How The Deep State’s Two-Dimensional Engineered Reality Actually Works

deep_state_2_0

By Bernie Suarez

Source: Waking Times

It is refreshing to see more and more of humanity wake up to the functional real-time political reality of the world we now live in. There are many human beings throughout the planet who now understand that corruption has taken over. They understand that criminals run the world. They understand that in America a powerful ruling elite bought out politicians and corporations to get what they want. They understand that the ruling elite operate in networks that transcend the boundaries of nation states in an agenda intended to lead to global domination using their military might.

People are understanding that government propaganda is real, and that the U.S. government has gotten away with one false flag attack on its own people after another; 9/11 being just one of them, all for the purposes of justifying endless war. People also understand that the war on terror, which was ushered in by 9/11, is a lie and that because of this phony war on terror the Pentagon and U.S. military is swimming in billions of dollars of free money to do whatever they want. But what does all of this mean? Do we really understand how they’ve done it and how all of this works?

In 1999 Directors Andy and Lana Wachowski brought us an interesting film called The Matrix which nicely depicts how two alternate realities simultaneously exist: one in which the people in it have no clue what is real and what is not because the sum of the two-dimensional parts they are exposed to seems real, even though it’s not, and another reality where you are irreversibly awakened from that fictional reality.

Over the past 17+ years since the release of The Matrix film many people have awakened to the political reality we live in. For many people it is not difficult to see the parallels between the world we live in and the world depicted in The Matrix. We can see that there is an artificial reality in play that looks and feels real, but it is not. It’s a system designed to keep you enslaved, keep you disempowered, keep you in fear and keep you dependent on big government for survival. Most importantly it’s a system designed to keep itself in power and to preserve whatever agenda it has. Ultimately, this artificial reality is tending towards a global order where the ruling elite hope to absolutely control humanity forever in a way that is absolutely and uncompromisingly in line with their wishes.

The question we should be asking is, How does this matrix work and how does it relate to the three-dimensional physical reality we live in? To answer that, the concept of the “Deep State” was originally proposed to describe the political corruption in Turkey as a secret state acting within a state.

Though we had been warned about these ruling elite, banksters and shadow government by previous presidents going back 200+ years, following the post 9/11 period more and more people began wrapping this concept around their heads. To many, the idea of a group of elite running the world, deemed for years by the U.S. mainstream media and propaganda machine as lunatic “conspiracy theories”, suddenly didn’t seem so crazy after all. Today the concept of a “Deep State,” perhaps because of its roots in Turkey, is much more believable and is seen as more plausible.

In an interview for his book The Road to 9/11, author Peter Dale Scott describes the “Deep State” saying:

It refers to a parallel secret government, organized by the intelligence and security apparatus, financed by drugs, and engaging in illicit violence, to protect the status and interests of the military against threats from intellectuals, religious groups, and occasionally the constitutional government. In this book, I adapt the term somewhat to refer to the wider interface in America between the public, the constitutionally established state, and the deep forces behind it of wealth, power, and violence outside the government. You might call it the back door of the Public state, giving access to dark forces outside the law.

Since the publishing of Scott’s book, the term “Deep State” has gained increased attention and now serves as a practical model to describe how the shadow government operates.

And as humanity continues to awaken to the political reality that surrounds us, the concept of the Deep State becomes more a reality and much less fictional than the idea of the “matrix”, though these two are very intricately related as we’ll see.

The Matrix refers to the illusory engineered pseudo-reality that many people live in. The Deep State is the apparatus that allows that engineered and artificial two-dimension reality to be put out by the control system for daily consumption by the masses.

In order to appreciate this relationship consider the quote from former CIA director William Casey in 1981 when he said that:

We’ll know our disinformation program is complete when everything the American public believes is false.

This is an example of how the Deep State, which is led by Intelligence and their control and manipulation of news, is at the root of the creation of the false engineered world of lies that many people live in. As we can see by the Casey comment, the goal is not to tell a few lies but to actually create an entire reality based on those lies (think Sandy Hook, Bin Laden death hoax, etc).

Manufacturing the 2-Dimensional Reality

What many people don’t realize is that this false world of lies and deceit which is presented to the masses as “reality” is nothing more than a series of two-dimensional items strung together by the controlled media to create an artificial reality. Like the individual frames in a movie reel, each frame seems insignificant until you look at all the frames in a timed sequence. The sequential frames then present an artificial perceived reality.

This is the reason why every time the controllers pull off a staged crisis actor event or a false flag attack like 9/11, those defending the event including the media never seem to think it’s important to provide actual evidence for their claims. That’s because the three-dimensional evidence that truth seekers ask for always conflicts with the two-dimensional presentation they are putting out. The organic presentation of the truth itself, however, is never two-dimensional. It is actual, concrete, multi-dimensional truth which can be reasonably, logically and scientifically verified in real-time on multiple levels and reproduced endlessly without government interference due to its realistic and often simplistic nature.

This is why the demand for “proof” of government and mainstream media claims surrounding false flags and staged events always tends to become the thing that gets truth seekers demonized, attacked, accused, and even profiled as a “harassers” and criminals.

I recently wrote about the attack on Truth that we are seeing today and how it’s not just Truth that is under attack but the very search for Truth. That’s because today, searching for truth is a direct threat to the Deep State, it’s hypnotic control of the masses and its web of lies that make up the matrix, which in turn is keeping people enslaved.

The last thing the ruling oligarchs want is for people to wake up from the matrix of lies which the Deep State has put in place. Thus identifying the Deep State then logically becomes the first step in all of this. Most people in the U.S. don’t realize the degree to which the CIA and the Pentagon are secretly controlling the illusion of government. Even in an election year like 2016, Americans continue to believe the illusion of choice and Democracy which is actually one of the most important features to the operation of the Deep State.

As I’ve written about recently, in 2016 too many Americans are going in circles, like Groundhog Day, believing the same exact lies and promises told to them by the puppet politicians who are running for president, not realizing that this is precisely how the Deep State works. They put out their puppets and pseudo-promises, they ratchet up the campaign hoopla, and they have the candidates tell you anything you want to hear before they select their next puppet president mouthpiece.

Though most Americans know full well that to repeatedly do the same thing over and over again while expecting different results constitutes insanity, they do this very thing each time a presidential election year comes around. These same Americans witness this process with their own eyes every 4 years; another election, another president, the same results.

The result every time is more war, billions of dollars to the Pentagon slush fund, more false flags to justify more wars, more corruption and less accountability from government officials who get caught lying and committing crimes, more lies and propaganda sold to us by CIA’s mainstream media, more police state and tyranny against the people, less freedoms, more staged mass shootings, more globalization and illegal trade agreements, more medical and scientific fraud and false claims to feed the pockets of the pharmaceutical industries and vaccine industries, and, among other things, bigger steps to get us closer and closer to the permanent establishment of a new world order to be sold as United Nations’ “sustainable” living and “global peace and prosperity.”

It is incredible to think that at the smallest level, all of this is possible because unaware and naive Americans continue to believe the phony, artificial and engineered two-dimensional reality presented to them every day by mainstream media and Hollywood. They continue to misconstrue fiction for reality.

That simple inability to discern two-dimensional proof of a claim (a picture, a video, an empty claim by mainstream media or politicians) from three-dimensional proof (all the factors that make a story true including the full collection of physical, and scientific easily reproducible proof, real non-crisis actor eyewitnesses, real blood, real logical spontaneously captured sequences of events, open investigations, etc.) now threatens the survival of the human race and is dooming humanity to a potentially very dark future. This is a future which only those who are awakened to the difference between the presented two-dimensional reality and the actual three-dimensional reality, can potentially save humanity from.

Because this is so, those who realize the reality of the Deep State are therefore the greatest threat to the plans of the ruling elite who run the Deep State. This is why so many online trolls and shills are actually paid to spread State propaganda, lies, create division, insert doubt about topics and post State-sponsored “rebuttals” to key arguments on blog sites and social media. This is why they are fighting so hard to control the Internet, to criminalize activists, and to profile them as “domestic extremists”. This is also why sports fans are mesmerized with pro-military propaganda commercials and fake military worship pre-game ceremonies. This is why so many video games have pro-military and pro-war components to them. This is also why America is always told to “honor” the military. That’s because the military and the Intelligence is the enforcement arm of this evil Deep State. But they do know that as long as they deliver you entertainment, laughter and fun times, you’ll never question what or who the Deep State is. To the blind sheep it’s not something worth interrupting their life to believe, to try to recognize or to find answers for.

In the end, you can call it whatever you want but it’s still the matrix of lies we live in. It operates simultaneously with reality. It looks, feels and tastes real even though it is not. Can you taste it? Can you feel it? It’s all around us as we speak, but whether you see it for what it is, is entirely up to you.

Keep Fear Alive

DHSFEAR3

The bald-eagle boondoggle of the terror wars

By Kade Crockford

Source: The Baffler

“If you’re submitting budget proposals for a law enforcement agency, for an intelligence agency, you’re not going to submit the proposal that ‘We won the war on terror and everything’s great,’ cuz the first thing that’s gonna happen is your budget’s gonna be cut in half. You know, it’s my opposite of Jesse Jackson’s ‘Keep Hope Alive’—it’s ‘Keep Fear Alive.’ Keep it alive.”

—Thomas Fuentes, former assistant director, FBI Office of International Operations

Can we imagine a free and peaceful country? A civil society that recognizes rights and security as complementary forces, rather than polar opposites? Terrorist attacks frighten us, as they are designed to. But when terrorism strikes the United States, we’re never urged to ponder the most enduring fallout from any such attack: our own government’s prosecution of the Terror Wars.

This failure generates all sorts of accompanying moral confusion. We cast ourselves as good, but our actions show that we are not. We rack up a numbing litany of decidedly uncivil abuses of basic human rights: global kidnapping and torture operations, gulags in which teenagers have grown into adulthood under “indefinite detention,” the overthrow of the Iraqi and Libyan governments, borderless execution-by-drone campaigns, discriminatory domestic police practices, dragnet surveillance, and countless other acts of state impunity.

The way we process the potential cognitive dissonance between our professed ideals and our actual behavior under the banner of freedom’s supposed defense is simply to ignore things as they really are. They hate us for our freedom, screech the bald-eagle memes, and so we must solemnly fight on. But what, beneath the official rhetoric of permanent fear, explains the collective inability of the national security overlords to imagine a future of peace?

Incentives, for one thing. In a perverse but now familiar pattern, what we have come to call “intelligence failures” produce zero humility, and no promise of future remedies, among those charged with guarding us. Instead, a new array of national security demands circulate, which are always rapidly met. In America, the gray-haired representatives of the permanent security state say their number one responsibility is to protect us, but when they fail to do so, they go on television and growl. To take but one recent example, former defense secretary Donald Rumsfeld appeared before the morally bankrupt pundit panel on MSNBC’s Morning Joe to explain that intractable ethnic, tribal, and religious conflict has riven the Middle East for more than a century—the United States, and the West at large, were mere hapless bystanders in this long-running saga of civilizational decay. This sniveling performance came, mind you, just days after Politico reported that, while choreographing the run-up to the 2003 invasion of Iraq, Rumsfeld had quietly buried a report from the Joint Chiefs of Staff indicating that military intelligence officials had almost no persuasive evidence that Saddam Hussein was maintaining a serious WMD program. Even after being forced to resign in embarrassment over the botched Iraq invasion a decade ago, Rumsfeld continues to cast himself as an earnestly outmanned casualty of Oriental cunning and backbiting while an indulgent clutch of cable talking heads nods just as earnestly along.

And the same refrain echoes throughout the echelons of the national security state. Self-assured and aloof as the affluenza boy, the FBI, CIA, and NSA fuck up, and then immediately apply for a frenzied transfer of ever more money, power, and data in order to do more of what they’re already doing. Nearly fifteen years after the “Global War on Terror” began, the national security state is a trillion-dollar business. And with the latest, greatest, worst-ever terrorist threat always on the horizon, business is sure to keep booming.

The paradox produces a deep-state ouroboros: Successful terrorist attacks against the West do not provoke accountability reviews or congressional investigations designed to truly understand or correct the errors of the secret state. On the contrary, arrogant spies and fearful politicians exploit the attacks to cement and expand their authority. This permits them, in turn, to continue encroaching on the liberties they profess to defend. We hear solemn pledges to collect yet more information, to develop “back doors” to decrypt private communications, to keep better track of Muslims on visas, send more weapons to unnamed “rebel groups,” drop more cluster bombs. Habeas corpus, due process, equal protection, freedom of speech, and human rights be damned. And nearly all the leaders in both major political parties play along, like obliging extras on a Morning Joe panel. The only real disagreement between Republican and Democratic politicians on the national stage is how quickly we should dispose of our civil liberties. Do we torch the Bill of Rights à la Donald Trump and Dick Cheney, or apply a scalpel, Obama-style?

Safety Last

Both Democrats and Republicans justify Terror War abuses by telling the public, either directly or indirectly, that our national security hangs in the balance. But national security is not the same as public safety. And more: the things the government has done in the name of preserving national security—from invading Iraq to putting every man named Mohammed on a special list—actually undermine our public safety.

That’s because, as David Talbot demonstrates in The Devil’s Chessboard, his revelatory Allen Dulles biography and devastating portrait of a CIA run amok, national security centers on “national interests,” which translates, in the brand of Cold War realpolitik that Dulles pioneered, into the preferred policy agendas of powerful corporations.

Public safety, on the other hand, is concerned with whether you live or die, and how. Any serious effort at public safety requires a harm-reduction approach acknowledging straight out that no government program can foreclose the possibility of terroristic violence. The national security apparatus, by contrast, grows powerful in direct proportion to the perceived strength of the terrorist (or in yesterday’s language, the Communist) threat—and requires that you fear this threat so hysterically that you release your grip on reason. Reason tells you government cannot protect us from every bad thing that happens. But the endlessly repeated national security meme pretends otherwise, though the world consistently proves it wrong.

When it comes to state action, the most important distinction between what’s good for public safety (i.e., your health) and what’s good for national security (i.e., the health of the empire, markets, and prominent corporations) resides in the concept of the criminal predicate. This means, simply, that an agent of the government must have some reasonable cause to believe you are involved with a crime before launching an investigation into your life. When the criminal predicate forms the basis for state action, police and spies are required to focus on people they have reason to believe are up to no good. Without the criminal predicate, police and spies are free to monitor whomever they want. Police action that bypasses criminal predicates focuses on threats to people and communities that threaten power—regardless of whether those threats to power are fully legal and legitimate.

Nearly fifteen years after the “Global War on Terror” began, the national security state is a trillion-dollar business.

We can see the results of this neglect everywhere the national security state has set up shop. Across the United States right now, government actors and private contractors paid with public funds are monitoring the activities of dissidents organizing to end police brutality and the war on drugs, Israeli apartheid and colonization in Palestine, U.S. wars in the Middle East, and Big Oil’s assault on our physical environment. In the name of fighting terrorism, Congress created the Department of Homeland Security, which gave state and local law enforcement billions of dollars to integrate police departments into the national intelligence architecture. As a result, we now have nearly a million cops acting as surrogates for the FBI. But as countless studies have shown, the “fusion centers” and intelligence operations that have metastasized under post-9/11 authorities do nothing to avert the terror threat. Instead, they’ve targeted dissidents for surveillance, obsessive documentation, and even covert infiltration. When government actors charged with protecting us use their substantial power and resources to track and disrupt Black Lives Matter and Earth First! activists, they are not securing our liberties; they’re putting them in mortal peril.

Things weren’t always like this. Once upon a time, America’s power structure was stripped naked. When the nation saw the grotesque security cancer that had besieged the body politic in the decades after World War II (just as Harry Truman had warned it would) the country’s elected leadership reasserted control, placing handcuffs on the wrists of the security agencies. This democratic counterattack on the national security state not only erected a set of explicit protocols to shield Americans from unconstitutional domestic political policing, but also advanced public safety.

Mission Creeps

As late as the 1970s, the FBI was still universally thought to be a reputable organization in mainstream America. The dominant narrative held that J. Edgar Hoover’s capable agents, who had to meet his strict height, weight, and dress code requirements, were clean-cut, straight-laced men who followed the rules. Of course, anyone involved with the social movements of that age—anti-war, Communist, Black Power, American Indian, Puerto Rican Independence—knew a very different FBI, but they had no evidence to prove what they could see and feel all around them. And since this was the madcap 1970s, the disparity between the FBI’s glossy reputation as honest crusaders and its actual dirty fixation on criminalizing the exercise of domestic liberties drove a Pennsylvania college physics professor and anti-war activist named William Davidon to take an extraordinary action. On the night of the Muhammad Ali vs. Joe Frazier fight of March 8, 1971, Davidon and some friends broke into an FBI office in Media, Pennsylvania. They stole every paper file they could get their hands on. In communiqués to the press, to which they attached some of the most explosive of the Hoover files, they called themselves the Citizens’ Commission to Investigate the FBI.

Not one of the costly post-9/11 surveillance programs based on suspicionless, warrantless monitoring stopped Tsarnaev from blowing up the marathon.

When Davidon and his merry band of robbers broke into the FBI office, they blew the lid off of decades of secret—and sometimes deadly—police activity that targeted Black and Brown liberation organizers in the name of fighting the Soviet red menace. According to Noam Chomsky, the Citizens’ Commission concluded that the vast majority of the files at the FBI’s Media, Pennsylvania, office concerned political spying rather than criminal matters. Of the investigative files, only 16 percent dealt with crimes. The rest described FBI surveillance of political organizations and activists—overwhelmingly of the left-leaning variety—and Vietnam War draft resisters. As Chomsky wrote, “in the case of a secret terrorist organization such as the FBI,” it was impossible to know whether these Pennsylvania figures were representative of the FBI’s national mandate. But for Bill Davidon and millions of Americans—including many in Congress who were none too pleased with the disclosures—these files shattered Hoover’s image as a just-the-facts G-man. They proved that the FBI was not a decent organization dedicated to upholding the rule of law and protecting the United States from foreign communist threats, but rather a domestic political police primarily concerned with preserving the racist, sexist, imperialist status quo.

In a cascade of subsequent transparency efforts, journalists, activists, and members of Congress all probed the darker areas of the national security state, uncovering assassination plots against foreign leaders, dragnet surveillance programs, and political espionage targeting American dissidents under the secret counterintelligence program known as COINTELPRO. Not since the birth of the U.S. deep state, with the 1947 passage of the National Security Act, had the activities of the CIA, FBI, or NSA been so publicly or thoroughly examined and contested.

Subsequent reforms included the implementation of new attorney general’s guidelines for domestic investigations, which, for the first time in U.S. history, required FBI agents to suspect someone of a crime before investigating them. Under the 1976 Levi guidelines, named for their author, Nixon attorney general Edward Levi, the FBI could open a full domestic security investigation against someone only if its agents had “specific and articulable facts giving reason to believe that an individual or group is or may be engaged in activities which involve the use of force or violence.” The criminal predicate was now engraved in the foundations of the American security state—and the Levi rules prompted a democratic revolution in law enforcement and intelligence circles. It would take decades and three thousand dead Americans for the spies to win back their old Hoover-era sense of indomitable mission—and their investigative MO of boundless impunity.

False Flags

In the years following the 9/11 attacks, the Bush administration began Hoovering up our private records in powerful, secret dragnets. When we finally learned about the warrantless wiretapping program in 2005, it was a national scandal. But just as important, and much less discussed, was the abolition of Levi’s assertion of the criminal predicate. So-called domestic terrorism investigations would be treated principally as intelligence or espionage cases—not criminal ones. This shift has had profound, if almost universally ignored, implications.

Michael German, an FBI agent for sixteen years working undercover in white supremacist organizations to identify and arrest terrorists, saw firsthand what the undoing of the 1970s intelligence reforms meant for the FBI. And German argues, persuasively, that the eradication of the criminal predicate didn’t just put Americans at risk of COINTELPRO 2.0. It also threatened public safety. The First and Fourth Amendments, which protect, respectively, our rights to speech and association and our right to privacy, don’t just create the conditions for political freedom; they also help law enforcement focus, laser-like, on people who have the intent, the means, and the plans to harm the rest of us.

Think of it like this, German told me: You’re an FBI agent tasked with infiltrating a radical organization that promotes violence as a means of achieving its political goals—the Ku Klux Klan, for example. KKK members say horrible and disgusting things. But saying disgusting things isn’t against the law; nor, as numerous studies have shown, is it a reliable predictor of whether the speaker will commit an act of political violence. When surrounded by white supremacists constantly spouting hate speech, a law enforcement officer has to block it out. If he investigates people based on their rhetoric, his investigations will lead nowhere. After all, almost no white supremacist seriously intending to carry out a terrorist attack is all that likely to broadcast that intent in public. (Besides, have you noticed how many Americans routinely say disgusting things?)

Today, more than a decade after it shrugged off the Levi guidelines, the FBI conducts mass surveillance directed at the domestic population. But dragnet surveillance, however much it protects “national security,” doesn’t increase public safety, as two blue-ribbon presidential studies have in recent years concluded. Indeed, the Boston bombings, the Paris attacks, and the San Bernardino and Planned Parenthood shootings have all made the same basic point in the cold language of death. The national security state has an eye on everyone, including the people FBI director James Comey refers to as “the bad guys.” But despite its seeming omniscience, the Bureau does not stop those people from killing the rest of us in places where we are vulnerable.

The curious case of Boston Marathon bomber Tamerlan Tsarnaev demonstrates the strange consequences of sidelining criminal investigations for national security needs. In 2011, about eighteen months before the bombings, Tsarnaev’s best friend and two other men were murdered in a grisly suburban scene in Waltham, Massachusetts—their throats slashed, marijuana sprinkled on their mutilated corpses. These murders were never solved. But days after the marathon bombings, law enforcement leaked that they had forensic and cellphone location evidence tying Tamerlan Tsarnaev to those unsolved crimes. Not one of the costly post-9/11 surveillance programs based on suspicionless, warrantless monitoring stopped Tsarnaev from blowing up the marathon. But if the police leaks were correct in assigning him responsibility for the 2011 murders, plain old detective work likely would have.

If security agencies truly want to stop terrorism, they should eliminate all domestic monitoring that targets people who are not suspected of crimes. This would allow agents to redirect space and resources now devoted to targeting Muslims and dissidents into serious investigations of people actually known to be dangerous. It’s the only reasonable answer to the befuddling question: Why is it that so many of these terrorists succeed in killing people even though their names are on government lists of dangerous men?

After the terrorist attacks in November, the French government obtained greater emergency powers in the name of protecting a fearful public. Besides using those powers to round up hundreds of Muslims without evidence or judicial oversight, French authorities also put at least twenty-four climate activists on house arrest ahead of the Paris Climate Change Conference—an approach to squashing dissent that didn’t exactly scream liberté, and had nothing to do with political violence. As with the Boston Marathon and countless other attacks on Western targets, the men who attacked the Bataclan were known to intelligence agencies. In May 2015, months before the attacks in Paris, French authorities gained sweeping new surveillance powers authorizing them to monitor the private communications of suspected terrorists without judicial approval. The expanded surveillance didn’t protect the people of Paris. In France, as in the United States, the devolution of democratic law enforcement practice has opened up space that’s filled with political spying and methods of dragnet monitoring that enable social and political control. This is not only a boondoggle for unaccountable administrators of mass surveillance; it also obstructs the kind of painstaking detective work that might have prevented the attacks on the Bataclan and the marathon.

Our imperial government won’t ever admit this, but we must recognize that the best method for stopping terrorism before it strikes is to stop engaging in it on a grand scale. Terrorist attacks are the price we pay for maintaining a global empire—for killing a million Iraqis in a war based on lies, for which we have never apologized or made reparations, and for continuing to flood the Middle East with weapons. No biometrics program, no database, no algorithm, no airport security system will protect us from ourselves.

Clinton Does Best Where Voting Machines Flunk Hacking Tests: Hillary Clinton vs. Bernie Sanders Election Fraud Allegations

1015636467

By Doug Johnson Hatlem

Source: CounterPunch

At the end of the climactic scene (8 minutes) in HBO’s Emmy nominated Hacking Democracy (2006), a Leon County, Florida Election official breaks down in tears. “There are people out there who are giving their lives just to try to make our elections secure,” she says. “And these vendors are lying and saying everything is alright.” Hundreds of jurisdictions throughout the United States are using voting machines or vote tabulators that have flunked security tests. Those jurisdictions by and large are where former Secretary of State Hillary Clinton is substantially outperforming the first full wave of exit polling in her contest against Senator Bernie Sanders.

CounterPunch has interviewed hackers, academics, exit pollsters, and elections officials and workers in multiple states for this series taking election fraud allegations seriously. The tearful breakdown in Hacking Democracy is not surprising. There is a well-beyond remarkable gap between what security experts and academics say about the vulnerability of voting machines and the confidence elections experts and academics, media outlets, and elections officials place in those same machines.

In Leon County, Bev Harris’ Black Box Voting team had just demonstrated a simple hack of an AccuVote tabulator for bubble-marked paper ballots. Ion Sancho, Leon County’s Supervisor of Elections, also fights back tears in the Hacking Democracy clip: “I would have certified this election as a true and accurate result of a vote.” Sancho adds, “The vendors are driving the process of voting technology in the United States.”

In 2010, and this reminder will pain those of you who can remember when Nate Silver’s outfit did real data journalism rather than primarily yay-Clinton boo-Trump punditry, a FiveThirtyEight column argued that hacking was one of two possibilities for statistical anomalies in a Democratic Senate primary in South Carolina: “B. Somebody with access to software and machines engineered a very devious manipulation of the vote returns.”

Joshua Holland’s column in The Nation “debunking” claims of election fraud benefiting Clinton rests its case on a simple proposition: why would Clinton need to cheat when she was winning anyway? Apparently, Mr. Holland has never heard of an obscure American politician named Richard Nixon.

More importantly, entering the South Carolina primary, the pledged delegate count was 52-51. CNN’s poll two weeks out projected an 18 point Clinton win. Ann Selzer, the best pollster in the United States, projected a 22 point Clinton win. RealClearPolitics’ polling average projected a 27.5% win. FiveThirtyEight was much bolder in projecting a 38.3% Clinton win. The early full exit poll said Clinton had won by 36%, pretty close to FiveThirtyEight’s call. Tellingly, white people in that exit poll went for Sanders 58-42. But the final results said Clinton won by 47.5%, an 11.5% exit polling miss. And the exit polls had to adjust their initial figures to a 53-47 Clinton win with white Democrats in South Carolina.

Three days after South Carolina’s primary, Clinton seriously outperformed her exit polling projections again in a bunch of states on Super Tuesday, including Massachusetts where she went from a projected 6.6% loss to a 1.4% win. Super Tuesday set the narrative that Sanders had no chance of beating Clinton in pledged delegates.

Correlating Exit Polling Misses and Bad Machines

Let’s be clear: yes, correlation does not equal causality. What strong correlation does do, however, is set the agenda for reasonable investigation. Mocking fraud claims where there is a strong correlative case and actual evidence of potential vote tampering in places like Arizona, New York, and Chicago is precisely the kind of thing that has seen confidence in media outlets plummet to an all-time low. Just 6% of people in the U.S., about the same number as for Congress, have high confidence that media are unbiased and accurate.

Meanwhile, according to a September 2015 study (.pdf) by the Brennan Center for Justice at New York University’s School of Law, South Carolina uses all machines more than ten years old. In fact, drawing on the source of the Brennan Center report over at Verified Voting, South Carolina uses provably hackable voting machines without a verified paper trail. Virtually all counties in South Carolina use two machines in particular – Electronic Systems and Software’s (ES&S) iVotronic, a touch screen voting machine without a paper trail, and ES&S’s Model 100, used to tabulate absentee and provisional ballots.

Kim Zetter, the best reporter on hacking and computer security at Wired Magazine, delved into the Brennan Center report with an article entitled “The Dismal State of America’s Decade-Old Voting Machines.” Zetter noted that in 2002, after the Bush v. Gore disaster, Congress passed the Help America Vote Act (HAVA) with billions of dollars available for counties throughout the U.S. to upgrade to new voting machines. Zetter then hits the critical point for discussion of election fraud allegations in the Democratic presidential primary:

But many of the machines installed then, which are still in use today, were never properly vetted—the initial voting standards and testing processes turned out to be highly flawed—and ultimately introduced new problems in the form of insecure software code and design.

Things are dismal, yes, but they are not evenly so. As this map from the Brennan Center report shows, there are just a few states that are as bad off as South Carolina (all machines ten years old or greater). But there are also just as few states that are relatively well off with all machines newer than ten years old.

state-by-state-10-year-old-voting-machines

Of the nine places where the exit polling has missed by more than 7% (South Carolina, Alabama, Georgia, Massachusetts, Tennessee, Texas, Mississippi, Ohio, New York), two-thirds are states where all or the majority of election jurisdictions are using machines ten years old or greater. For these six states the average initial exit polling miss is a whopping 9.98%. From my column on exit polling misses last week, the average exit polling miss in Clinton’s favor is 5.1%. For the three states (Oklahoma, New York, Maryland) for which there is polling and for which all election jurisdictions use machines less than ten years old (gray in the map), the average is just a 1.67% miss in Clinton’s favor. Now take note, this 1.67% average includes New York with its huge miss in Clinton’s favor. Alabama is also worth looking at, with a minority of jurisdictions having machines more than ten years old, because I have been using an “Alabama Test” to see whether theories for the exit polling misses make sense.

I put figures like this to exit pollster and Executive Vice President of Edison Research Joe Lenski for question 10, which I’d previously left out of the published version of the interview I completed with him. I wanted to know whether the gap in exit polling misses raised any red flags. Here was Lenski’s reply:

The reliability of vote equipment is a true concern but I don’t see any evidence how the concentration of older voting machines in certain states would have affected either candidate more than the other.  There are many examples of vote count errors.  Here is a link reporting a recent vote count error in the Michigan primary that inflated Ted Cruz’s vote by 3000 votes  http://uselectionatlas.org/WEBLOGS/dave/ .  These types of errors are discovered all the time but there is no evidence that these are anything more than mistakes by local election officials – not a systematic attempt to affect a single candidate’s vote totals.  This reminds me of theories after the 2008 New Hampshire Democratic Primary based upon the fact that Hillary Clinton did better in towns with voting machines while Barack Obama did better in towns that voted on paper.  That was simply an artifact of the demographics in New Hampshire of the towns that had voting machines versus those that voted on paper.  Again the states with older voting machines in 2016 may just be the same states with demographics that favored Hillary Clinton over Bernie Sanders.

But again, as I argued last Wednesday, the demographics by state and other proposed reasons for exit polling misses do not actually add up. Big misses have happened in the South, in Massachusetts, and also in Ohio where Sanders otherwise did quite well in the Midwest. Nor do age or early voting patterns predict exit polling misses. Still, what is most remarkable about Lenski’s statement is that he is one of the few non-tech experts we spoke with who recognized that the “reliability of voting equipment is a true concern.”

None of the three elections academics I spoke with for last Wednesday’s piece appeared to be familiar with the Brennan Center report on aging and vulnerable machines, and Antonio Gonzalez, an exit polling expert and Latino voter registration guru who called for parties not to seat Arizona’s delegations in last Thursday’s piece, seemed a bit floored when I presented him with question ten from my interview with Lenski. “Oh,” he said, “I thought Congress was supposed to have taken care of that with HAVA.” HAVA, as noted earlier, offered money from 2002 to 2006 for states to upgrade to the then latest and greatest voting technology.

At this point we should take a look at the proven flaws in four very old and hackable machines in particular. These machines or similar elderly and vulnerable machines are in use in almost all places where Clinton outperforms exit polling most substantially. Because I am taking evidence and counter-evidence seriously, we will also look at the machines used in New York City, which are not quite so old (about six or seven years). While those machines, ES&S’s DS200, have had several problems over the years of the type suggested by Lenski, they also have not verifiably flunked independent security tests, so far as I know.

AccuVote (TS, OS, TSX models)

AccuVote technology is among the worst of the worst. This is the Diebold technology hacked in the Hacking Democracy clip. It is more than ten years old, can be hacked in such a way that even those models (OS, TSX) with a paper trail can be tricked, and it is in use throughout Georgia (12.2% miss) and in more than 300 counties or other election jurisdictions in more than 20 states.

AVC Edge and Edge II  (from my column on Chicago Friday)

The AVC Edge and Edge II (with paper trail) were provably hacked by a “Red Team” from UC Santa Barbara hired by the State of California in 2008. Jim Allen, spokesman for the Chicago Board of Elections, called and emailed to complain after my article last Friday. He dismissed the suggestion that Edge II could be hacked because of the paper trail. Not only is this laughable since his team engaged in a wildly inaccurate audit of the paper trail from the Chicago Democratic primary, but Allen apparently failed to click on the linkregarding the UCSB Red Team test that I included in the article. The first paragraph of that article notes that Edge machines, “even those with a so-called Voter Verified Paper Trail” can be successfully hacked by a single person. AVC Edge machines are in use without a paper trail throughout Louisiana (where there were no exit polls but where Clinton seriously outperformed her pre-election day polling average) and in more than 130 counties in various other states.

Model 100 (from ES&S)

Model 100 also badly flunked (.pdf) the California “Red Team” test in 2008. Like the other machines in this list, it is hackable in a way that spreads virally to other machines in the same network. Hundreds of jurisdictions still use Model 100 to tabulate votes, including especially Wayne County (Detroit), 27 counties in Ohio, 9 counties in Tennessee, 78 counties in Texas, and many more that match very well with where Clinton has outperformed exit polls.

iVotronic (ES&S)

iVotronic machines are touchscreen voting machines, many without a paper trail. iVotronic machines flunked a University of Pennsylvania test in 2007 and are the precise machines in question in the previous suspicious Democratic primary results in South Carolina in 2010. They continue to be used throughout South Carolina (no paper trail) and in hundreds of counties in states where Clinton has suspiciously overperformed exit polling.

DS200

DS200 machines have had a wide variety of malfunctioning problems, particularly in New York City, but those problems can and mostly have been addressed in places like New York City by retraining poll workers to check immediately whether each voters’ vote was counted and then offering a new chance to vote if necessary. As stated, the DS200 has not been provably hacked so far as I know. Newer machines of this sort were put into use just this year in Maryland where the overall exit polling missed in Sanders favor, for once, but by just 0.6 points. Still, the votes in Baltimore County have now been decertifiedbecause, among other things, there were more votes than voters who checked in at the polls. In Maryland, the DS200 machines are all networked to a statewide system for tabulating votes quickly. Networking, however, is not required, and my best information suggests that networking is not how the DS200 is used in New York City. Instead, precinct workers pull the results off the machine at the end of the voting day and relay them to county headquarters, according to my discussions with a poll worker from Brooklyn.

What About the Exceptions to This Correlation?

But we also would have to deal with where there are exceptions to this strong correlation between hackable machines and Clinton beating the exit polling badly. Here’s where my conversation with a particular veteran hacker comes into play. I chatted securely with a long-time member of Anonymous whom I’ll call the King of SciAm (not the handle they use publicly or privately). The King of SciAm has long worked with the Telecommix branch of Anonymous. Telecommix rose to fame when Hosni Mubarak cut off internet access in Egypt during the Arab Spring uprising. Telecommix found work-arounds via dial-up internet to keep information from activists on the ground flowing out of Egypt. As a general rule, Telecommix does not take part in Anonymous leaks or website shutdowns and defacements, but they made an exception to that rule early in this campaign cycle. Telecommix members defaced Donald Trump’s website with a tribute to Jon Stewart upon his retirement. The New Yorker’s Alex Koppleman called it the “classiest website hack ever,” a compliment the King of SciAm relishes.

The King of SciAm emphasized to me that, if hired to hack an election (which they would never do), the first thing they would do would be to figure out the best way to leave no trace: “we’d target the network packets or their headwater.” The key idea being for “a hack to survive the security audit trail after the vote is certified.” Furthermore, “we would likely try to target the thing most likely to get it’s logs wiped first – so – whatever it plugs into to move the data. Are the voting machines in use network connected?”

The King of SciAm told me that targeting old, provably hackable machines is “not an unfair theory,” but “you asked how (if we did these sort of things) we would do them.” The problem, they noted, “is that any change to the voting machine operating system or driver stack will likely be found in the security auditor’s rotation pretty quickly. This is because once the machines are down (end of election day) – they are no longer accessible to revert any source code changes or wipe any logs that said you were there, unless you’ve written STUXnet – in which case you wouldn’t be targeting the booth machines either.”

The King of SciAm was not at all surprised that sloppy hackers may be targeting older machines in places like South Carolina and Chicago, nor that elections officials were cluelessly trusting those machines and not even properly following procedures that could catch a less sophisticated hack.

So if, instead of targeting the DS200 in New York, hackers had targeted further upstream in the voting ecosystem, how would you catch it? The King of SciAm noted that you would have to use some procedure to “match 100% of the data, not 5%,” as in Chicago.

To do this, you would need to use a methodology much more like that used in the FiveThirtyEight article on irregularities in the South Carolina 2010 primary election. There, FiveThirtyEight referred to a Benford’s law test on precinct level results. That test showed an “unusual, non-random pattern in the precinct-level results suggest[ing] tampering, or at least machine malfunction, perhaps at the highest level.”

Intriguingly, after I began this series on election fraud allegations, a reader who would like to remain anonymous, emailed to point out similar irregularities in New York’s Democratic primary this year:

Results for Kings County and Bronx county [show] deviation from perfect 60-40 and 70-30 results was the same 0.035% The increase in votes in Kings (Brooklyn) from 2008 is incredible, almost a perfect 10%. Not only that but that’s where over a 100,000 voters lost their right to vote. Another 20,000 votes in Kings would mean almost a 20% increase which would be amazing compared to other counties that experienced decreases or mild increases. 

Furthermore, the overall results in New York, as announced on election night, deviated from a perfect 58-42 split “by 0.005345%. That’s 97 votes out of over 1.8 million.” Will FiveThirtyEight apply a Benford’s law test to 2016 primary results? Not a chance. They have boosted Clinton throughout and are already quite embarrassed by how badly they missed on the GOP side with Donald Trump.

But what about our test? The “Alabama Test.” What’s good for the goose is good for the gander. Alabama only has a minority of jurisdictions using old, provably hackable machines. Is that a weak correlation for the theory that in most places sloppy hackers targeted old, provably vulnerable machines while apparently more sophisticated hackers would have had to have been involved with targeting New York’s results as well as registration switching operations in a wide variety of states?

Taking a look at Alabama on a county level gives us a fairly strong answer. Most of Alabama’s counties also use hand cast ballots tabulated by the DS200, but a minority use Model 100, one of our flunked election machines. Three of the flunked Model 100 counties, however, are three of the four biggest counties in Alabama (Jefferson, Mobile, and Montgomery) and accounted for around 40% of the vote for Democrats in Alabama. Clinton won by a 64.2% spread in Jefferson, by 66.5% in Mobile, and by a stunning 73.4% in Montgomery. What happened in Madison, the one county of the top four by population that votes using the DS200 model? Clinton won by just a 38.5% spread! In fact, Clinton did not make it to 80% of the vote in any of the top twelve counties by population except for those three counties using Model 100 to tabulate votes.

And controlling for factors like African American voters or wealth does not account for this phenomenon. Take for instance Mobile where the population is 35.3% black versus a 24.6% black population in Madison County. A 10% difference in black population does not account for a 28% difference in the Clinton-Sanders spread. What’s more, if you compare Mobile to a very similar county in North Carolina (where the exit polls did not really miss), you see something similarly telling.

Cumberland County, NC is very comparative to Mobile, Alabama. They have similar populations, similar numbers of black residents (with Cumberland slightly higher at 37.6% African American), very similar per capita income figures, and both counties had about 35,000 Democratic voters. Clinton won Cumberland by 32.8%, very close to the Madison County (DS200 model) results and about half the percentage spread Clinton saw in Mobile (Model 100).

Of the theories we have so far for why exit polling missed in Alabama by a huge 14%, the only theory that provides a reasonable explanation is vote tabulating machine tampering. Now, perhaps someone else will come up with a non-fraudulent exit polling miss theory that passes the Alabama Test and explains other states as well. Such a theory cannot be about early voting (Alabama had none) and over-projecting young voters (there were very few according to exit polls of Alabama).

Until someone comes up with such a workable theory, election fraud benefiting Hillary Clinton to the tune of a 120 to 150 pledged delegate difference, is the best explanation we have. People wanting to prove this theory should be suing for a technologically sophisticated and independent review of results and the voting results’ entire computer ecosystems in places like Ohio, South Carolina, Alabama, Boston, Chicago, New York, and many others.

Part 1: Taking Election Fraud Allegations Seriously
Part 2: Debunking Some Election Fraud Allegations
Part 3: In-depth Report on Exit Polling and Election Fraud Allegations
An Interview With Lead Edison Exit Pollster Joe Lenski
Part 4: Purged, Hacked, Switched
Part 5: Chicago Election Official Admits “Numbers Didn’t Match”

Doug Johnson Hatlem is best known for his work as a street pastor and advocate with Toronto’s homeless population from 2005-2013. He is now a film producer and free-lance writer based in Chicago.

Govt-Hollywood Complex to Sell “Patriotic” Martial Law Lockdown in New Boston Bombing Films

qefgtrhy

By Berie Suarez

Source: Truth and Art TV

A massive wave of government propaganda is coming and the method of transmission will be Hollywood. Hollywood is one of the most important brainwashing tools to keep the masses ignorant of reality and government corruption. And as we’ve seen in the past, it is designed to reinforce numerous government lies the masses are supposed to believe. Whenever Hollywood releases a film endorsing a government narrative it usually represents the final phase of a false flag, staged event narrative being sold.

Remember what former CIA director William Casey said. Until EVERYTHING that everyone believes is a lie, the control system feels they are not done lying to you yet.

When it comes to propaganda Hollywood operates under a different set of rules as they have the liberty to fictionally represent a story under the guise of “entertainment” without having to be accurate about what really happened. A close look at this issue reveals how powerful and effective the Hollywood-Government complex is at cementing massive government lies in the psyche of the general public.

So it shouldn’t surprise us that it is being reported that Hollywood producers are in race to put out not one but two films about the Boston bombing hoax staged in April of 2013 featuring numerous crisis actors. One film “Patriots Day” will serve to not only reinforce the Boston bombing staged event but to glorify “lockdown” and deceive viewers into worshiping police and psychologically re-accepting that lockdown was necessary to catch the “bad guys”, thus serving to authenticate future lockdowns as necessary as well. Another film being scheduled for release this year “Boston Strong” is also based on the Boston bombing false flag event and the concept of heroism. Both films appear to correlate “strength” with obedience to lockdown as well as “patriotism” and obedience to lockdown, and both are psychological operations on the general public being likely secretly funded by the state.

So without any shame, the storyline behind Patriots Day admits the idea is to sell the manhunt against the Tsarnaev accused patsy brothers itself and the lockdown of Watertown which ensued. The lockdown itself seems to be the focus of the emotion and heroism in these movies more so than the overall false flag narrative which has been debunked and exposed on many levels.

The story of course, is told by lucky Ed Davis, the commissioner that just so happened to get a phone call right at the time of the pressure cooker detonation, and like lucky Larry Silverstein on 9/11 he wasn’t blown up. Davis was just as “lucky” as all those “Craft International” operatives clearly seen all over the place with suspicious backpacks and communicating suspiciously before during and after the explosion.

Commissioner Davis, who was right there are the marathon finish line and walked away to take a phone call moments before the blast occurred, played an integral role working with the FBI, Watertown Police Department, Boston Police Department, Massachusetts State Police and local first responders to track, identify and apprehend the suspected bombers. Their tactics included the use of sophisticated identity technology (they actually discovered the murderers acting differently than the crowd) and giving the historic order to put the city of Boston on lockdown as they rushed to catch the suspects.

The story is envisioned as an intense thriller, spanning the five-day search up to the infamous siege where Dzhokhar Tsarnaev was pulled from a boat in Watertown. Three lost their lives at the Marathon blast site, 264 were injured, and a police officer was killed and several injured in the shootout that ended in the death of Tsarnaev’s older brother, Tamerlan. The younger mass murderer is currently on trial. Victims were eulogized in a touching ceremony at Fenway Park, something that most certainly will be part of each of those feature films, including an unforgettable exhortation of defiance by Red Sox slugger David Ortiz.

This is a clever attempt to appeal to everyone’s emotional and “patriotic” feelings, 9/11 Bush Jr style, while selling them that martial law lockdown is somehow “patriotic” because it helped catch the bad guys.

“There is nothing more compelling than a real story populated by real heroes,” said CBS Films President Terry Press. “The team that we have assembled for this project is determined to give audiences a very personal look at what occurred during the days when the eyes of the world were on the city of Boston and how a group of contemporary patriots faced this crisis.”

Anyone who cares about truth, freedom, and morality should be outraged by this in-your-face propaganda. This also serves as a warning of things to come. Very likely they are rushing these two films because something is coming and they need to condition the masses for a major lockdown.

I’m calling for readers to help take a stand against “lockdown” now before it’s too late. I’m currently in the process of researching how to properly draft a petition that can be used broadly across the U.S. to demand that lockdown is criminalized as illegal, not to mention it’s an ineffective and unproven tactic for catching law breakers. If anyone wants to help and contribute to the process please do or by all means carry out the idea yourself.

This entire effort by the Hollywood-Government complex to expedite the production of these two films which will glorify lockdown should concern everyone. Ask yourself: Why are they moving so fast to glorify lockdown? And why now? I’m sure we’ll soon find out.

Pugnacious Parasites and the Provocation

insane_people

By Zen Gardner

Source: ZenGardner.com

Everyone knows the unscrupulously manipulative always accuse others of what they themselves are guilty of. It’s an age old trick to obfuscate the obvious and buy time to accomplish their purposes.

Lying is their pathological language.

Such behavior, especially in high profile public figures, is unthinkable, yet for some inexplicable reason it is not just tolerated, but ironically readily expected.

People still buy into it. And the reaction always remains the same. Complacency on the most part, and a rising sense of anger in others. No doubt a byproduct of cognitive dissonance and range of other deliberately triggered mechanisms, but surreal just the same.

A Bald Faced Lie is a Punch in the Face

This is essentially what transpires when someone knowingly lies to your face. It jars your mind and pushes you back on the defensive and you’re left to try and understand why your heart and head are not matching up with what you just heard.

Everyone, except these willingly possessed psychopaths, has a conscience. And it’s faithful to speak to us. This is why humanity has been conditioned to not respond to it, and also why fear is so essential to their game. When our signals are scrambled, our gut reaction belittled and intuition denied we’re left in a daze.

This is exactly what they want to happen. It gives them time to keep executing their programs, especially when a complicit media candies and bandies it about as if it’s true and nothing to question.

This is the whirled we’re in and up against. Again, another reason to stay fully conscious and circumspect and thoroughly educated as to their techniques and true nature. Not pretty stuff to look at, but understand it we must.

Abject bullies like Israel are relatively easy to spot – if we grasp their obvious odious nature and where they’re coming from. The bully in the playground works by pure intimidation and force and will resort to any form of expression they can – loud mouthed intimidation, brandishing weapons, and all bathed in swaggering bravado right up to and including physical force to get their point across.

Send a signal is their MO. And those who don’t cower, teach them a lesson. Again, just look at the abject genocidal insanity of the Israeli occupiers. Now that they’ve gained control of most of the world’s media, especially in the west, what they say goes. And if the media or governments don’t toe their line well enough they’ll hear from these vociferous, self serving elitist beasts.

The Provocation

Another aspect of bullying is provoking your supposed enemy. The US is at this big time, deliberately firing up the conservative right and constitutionalists. It’s full on deliberate. The opulent extravagance of the Obamas, the clearly deliberate crashing of the economy, the flagrant trashing of patriotism and removal of individual rights are all carefully planned. Threatening to disarm fiercely independent Americans is an essential part of this agenda.

The mass migration agenda is the same. While the US gets inundated with needy Central Americans with clear governmental manipulation, Europe is similarly being swept with an influx that threatens their economies and cultural identities.

What’s most amazing about this is anyone can read this agenda for themselves from UN statements and documents and the Agenda 21 or 2030 programs. That so many can’t be bothered to look into much of this is outright frightening.

Israel again is a master example of aggressive agendas designed to push back common sense and reason as well as true empathy for the plight of others. A clearly apartheid state while claiming they were the victims of such treatment is completely nonsensical. It flies in the face of simple reason and logic. Yet they get away with it. How? They’ve taken over the media and political structures through the same tactics of intimidation and potential consequence by their massive Mossad/CIA/MI6 black hand of control.

Strategy of Tension and Not Just Provoking, but Demonizing Your Subjects

What’s amazing is the thoroughness of psychopathic social engineers. This is where we need to wake up and get smart.

They operate according to something called the Strategy of Tension, keeping peoples and nations nervous and afraid and more inclined to rely on government and enforcement to protect them. It also homogenizes cultures in a form of group think and a state of malleability due to this state of fear.

The extension of their influence is far and wide. Mass shootings, weird mass “accidents” at certain interims, and most of all false flags, never mind assassinations and the like. This has been the weapon of choice for every totalitarian regime for eons and a real favorite of this latest push for world dominion by these psychopaths.

The end result, ironically, is not entirely to direct everyone’s attention to a foreign enemy. That’s just a ruse and excuse for genocide and expansion. The enemy to them is within – us. We must be contained like animals and malleable to their every whim.

So-called domestic terrorism has been a meme on the rise. The deliberate migration of “potential muslim extremists” is a key part of this, as any and every incident they stage can more and more be justified and conveniently blamed on outside influences. The end result is the same: clampdown on the populace.

Just look at this propaganda piece brought to you by the Rothschild/Rockefeller owned and CIA/Mossad/MI6 et all run Reuters news agency:

U.S. eyes ways to toughen fight against domestic extremists

The U.S. Justice Department is considering legal changes to combat what it sees as a rising threat from domestic anti-government extremists, senior officials told Reuters, even as it steps up efforts to stop Islamic State-inspired attacks at home.

Extremist groups motivated by a range of U.S.-born philosophies present a “clear and present danger,” John Carlin, the Justice Department’s chief of national security, told Reuters in an interview. “Based on recent reports and the cases we are seeing, it seems like we’re in a heightened environment.” (source)

The agenda is obvious. If we’re looking. The language as well is a giveaway, the smooth talking and use of buzz phrases like “clear and present danger”, “national security” and the like are rife.

The Subtler Techniques of Deceit

This may seem a bit tangential to the main point I’m making here but is nonetheless essential information if we’re to more fully understand how these tactics are carried out on subtler levels.

You’ll see the following logical fallacy tactics in use continually, but unfortunately most people fall for them for lack of discernment as well as awareness of just what deceitful people are capable of doing.

This is a big subject well worth researching on your own but here are a few to get you started:

1. The Strawman Argument – Misrepresenting someone’s argument to make it easier to attack.

Example: After Will said that we should put more money into health and education, Warren responded by saying that he was surprised that Will hates our country so much that he wants to leave it defenseless by cutting military spending.

You’ll see this in use continually especially in the political and government arenas. It’s very clever really, side-stepping the real issue and misdirecting the argument to a false issue having nothing to do with the original question or discussion.

2. The False Choice Dilemma – Giving an extremely narrow range of choice to an issue or situation that is much wider than is being portrayed with virtually unlimited possibilites.

Baby Bush’s carefully framed post 9/11 statement is the classic geopolitical example: “You’re either with us, or you’re with the terrorists.”

You have to admit that’s pretty damn galvanizing. But in what way? Now you can’t question what the “good guys” are doing or you might be with “axis of evil”? That’s what it’s since come down to. Again, cleverly staged propaganda by these very intelligent psychopaths. Keeping the public drugged and dumbed down would sure work in their favor, wouldn’t it?

3. Correlation versus Causation. You can apply this across the board. It’s so easy to assume what we’re told is true in this context. Beware.

The easiest example is when two events occur at the same time, or in close apparent relation with each other. One is then seen as the cause of the other. An increase in robberies occurs at the same time that jobs cuts are announced, for example. There is no evidence to support the claim that the expected job losses caused the increase in robberies.

This is best seen in false flag events when the enemy or culprit is named before any investigation whatsoever. If someone “claims” responsibility it’s case closed, as they go after their pre-selected patsy to confirm this or already executed this planted persona on the spot. Done deal.

4. Overgeneralization or Oversimplification.

This is another framework for logical fallacies. Generalizing from too small of a population, or reducing complex social issues to only one choice or the other, and leaving out the complex issues that do not support the claim are examples of fallacies that stem from overgeneralization and oversimplification. (source of last two citations)

These are just a few examples. It’s a field well worth exploring and getting a handle on. When you dissect and analyze these mechanisms it is extremely empowering.

All That To Say…

Be on the look out. Stay alert and awake and aware. What we see around us is not what we get, unless we fall for it and thereby make it our reality. Personal empowerment in such an environment as we’re living in is essential.

But you have to do the work.

Psychopaths are running the external world. It’s more evident by the day to more and more people. Those not fully on board even at higher and middle levels are being bullied into it within the power structure. They can see who the apparent heirs are to the coming positions of power so they’re buckling under the pressure in an effort to save their hides.

Others at many levels of society are waking up and looking for ways to expose this nefarious agenda and help humanity push back in whatever way it can. We need to keep our voices loud and clear and distinctly truthful and helpful.

There may be many vectors by which they’re coming at us, be they geoengineering, manipulated food, societal crackdowns, media programming and the like, but we’re clearly up to the challenge.

After all, we’re here! We’re thriving just fine in spite of all they do, and we’re growing stronger by the day.

Never forget that, let down your guard, nor grow weary in well doing.

This is our day – not theirs. Let’s fulfill our mission, and use the massive spiritual weapons at our disposal – love, truth, our connection to Source and essential eternal nature which can never be taken away.

Stay true.

Love always, Zen

Always Attack the Wrong Country

8lfjisz6

By Dmitry Orlov

Source: Club Orlov

There are numerous tactics available to those who aim to make problems worse while pretending to solve them, but misdirection is always a favorite. The reason to want to make problems worse is that problems are profitable—for someone. And the reason to pretend to be solving them is that causing problems, then making them worse, makes those who profit from them look bad.

In the international arena, this type of misdirection tends to take on a farcical aspect. The ones profiting from the world’s problems are the members of the US foreign policy and military establishments, the defense contractors and the politicians around the world, and especially in the EU, who have been bought off by them. Their tactic of misdirection is conditioned by a certain quirk of the American public, which is that it doesn’t concern itself too much with the rest of the world. The average member of the American public has no idea where various countries are, can’t tell Sweden from Switzerland, thinks that Iran is full of Arabs and can’t distinguish any of the countries that end in -stan. And so a handy trick has evolved, which amounts to the following dictum: “Always attack the wrong country.”

Need some examples? After 9/11, which, according to the official story (which is probably nonsense) was carried out by “suicide bombers” (some of them, amusingly, still alive today) who were mostly from Saudi Arabia, the US chose to retaliate by attacking Saudi ArabiaAfghanistan and Iraq.

When Arab Spring erupted (because a heat wave in Russia drove up wheat prices) the obvious place to concentrate efforts, to avoid a seriously bad outcome for the region, was Egypt—the most populous Arab country and an anchor for the entire region. And so the US and NATO decided to attack EgyptLibya.

When things went south in the Ukraine, whose vacillating government couldn’t make up its mind whether it wanted to remain within the Customs Union with Russia, its traditional trading partner, or to gamble on signing an agreement with the EU based on vague (and since then broken) promises of economic cooperation, the obvious place to go and try to fix things was the Ukraine. And so the US and the EU decided fix the UkraineRussia, even though Russia is not particularly broken. Russia was not amused; nor is it a country to be trifled with, and so in response the Russians inflicted some serious pain on the Washington establishmentfarmers within the EU.

Who was at fault exceedingly clear once the Ukrainians that managed to get into power (including some very nasty neo-Nazis) started to violate the rights of Ukraine’s Russian-speaking majority, including staging some massacres, in turn causing a large chunk of it to hold referendums and vote to secede. (Perhaps you didn’t know this, but the majority of the people in the Ukraine are Russian-speakers, and there is just one city of any size—Lvov—that is mostly Ukrainian-speaking. Mind you, I find Ukrainian to be very cute and it makes me smile whenever I hear it. I don’t bother speaking it, though, because any Ukrainian with an IQ above bathwater temperature understands Russian.) And so the US and the EU decided to fix things by continuing to put pressure on the UkraineRussia.

When Russia started insisting on a political rather than a military resolution to the crisis in the Ukraine, and helped negotiate the Minsk agreements together with the Ukraine, France and Germany, a similar thing happened. These agreements obligated the Ukrainian government to pass constitutional reforms to grant autonomy to its Russian regions in the east. The Ukrainian government refused to abide by these agreements. As a result, the US and the EU decided to put pressure on the UkrainianRussian government.

When a nasty terrorist group calling itself ISIS and composed of Islamic Salafi/Takfiri extremists started to seize power in large parts of Iraq, and then spread to Syria, something had to be done about it. These extremists were being financed by Turkey (which is still buying oil from them and sheltering them on its territory) and Saudi Arabia. And so the US and NATO decided to put some pressure on Turkey and Saudi ArabiaSyria.

In response to all this foolishness, Russia up and decided to actually go and fix something that was broken: Syria. And now Syria is on the mend, and members the misdirectorate in Washington are left scratching their heads.

So far so good. But this method of pretending to be solving problems by making them worse has some definite downsides.

For one thing, eventually even the dimmest, most geographically challenged bulbs in the general population start to get a clue, and then they start refusing to vote for the establishment candidates. Then it becomes hard to continue with the misdirecting because the people doing the misdirecting are voted out, and (horror of horrors!) somebody who might actually try to fix a problem or two might get voted in.

For another, continually making problems worse by attacking the wrong country tends to eventually make the sheer number problems get completely out of hand. Take the recent massive terror attack in Brussels, down the road from NATO headquarters, for which ISIS took credit. Recently, Europe has been experiencing a large-scale influx of people from the Middle East and North Africa, who have been forced to flee their native lands because of all the previous acts of misdirection, and a fair number of these people are ISIS terrorists. And so, to protect itself, NATO is planning to fight ISIS in EuropeSyria. Also, it is well known that the influx into Europe has been orchestrated by Turkey. In response, the EU has decided to put pressure ongive billions of euros to Turkey and tell Turkey that it is welcome to join the EU.

Lastly, this pattern has an overall momentum that, over time, becomes harder and harder to break. It starts out as just one group of plutocrats doing incredibly vile, underhanded but profitable things; later on, an even bigger group of plutocrats is doing equally vile but now completely idiotic, self-defeating, embarrassing things; and right near the end a really huge group of plutocrats is doing things that are absolutely suicidal—but they can’t stop themselves. You should be able to decide for yourselves when that point in time arrives, but I doubt that it is too far in the future.

Hillary Clinton’s Damning Emails

shutterstock_405351559

By Ray McGovern

Source: Consortium News

A few weeks after leaving office, former Secretary of State Hillary Clinton may have breathed a sigh of relief and reassurance when Director of National Intelligence James Clapper denied reports of the National Security Agency eavesdropping on Americans. After all, Clinton had been handling official business at the State Department like many Americans do with their personal business, on an unsecured server.

In sworn testimony before the Senate Intelligence Committee on March 12, 2013, Clapper said the NSA was not collecting, wittingly, “any type of data at all on millions or hundreds of millions of Americans,” which presumably would have covered Clinton’s unsecured emails.

But NSA contractor Edward Snowden’s revelations — starting on June 5, 2013 — gave the lie to Clapper’s testimony, which Clapper then retracted on June 21 – coincidentally, Snowden’s 30th birthday – when Clapper sent a letter to the Senators to whom he had, well, lied. Clapper admitted his “response was clearly erroneous – for which I apologize.”  (On the chance you are wondering what became of Clapper, he is still DNI.)

I would guess that Clapper’s confession may have come as a shock to then ex-Secretary Clinton, as she became aware that her own emails might be among the trillions of communications that NSA was vacuuming up. Nevertheless, she found Snowden’s truth-telling a safer target for her fury than Clapper’s dishonesty and NSA’s dragnet.

In April 2014, Clinton suggested that Snowden had helped terrorists by giving “all kinds of information, not only to big countries, but to networks and terrorist groups and the like.” Clinton was particularly hard on Snowden for going to China (Hong Kong) and Russia to escape a vengeful prosecution by the U.S. government.

Clinton even explained what extraordinary lengths she and her people went to in safeguarding government secrets: “When I would go to China or would go to Russia, we would leave all my electronic equipment on the plane with the batteries out, because … they’re trying to find out not just about what we do in our government, they’re … going after the personal emails of people who worked in the State Department.” Yes, she said that. (emphasis added)

Hoisted on Her Own Petard

Alas, nearly a year later, in March 2015, it became known that during her tenure as Secretary of State she had not been as diligent as she led the American people to believe. She had used a private server for official communications, rather than the usual official State Department email accounts maintained on federal servers. Thousands of those emails would retroactively be marked classified – some at the TOP SECRET/Codeword level – by the department.

During an interview last September, Snowden was asked to respond to the revelations about highly classified material showing up on Clinton’s personal server: “When the unclassified systems of the United States government, which has a full-time information security staff, regularly gets hacked, the idea that someone keeping a private server in the renovated bathroom of a server farm in Colorado is more secure is completely ridiculous.”

Asked if Clinton “intentionally endangered US international security by being so careless with her email,” Snowden said it was not his place to say. Nor, it would seem, is it President Barack Obama’s place to say, especially considering that the FBI is actively investigating Clinton’s security breach. But Obama has said it anyway.

“She would never intentionally put America in any kind of jeopardy,” the President said on April 10. In the same interview, Obama told Chris Wallace, “I guarantee that there is no political influence in any investigation conducted by the Justice Department, or the FBI – not just in this case, but in any case. Full stop. Period.”

But, although a former professor of Constitutional law, the President sports a checkered history when it comes to prejudicing investigations and even trials, conducted by those ultimately reporting to him. For example, more than two years before Bradley (Chelsea) Manning was brought to trial, the President stated publicly: “We are a nation of laws. We don’t let individuals make decisions about how the law operates. He [Bradley Manning] broke the law!”

Not surprisingly, the ensuing court martial found Manning guilty, just as the Commander in Chief had predicted. Though Manning’s purpose in disclosing mostly low-level classified information was to alert the American public about war crimes and other abuses by the U.S. government, Manning was sentenced to 35 years in prison.

On March 9, when presidential candidate Clinton was asked, impertinently during a debate, whether she would withdraw from the race if she were indicted for her cavalier handling of government secrets, she offered her own certain prediction: “Oh, for goodness sake! It’s not going to happen. I’m not even answering that question.”

Prosecutorial Double Standards

Merited or not, there is, sadly, some precedent for Clinton’s supreme confidence. Retired General and ex-CIA Director David Petraeus, after all, lied to the FBI (a felony for “lesser” folks) about giving his mistress/biographer highly classified information and got off with a slap on the wrist, a misdemeanor fine and probation, no jail time – a deal that Obama’s first Attorney General Eric Holder did on his way out the door.

We are likely to learn shortly whether Attorney General Loretta Lynch is as malleable as Holder or whether she will allow FBI Director James Comey, who held his nose in letting Petraeus cop a plea, to conduct an unfettered investigation this time – or simply whether Comey will be compelled to enforce Clinton’s assurance that “it’s not going to happen.”

Last week, Fox News TV legal commentator Andrew Napolitano said the FBI is in the final stages of its investigation into Clinton and her private email server. His sources tell him that “the evidence of her guilt is overwhelming,” and that the FBI has enough evidence to indict and convict.

Whether Napolitano has it right or not, it seems likely that Clinton is reading President Obama correctly – no profile in courage is he. Nor is Obama likely to kill the political fortunes of the now presumptive Democratic presidential nominee. Yet, if he orders Lynch and Comey not to hold Hillary Clinton accountable for what – in my opinion and that of most other veteran intelligence officials whom I’ve consulted – amounts to at least criminal negligence, another noxious precedent will be set.

Knowing Too Much

This time, however, the equities and interests of the powerful, secretive NSA, as well as the FBI and Justice, are deeply involved. And by now all of them know “where the bodies are buried,” as the smart folks inside the Beltway like to say. So the question becomes would a future President Hillary Clinton have total freedom of maneuver if she were beholden to those all well aware of her past infractions and the harm they have done to this country.

One very important, though as yet unmentioned, question is whether security lapses involving Clinton and her emails contributed to what Clinton has deemed her worst moment as Secretary of State, the killing of Ambassador Christopher Stevens and three other U.S. personnel at the lightly guarded U.S. “mission” (a very small, idiosyncratic, consulate-type complex not performing any consular affairs) in Benghazi, Libya, on Sept. 11, 2012.

Somehow the terrorists who mounted the assault were aware of the absence of meaningful security at the facility, though obviously there were other means for them to have made that determination, including the State Department’s reliance on unreliable local militias who might well have shared that inside information with the attackers.

However, if there is any indication that Clinton’s belatedly classified emails contained information about internal State Department discussions regarding the consulate’s security shortcomings, questions may be raised about whether that information was somehow compromised by a foreign intelligence agency and shared with the attackers.

We know that State Department bureaucrats under Secretary Clinton overruled repeated requests for additional security in Benghazi. We also know that Clinton disregarded NSA’s repeated warnings against the use of unencrypted communications. One of NSA’s core missions, after all, is to create and maintain secure communications for military, diplomatic, and other government users.

Clinton’s flouting of the rules, in NSA’s face, would have created additional incentive for NSA to keep an especially close watch on her emails and telephone calls. The NSA also might know whether some intelligence service successfully hacked into Clinton’s server, but there’s no reason to think that the NSA would share that sort of information with the FBI, given the NSA’s history of not sharing its data with other federal agencies even when doing so makes sense.

The NSA arrogates to itself the prerogative of deciding what information to keep within NSA walls and what to share with the other intelligence and law enforcement agencies like the FBI. (One bitter consequence of this jealously guarded parochialism was the NSA’s failure to share very precise information that could have thwarted the attacks of 9/11, as former NSA insiders have revealed.)

It is altogether likely that Gen. Keith Alexander, head of NSA from 2005 to 2014, neglected to tell the Secretary of State of NSA’s “collect it all” dragnet collection that included the emails and telephone calls of Americans – including Clinton’s. This need not have been simply the result of Alexander’s pique at her disdain for communications security requirements, but rather mostly a consequence of NSA’s modus operandi.

With the mindset at NSA, one could readily argue that the Secretary of State – and perhaps the President himself – had no “need-to-know.” And, needless to say, the fewer briefed on the NSA’s flagrant disregard for Fourth Amendment protections against unreasonable searches and seizures the better.

So, if there is something incriminating – or at least politically damaging – in Clinton’s emails, it’s a safe bet that at least the NSA and maybe the FBI, as well, knows. And that could make life difficult for a Clinton-45 presidency. Inside the Beltway, we don’t say the word “blackmail,” but the potential will be there. The whole thing needs to be cleaned up now before the choices for the next President are locked in.

 

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington.  He served as a CIA analyst for 27 years, during which he prepared and briefed the morning President’s Daily Brief for Presidents Nixon, Ford, and Reagan.

Blood Money: Four More Years of Drug War Horror with HRC

hillary-clinton-winking-AP-640x480

By Chris Floyd

(Empire Burlesque)

The Drug War, like the Terror War, is essentially a vast machine for profiteering by the purveyors of weapons and tools of repression. Like the Terror War, the Drug War demonstrably exacerbates the problems it purports to address, and has led to widespread chaos, death and state corruption of almost unfathomable levels. And Hillary Clinton, almost certain to be the next president, is deeply complicit in both of these malevolent enterprises.

Clinton’s extensive and eager involvement in the genuinely insane hyper-militarizataion of American policy in the so-called War on Terror is well-attested. Indeed, she boasts of it, trumpeting how she urged a reluctant Obama into destroying Libya, for example: a “great victory” which she famously celebrated by crowing over the rape and murder of Libyan leader Moamar Gaddafi: “We came, we saw, he died!” The neocons who pressed for the war of aggression against Iraq — which Clinton supported — are now flocking to her banner, as are the war profiteers and their Wall Street allies. And why not? Clinton is the most hawkish Democratic candidate since Henry Jackson. The blood money will continue to flow like the Nile in flood under her watch.

But Clinton’s role in the Drug War is perhaps less well-known. Jesse Franzblau remedies this with an excellent article at CounterPunch, noting her instrumental role in the slaughterfest and corruption feast that the Drug War has spawned in Mexico. Franzblau writes of the $2.5 billion Merida Initiative:

Negotiated behind closed doors in the last years of the Bush administration, the plan was originally proposed as a three-year program. Yet Hillary Clinton’s State Department pushed aggressively to extend it, overseeing a drastic increase of the initiative that continues today.

Much of this aid goes to U.S.-based security, information, and technology contracting firms, who make millions peddling everything from helicopter training to communications equipment to night-vision goggles, surveillance aircrafts, and satellites.

This aid comes in addition to the direct sales of arms and other equipment to Mexico authorized by the State Department, as Christy Thorton pointed out in a 2014 New York Times op-ed. Those sales reached $1.2 billion in 2012 alone, the last full year of Clinton’s tenure. Indeed, as the Mérida Initiative has grown, Mexico has become one of the world’s biggest purchasers of U.S. military arms and equipment.

But while sales have boomed for U.S.-based contractors, the situation in Mexico has badly deteriorated. The escalation of U.S. counter-drug assistance in the country has paralleled a drastic increase in violence, fueling a drug war that’s killed more than 100,000 people since 2006.

Turning Mexico into a major fountain of war profits: quite another accomplishment for a secretary of state whose skills have been lavishly praised by no less than Henry Kissinger, her close friend and advisor. Franzblau goes on to lay out, in grim detail, how Clinton’s State Department, openly flouting U.S. law, increased its cooperation with Mexican military and law enforcement units known to be perpetrating horrific human rights abuses:

Human Rights Watch reported in 2011, for example, on widespread cases of torture in Guerrero going back to 1994. The group noted regular abuses by police and military forces, including “cases of homicide, torture, and extortion” overseen by the judicial police chief in the northern part of the state. The same report highlighted strong evidence of the involvement of military officials from Chilpancingo in cases of kidnapping and disappearances in 2010, as the U.S. embassy was clearing officials for training from the same military base.

The payoff for these illegalities has been sweet for the future president:

Notably, several of the contractors that profited from U.S. security assistance in Mexico — such as General Electric, Lockheed Martin, and United Technologies Corporation, which owns Sikorsky — reportedly contributed to the Clinton Foundation. And according to the transparency group Open Secrets, Clinton currently tops the list of all 2016 presidential candidates in campaign contributions from the military contracting industry.

By the end of Clinton’s first term in 2021, we will be in the 20th year of the Terror War — and the 50th year of the Drug War. How many more lives, how many more communities, how many more countries will be laid waste by these inhuman engines of greed and power — and their “progressive” champions — in that time?