The Complexity of Cultural Evolution

By Joe Brewer

Source: Resilience

What does the ecological crisis have in common with global poverty? How does politics relate to economics? The study of history? The changing landscape of technology, arts, and culture? Why is there not a coherent School of Social Sciences that brings themes like these together in one place? Answers can only be found by synthesizing two of the most important areas of scientific work in the last 150 years — in the fields of evolutionary studies and complexity science.

All of the most interesting and important topics of concern in the world today (How does consciousness work? What is the human mind? Is it possible to restore health to deteriorated ecosystems? Can we create political systems that promote widespread health and well-being?) involve vast networks of relationships interacting with each other — what are called complex adaptive systems in the lingo of complexity science.

Familiar examples include things like the weather with its inherent unpredictability or a market economy that has no central locus of control. The thing that makes a system “complex” is that patterns arise through the interactions that are not reducible to its constituent parts. You cannot explain the weather simply by describing what water molecules or solar radiation on their own are capable of doing. Neither can you explain an economy by describing how individuals engage in barter or exchange if they happen to be in a market-based society.

Importantly, complex adaptive systems are always far from equilibrium. They are not static. And the only way to make sense of their behavior is to computationally model how the various parts interact with each other dynamically — which leads to the importance of evolution. Emphasis on the word adaptive in complex adaptive systems gives an inkling of Charles Darwin’s Theory of Natural Selection, where the biological traits of an organism that happen to be adaptive in its environment tend to occur more frequently than traits that are not adaptive.

Over time (since living systems are also dynamic), the evolutionary pathway for biology is traced by the intersections of adaptive fitness in environments that might be changing quickly or slowly. All biological systems are complex (they have many interacting parts with emergent phenomena that are not reducible) and they are adaptive (as natural selection plays out in changing environments).

So what does this say about cultural evolution? How can we apply this basic finding from biology to the study of history and economics, politics, and environmental management? Well it turns out that researchers who study cultural evolution — and there are now nearly 2,000 of them in the newly formed Cultural Evolution Society that I was tasked to help create — have brought the mathematical toolkit used in complexity science to the study of cultural change in human and non-human species.

The earliest inklings of this synthesis go back to a debate a century ago when foundations were being laid for the study of population genetics. At that time, statisticians were actively grappling with questions about how to account for genetic variation in biological organisms without the use of digital computers. They developed accounting systems for biological traits that matured continuously through the early-to-mid 20th Century.

In the late 1970’s and early 80’s, there was a group of cultural evolution researchers who translated these statistical tools for the distinct mechanisms of “selection” that play out for behavioral repertoires and other cultural phenomena in human and non-human cultures. Among them were Luigi Cavalli-Sforza and Marcus Feldman at Stanford, Peter J. Richerson at UC-Davis, and Robert Boyd of Arizona State University. These efforts culminated in the publishing of Cultural Transmission and Evolution: A Quantitative Approach in 1981 and Culture and the Evolutionary Process in 1988.

It was during this same time period that the field of complexity research was getting underway — with the multidisciplinary Santa Fe Institute being established in 1984 to explore the mathematical patterns of complex adaptive systems across many domains of study. They organized workshops and symposia on economics, ecology, urban studies, epidemiology, and more to discover how complex systems evolve and change using the mathematical tools of fractal geometry, network science, differential equations, and computational methods.

As I have written elsewhere, the time is urgently upon us to synthesize and apply what is known about complexity and evolution. The fate of humanity literally depends on our ability to do this. In a time of unprecedented exponential change, we must learn to manage complex systems as they evolve in real time.

We need to firstly understand that cultural systems evolve according to Darwinian principles. The interested reader can find many books explaining why this is the case. Here are a few to get you started:

This is a mere sampling — there are now hundreds of books on cultural evolutionary studies that one can dive into. Important for this article is to note that (i) the field of cultural evolution is quite mature at this point in time; (ii) it has advanced rapidly since incorporating mathematical tools used in the study of complexity; and (iii)the world is in flux with tremendous need for this body of knowledge to be brought to bear on our global challenges in the 21st Century.

This is the work of culture design.

The most pressing challenges in the world have foundational cultural components. Global warming arose from the false illusions of human separation from nature and the perception of endless bounty for natural resources at the beginning of the industrial era. Terrorism is cultivated in landscapes where people feel deep-seated anxiety and economic desperation — which arise from particular models of colonial (or post-colonial) exploitation that have unique cultural histories.

Similarly, the spread of rugged individualism as a cultural construct treats human beings as if they are separate from their communities, inherently selfish, and venerable for engaging in psychopathic behaviors like wealth hoarding. In each case, the real state of power is culture and the only viable solutions involve the intentional management of cultural evolutionary change.

But we cannot even start to think this way if we don’t recognize how human cultures operate as complex systems. Only by learning to see that emergent patterns arise through the interactions of constituent parts will we begin to discern how evolutionary change is taking us closer to planetary-scale collapse — and that design practices will be needed that make use of what is now known from cultural evolutionary studies.

Onward, fellow humans.

Saturday Matinee: Le Orme (aka Footprints on the Moon)

From Archive.org:

“Le Orme” (a/k/a “Footprints on the Moon” and “Primal
Impulse”) has been described variously as an Italian giallo, a sci-fi film, a
mystery, or a psychological thriller. Ultimately, it defies pigeonholing.

It stars Florinda Bolkan as Alice Cespi, a professional
translator, who is tormented by a recurring nightmare; in it, a lunar-landing
team deliberately abandons a colleague on the moon’s surface as part of a scientific
experiment.

Alice arrives for work one day and is summarily canned. The
reason? She’d walked out of an international astronomy conference and disappeared
for three days, incommunicado.

Those three days are a complete blank for her. Alice finds a
few vague clues — a torn postcard from Garma, a resort she’s never visited; an
earring, a unfamiliar bloody yellow dress that fits her perfectly — and sets out
to learn what has happened.

When she arrives in Garma, all of the strangers are
delighted to see her “again” — but claim that she’s another person entirely. And that’s
just the beginning…

Although the storytelling in “Le Orme” is fairly linear, it’s also disorienting — so you’ll
have to pay attention to it. There are blind alleys, red herrings and
(possibly) misleading implications throughout.

Cast includes Bolkan, Peter McEnery, Nicoletta Elmi, and a cameo by Klaus Kinski.

Titles and credits are in Italian, but all dialogue is in English.

What Country Is This? Forced Blood Draws, Cavity Searches and Colonoscopies

By John W. Whitehead

Source: The Rutherford Institute

“The Fourth Amendment was designed to stand between us and arbitrary governmental authority. For all practical purposes, that shield has been shattered, leaving our liberty and personal integrity subject to the whim of every cop on the beat, trooper on the highway and jail official.”—Herman Schwartz, The Nation

Our freedoms—especially the Fourth Amendment—are being choked out by a prevailing view among government bureaucrats that they have the right to search, seize, strip, scan, shoot, spy on, probe, pat down, taser, and arrest any individual at any time and for the slightest provocation.

Forced cavity searches, forced colonoscopies, forced blood draws, forced breath-alcohol tests, forced DNA extractions, forced eye scans, forced inclusion in biometric databases: these are just a few ways in which Americans are being forced to accept that we have no control over our bodies, our lives and our property, especially when it comes to interactions with the government.

Worse, on a daily basis, Americans are being made to relinquish the most intimate details of who we are—our biological makeup, our genetic blueprints, and our biometrics (facial characteristics and structure, fingerprints, iris scans, etc.)—in order to clear the nearly insurmountable hurdle that increasingly defines life in the United States: we are now guilty until proven innocent.

Such is life in America today that individuals are being threatened with arrest and carted off to jail for the least hint of noncompliance, homes are being raided by police under the slightest pretext, property is being seized on the slightest hint of suspicious activity, and roadside police stops have devolved into government-sanctioned exercises in humiliation and degradation with a complete disregard for privacy and human dignity.

Consider, for example, what happened to Utah nurse Alex Wubbels after a police detective demanded to take blood from a badly injured, unconscious patient without a warrant.

Wubbels refused, citing hospital policy that requires police to either have a warrant or permission from the patient in order to draw blood. The detective had neither. Irate, the detective threatened to have Wubbels arrested if she didn’t comply. Backed up by her supervisors, Wubbels respectfully stood her ground only to be roughly grabbed, shoved out of the hospital, handcuffed and forced into an unmarked car while hospital police looked on and failed to intervene (take a look at the police body camera footage, which has gone viral, and see for yourself).

Michael Chorosky didn’t have an advocate like Wubbels to stand guard over his Fourth Amendment rights. Chorosky was surrounded by police, strapped to a gurney and then had his blood forcibly drawn after refusing to submit to a breathalyzer test. “What country is this? What country is this?” cried Chorosky during the forced blood draw.

What country is this indeed?

Unfortunately, forced blood draws are just the tip of the iceberg when it comes to the indignities and abuses being heaped on Americans in the so-called name of “national security.”

Forced cavity searches, forced colonoscopies and forced roadside strip searches are also becoming par for the course in an age in which police are taught to have no respect for the citizenry’s bodily integrity whether or not a person has done anything wrong.

For example, 21-year-old Charnesia Corley was allegedly being pulled over by Texas police in 2015 for “rolling” through a stop sign. Claiming they smelled marijuana, police handcuffed Corley, placed her in the back of the police cruiser, and then searched her car for almost an hour. No drugs were found in the car.

As the Houston Chronicle reported:

Returning to his car where Corley was held, the deputy again said he smelled marijuana and called in a female deputy to conduct a cavity search. When the female deputy arrived, she told Corley to pull her pants down, but Corley protested because she was cuffed and had no underwear on. The deputy ordered Corley to bend over, pulled down her pants and began to search her. Then…Corley stood up and protested, so the deputy threw her to the ground and restrained her while another female was called in to assist. When backup arrived, each deputy held one of Corley’s legs apart to conduct the probe.

The cavity search lasted 11 minutes. This practice is referred to as “rape by cop.”

Although Corley was charged with resisting arrest and with possession of 0.2 grams of marijuana, those charges were subsequently dropped.

David Eckert was forced to undergo an anal cavity search, three enemas, and a colonoscopy after allegedly failing to yield to a stop sign at a Wal-Mart parking lot. Cops justified the searches on the grounds that they suspected Eckert was carrying drugs because his “posture [was] erect” and “he kept his legs together.” No drugs were found.

During a routine traffic stop, Leila Tarantino was subjected to two roadside strip searches in plain view of passing traffic, while her two children—ages 1 and 4—waited inside her car. During the second strip search, presumably in an effort to ferret out drugs, a female officer “forcibly removed” a tampon from Tarantino. No contraband or anything illegal was found.

Thirty-eight-year-old Angel Dobbs and her 24-year-old niece, Ashley, were pulled over by a Texas state trooper on July 13, 2012, allegedly for flicking cigarette butts out of the car window. Insisting that he smelled marijuana, the trooper proceeded to interrogate them and search the car. Despite the fact that both women denied smoking or possessing any marijuana, the police officer then called in a female trooper, who carried out a roadside cavity search, sticking her fingers into the older woman’s anus and vagina, then performing the same procedure on the younger woman, wearing the same pair of gloves. No marijuana was found.

Sixty-nine-year-old Gerald Dickson was handcuffed and taken into custody (although not arrested or charged with any crime) after giving a ride to a neighbor’s son, whom police suspected of being a drug dealer. Despite Dickson’s insistence that the bulge under his shirt was the result of a botched hernia surgery, police ordered Dickson to “strip off his clothes, bend over and expose all of his private parts. No drugs or contraband were found.”

Meanwhile, four Milwaukee police officers were charged with carrying out rectal searches of suspects on the street and in police district stations over the course of several years. One of the officers was accused of conducting searches of men’s anal and scrotal areas, often inserting his fingers into their rectums and leaving some of his victims with bleeding rectums.

It’s gotten so bad that you don’t even have to be suspected of possessing drugs to be subjected to a strip search.

A North Carolina public school allegedly strip-searched a 10-year-old boy in search of a $20 bill lost by another student, despite the fact that the boy, J.C., twice told school officials he did not have the missing money. The assistant principal reportedly ordered the fifth grader to disrobe down to his underwear and subjected him to an aggressive strip-search that included rimming the edge of his underwear. The missing money was later found in the school cafeteria.

Suspecting that Georgia Tech alum Mary Clayton might have been attempting to smuggle a Chick-Fil-A sandwich into the football stadium, a Georgia Tech police officer allegedly subjected the season ticket-holder to a strip search that included a close examination of her underwear and bra. No contraband chicken was found.

What these incidents show is that while forced searches may span a broad spectrum of methods and scenarios, the common denominator remains the same: a complete disregard for the rights of the citizenry.

In fact, in the wake of the U.S. Supreme Court’s ruling in Florence v. Burlison, any person who is arrested and processed at a jail house, regardless of the severity of his or her offense (i.e., they can be guilty of nothing more than a minor traffic offense), can be subjected to a strip search by police or jail officials without reasonable suspicion that the arrestee is carrying a weapon or contraband.

Examples of minor infractions which have resulted in strip searches include: individuals arrested for driving with a noisy muffler, driving with an inoperable headlight, failing to use a turn signal, riding a bicycle without an audible bell, making an improper left turn, and engaging in an antiwar demonstration (the individual searched was a nun, a Sister of Divine Providence for 50 years).

Police have also carried out strip searches for passing a bad check, dog leash violations, filing a false police report, failing to produce a driver’s license after making an illegal left turn, having outstanding parking tickets, and public intoxication. A failure to pay child support can also result in a strip search.

As technology advances, these searches are becoming more invasive on a cellular level, as well.

For instance, close to 600 motorists leaving Penn State University one Friday night were stopped by police and, without their knowledge or consent, subjected to a breathalyzer test using flashlights that can detect the presence of alcohol on a person’s breath. These passive alcohol sensors are being hailed as a new weapon in the fight against DUIs. (Those who refuse to knowingly submit to a breathalyzer test are being subjected to forced blood draws. Thirty states presently allow police to do forced blood draws on drivers as part of a nationwide “No Refusal” initiative funded by the federal government. Not even court rulings declaring such practices to be unconstitutional in the absence of a warrant have slowed down the process. Now police simply keep a magistrate on call to rubber stamp the procedure over the phone.)

The National Highway Safety Administration, the same government agency that funds the “No Refusal” DUI checkpoints and forcible blood draws, is also funding nationwide roadblocks aimed at getting drivers to “voluntarily” provide police with DNA derived from saliva and blood samples, reportedly to study inebriation patterns. In at least 28 states, there’s nothing voluntary about having one’s DNA collected by police in instances where you’ve been arrested, whether or not you’re actually convicted of a crime. All of this DNA data is being fed to the federal government.

Airline passengers, already subjected to virtual strip searches, are now being scrutinized even more closely, with the Customs and Border Protection agency tasking airport officials with monitoring the bowel movements of passengers suspected of ingesting drugs. They even have a special hi-tech toilet designed to filter through a person’s fecal waste.

Iris scans, an essential part of the U.S. military’s boots-on-the-ground approach to keeping track of civilians in Iraq and Afghanistan, are becoming a de facto method of building the government’s already mammoth biometrics database. Funded by the Dept. of Justice, along with other federal agencies, the iris scan technology is being incorporated into police precincts, jails, immigration checkpoints, airports and even schools. School officials—from elementary to college—have begun using iris scans in place of traditional ID cards. In some parts of the country, parents wanting to pick their kids up from school have to first submit to an iris scan.

As for those endless pictures everyone so cheerfully uploads to Facebook (which has the largest facial recognition database in the world) or anywhere else on the internet, they’re all being accessed by the police, filtered with facial recognition software, uploaded into the government’s mammoth biometrics database and cross-checked against its criminal files. With good reason, civil libertarians fear these databases could “someday be used for monitoring political rallies, sporting events or even busy downtown areas.”

While the Fourth Amendment was created to prevent government officials from searching an individual’s person or property without a warrant and probable cause—evidence that some kind of criminal activity was afoot—the founders could scarcely have imagined a world in which we needed protection against widespread government breaches of our privacy, including on a cellular level.

Yet that’s exactly what we are lacking and what we so desperately need.

Unfortunately, the indignities being heaped upon us by the architects and agents of the American police state—whether or not we’ve done anything wrong—are just a foretaste of what is to come.

As I make clear in my book Battlefield America: The War on the American People, the government doesn’t need to tie you to a gurney and forcibly take your blood or strip you naked by the side of the road in order to render you helpless. It has other methods—less subtle perhaps but equally humiliating, devastating and mind-altering—of stripping you of your independence, robbing you of your dignity, and undermining your rights.

With every court ruling that allows the government to operate above the rule of law, every piece of legislation that limits our freedoms, and every act of government wrongdoing that goes unpunished, we’re slowly being conditioned to a society in which we have little real control over our bodies or our lives.

New York Times Propagates Russia Hacking Conspiracy Theory

The New York Times reports as fact that Russia hacked the 2016 US presidential election despite failing to present any evidence to support this claim.

By Jeremy R. Hammond

Source: Foreign Policy Journal

In late 2002 and early 2003, those of us who were warning that the US government was lying, that there was no evidence that Iraq still possessed stockpiles of weapons of mass destruction (WMD), much less active WMD manufacturing programs, were frequently dismissed as “conspiracy theorists”.

Of course, in reality, it was the US mainstream media that was propagating the government’s unfounded conspiracy theory that Saddam Hussein had such weapons and, further, had a cooperative relationship with Al-Qaeda, the terrorist organization held responsible for the attacks of September 11, 2001.

The New York Times served the government in its campaign of deception by spearheading the media’s dissemination of the lies out to the public, thus manufacturing Americans’ consent for this illegal war of aggression.

Spreading government propaganda is a function the Times never ceases to serve well — the lesson from its own reporting during the run-up to the Iraq war, and from the mainstream media’s reporting in general, having been dutifully disregarded.

One of the latest government conspiracy theories the Times is helping to propagate, by serving effectively as the political establishment’s very own public relations firm, is the claim that the government of Russia was responsible for hacking into computers of the Democratic National Committee (DNC) and email accounts of John Podesta, who was then chairman of Hillary Clinton’s presidential campaign.

In a report published September 1, 2017, the Times elaborated on this conspiracy theory under the headline “Russian Election Hacking Efforts, Wider Than Previously Known, Draw Little Scrutiny”.

In it, the Times reports as fact that Russia was responsible not only for hacking the DNC and Podesta’s email account, but also for hacking directly into the US election system itself. All that’s old news, however, so the Times‘ new spin is that Russia’s efforts to hack state electoral systems were much more extensive than previously thought.

However, the Times presents not one shred of evidence to support the underlying claim that Russia hacked these systems, much less that this alleged hacking was much more widespread than previously reported.

To the scrutinous reader who is familiar with the propaganda techniques mainstream media use in order to manufacture consent for various government policies, the total lack of evidence is apparent. In fact, the Times actually acknowledges that there is no evidence to support the claim it is making in the headline. Yet, through obfuscation, use of deceptive language, and various other techniques, the Times leads the general reader to believe that its headline is true.

An examination of the article is useful to see just how the Times manages to lead readers to the conclusion the Russia hacking is a demonstrated fact when, in reality, it remains just another conspiracy theory originating from the government that the Times is all too happy to help propagate.

The Alleged Russian Hacking of US Electoral Systems

The first thing to note about this New York Times piece is its title. The headline makes two claims: 1) it’s a fact that Russia tried to hack the US election, and this fact has been known publicly for some time; and 2) the Times has new information showing not only that US election systems were hacked and that Russia was responsible, but also that Russia’s hacking efforts even more widespread than previously known.

The story begins with the case of Durham county, North Carolina, where, we learn, various irregularities occurred at polling stations on election day last November (bold emphasis added throughout):

Dozens were told they were ineligible to vote and were turned away at the polls, even when they displayed current registration cards. Others were sent from one polling place to another, only to be rejected. Scores of voters were incorrectly told they had cast ballots days earlier. In one precinct, voting halted for two hours.

Susan Greenhalgh, a troubleshooter at a nonpartisan election monitoring group, was alarmed. Most of the complaints came from Durham, a blue-leaning county in a swing state [North Carolina]. The problems involved electronic poll books — tablets and laptops, loaded with check-in software, that have increasingly replaced the thick binders of paper used to verify voters’ identities and registration status. She knew that the company that provided Durham’s software, VR Systems, had been penetrated by Russian hackers months before.

“It felt like tampering, or some kind of cyberattack,” Ms. Greenhalgh said about the voting troubles in Durham.

Note that the Times does not say that Ms. Greenhalgh “believed” or “had heard” that Russian hackers were responsible for earlier hacking VR Systems, but that she “knew” this was so. With this verb choice, the Times is asserting that this claim is a proven fact.

The purpose of this assertion is to establish credibility in the mind of the reader that its headline is true, that the evidence shows that Russian hacking efforts were more widespread than previously known. If it is a fact that Russia hacked US election systems, then it is not hard to believe that its hacking was more extensive than previously thought.

But what evidence does the Times present to support its assertion that this earlier Russian hacking of VR Systems occurred?

Well, to answer that question, let’s first look at how Ms. Greenhalgh “knew” that Russians had hacked VR Systems. Much further into the article, more than halfway through, the Times tells us:

As the problems mounted, The Charlotte Observer reported that Durham’s e-poll book vendor was Florida-based VR Systems, which Ms. Greenhalgh knew from a CNN report had been hacked earlier by Russians. “Chills went through my spine,” she recalled.

So there were irregularities at the Durham county polling stations, and Durham county used VR Systems for its polling system, which Ms. Greenhalgh “knew” Russians had hacked because she’d heard it on CNN.

Mid-article, however, the Times also quotes Ms. Greenhalgh acknowledging, with respect to the specific case of Durham county, “We still don’t know if Russian hackers did this.”

If we don’t know whether Russian hacking was responsible for the supposed irregularities in Durham county’s polling station, why is the Times using it as an example to support the claim made in its headline that this hacking was more extensive than previously thought? If there are cases where there is evidence, why not feature one of those, instead?

The answer is that no such evidence exists; the Times has no evidence to support that claim in its headline. In fact, it acknowledges this in several other places in the article. What the Times is trying to do is to build the case that we can safely assume that what happened in Durham county was a consequence of Russian hacking. After all, if Russia hacked VR Systems, that certainly could explain those election-day irregularities, right?

But how solid is the Times‘ premise that Russia hacked VR Systems in the first place?

The Times doesn’t attempt to support this premise solely with hearsay about something CNN reported. It exerts slightly greater effort to convince the reader. Nine paragraphs into the article, we read:

Beyond VR Systems, hackers breached at least two other providers of critical election services well ahead of the 2016 voting, said current and former intelligence officials, speaking on condition of anonymity because the information is classified. The officials would not disclose the names of the companies.

Note here that the Times is once again acknowledging that it doesn’t actually have any evidence to support the claim that Russia hacked other companies in addition to VR Systems, which it is using to support the claim made in its headline that the Russian hacking was more widespread than previously thought. The Times is simply parroting government officials who’ve made this claim.

The Times‘ case crumbles even further the deeper one reads into the article. With respect to the Durham county irregularities, the Times next notes:

There are plenty of other reasons for such breakdowns — local officials blamed human error and software malfunctions — and no clear-cut evidence of digital sabotage has emerged, much less a Russian role in it. Despite the disruptions, a record number of votes were cast in Durham, following a pattern there of overwhelming support for Democratic presidential candidates, this time Hillary Clinton.

But months later, for Ms. Greenhalgh, other election security experts and some state officials, questions still linger about what happened that day in Durham as well as other counties in North Carolina, Virginia, Georgia and Arizona.

So keep in mind as we proceed that the Times is here once again acknowledging that no evidence exists to support the suspicion that the Durham county irregularities were due to Russian hacking. Yet it attempts to lead readers to that conclusion by suggesting that Russians did hack states’ electoral systems:

After a presidential campaign scarred by Russian meddling, local, state and federal agencies have conducted little of the type of digital forensic investigation required to assess the impact, if any, on voting in at least 21 states whose election systems were targeted by Russian hackers, according to interviews with nearly two dozen national security and state officials and election technology specialists.

Note that here the Times is attributing the claim that Russia hacked into states’ electoral systems to various sources. In its next paragraph, however, the Times does away with attribution and transforms this claiminto an ostensibly verified fact:

The assaults on the vast back-end election apparatus — voter-registration operations, state and local election databases, e-poll books and other equipment — have received far less attention than other aspects of the Russian interference, such as the hacking of Democratic emails and spreading of false or damaging information about Mrs. Clinton. Yet the hacking of electoral systems was more extensive than previously disclosed, The New York Times found.

Here we see that the Times is back to asserting as fact that the Russian hacking was more extensive than previously reported, even though it has admittedly not yet provided even a single piece of supporting evidence! How can it do that? Well, transparently, what is important to the Times is that its readers believe that its headline is true, not to actually demonstrate it. Whether it is actually true does not matter; it is just the belief that the Times is aiming to instill.

This is the nature of propaganda.

Turning to the premise, note that the Times is here claiming as fact that, one, US electoral systems were extensively hacked, and, two, Russia was responsible.

It continues:

Intelligence officials in January reassured Americans that there was no indication that Russian hackers had altered the vote count on Election Day, the bottom-line outcome. But the assurances stopped there.

Government officials said that they intentionally did not address the security of the back-end election systems, whose disruption could prevent voters from even casting ballots.

That’s partly because states control elections; they have fewer resources than the federal government but have long been loath to allow even cursory federal intrusions into the voting process.

That, along with legal constraints on intelligence agencies’ involvement in domestic issues, has hobbled any broad examination of Russian efforts to compromise American election systems. Those attempts include combing through voter databases, scanning for vulnerabilities or seeking to alter data, which have been identified in multiple states. Current congressional inquiries and the special counsel’s Russia investigation have not focused on the matter.

Note here how the Times is explaining that the federal government has not really focused much on investigating US election systems irregularities even while continuing to assert as fact that there were Russian efforts to compromise those systems! Further:

“We don’t know if any of the problems were an accident, or the random problems you get with computer systems, or whether it was a local hacker, or actual malfeasance by a sovereign nation-state,” said Michael Daniel, who served as the cybersecurity coordinator in the Obama White House. “If you really want to know what happened, you’d have to do a lot of forensics, a lot of research and investigation, and you may not find out even then.”

In interviews, academic and private election security experts acknowledged the challenges of such diagnostics but argued that the effort is necessary. They warned about what could come, perhaps as soon as next year’s midterm elections, if the existing mix of outdated voting equipment, haphazard election-verification procedures and array of outside vendors is not improved to build an effective defense against Russian or other hackers.

So, again, the Times is acknowledging that the kind of forensic investigation that would be required to determine whether US election systems were hacked have not actually been conducted. How, therefore, can the Times report as fact not only that such hacking occurred, but that Russia was responsible?

It gets worse. The Times at this point in the article has already acknowledged that there could be perfectly benign explanations for what happened in Durham county. As we continue reading, we learn that the those supposedly alarming irregularities the Times opened the article with were not actually all that irregular (and hence not all that alarming). To the contrary:

Still, some of the incidents reported in North Carolina occur in every election, said Charles Stewart III, a political scientist at the Massachusetts Institute of Technology and an expert on election administration.

“Election officials and advocates and reporters who were watching most closely came away saying this was an amazingly quiet election,” he said, playing down the notion of tampering.

The Times next quotes Ms. Greenhalgh’s admission that there’s no evidence hackers got into Durham county’s system (much less that Russia was responsible).

Keep in mind that the claim the government and media have been making is that Russia interfered in the US election to throw the vote to Donald Trump. Yet, in the case of Durham county, the result was that, as the Times informs, “Hillary Clinton won 78 percent of the 156,000 votes”. This is a strange outcome if we are to assume that Russia hacked the system to tamper with the election!

But the Times is not unskilled in the art of propaganda, so it has an explanation ready for us: Russia tried to hack the system there, but was just unsuccessful! It continues:

Details of the breach did not emerge until June, in a classified National Security Agency [NSA] report leaked to The Intercept, a national security news site. That report found that hackers from Russia’s military intelligence agency, the G.R.U., had penetrated the company’s computer systems as early as August 2016, then sent “spear-phishing” emails from a fake VR Systems account to 122 state and local election jurisdictions. The emails sought to trick election officials into downloading malicious software to take over their computers.

The N.S.A. analysis did not say whether the hackers had sabotaged voter data. “It is unknown,” the agency concluded, whether Russian phishing “successfully compromised the intended victims, and what potential data could have been accessed.”

VR Systems’ chief operating officer, Ben Martin, said he did not believe Russian hackers were successful. He acknowledged that the vendor was a “juicy target,” given that its systems are used in battleground states including North Carolina, Florida and Virginia. But he said that the company blocked access from its systems to local databases, and employs security protocols to bar intruders and digital triggers that sound alerts if its software is manipulated.

Take note again of the Times choice of verb: the NSA report “found” that hackers working for Russian intelligence had penetrated VR Systems’ computer systems. Through this choice of verb, the Times is communicating that it is a verified fact that Russia hacked VR Systems. But is it? To answer that, let’s turn to the Times‘ source.

The Intercept reported on this alleged hack much earlier, on June 5, 2017. Unlike the Times, however, The Intercept provided the following important caveat:

While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based. A U.S. intelligence officer who declined to be identified cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.

To reiterate, the supposed evidence that exists proving that Russia hacked VR Systems is classified and still unknown to either the public or the media, including The Intercept and New York Times.

As The Intercept notes, the NSA report “states unequivocally in its summary statement that it was Russian military intelligence, specifically the Russian General Staff Main Intelligence Directorate, or GRU, that conducted the cyber attacks described in the document.”

But upon what actual evidence is that unequivocal statement based?

The Intercept, like the Times, proceeds to accept this unequivocal summary statement as fact despite its acknowledged lack of access to the evidence supposedly supporting this claim:

The NSA has now learned, however, that Russian government hackers, part of a team with a “cyber espionage mandate specifically directed at U.S. and foreign elections,” focused on parts of the system directly connected to the voter registration process, including a private sector manufacturer of devices that maintain and verify the voter rolls.

Here The Intercept is being as disingenuous with its readers as the Times. Note again the deceptive verb choice. The NSA had not actually “learned” that Russia tried to hack US electoral systems; it had rather assessed that this was so. As the manufactured “intelligence” about Iraq’s WMDs should have taught us, those are far from the same thing.

Conveniently, The Intercept provides a graphic image from the NSA report illustrating the point:

The key element of this chart to note is in the left column, where it identifies the “Operators” responsible sending Phishing emails — emails designed to trick the recipient into giving away login credentials for whatever system the hackers were trying to get into. Note that, according to the NSA, these “Operators” were “Probably within” the GRU.

“Probably”.

So, does the NSA know that the Russian government was responsible for these Phishing emails?

No.

The NSA is claiming this is so. But the supposed evidence it is basing this claim upon has not been shown to even exist.

Now, perhaps the NSA has solid reasoning to arrive at this conclusion. Perhaps it has solid, though not definitive, evidence to back this up.

But the New York Times ought to be properly informing its readers that the Russian hacking of VR Systems is an allegation. It ought to be including the caveat with this information that this is according to the government, but that it has not yet been proven. Moreover, the Times ought to be informing its readers that the evidence supposedly supporting this conclusion has not been made public, and, further, that nobody at the Times has been able to verify it even exists.

But continuing in its propaganda effort, the Times reminds us that, “In an assessment of Russian cyberattacks released in January, intelligence agencies said Kremlin spy services had been collecting information on election processes, technology and equipment in the United States since early 2014.”

But that was just another example of the government making a claim for which no evidence has actually been provided. Each of these claims simply builds upon those that preceded it. In the next manifestation, the New York Times claim that Russia’s supposed hacking was even more extensive than previously known will likewise be presented as fact, and the acknowledgments about the lack of supporting evidence will be omitted, just as the Times omitted that important caveat from The Intercept.

Of course, to write and publish this kind of story requires extreme cognitive dissonance on the part of journalists and editors at the Times. This psychological phenomenon of holding two fundamentally contradictory beliefs at the same time is palpable throughout the piece. Once more, even while reporting its headlined claim as fact, the Times acknowledges that it has no evidence to support it:

Beginning in 2015, the American officials said, Russian hackers focused instead on other internet-accessible targets: computers at the Democratic National Committee, state and local voter databases, election websites, e-poll book vendors and other back-end election services.

Apart from the Russian influence campaign intended to undermine Mrs. Clinton and other Democratic officials, the impact of the quieter Russian hacking efforts at the state and county level has not been widely studied. Federal officials have been so tight-lipped that not even many election officials in the 21 states the hackers assaulted know whether their systems were compromised, in part because they have not been granted security clearances to examine the classified evidence.

Of course, nobody at the New York Times has seen that evidence, either, to be able to verify that it even exists.

The Times closes by noting that, unlike Ms. Greenhalgh, Durham county officials “have rejected any notion that an intruder sought to alter the election outcome.” Nevertheless, the county has turned over computers to the North Carolina State Board of Elections and Ethics Enforcement in order for the matter to be investigated.

Of course, the Times‘ purpose with this piece, rather than being to properly inform the public, is to lead readers into the belief that, regardless of whether it happened in Durham county, there were extensive efforts by the government of Russia to hack into state electoral systems.

Never mind that the Times presents not one shred of actual evidence to support either of the two claims it makes in its headline.

Conclusion

We can again recall how the media, including the New York Times, piled lie upon lie in order to manufacture consent for the US’s war of aggression against Iraq.

Here, again, the political establishment has an agenda. Donald Trump campaigned on a platform of seeking improved relations with Russia, a deescalation of tensions, and greater cooperation with Moscow. The so-called “Deep State” was upset by Hillary Clinton’s loss. In order for the national security state to retain the authoritarian powers it has assumed supposedly in order to keep Americans safe, it needs to convince Americans that they need protecting. Russia has been selected to serve as a useful “enemy” to that end.

Framing Russia as an enemy of the United States also serves the interests of the military/security complex and the goal of maintaining and expanding US hegemony across the globe. This narrative has been used, for example, to prevent Trump from deescalating in Syria and increasing cooperation with Russia there. Trump had indicated that he would shift US policy away from the Obama administration’s goal of seeking regime change in Syria and only focus on combating the so-called “Islamic State” (a.k.a., ISIS, ISIL, or Daesh). The national security state has maneuvered rather to ensure that relations between the US and Russia remain tense and that US policy remains effectively to prolong the violence.

Whatever the motives for the propaganda campaign, we can observe that this propaganda campaign is occurring. Members of the establishment media have not only failed to learn the relevant lesson from their reporting about Iraqi WMD, but refusing to do so almost seems a job prerequisite.

News consumers should not make the same mistake.

Scrutinize. Question. Think.

If we want the mainstream media to change its behavior and actually do its job of properly informing the public, then news consumers need to change their behavior. Ever news consumers knows the old adage that you can’t believe everything you read in the newspaper. Nevertheless, all too habitually, that is precisely what they do — just as the journalists and editors they are relying on for information all too habitually accept claims from government officials as fact.

It is supposed to be the job of news media to analyze information, assess the veracity of sources, question government claims, and reveal the truth. Yet the establishment media not only fail to do so, but actively serve to propagate conspiracy theories originating from the government, and thus to manufacture consent for various government policies and the private agendas of the politically and financially powerful.

In light of how the mainstream media serve this function, it is critical for the consumers to develop the analytic skills necessary to determine the truth for themselves and be able to identify state propaganda when they see it.

Hopefully, this exercise has provided some useful insights into how to do just that.

Media’s Grim Addiction to Perseverance Porn

By Adam Johnson

Source: FAIR

You’ve seen or heard or read the personal interest story a thousand times: An enterprising seven-year-old collects cans to save for college (ABC72/8/17), a man with unmatched moxie walks 15 miles to his job (Today2/20/17), a low-wage worker buys shoes for a kid whose mother can’t afford them (Fox512/14/16), an “inspiring teen” goes right back to work after being injured in a car accident (CBS News12/16/16). All heartwarming tales of perseverance in the face of impossible odds—and all ideological agitprop meant to obscure and decontextualize the harsh reality of dog-eat-dog capitalism.

Man walks eight miles in the snow to get to work every day (ABC 273/14/17). Or was it a teen walking 10 miles in freezing weather to a job interview (New York Daily News2/26/13)? Or was it 10 miles to work every day (Times Herald Record3/17/17)? Or was it 12 (ABC News2/22/17) or 15 (Today2/20/17) or 18 (Evening Standard, 2/9/09) or 21 (Detroit Free Press1/20/15)? Who cares—their humanity is irrelevant. They’re clickbait, stand-in bootstrap archetypes meant to validate the bourgeois morality of click-happy media consumers.

These stories are typically shared for the purposes of poor-shaming, typically under the guise of inspirational life advice. “This man is proof we all just need to keep walking, no matter what life throws at us,” insisted Denver ABC7 anchor Anne Trujillo, after sharing one of those stories of a poor person forced to walk thousands of miles a year to survive.

A healthy press would take these anecdotes of “can do” spirit and ask bigger questions, like why are these people forced into such absurd hardship? Who benefits from skyrocketing college costs? Why does the public transit in this person’s city not have subsidies for the poor? Why aren’t employers forced to offer time off for catastrophic accidents? But time and again, the media mindlessly tells the bootstrap human interest story, never questioning the underlying system at work.

One particularly vulgar example was CBS News(12/16/16) referring to an “inspiring” African-American kid who had to work at his fast food job with an arm sling and a neck brace after a car accident. To compound the perseverance porn, he was, at least in part, doing so to help donate to a local homeless charity. Here we have a story highlighting how society has colossally failed its most vulnerable populations—the poor, ethnic minorities, children and the homeless—and the take-home point is, “Ah gee, look at that scrappy kid.”

Journalism is as much—if not more—about what isn’t reported as what is. Here a local reporter is faced with a cruel example of people falling through the cracks of the richest country on Earth, and their only contribution is to cherry-pick one guy who managed—just barely—to cling on to the edge.

Perseverance porn goes hand in hand with the rise of a GoFundMe economy that relies on personal narrative over collective policy, emotional appeals over baseline human rights. $930 million out of the $2 billion raised on GoFundMe since its inception in 2010 was for healthcare expenses, while an estimated 45,000 people a year die a year due to a lack of medical treatment. Meanwhile, anchors across cable news insist that single-payer healthcare is “unaffordable,” browbeating guests who support it, while populating their broadcasts with these one-off tales of people heroically scraping by.

It’s part of a broader media culture of anecdotes in lieu of the macro, moralizing “success” rather than questioning systemic problems. Perseverance porn may seem harmless, but in highlighting handpicked cases of people overcoming hardship without showing the thousands that didn’t—much less asking broader questions as to what created these conditions—the media traffics in decidedly right-wing tropes. After all, if they can do it, so can you—right?

False Flag Terrorism Isn’t a “Theory” … It’s ADMITTED and Widespread

Source: Washington’s Blog

Presidents, Prime Ministers, Congressmen, Generals, Spooks, Soldiers and Police ADMIT to False Flag Terror

In the following instances, officials in the government which carried out the attack (or seriously proposed an attack) admit to it, either orally, in writing, or through photographs or videos:

(1) Japanese troops set off a small explosion on a train track in 1931, and falsely blamed it on China in order to justify an invasion of Manchuria. This is known as the “Mukden Incident” or the “Manchurian Incident”. The Tokyo International Military Tribunal found: “Several of the participators in the plan, including Hashimoto [a high-ranking Japanese army officer], have on various occasions admitted their part in the plot and have stated that the object of the ‘Incident’ was to afford an excuse for the occupation of Manchuria by the Kwantung Army ….” And see this, this and this.

(2) A major with the Nazi SS admitted at the Nuremberg trials that – under orders from the chief of the Gestapo – he and some other Nazi operatives faked several attacks on their own people and resources which they blamed on the Poles, to justify the invasion of Poland.    The staged attacks included:

  • The German radio station Sender Gleiwitz [details below]
  • The strategic railway at POSunka Pass (Jabłonków Incident), located on the border between Poland and Czechoslovakia
  • The German customs station at Hochlinden (today part of Rybnik-Stodoły)
  • The forest service station in Pitschen (Byczyna)
  • The communications station at Neubersteich (“Nieborowitzer Hammer” before 12 February 1936, now Kuznia Nieborowska)
  • The railroad station in Alt-Eiche (Smolniki), Rosenberg in Westpreußen district
  • A woman and her companion in Katowice

The details of the Gleiwitz radio station incident include:

On the night of 31 August 1939, a small group of German operatives dressed in Polish uniforms and led by Naujocks seized the Gleiwitz station and broadcast a short anti-German message in Polish (sources vary on the content of the message). The Germans’ goal was to make the attack and the broadcast look like the work of anti-German Polish saboteurs.

To make the attack seem more convincing, the Germans used human corpses to pass them off as Polish attackers. They murdered Franciszek Honiok, a 43-year-old unmarried German Silesian Catholic farmer known for sympathizing with the Poles. He had been arrested the previous day by the Gestapo. He was dressed to look like a saboteur, then killed by lethal injection, given gunshot wounds, and left dead at the scene so that he appeared to have been killed while attacking the station. His corpse was subsequently presented to the police and press as proof of the attack.

(3) The minutes of the high command of the Italian government – subsequently approved by Mussolini himself – admitted that violence on the Greek-Albanian border was carried out by Italians and falsely blamed on the Greeks, as an excuse for Italy’s 1940 invasion of Greece.

(4) Nazi general Franz Halder also testified at the Nuremberg trials that Nazi leader Hermann Goering admitted to setting fire to the German parliament building in 1933, and then falsely blaming the communists for the arson.

(5) Soviet leader Nikita Khrushchev admitted in writing that the Soviet Union’s Red Army shelled the Russian village of Mainila in 1939 – while blaming the attack on Finland – as a basis for launching the “Winter War” against Finland. Russian president Boris Yeltsin agreed that Russia had been the aggressor in the Winter War.

(6) The Russian Parliament, current Russian president Putin and former Soviet leader Gorbachev all admit that Soviet leader Joseph Stalin ordered his secret police to execute 22,000 Polish army officers and civilians in 1940, and then falsely blamed it on the Nazis.

(7) The British government admits that – between 1946 and 1948 – it bombed 5 ships carrying Jews who were Holocaust survivors attempting to flee to safety in Palestine right after World War II, set up a fake group called “Defenders of Arab Palestine”, and then had the psuedo-group falsely claim responsibility for the bombings (and see thisthis and this).

(8) Israel admits that in 1954, an Israeli terrorist cell operating in Egypt planted bombs in several buildings, including U.S. diplomatic facilities, then left behind “evidence” implicating the Arabs as the culprits (one of the bombs detonated prematurely, allowing the Egyptians to identify the bombers, and several of the Israelis later confessed) (and see this and this).

The U.S. Army does not believe this is an isolated incident. For example, the U.S. Army’s School of Advanced Military Studies said of Mossad (Israel’s intelligence service):

“Ruthless and cunning. Has capability to target U.S. forces and make it look like a Palestinian/Arab act.”

(9) The CIA admits that it hired Iranians in the 1950′s to pose as Communists and stage bombings in Iran in order to turn the country against its democratically-elected prime minister.

(10) The Turkish Prime Minister admitted that the Turkish government carried out the 1955 bombing on a Turkish consulate in Greece – also damaging the nearby birthplace of the founder of modern Turkey – and blamed it on Greece, for the purpose of inciting and justifying anti-Greek violence.

(11) The British Prime Minister admitted to his defense secretary that he and American president Dwight Eisenhower approved a plan in 1957 to carry out attacks in Syria and blame it on the Syrian government as a way to effect regime change.

(12) The former Italian Prime Minister, an Italian judge, and the former head of Italian counterintelligence admit that NATO, with the help of the Pentagon and CIA, carried out terror bombings in Italy and other European countries in the 1950s through the 1980s and blamed the communists, in order to rally people’s support for their governments in Europe in their fight against communism.

As one participant in this formerly-secret program stated: “You had to attack civilians, people, women, children, innocent people, unknown people far removed from any political game. The reason was quite simple. They were supposed to force these people, the Italian public, to turn to the state to ask for greater security” … so that “a state of emergency could be declared, so people would willingly trade part of their freedom for the security” (and see this) (Italy and other European countries subject to the terror campaign had joined NATO before the bombings occurred). And watch this BBC special. They also allegedly carried out terror attacks in France, Belgium, Denmark, Germany, Greece, the Netherlands, Norway, Portugal, the UK, and other countries.

The CIA also stressed to the head of the Italian program that Italy needed to use the program to control internal uprisings.

False flag attacks carried out pursuant to this program include – by way of example only:

(13) In 1960, American Senator George Smathers suggested that the U.S. launch “a false attack made on Guantanamo Bay which would give us the excuse of actually fomenting a fight which would then give us the excuse to go in and [overthrow Castro]”.

(14) Official State Department documents show that, in 1961, the head of the Joint Chiefs and other high-level officials discussed blowing up a consulate in the Dominican Republic in order to justify an invasion of that country. The plans were not carried out, but they were all discussed as serious proposals.

(15) As admitted by the U.S. government, recently declassified documents show that in 1962, the American Joint Chiefs of Staff signed off on a plan to blow up AMERICAN airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. See the following ABC news reportthe official documents; and watch this interview with the former Washington Investigative Producer for ABC’s World News Tonight with Peter Jennings.

(16) In 1963, the U.S. Department of Defense wrote a paper promoting attacks on nations within the Organization of American States – such as Trinidad-Tobago or Jamaica – and then falsely blaming them on Cuba.

(17) The U.S. Department of Defense also suggested covertly paying a person in the Castro government to attack the United States: “The only area remaining for consideration then would be to bribe one of Castro’s subordinate commanders to initiate an attack on Guantanamo.”

(18) A U.S. Congressional committee admitted that – as part of its “Cointelpro” campaign – the FBI had used many provocateurs in the 1950s through 1970s to carry out violent acts and falsely blame them on political activists.

(19) A top Turkish general admitted that Turkish forces burned down a mosque on Cyprus in the 1970s and blamed it on their enemy. He explained: “In Special War, certain acts of sabotage are staged and blamed on the enemy to increase public resistance. We did this on Cyprus; we even burnt down a mosque.” In response to the surprised correspondent’s incredulous look the general said, “I am giving an example”.

(20) A declassified 1973 CIA document reveals a program to train foreign police and troops on how to make booby traps, pretending that they were training them on how to investigate terrorist acts:

The Agency maintains liaison in varying degrees with foreign police/security organizations through its field stations ….

[CIA provides training sessions as follows:]

a. Providing trainees with basic knowledge in the uses of commercial and military demolitions and incendiaries as they may be applied in terrorism and industrial sabotage operations.

b. Introducing the trainees to commercially available materials and home laboratory techniques, likely to he used in the manufacture of explosives and incendiaries by terrorists or saboteurs.

c. Familiarizing the trainees with the concept of target analysis and operational planning that a saboteur or terrorist must employ.

d. Introducing the trainees to booby trapping devices and techniques giving practical experience with both manufactured and improvised devices through actual fabrication.

***

The program provides the trainees with ample opportunity to develop basic familiarity and use proficiently through handling, preparing and applying the various explosive charges, incendiary agents, terrorist devices and sabotage techniques.

(21) The German government admitted (and see this) that, in 1978, the German secret service detonated a bomb in the outer wall of a prison and planted “escape tools” on a prisoner – a member of the Red Army Faction – which the secret service wished to frame the bombing on.

(22) A Mossad agent admits that, in 1984, Mossad planted a radio transmitter in Gaddaffi’s compound in Tripoli, Libya which broadcast fake terrorist transmissions recorded by Mossad, in order to frame Gaddaffi as a terrorist supporter. Ronald Reagan bombed Libya immediately thereafter.

(23) The South African Truth and Reconciliation Council found that, in 1989, the Civil Cooperation Bureau (a covert branch of the South African Defense Force) approached an explosives expert and asked him “to participate in an operation aimed at discrediting the ANC [the African National Congress] by bombing the police vehicle of the investigating officer into the murder incident”, thus framing the ANC for the bombing.

(24) An Algerian diplomat and several officers in the Algerian army admit that, in the 1990s, the Algerian army frequently massacred Algerian civilians and then blamed Islamic militants for the killings (and see this video; and Agence France-Presse, 9/27/2002, French Court Dismisses Algerian Defamation Suit Against Author).

(25) In 1993, a bomb in Northern Ireland killed 9 civilians. Official documents from the Royal Ulster Constabulary (i.e. the British government) show that the mastermind of the bombing was a British agent, and that the bombing was designed to inflame sectarian tensions. And see this and this.

(26) The United States Army’s 1994 publication Special Forces Foreign Internal Defense Tactics Techniques and Procedures for Special Forces – updated in 2004 – recommends employing terrorists and using false flag operations to destabilize leftist regimes in Latin America. False flag terrorist attacks were carried out in Latin America and other regions as part of the CIA’s “Dirty Wars“. And see this.

(27) Similarly, a CIA “psychological operations” manual prepared by a CIA contractor for the Nicaraguan Contra rebels noted the value of assassinating someone on your own side to create a “martyr” for the cause. The manual was authenticated by the U.S. government. The manual received so much publicity from Associated Press, Washington Post and other news coverage that – during the 1984 presidential debate – President Reagan was confronted with the following question on national television:

At this moment, we are confronted with the extraordinary story of a CIA guerrilla manual for the anti-Sandinista contras whom we are backing, which advocates not only assassinations of Sandinistas but the hiring of criminals to assassinate the guerrillas we are supporting in order to create martyrs.

(28) A Rwandan government inquiry admitted that the 1994 shootdown and murder of the Rwandan president, who was from the Hutu tribe – a murder blamed by the Hutus on the rival Tutsi tribe, and which led to the massacre of more than 800,000 Tutsis by Hutus – was committed by Hutu soldiers and falsely blamed on the Tutis.

(29) An Indonesian government fact-finding team investigated violent riots which occurred in 1998, and determined that “elements of the military had been involved in the riots, some of which were deliberately provoked”.

(30) Senior Russian Senior military and intelligence officers admit that the KGB blew up Russian apartment buildings in 1999 and falsely blamed it on Chechens, in order to justify an invasion of Chechnya (and see this report and this discussion).

(31) As reported by the New York TimesBBC and Associated Press, Macedonian officials admit that in 2001, the government murdered 7 innocent immigrants in cold blood and pretended that they were Al Qaeda soldiers attempting to assassinate Macedonian police, in order to join the “war on terror”. They lured foreign migrants into the country, executed them in a staged gun battle, and then claimed they were a unit backed by Al Qaeda intent on attacking Western embassies”. Specifically, Macedonian authorities had lured the immigrants into the country, and then – after killing them – posed the victims with planted evidence – “bags of uniforms and semiautomatic weapons at their side” – to show Western diplomats.

(32) At the July 2001 G8 Summit in Genoa, Italy, black-clad thugs were videotaped getting out of police cars, and were seen by an Italian MP carrying “iron bars inside the police station”. Subsequently, senior police officials in Genoa subsequently admitted that police planted two Molotov cocktails and faked the stabbing of a police officer at the G8 Summit, in order to justify a violent crackdown against protesters.

(33) The U.S. falsely blamed Iraq for playing a role in the 9/11 attacks – as shown by a memo from the defense secretary – as one of the main justifications for launching the Iraq war.

Even after the 9/11 Commission admitted that there was no connection, Dick Cheney said that the evidence is “overwhelming” that al Qaeda had a relationship with Saddam Hussein’s regime, that Cheney “probably” had information unavailable to the Commission, and that the media was not ‘doing their homework’ in reporting such ties. Top U.S. government officials now admit that the Iraq war was really launched for oil … not 9/11 or weapons of mass destruction.

Despite previous “lone wolf” claims, many U.S. government officials now say that 9/11 was state-sponsored terror; but Iraq was not the state which backed the hijackers. (Many U.S. officials have allegedthat 9/11 was a false flag operation by rogue elements of the U.S. government; but such a claim is beyond the scope of this discussion. The key point is that the U.S. falsely blamed it on Iraq, when it knew Iraq had nothing to do with it.). 

(Additionally, the same judge who has shielded the Saudis for any liability for funding 9/11 has awarded a default judgment against Iran for $10.5 billion for carrying out 9/11 … even though no one seriously believes that Iran had any part in 9/11.)

(34) Although the FBI now admits that the 2001 anthrax attacks were carried out by one or more U.S. government scientists, a senior FBI official says that the FBI was actually told to blame the Anthrax attacks on Al Qaeda by White House officials (remember what the anthrax letters looked like). Government officials also confirm that the white House tried to link the anthrax to Iraq as a justification for regime change in that country. And see this.

(35) According to the Washington Post, Indonesian police admit that the Indonesian military killed American teachers in Papua in 2002 and blamed the murders on a Papuan separatist group in order to get that group listed as a terrorist organization.

(36) The well-respected former Indonesian president also admits that the government probably had a role in the Bali bombings.

(37) Police outside of a 2003 European Union summit in Greece were filmed planting Molotov cocktails on a peaceful protester.

(38) In 2003, the U.S. Secretary of Defense admitted that interrogators were authorized to use the following method: “False Flag: Convincing the detainee that individuals from a country other than the United States are interrogating him.” While not a traditional false flag attack, this deception could lead to former detainees – many of whom were tortured – attacking the country falsely blamed for the interrogation and torture.

(39) Former Department of Justice lawyer John Yoo suggested in 2005 that the US should go on the offensive against al-Qaeda, having “our intelligence agencies create a false terrorist organization. It could have its own websites, recruitment centers, training camps, and fundraising operations. It could launch fake terrorist operations and claim credit for real terrorist strikes, helping to sow confusion within al-Qaeda’s ranks, causing operatives to doubt others’ identities and to question the validity of communications.”

(40) Similarly, in 2005, Professor John Arquilla of the Naval Postgraduate School – a renowned US defense analyst credited with developing the concept of ‘netwar’ – called for western intelligence services to create new “pseudo gang” terrorist groups, as a way of undermining “real” terror networks. According to Pulitzer-Prize winning journalist Seymour Hersh, Arquilla’s ‘pseudo-gang’ strategy was, Hersh reported, already being implemented by the Pentagon:

“Under Rumsfeld’s new approach, I was told, US military operatives would be permitted to pose abroad as corrupt foreign businessmen seeking to buy contraband items that could be used in nuclear-weapons systems. In some cases, according to the Pentagon advisers, local citizens could be recruited and asked to join up with guerrillas or terrorists

The new rules will enable the Special Forces community to set up what it calls ‘action teams’ in the target countries overseas which can be used to find and eliminate terrorist organizations. ‘Do you remember the right-wing execution squads in El Salvador?’ the former high-level intelligence official asked me, referring to the military-led gangs that committed atrocities in the early nineteen-eighties. ‘We founded them and we financed them,’ he said. ‘The objective now is to recruit locals in any area we want. And we aren’t going to tell Congress about it.’ A former military officer, who has knowledge of the Pentagon’s commando capabilities, said, ‘We’re going to be riding with the bad boys.’”

(41) United Press International reported in June 2005:

U.S. intelligence officers are reporting that some of the insurgents in Iraq are using recent-model Beretta 92 pistols, but the pistols seem to have had their serial numbers erased. The numbers do not appear to have been physically removed; the pistols seem to have come off a production line without any serial numbers. Analysts suggest the lack of serial numbers indicates that the weapons were intended for intelligence operations or terrorist cells with substantial government backing. Analysts speculate that these guns are probably from either Mossad or the CIA. Analysts speculate that agent provocateurs may be using the untraceable weapons even as U.S. authorities use insurgent attacks against civilians as evidence of the illegitimacy of the resistance.

(42) In 2005, British soldiers dressed as Arabs were caught by Iraqi police after a shootout against the police. The soldiers apparently possessed explosives, and were accused of attempting to set off bombs. While none of the soldiers admitted that they were carrying out attacks, British soldiers and a column of British tanks stormed the jail they were held in, broke down a wall of the jail, and busted them out. The extreme measures used to free the soldiers – rather than have them face questions and potentially stand trial – could be considered an admission.

(43) Undercover Israeli soldiers admitted in 2005 to throwing stones at other Israeli soldiers so they could blame it on Palestinians, as an excuse to crack down on peaceful protests by the Palestinians.

(44) Quebec police admitted that, in 2007, thugs carrying rocks to a peaceful protest were actually undercover Quebec police officers (and see this).

(45) A 2008 US Army special operations field manual recommends that the U.S. military use surrogate non-state groups such as “paramilitary forces, individuals, businesses, foreign political organizations, resistant or insurgent organizations, expatriates, transnational terrorism adversaries, disillusioned transnational terrorism members, black marketers, and other social or political ‘undesirables.’” The manual specifically acknowledged that U.S. special operations can involve both counterterrorism and “Terrorism” (as well as “transnational criminal activities, including narco-trafficking, illicit arms-dealing, and illegal financial transactions.”)

(46) The former Italian Prime Minister, President, and head of Secret Services (Francesco Cossiga) advised the 2008 minister in charge of the police, on how to deal with protests from teachers and students:

He should do what I did when I was Minister of the Interior … infiltrate the movement with agents provocateurs inclined to do anything …. And after that, with the strength of the gained population consent, … beat them for blood and beat for blood also those teachers that incite them. Especially the teachers. Not the elderly, of course, but the girl teachers yes.

(47) An undercover officer admitted that he infiltrated environmental, leftwing and anti-fascist groups in 22 countries. Germany’s federal police chief admitted that – while the undercover officer worked for the German police – he acted illegally during a G8 protest in Germany in 2007 and committed arson by setting fire during a subsequent demonstration in Berlin. The undercover officer spent many years living with violent “Black Bloc” anarchists.

(48) Denver police admitted that uniformed officers deployed in 2008 to an area where alleged “anarchists” had planned to wreak havoc outside the Democratic National Convention ended up getting into a melee with two undercover policemen. The uniformed officers didn’t know the undercover officers were cops.

(49) At the G20 protests in London in 2009, a British member of parliament saw plain clothes police officers attempting to incite the crowd to violence.

(50) The oversight agency for the Royal Canadian Mounted Police admitted that – at the G20 protests in Toronto in 2010 – undercover police officers were arrested with a group of protesters. Videos and photos (see this and this, for example) show that violent protesters wore very similar boots and other gear as the police, and carried police batons. The Globe and Mail reports that the undercover officers planned the targets for violent attack, and the police failed to stop the attacks.

(51) Egyptian politicians admitted (and see this) that government employees looted priceless museum artifacts 2011 to try to discredit the protesters.

(52) Austin police admit that 3 officers infiltrated the Occupy protests in that city. Prosecutors admit that one of the undercover officers purchased and constructed illegal “lock boxes” which ended up getting many protesters arrested.

(53) In 2011, a Colombian colonel admitted that he and his soldiers had lured 57 innocent civilians and killed them – after dressing many of them in uniforms – as part of a scheme to claim that Columbia was eradicating left-wing terrorists. And see this.

(54) Rioters who discredited the peaceful protests against the swearing in of the Mexican president in 2012 admitted that they were paid 300 pesos each to destroy everything in their path. According to Wikipedia, photos also show the vandals waiting in groups behind police lines prior to the violence.

(55) On November 20, 2014, Mexican agent provocateurs were transported by army vehicles to participate in the 2014 Iguala mass kidnapping protests, as was shown by videos and pictures distributed via social networks.

(56) The highly-respected writer for the Telegraph Ambrose Evans-Pritchard says that the head of Saudi intelligence – Prince Bandar – recently admitted that the Saudi government controls “Chechen” terrorists.

(57) Two members of the Turkish parliamenthigh-level American sources and others admitted that the Turkish government – a NATO country – carried out the chemical weapons attacks in Syria and falsely blamed them on the Syrian government; and high-ranking Turkish government admitted on tape plans to carry out attacks and blame it on the Syrian government.

(58) The former Director of the NSA and other American government officials admit said that the U.S. is a huge supporter of terrorism. Jimmy Carter’s National Security Adviser Zbigniew Brzezinski admitted on CNN that the U.S. organized and supported Bin Laden and the other originators of “Al Qaeda” in the 1970s to fight the Soviets. The U.S. and its allies have been supporting Al Qaeda and other Islamic terrorist groups for many decades, and providing them arms, money and logistical support in LibyaSyriaMaliBosniaChechnyaIran, and many other countries. U.S. allies are also directly responsible for creating and supplying ISIS.

It’s gotten so ridiculous that a U.S. Senator has introduced a “Stop Arming Terrorists Act”, and U.S. Congresswoman – who introduced a similar bill in the House – says: “For years, the U.S. government has been supporting armed militant groups working directly with and often under the command of terrorist groups like ISIS and al-Qaeda in their fight to overthrow the Syrian government.”

(59) The Ukrainian security chief admits that the sniper attacks which started the Ukrainian coup were carried out in order to frame others. Ukrainian officials admit that the Ukrainian snipers fired on both sides, to create maximum chaos.

(60) Speaking of snipers, in a secret recording, Venezuelan generals admit that they will deploy snipers to shoot protesters, but keep the marksmen well-hidden from demonstrator and the reporters covering the events so others would be blamed for the deaths.

(61) Burmese government officials admitted that Burma (renamed Myanmar) used false flag attacks against Muslim and Buddhist groups within the country to stir up hatred between the two groups, to prevent democracy from spreading.

(62) Israeli police were again filmed in 2015 dressing up as Arabs and throwing stones, then turning over Palestinian protesters to Israeli soldiers.

(63) Britain’s spy agency has admitted (and see this) that it carries out “digital false flag” attacks on targets, framing people by writing offensive or unlawful material … and blaming it on the target.

(64) The CIA has admitted that it uses viruses and malware from Russia and other countries to carry out cyberattacks and blame other countries.

(65) U.S. soldiers have admitted that if they kill innocent Iraqis and Afghanis, they then “drop” automatic weapons near their body so they can pretend they were militants.

(66) Similarly, police frame innocent people for crimes they didn’t commit. The practice is so well-known that the New York Times noted in 1981:

In police jargon, a throwdown is a weapon planted on a victim.

Newsweek reported in 1999:

Perez, himself a former [Los Angeles Police Department] cop, was caught stealing eight pounds of cocaine from police evidence lockers. After pleading guilty in September, he bargained for a lighter sentence by telling an appalling story of attempted murder and a “throwdown”–police slang for a weapon planted by cops to make a shooting legally justifiable. Perez said he and his partner, Officer Nino Durden, shot an unarmed 18th Street Gang member named Javier Ovando, then planted a semiautomatic rifle on the unconscious suspect and claimed that Ovando had tried to shoot themduring a stakeout.

Wikipedia notes:

As part of his plea bargain, Pérez implicated scores of officers from the Rampart Division’s anti-gang unit, describing routinely beating gang members, planting evidence on suspects, falsifying reports and covering up unprovoked shootings.

(As a side note – and while not technically false flag attacks – police have been busted framing innocent people in many other ways, as well.)

(67) A former U.S. intelligence officer recently alleged:

Most terrorists are false flag terrorists or are created by our own security services.

(68) The head and special agent in charge of the FBI’s Los Angeles office said that most terror attacks are committed by the CIA and FBI as false flags.

(69) The Director of Analytics at the interagency Global Engagement Center housed at the U.S. Department of State, also an adjunct professor at George Mason University, where he teaches the graduate course National Security Challenges in the Department of Information Sciences and Technology, a former branch chief in the CIA’s Counterterrorism Center, and an intelligence advisor to the Secretary of Homeland Security (J.D. Maddox) notes:

Provocation is one of the most basic, but confounding, aspects of warfare. Despite its sometimes obvious use, it has succeeded consistently against audiences around the world, for millennia, to compel war. A well-constructed provocation narrative mutes even the most vocal opposition.

***

The culmination of a strategic provocation operation invariably reflects a narrative of victimhood: we are the 
victims of the enemy’s unforgivable atrocities.

***

In the case of strategic provocation the deaths of an aggressor’s own personnel are a core tactic of the provocation.

***

The persistent use of strategic provocation over centuries – and its apparent importance to war planners – begs the question of its likely use by the US and other states in the near term.

(70) Leaders throughout history have acknowledged the “benefits” of of false flags to justify their political agenda:

Terrorism is the best political weapon for nothing drives people harder than a fear of sudden death”.
– Adolph Hitler

“Why of course the people don’t want war … But after all it is the leaders of the country who determine the policy, and it is always a simple matter to drag the people along, whether it is a democracy, or a fascist dictatorship, or a parliament, or a communist dictatorship … Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is to tell them they are being attacked, and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same in any country.”
– Hermann Goering, Nazi leader.

“The easiest way to gain control of a population is to carry out acts of terror. [The public] will clamor for such laws if their personal security is threatened”.
– Josef Stalin

Postscript 1:  It is not just “modern” nations which have launched false flag attacks. For example, a Native American from one tribe (Pomunkey) murdered a white Englishwoman living in Virginia in 1697 and then falsely blamed it on second tribe (Piscataway). But he later admitted in court that he was not really Piscataway, and that he had been paid by a provocateur from a third tribe (Iroquois) to kill the woman as a way to start a war between the English and the Piscataway, thus protecting the profitable Iroquois monopoly in trade with the English.

Postscript 2:  On multiple occasions, atrocities or warmongering are falsely blamed on the enemy as a justification for war … when no such event ever occurred. This is more like a “fake flag” than a “false flag”, as no actual terrorism occurred.

For example:

  • The NSA admits that it lied about what really happened in the Gulf of Tonkin incident in 1964 … manipulating data to make it look like North Vietnamese boats fired on a U.S. ship so as to create a false justification for the Vietnam war
  • One of the central lies used to justify the 1991 Gulf War against Iraq after Iraq invaded Kuwait was the false statement by a young Kuwaiti girl that Iraqis murdered Kuwaiti babies in hospitals. Her statement was arranged by a Congressman who knew that she was actually the daughter of the Kuwaiti Ambassador to the U.S. – who was desperately trying to lobby the U.S. to enter the war – but the Congressman hid that fact from the public and from Congress
  • Pulitzer prize-winning journalist Ron Suskind reported that the White House ordered the CIA to forge and backdate a document falsely linking Iraq with Muslim terrorists and 9/11 … and that the CIA complied with those instructions and in fact created the forgery, which was then used to justify war against Iraq. And see this and this
  • Time magazine points out that the claim by President Bush that Iraq was attempting to buy “yellow cake” Uranium from Niger:

had been checked out — and debunked — by U.S. intelligence a year before the President repeated it.

  • The “humanitarian” wars in Syria, Libya and Yugoslavia were all justified by highly exaggerated reports that the leaders of those countries were committing atrocities against their people. And see this

Afterword: The corporate media will likely never report on false flags … as it is ALWAYS pro-war.

Conspiracy Theory

By Paul Craig Roberte

Source: PaulCraigRoberts.org

In the United States “conspiracy theory” is the name given to explanations that differ from those that serve the ruling oligarchy, the establishment or whatever we want to call those who set and control the agendas and the explanations that support the agendas.

The explanations imposed on us by the ruling class are themselves conspiracy theories. Moreover, they are conspiracy theories designed to hide the real conspiracy that our rulers are operating.

For example, the official explanation of 9/11 is a conspiracy theory. Some Muslims, mainly Saudi Arabians, delivered the greatest humiliation to a superpower since David slew Goliath. They outsmarted all 17 US intelligence agencies and those of NATO and Israel, the National Security Council, the Transportation Safety Administration, Air Traffic Control, and Dick Cheney, hijacked four US airliners on one morning, brought down three World Trade Center skyscrapers, destroyed that part of the Pentagon where research was underway into the missing $2.3 trillion, and caused the morons in Washington to blame Afghanistan instead of Saudi Arabia.

Clearly, the Saudia Arabians who humiliated Ameria were involved in a conspiracy to do so.

Is it a believable conspiracy?

The ability of a few young Muslim men to pull off such a feat is unbelievable. Such total failure of the US National Security State means that America was blindly vulnerable throughout the decades of Cold War with the Soviet Union. If such total failure of the National Security State had really occurred, the White House and Congress would have been screaming for an investigation. People would have been held accountable for the long chain of security failures that allowed the plot to succeed. Instead, no one was even reprimanded, and the White House resisted all efforts for an investigation for a year. Finally, to shut up the 9/11 families, a 9/11 Commission was convened. The commission duly wrote down the government’s story and that was the “investigation.”

Moreover, there is no evidence to support the official conspiracy theory of 9/11. Indeed, all known evidence contradicts the official conspiracy theory.

For example, it is a proven fact that Building 7 came down at freefall acceleration, which means it was wired for demolition. Why was it wired for demolition? There is no official answer to this question.

It is the known evidence provided by scientists, architects, engineers, pilots, and the first responders who were in the twin towers and personally experienced the numerous explosions that brought down the towers that is described as a conspiracy theory.

The CIA introduced the term “conspiracy theory” into public discourse as part of its action plan to discredit skeptics of the Warren Commission report on the assassination of President John F. Kennedy. Any explanation other than the one handed down, which is contradicted by all known evidence, was debunked as a conspiracy theory.

Conspiracy theories are the backbone of US foreign policy. For example, the George W. Bush regime was active in a conspiracy against Iraq and Saddam Hussein. The Bush regime created fake evidence of Iraqi “weapons of mass destruction,” sold the false story to a gullible world and used it to destroy Iraq and murder its leader. Similarly, Gaddafi was a victim of an Obama/Hillary conspiracy to destroy Libya and murder Gaddafi. Assad of Syria and Iran were slated for the same treatment until the Russians intervened.

Currently, Washington is engaged in conspiracies against Russia, China, and Venezuela. Proclaiming a non-existent “Iranian threat,” Washington put US missiles on Russia’s border and used the “North Korean threat” to put missiles on China’s border. The democratically elected leader of Venezuela is said by Washington to be a dictator, and sanctions have been put on Venezuela to help the small Spanish elite through whom Washington has traditionally ruled South American countries pull off a coup and reestablish US control over Venezuela.

Everyone is a threat: Venezuela, Yemen, Syria, Iran, Iraq, Afghanistan, tribes in Pakistan, Libya, Russia, China, North Korea, but never Washington. The greatest conspiracy theory of our time is that Americans are surrounded by foreign threats. We are not even safe from Venezuela.

The New York Times, the Washington Post, CNN, NPR, and the rest of the presstitutes are quick to debunk as conspiracy theories all explanations that differ from the explanations of the ruling interests that the presstitutes serve.

Yet, as I write and for some nine months to date, the presstitute media has itself been promoting the conspiracy theory that Donald Trump was involved in a conspiracy with the president of Russia and Russian intelligence services to hack the US presidential election and place Trump, a Russian agent, in the White House.

This conspiracy theory has no evidence whatsoever. It doesn’t need evidence, because it serves the interests of the military/security complex, the Democratic Party, the neoconservatives, and permits the presstitutes to show lavish devotion to their masters. By endless repetition a lie becomes truth.

There is a conspiracy, and it is against the American people. Their jobs have been offshored in order to enrich the already rich. They have been forced into debt in a futile effort to maintain their living standards. Their effort to stem their decline by electing a president who spoke for them is being subverted before their eyes by an utterly corrupt media and ruling class.

Sooner or later it will dawn on them that there is nothing they can do but violently revolt. Most likely, by the time they reach this conclusion it will be too late. Americans are very slow to escape from the false reality in which they live. Americans are a thoroughly brainwashed people who hold tightly to their false life within The Matrix.

For the gullible and naive who have been brainwashed into believing that any explanation that differs from the officially-blessed one is a conspiracy theory, there are available online long lists of government conspiracies that succeeded in deceiving the people in order that the governments could achieve agendas that the people would have rejected.

If liberty continues to exist on earth, it will not be in the Western world. It will be in Russia and China, countries that emerged out of the opposite and know the value of liberty, and it will be in those South American countries, such as Venezuela, Ecuador, and Bolivia that fight for their sovereignty against American oppression.

Indeed, as historians unconcerned with their careers are beginning to write, the primary lesson in history is that governments deceive their peoples.

Everywhere in the Western world, government is a conspiracy against the people.