROFILE TARGET OF YOUR ADVERSARY’S COUNTER-INTELLIGENCE HUNTING YOUR (in this case, WikiLeaks) SOURCE(S)

Then, we had WikiLeak’s Assange giving what amounts to a ‘Glomar’ ‘I will neither confirm or deny’ response concerning the murder (assassination) of Seth Rich after appearing to suggest Rich was the source of the DNC emails leak:

Beyond this, WikiLeaks offering a $20,000 reward for the solving of the Seth Rich murder is laughable, that’s what an American west coast upscale community would offer for the arrest of a serial killer of the neighborhood’s cats. Two million dollars might get two seconds’ attention of a corruptible counter-intelligence agent with knowledge of a professional hit on Seth Rich, twenty million might even net an inside the agency sucker willing to take the exceedingly high risk to one’s life (almost certain death) that would attend selling out an agency hit man for substantial lucre. In truth, the WikiLeaks reward offer amounted to little more than a tabloid publicity stunt.

Narcissism is a blinding thing; and a self-righteous narcissism is no exception. Ambassador Murray could have every good intention but on the face of it, he had seriously screwed up. Murray and WikiLeaks should have immediately come clean, there was little to lose. Seth Rich was the source, Murray had met with him, and much could have been gained by stating so; there would be nothing given up any intelligence agency involved did not already know. Not only would it have been the right thing to do, the only thing at stake here for Murray was a hit to ego & image.

Craig Murray stating ‘I had a serious lapse of professional judgement and this resulted in the death of Seth Rich’ would be the most responsible and newsworthy move WikiLeaks could have taken; to counter the CIA’s ‘the Russians hacked the DNC’ propaganda lie, in which there is much invested by the agency; and the consequent damage to relations with Russia, and growing threat to what little world peace yet exists, is immense. WikiLeaks should have done the right thing a long time ago and they have not. Why not? Because Assange and WikiLeaks believes Assange’s comfort is more important than world peace. What fucks. This is beyond inexcusable, it’s criminal. But for Murray, there’s more at stake here than just a hit to ego & image.

Murray’s likely role in the DNC leaks case? A personal meeting with Rich to confirm for WikiLeaks Seth Rich was a bona fide insider with authentic material prior to a WikiLeaks cash payment to Rich and arrangements completed for the mails transfer.

Now, it is a question of ‘damned if you do and damned if you don’t’ release the evidence because WikiLeaks waited too long, and let the criminals surrounding Trump consolidate their power while investing deeply in the myth of the Russians hacked the election; a criminal cabal that will up the ante on the world stage to any level necessary to avoid accountability. WikiLeaks Idiots. WikiLeaks Morons.

Meanwhile, Murray subsequently barred from the United States (except that he applies for a visa, typically unnecessary for a British citizen) appears to have been, in a manner of speaking, a deep state message to Murray: ‘thank you very much for the lapse of judgement, we have taken full advantage with the assassination of Seth Rich and we won’t be requiring your services after this’ (he’d be smart to stay away.)

The really sticky problem for WikiLeaks in this scenario is, Seymour Hersh asserts in the recorded call WikiLeaks had paid Rich for the leaked documents, damaging or reducing to element of pretense WikiLeaks claims of journalism & providing rationale for deep state prosecutors & judges to find this had been straightforward espionage. But they won’t do it if the Rich-Murray meeting stays buried, a LOT is invested in ‘the Russians did it’ for the public consumption. If it DOES break open, Murray’s ‘goose is cooked.’ It’s now not only WikiLeaks problem in a larger sense, but Murray’s, whether he does or doesn’t admit the assassinated Seth Rich had been the DNC mails source.

Murray’s reputation? [and in this case, Ferreira’s] C’est la mort.

 

 

DSEI_ARMS_FAIR - 1

^ “JOINT ENABLERS”

Defence and Security Equipment International (DSEI) is the world leading event that brings together the global defence and security sector to innovate and share knowledge. DSEI represents the entire supply chain on an unrivalled scale

First of all, forgive the British their English. Secondly, I appreciate the opening provided in the term “Joint Enablers.”

DoD_Joint_Enabler - 1

The JECC [Joint Enabling Capabilities Command] and its three support elements — joint planning, joint communications and joint public affairs — have supported every major military operation since 9/11

Where this is headed or, the bottom line, is until ‘joint enabling’ schemes behind weapons related profit is taken out of the western economic engines blueprints, war will be the norm. Where people miss the mark in the social equation is, the relationship to military-industrial corporate boards. War is good for business and anything good for business is in the so-called ‘national interest’ and protecting the national interest is in the intelligence agencies work description; and every American military arm has its’ own professional intelligence apparatus.

That’s where social engineering through psyops (a military euphemism for civilian consumption is ‘public affairs‘) comes into play. The peoples of the west are as heavily propagandized, in their own way, as any peoples, anywhere. And so long as this is the rule, covert destabilization abroad, whether related to renewing, perpetrating or initiating conflicts, will pay out. And because this pays out, largely to military-industrial related corporate boards, but with considerable tax wealth also expended on the modern mercenaries euphemistically labeled ‘contractors’, there is a lot invested in maintaining what amounts to a ‘growth industry.’

Here’s the simple equation:

Psyops = generated fears = justifications in the public mind to spend tax revenue enriching weapons producers.

It really is that simple. Beyond replacing the no longer viable ‘spreading communism’ with a ‘spreading terrorist networks’ freaking people out to numbness and justifying intelligence agencies huge arms shipments supplying moderate® rebels™ generating conflict in Syria, example given, or the ‘humanitarian violence‘ sale to people who believed a classic psyop employed to convince Libya would be a better place without Gaddafi, other, larger psychological operations are employed to justify a non-stop military growth industry.

Reagan bought into ‘star wars’ and by comparison, Trump not buying (or attempting to not buy) into the current Russophobia, simply demonstrates whoever sits in the Oval Office makes no difference. The military-industrial corporate boards’ satellite, NATO, needs enemies more robust than any CIA created junior boogieman (e.g. al-Qaida) to justify the higher ticket weapons platforms, whether nuclear submarines, super-sonic bombers, super-carriers or modernized nuclear warheads, and the generals buy what the corporations demand and here’s why. The generals were mentored by the previous generation and the current generation will mentor the next generation, where the ‘afterlife’ (after life and career at the Pentagon) is at the boards of Raytheon, Chevron, and too many more of ‘the usual suspects’ to recall in any given moment. So, when the next generation of generals retire, they add a six figure ‘civilian life’ (military-industrial-corporate) salary to their six figure military retirement benefit. Some will be (others are already) pulling in five hundred thousand or more dollars a year.

The Globe analyzed the career paths of 750 of the highest ranking generals and admirals who retired during the last two decades and found that, for most, moving into what many in Washington call the “rent-a-general’’ business is all but irresistible.

From 2004 through 2008, 80 percent of retiring three- and four-star officers went to work as consultants or defense executives, according to the Globe analysis. That compares with less than 50 percent who followed that path a decade earlier, from 1994 to 1998.

In some years, the move from general staff to industry is a virtual clean sweep. Thirty-four out of 39 three- and four-star generals and admirals who retired in 2007 are now working in defense roles — nearly 90 percent.

And in many cases there is nothing subtle about what the generals have to sell — Martin’s firm is called The Four Star Group, for example. The revolving-door culture of Capitol Hill — where former lawmakers and staffers commonly market their insider knowledge to lobbying firms — is now pervasive at the senior rungs of the military leadership.

Among the Globe findings:

Dozens of retired generals employed by defense firms maintain Pentagon advisory roles, giving them unparalleled levels of influence and access to inside information on Department of Defense procurement plans…

Essentially, what we have in the preceding is a military-patrician mentor system of legalized, inter-generational bribery to benefit corporate boards, all propped up with psyops particularly aimed at congress.

In a macro-cosmic sense, this is what military-industrial ‘joint enablers’ are all about. And it’s why Russia is the generals’ enemy, it’s why Trump has been captured  by the generals and it’s why we have a general as Secretary of Defense, traditionally a civilian role, and it’s why we have a general as (Trump’s babysitter) Chief of Staff at the White House and it’s why, there you have it, Trump’s National Security Advisor is a general.

A post script note would be, the moron neo-liberals at the CIA played into the Pentagon’s hands with the ‘Russia hacked the election’ propaganda lie, the senior staff at Langley can’t back down from their overplayed hand and the generals don’t want to call out the CIA on their big lie because that lie will serve to make their corporate allies rich.

*

*

Related: Counterfeit Coin

*

16 September 2017 updated article HERE

 

The entire sand-castle (a product of Obama CIA Director John Brennan’s imagination) the “Russians hacked the election” is finally washing away with an incoming tide. How this plays out is anyone’s guess.

The open question is, how the new information will be leveraged, if it were to actually break into the open widely, with the bad boy Trump essentially captured by the surreal evil that surrounds him. Other than pure evil (e.g. Pence), only a narcissist or a fool would ever desire to be president of this particular republic. In ‘The Donald’, we have both.

1 August 2017 an audio tape is leaked in which Seymour Hersh states the FBI knows it was Seth Rich leaked the DNC mails:

“What the [FBI] report says is that some time in late Spring… he makes contact with WikiLeaks, that’s in his computer. Anyway, they found what he had done is that he had submitted a series of documents — of emails, of juicy emails, from the DNC” -Seymour Hersh

On 9 August 2017 The Nation magazine publishes a column on a group of independent experts…

“Forensic investigators, intelligence analysts, system designers, program architects, and computer scientists of long experience and strongly credentialed are now producing evidence disproving the official version of key events last year”

…demonstrating the DNC mails were leaked, not hacked.

On 18 August 2017 Antiwar.com reports Congressman Dana  Rohrabacher has met with Assange concerning the DNC mails and [the article] further credibly suggests Assange is holding the DNC leak evidence hostage as a bargaining chip to possibly acquire a pardon for himself and leverage wikileaks into legitimacy with a President of the United States who at this point is owned by the USA’s intelligence agencies, a hare-brained scheme destined to fail. Assange & company waited too long.

But this would fit Julian Assange’s self-centered, persecuted-savior complex which never ceases to amaze, this guy (as well, Craig Murray) has allowed the idiots surrounding Trump to push us towards the brink with Russia, for months. All because Assange is tired of his embassy confinement in London, a circumstance that is entirely his own fault for the fact he didn’t have the self-discipline to keep his dick in his pants (whether Assange’s admitted intercourse was a case of rape or not.)

What’s more is, this blog pointed to strong circumstantial evidence it was Seth Rich leaked the DNC mails this past January, and recalling this, it still stretches the imagination a former UK ambassador would make an amateur espionage move worthy of a cub scout playing spy. But that’s what Craig Murray had done in the case of the DNC emails leaked to WikiLeaks.

Seymour Hersh states Seth Rich is the source of the DNC mails. Craig Murray states he had met with the source of the DNC mails. A + B = C:

Craig Murray met with Seth Rich

That Murray would be a high value target for American counter-intelligence to monitor for the reason of his high profile association with WikiLeaks is beyond obvious. For Murray then to state

murray_wikileaks-1

“I know who leaked them. I’ve met the person who leaked them, and they are certainly not Russian and it’s an insider. It’s a leak, not a hack; the two are different things”

…goes to the practically bizarre when coming from a former United Kingdom ambassador to Uzbekistan. The UK is little different to the USA in the case of embassies providing cover for spies; in which case Murray should at least have some rudimentary espionage understanding such as YOU DO NOT MEET YOUR SOURCE DIRECTLY WHEN YOU ARE A HIGH PROFILE TARGET OF YOUR ADVERSARY’S COUNTER-INTELLIGENCE HUNTING YOUR (in this case, WikiLeaks) SOURCE(S)

Then, we had WikiLeak’s Assange giving what amounts to a ‘Glomar’ ‘I will neither confirm or deny’ response concerning the murder (assassination) of Seth Rich after appearing to suggest Rich was the source of the DNC emails leak:

Beyond this, WikiLeaks offering a $20,000 reward for the solving of the Seth Rich murder is laughable, that’s what an American west coast upscale community would offer for the arrest of a serial killer of the neighborhood’s cats. Two million dollars might get two seconds’ attention of a corruptible counter-intelligence agent with knowledge of a professional hit on Seth Rich, twenty million might even net an inside the agency sucker willing to take the exceedingly high risk to one’s life (almost certain death) that would attend selling out an agency hit man for substantial lucre. In truth, the WikiLeaks reward offer amounted to little more than a tabloid publicity stunt.

Narcissism is a blinding thing; and a self-righteous narcissism is no exception. Ambassador Murray could have every good intention but on the face of it, he had seriously screwed up. Murray and WikiLeaks should have immediately come clean, there was little to lose. Seth Rich was the source, Murray had met with him, and much could have been gained by stating so; there would be nothing given up any intelligence agency involved did not already know. It have been the right thing to do.

Craig Murray stating ‘I had a serious lapse of professional judgement and this resulted in the death of Seth Rich’ would be the most responsible and newsworthy move WikiLeaks could have taken; to counter the CIA’s ‘the Russians hacked the DNC’ propaganda lie, in which there is much invested by the agency; and the consequent damage to relations with Russia, and growing threat to what little world peace yet exists, is immense. WikiLeaks should have done the right thing a long time ago and they have not. Why not? Because Assange and WikiLeaks believes Assange’s comfort is more important than world peace. What fucks. This is beyond inexcusable, it’s criminal. But for Murray, there’s more at stake here than just a hit to ego & image.

Murray’s likely role in the DNC leaks case? A personal meeting with Rich to confirm for WikiLeaks Seth Rich was a bona fide insider with authentic material prior to a WikiLeaks cash payment to Rich and arrangements completed for the mails transfer.

Now, it is a question of ‘damned if you do and damned if you don’t’ release the evidence because WikiLeaks waited too long, and let the criminals surrounding Trump consolidate their power while investing deeply in the myth of the Russians hacked the election; a criminal cabal that will up the ante on the world stage to any level necessary to avoid accountability. WikiLeaks Idiots. WikiLeaks Morons.

Meanwhile, Murray subsequently barred from the United States (except that he applies for a visa, typically unnecessary for a British citizen) appears to have been, in a  manner of speaking, a deep state message to Murray: ‘thank you very much for the lapse of judgement, we have taken full advantage with the assassination of Seth Rich and we won’t be requiring your services after this’ (he’d be smart to stay away.)

The really sticky problem for WikiLeaks in this scenario is, Seymour Hersh asserts in the  recorded call WikiLeaks had paid Rich for the leaked documents, damaging or reducing to element of pretense WikiLeaks claims of journalism & providing rationale for deep state prosecutors & judges to find this had been straightforward espionage. But they won’t do it if the Rich-Murray meeting stays buried, a LOT is invested in ‘the Russians did it’ for the public consumption. If it DOES break open, Murray’s ‘goose is cooked.’ It’s now not only WikiLeaks problem in a larger sense, but Murray’s, whether he does or doesn’t admit the assassinated Seth Rich had been the DNC mails source.

Murray’s reputation? C’est la mort.

*

Related:

Agent Assange

Litmus Test

WikiLeaks & Spy Agencies

 

Re-posted from Cryptome as a public service

The Gentleperson’s Guide to Forum Spies

COINTELPRO Techniques for dilution, misdirection and control of a internet forum..

There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a ‘uncontrolled forum.’

Technique #1 – ‘FORUM SLIDING’

If a very sensitive posting of a critical nature has been posted on a forum – it can be quickly removed from public view by ‘forum sliding.’ In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to ‘age.’ Each of these misdirectional forum postings can then be called upon at will to trigger a ‘forum slide.’ The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a ‘forum slide’ and ‘flush’ the critical post out of public view it is simply a matter of logging into each account both real and fake and then ‘replying’ to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting ‘slides’ down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and unuseful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.

Technique #2 – ‘CONSENSUS CRACKING’

A second highly effective technique (which you can see in operation all the time at http://www.abovetopsecret.com) is ‘consensus cracking.’ To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made – but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger ‘evidence’ or disinformation in your favour is slowly ‘seeded in.’ Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then ‘abort’ the consensus cracking by initiating a ‘forum slide.’

Technique #3 – ‘TOPIC DILUTION’

Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a ‘RESOURCE BURN.’ By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a ‘gossip mode.’ In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to ‘drive in the wedge.’ By being too far off topic too quickly it may trigger censorship by a forum moderator.

Technique #4 – ‘INFORMATION COLLECTION’

Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a ‘show you mine so me yours’ posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your ‘favourite weapon’ and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favourite ‘technique of operation.’ From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.

Technique #5 – ‘ANGER TROLLING’

Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes – without the requirement to ‘stage’ a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to ‘lead’ the forum by replying to your own posting with your own statement of violent intent, and that you ‘do not care what the authorities think!!’ inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.

Technique #6 – ‘GAINING FULL CONTROL’

It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings – and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the ‘ultimate victory’ as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a ‘honey pot’ gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.

CONCLUSION

Remember these techniques are only effective if the forum participants DO NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation can completely fail, and the forum can become uncontrolled. At this point other avenues must be considered such as initiating a false legal precidence to simply have the forum shut down and taken offline. This is not desirable as it then leaves the enforcement agencies unable to track the percentage of those in the population who always resist attempts for control against them. Many other techniques can be utilized and developed by the individual and as you develop further techniques of infiltration and control it is imperative to share then with HQ.

Twenty-Five Rules of Disinformation

Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.

1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the ‘How dare you!’ gambit.

3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such ‘arguable rumors’. If you can associate the material with the Internet, use this fact to certify it a ‘wild rumor’ from a ‘bunch of kids on the Internet’ which can have no basis in fact.

4. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

5. Sidetrack opponents with name calling and ridicule. This is also known as the primary ‘attack the messenger’ ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as ‘kooks’, ‘right-wing’, ‘liberal’, ‘left-wing’, ‘terrorists’, ‘conspiracy buffs’, ‘radicals’, ‘militia’, ‘racists’, ‘religious fanatics’, ‘sexual deviates’, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism, reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

7. Question motives. Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough ‘jargon’ and ‘minutia’ to illustrate you are ‘one who knows’, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

10. Associate opponent charges with old news. A derivative of the straw man — usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with – a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the ‘high road’ and ‘confess’ with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, ‘just isn’t so.’ Others can reinforce this on your behalf, later, and even publicly ‘call for an end to the nonsense’ because you have already ‘done the right thing.’ Done properly, this can garner sympathy and respect for ‘coming clean’ and ‘owning up’ to your mistakes without addressing more serious issues.

12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues.

13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.

16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won’t have to address the issue.

17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can ‘argue’ with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

18. Emotionalize, Antagonize, and Goad Opponents. If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how ‘sensitive they are to criticism.’

19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the ‘play dumb’ rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations — as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

Eight Traits of the Disinformationalist

1) Avoidance. They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.

2) Selectivity. They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.

3) Coincidental. They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.

4) Teamwork. They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.

5) Anti-conspiratorial. They almost always have disdain for ‘conspiracy theorists’ and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain.Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.

6) Artificial Emotions. An odd kind of ‘artificial’ emotionalism and an unusually thick skin — an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial.

Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal. But disinfo types usually have trouble maintaining the ‘image’ and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It’s just a job, and they often seem unable to ‘act their role in character’ as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later — an emotional yo-yo.

With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game — where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.

7) Inconsistent. There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat ‘freudian’, so to speak, in that perhaps they really root for the side of truth deep within.

I have noted that often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I’m not aware of too many Navy pilots who don’t have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.

8) Time Constant. Recently discovered, with respect to News Groups, is the response time factor. There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:

a) ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NG ONLY WORKS IF THE READER SEES IT – FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.

b) When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR – there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to ‘get permission’ or instruction from a formal chain of command.

c) In the NG example 1) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay – the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.

How to Spot a Spy (Cointelpro Agent)

One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?

1) The message doesn’t get out.

2) A lot of time is wasted

3) The activist is frustrated and discouraged

4) Nothing good is accomplished.

FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established.

Their purpose is to prevent any real movement for justice or eco-peace from developing in this country.

Agents come in small, medium or large. They can be of any ethnic background. They can be male or female.

The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs.

This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists.

It is the agent’s job to keep the activist from quitting such a group, thus keeping him/her under control.

In some situations, to get control, the agent will tell the activist:

“You’re dividing the movement.”

[Here, I have added the psychological reasons as to WHY this maneuver works to control people]

This invites guilty feelings. Many people can be controlled by guilt. The agents begin relationships with activists behind a well-developed mask of “dedication to the cause.” Because of their often declared dedication, (and actions designed to prove this), when they criticize the activist, he or she – being truly dedicated to the movement – becomes convinced that somehow, any issues are THEIR fault. This is because a truly dedicated person tends to believe that everyone has a conscience and that nobody would dissimulate and lie like that “on purpose.” It’s amazing how far agents can go in manipulating an activist because the activist will constantly make excuses for the agent who regularly declares their dedication to the cause. Even if they do, occasionally, suspect the agent, they will pull the wool over their own eyes by rationalizing: “they did that unconsciously… they didn’t really mean it… I can help them by being forgiving and accepting ” and so on and so forth.

The agent will tell the activist:

“You’re a leader!”

This is designed to enhance the activist’s self-esteem. His or her narcissistic admiration of his/her own activist/altruistic intentions increase as he or she identifies with and consciously admires the altruistic declarations of the agent which are deliberately set up to mirror those of the activist.

This is “malignant pseudoidentification.” It is the process by which the agent consciously imitates or simulates a certain behavior to foster the activist’s identification with him/her, thus increasing the activist’s vulnerability to exploitation. The agent will simulate the more subtle self-concepts of the activist.

Activists and those who have altruistic self-concepts are most vulnerable to malignant pseudoidentification especially during work with the agent when the interaction includes matter relating to their competency, autonomy, or knowledge.

The goal of the agent is to increase the activist’s general empathy for the agent through pseudo-identification with the activist’s self-concepts.

The most common example of this is the agent who will compliment the activist for his competency or knowledge or value to the movement. On a more subtle level, the agent will simulate affects and mannerisms of the activist which promotes identification via mirroring and feelings of “twinship”. It is not unheard of for activists, enamored by the perceived helpfulness and competence of a good agent, to find themselves considering ethical violations and perhaps, even illegal behavior, in the service of their agent/handler.

The activist’s “felt quality of perfection” [self-concept] is enhanced, and a strong empathic bond is developed with the agent through his/her imitation and simulation of the victim’s own narcissistic investments. [self-concepts] That is, if the activist knows, deep inside, their own dedication to the cause, they will project that onto the agent who is “mirroring” them.

The activist will be deluded into thinking that the agent shares this feeling of identification and bonding. In an activist/social movement setting, the adversarial roles that activists naturally play vis a vis the establishment/government, fosters ongoing processes of intrapsychic splitting so that “twinship alliances” between activist and agent may render whole sectors or reality testing unavailable to the activist. They literally “lose touch with reality.”

Activists who deny their own narcissistic investments [do not have a good idea of their own self-concepts and that they ARE concepts] and consciously perceive themselves (accurately, as it were) to be “helpers” endowed with a special amount of altruism are exceedingly vulnerable to the affective (emotional) simulation of the accomplished agent.

Empathy is fostered in the activist through the expression of quite visible affects. The presentation of tearfulness, sadness, longing, fear, remorse, and guilt, may induce in the helper-oriented activist a strong sense of compassion, while unconsciously enhancing the activist’s narcissistic investment in self as the embodiment of goodness.

The agent’s expresssion of such simulated affects may be quite compelling to the observer and difficult to distinguish from deep emotion.

It can usually be identified by two events, however:

First, the activist who has analyzed his/her own narcissistic roots and is aware of his/her own potential for being “emotionally hooked,” will be able to remain cool and unaffected by such emotional outpourings by the agent.

As a result of this unaffected, cool, attitude, the Second event will occur: The agent will recompensate much too quickly following such an affective expression leaving the activist with the impression that “the play has ended, the curtain has fallen,” and the imposture, for the moment, has finished. The agent will then move quickly to another activist/victim.

The fact is, the movement doesn’t need leaders, it needs MOVERS. “Follow the leader” is a waste of time.

A good agent will want to meet as often as possible. He or she will talk a lot and say little. One can expect an onslaught of long, unresolved discussions.

Some agents take on a pushy, arrogant, or defensive manner:

1) To disrupt the agenda

2) To side-track the discussion

3) To interrupt repeatedly

4) To feign ignorance

5) To make an unfounded accusation against a person.

Calling someone a racist, for example. This tactic is used to discredit a person in the eyes of all other group members.

Saboteurs

Some saboteurs pretend to be activists. She or he will ….

1) Write encyclopedic flyers (in the present day, websites)

2) Print flyers in English only.

3) Have demonstrations in places where no one cares.

4) Solicit funding from rich people instead of grass roots support

5) Display banners with too many words that are confusing.

6) Confuse issues.

7) Make the wrong demands.

Cool Compromise the goal.

9) Have endless discussions that waste everyone’s time. The agent may accompany the endless discussions with drinking, pot smoking or other amusement to slow down the activist’s work.

Provocateurs

1) Want to establish “leaders” to set them up for a fall in order to stop the movement.

2) Suggest doing foolish, illegal things to get the activists in trouble.

3) Encourage militancy.

4) Want to taunt the authorities.

5) Attempt to make the activist compromise their values.

6) Attempt to instigate violence. Activisim ought to always be non-violent.

7) Attempt to provoke revolt among people who are ill-prepared to deal with the reaction of the authorities to such violence.

Informants

1) Want everyone to sign up and sing in and sign everything.

2) Ask a lot of questions (gathering data).

3) Want to know what events the activist is planning to attend.

4) Attempt to make the activist defend him or herself to identify his or her beliefs, goals, and level of commitment.

Recruiting

Legitimate activists do not subject people to hours of persuasive dialog. Their actions, beliefs, and goals speak for themselves.

Groups that DO recruit are missionaries, military, and fake political parties or movements set up by agents.

Surveillance

ALWAYS assume that you are under surveillance.

At this point, if you are NOT under surveillance, you are not a very good activist!

Scare Tactics

They use them.

Such tactics include slander, defamation, threats, getting close to disaffected or minimally committed fellow activists to persuade them (via psychological tactics described above) to turn against the movement and give false testimony against their former compatriots. They will plant illegal substances on the activist and set up an arrest; they will plant false information and set up “exposure,” they will send incriminating letters [emails] in the name of the activist; and more; they will do whatever society will allow.

This booklet in no way covers all the ways agents use to sabotage the lives of sincere an dedicated activists.

If an agent is “exposed,” he or she will be transferred or replaced.

COINTELPRO is still in operation today under a different code name. It is no longer placed on paper where it can be discovered through the freedom of information act.

The FBI counterintelligence program’s stated purpose: To expose, disrupt, misdirect, discredit, and otherwise neutralize individuals who the FBI categorize as opposed to the National Interests. “National Security” means the FBI’s security from the people ever finding out the vicious things it does in violation of people’s civil liberties.

Seventeen Techniques for Truth Suppression

Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.

1. Dummy up. If it’s not reported, if it’s not news, it didn’t happen.

2. Wax indignant. This is also known as the “How dare you?” gambit.

3. Characterize the charges as “rumors” or, better yet, “wild rumors.” If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through “rumors.” (If they tend to believe the “rumors” it must be because they are simply “paranoid” or “hysterical.”)

4. Knock down straw men. Deal only with the weakest aspects of the weakest charges. Even better, create your own straw men. Make up wild rumors (or plant false stories) and give them lead play when you appear to debunk all the charges, real and fanciful alike.

5. Call the skeptics names like “conspiracy theorist,” “nutcase,” “ranter,” “kook,” “crackpot,” and, of course, “rumor monger.” Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the “more reasonable” government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own “skeptics” to shoot down.

6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).

7. Invoke authority. Here the controlled press and the sham opposition can be very useful.

8. Dismiss the charges as “old news.”

9. Come half-clean. This is also known as “confession and avoidance” or “taking the limited hangout route.” This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal “mistakes.” This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.

10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.

11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely free press. If evidence exists that the Vince Foster “suicide” note was forged, they would have reported it. They haven’t reported it so there is no such evidence. Another variation on this theme involves the likelihood of a conspiracy leaker and a press who would report the leak.

12. Require the skeptics to solve the crime completely. E.g. If Foster was murdered, who did it and why?

13. Change the subject. This technique includes creating and/or publicizing distractions.

14. Lightly report incriminating facts, and then make nothing of them. This is sometimes referred to as “bump and run” reporting.

15. Baldly and brazenly lie. A favorite way of doing this is to attribute the “facts” furnished the public to a plausible-sounding, but anonymous, source.

16. Expanding further on numbers 4 and 5, have your own stooges “expose” scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.

17. Flood the Internet with agents. This is the answer to the question, “What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?” Don t the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.

*

Truth is seldom pure and never simple -Oscar Wilde

What never ceases to amaze is the flat-out stupidity of the White identity groups rank and file. Consider Germany, where the real Nazis keep their identity concealed and rise to the very top of the pyramid (governance) all-the-while making a great (and believed) pretense of outrage at anyone from the street who dare make a bit of a nostalgic show for German fascism. Meanwhile, German chauvinism has been dominating Europe and economically bleeding ‘fellow’ European Union member nations to death. All thanks to Allen Dulles’ CIA rescuing war criminal Reinhardt Gehlen from justice and putting him at the top of a reconstituted Gestapo intelligence apparatus (staffed with Gestapo & SS veterans) then handed this resurrected monster over to the post-war Federal Republic of Germany as it’s own CIA: the BND or Bundesnachrichtendienst. You can read a bit of this ugly history, impacting today, HERE.

On a larger scale, the USA’s Dulles legacy has behaved much the same. If the German elite will now have the ‘Arab’ problem to exploit in a renewed push for a police state, the USA elite already have the Black/White division that can be exploited to the same purpose. Make no mistake, when the USA’s street violence has risen to a level ‘justifying’ police state tactics and solutions, White identity groups will discover they had been used and discarded like the ignorant stooges they are.

In the American Black experience, this controversy is (with absolute historical validity) perceived as “white privilege.” Outside of Africa (e.g. the USA), I don’t recall any incidence of Blacks owning White slaves.

Insofar as those high profile neo-liberals ‘nominally’ backing the Black Lives Matter and other Black identity movements, these movements should educate themselves in history (other than the history provided by the organs of state) and understand their political backers are derived from a long legacy of elites exploiting Blacks; when given ‘opportunity’ such as a chance to get ahead by abandoning their self-sufficient farms in the rural south to work ‘high paying’ jobs in the industrial north … only to be abandoned in what became ghettos when the elites were no longer profiting from Black labor, factories closed and ‘opportunity’ moved elsewhere. This process repeated, again and again.

Concerning Charlottesville, General Lee is an ironic historical figure to exploit for purpose of civic strife. It was Robert E Lee, through the force of his personality, wide influence over the southern Whites and principled stance he took, post Appomattox surrender, prevented possible decades of Southern guerrilla insurgency from 1865 into the future.

In the American White Experience, General Lee is (for many) about much more than Southern heroics, or alternatively, in the North’s historical revisionism concerning Black slavery and racism (Lincoln would have settled for slavery continuing prior to a political decision taken in the Summer of 1862.) The American civil war was not over some simplistic casus belli but was a complex circumstance that ultimately pit the competing forward visions for the USA by the Federalists and anti-Federalists, perhaps best represented historically in the persons of Alexander Hamilton and Thomas Jefferson. This was unfinished business and the Federalist heirs absolutely gained the upper hand with the North’s victory. When the South, and by implication, the anti-Federalists lost, it opened the door for future unscrupulous persons to exploit all Americans. You can read a bit on this American tension HERE.

The result of the Northern ‘victory’ had some positive aspect but was not entirely positive. America’s Blacks realized emancipation (if painfully, with decades of Jim Crow to follow), but today the North’s and South’s White progeny, both, are well down the road to economic and civic slavery together with America’s Blacks, Mexican-Americans and all the rest, with the loss of the anti-Federalist authored Bill of Rights, particularly with the loss of the 1st through 8th Amendments to the American Constitution, effectively canceled by the National Security Act of 1947. With that patently unconstitutional law came the CIA (backbone of the deep state), secret courts, warrant-less searches and a general degrading of civil liberties for all. It were never a ‘black & white’ world.

When slave owning Southerners disingenuously took on the anti-Federalist mantle of ‘States Rights’, exploited Southern patriotism and lost, we all lost our future to unscrupulous Northern Federalists, whether we are White, Black, Southerner, Northerner or post-war immigrant.

At the end of the day, it’s all about greed and consolidating power for those who would own us ALL, regardless of race.

One caution I should mention is, however the ‘deep state’ might play racial identity groups off each other, while sincerely not caring about casualties on either side despite the pretense, where they will welcome ANYONE, regardless of race, is all of those who will come over to where the neo-con and neo-liberal converge; in support for modern Federalist feudalism or the power structures propping up the contemporary elite. It’s not only White politicians aligned with Trump and his elite ‘owned’ Ben Carson. It is both sides of the aisle in Congress, it’s Paul Ryan, it’s Nancy Pelosi, it’s Mitch McConnell, it’s Chuck Schumer and, it is the system’s elite servants Jesse Jackson and Al Sharpton with their ongoing and abject failure to honestly educate, inspire and effect change.

*

%d bloggers like this: