New York Times Propagates Russia Hacking Conspiracy Theory

The New York Times reports as fact that Russia hacked the 2016 US presidential election despite failing to present any evidence to support this claim.

By Jeremy R. Hammond

Source: Foreign Policy Journal

In late 2002 and early 2003, those of us who were warning that the US government was lying, that there was no evidence that Iraq still possessed stockpiles of weapons of mass destruction (WMD), much less active WMD manufacturing programs, were frequently dismissed as “conspiracy theorists”.

Of course, in reality, it was the US mainstream media that was propagating the government’s unfounded conspiracy theory that Saddam Hussein had such weapons and, further, had a cooperative relationship with Al-Qaeda, the terrorist organization held responsible for the attacks of September 11, 2001.

The New York Times served the government in its campaign of deception by spearheading the media’s dissemination of the lies out to the public, thus manufacturing Americans’ consent for this illegal war of aggression.

Spreading government propaganda is a function the Times never ceases to serve well — the lesson from its own reporting during the run-up to the Iraq war, and from the mainstream media’s reporting in general, having been dutifully disregarded.

One of the latest government conspiracy theories the Times is helping to propagate, by serving effectively as the political establishment’s very own public relations firm, is the claim that the government of Russia was responsible for hacking into computers of the Democratic National Committee (DNC) and email accounts of John Podesta, who was then chairman of Hillary Clinton’s presidential campaign.

In a report published September 1, 2017, the Times elaborated on this conspiracy theory under the headline “Russian Election Hacking Efforts, Wider Than Previously Known, Draw Little Scrutiny”.

In it, the Times reports as fact that Russia was responsible not only for hacking the DNC and Podesta’s email account, but also for hacking directly into the US election system itself. All that’s old news, however, so the Times‘ new spin is that Russia’s efforts to hack state electoral systems were much more extensive than previously thought.

However, the Times presents not one shred of evidence to support the underlying claim that Russia hacked these systems, much less that this alleged hacking was much more widespread than previously reported.

To the scrutinous reader who is familiar with the propaganda techniques mainstream media use in order to manufacture consent for various government policies, the total lack of evidence is apparent. In fact, the Times actually acknowledges that there is no evidence to support the claim it is making in the headline. Yet, through obfuscation, use of deceptive language, and various other techniques, the Times leads the general reader to believe that its headline is true.

An examination of the article is useful to see just how the Times manages to lead readers to the conclusion the Russia hacking is a demonstrated fact when, in reality, it remains just another conspiracy theory originating from the government that the Times is all too happy to help propagate.

The Alleged Russian Hacking of US Electoral Systems

The first thing to note about this New York Times piece is its title. The headline makes two claims: 1) it’s a fact that Russia tried to hack the US election, and this fact has been known publicly for some time; and 2) the Times has new information showing not only that US election systems were hacked and that Russia was responsible, but also that Russia’s hacking efforts even more widespread than previously known.

The story begins with the case of Durham county, North Carolina, where, we learn, various irregularities occurred at polling stations on election day last November (bold emphasis added throughout):

Dozens were told they were ineligible to vote and were turned away at the polls, even when they displayed current registration cards. Others were sent from one polling place to another, only to be rejected. Scores of voters were incorrectly told they had cast ballots days earlier. In one precinct, voting halted for two hours.

Susan Greenhalgh, a troubleshooter at a nonpartisan election monitoring group, was alarmed. Most of the complaints came from Durham, a blue-leaning county in a swing state [North Carolina]. The problems involved electronic poll books — tablets and laptops, loaded with check-in software, that have increasingly replaced the thick binders of paper used to verify voters’ identities and registration status. She knew that the company that provided Durham’s software, VR Systems, had been penetrated by Russian hackers months before.

“It felt like tampering, or some kind of cyberattack,” Ms. Greenhalgh said about the voting troubles in Durham.

Note that the Times does not say that Ms. Greenhalgh “believed” or “had heard” that Russian hackers were responsible for earlier hacking VR Systems, but that she “knew” this was so. With this verb choice, the Times is asserting that this claim is a proven fact.

The purpose of this assertion is to establish credibility in the mind of the reader that its headline is true, that the evidence shows that Russian hacking efforts were more widespread than previously known. If it is a fact that Russia hacked US election systems, then it is not hard to believe that its hacking was more extensive than previously thought.

But what evidence does the Times present to support its assertion that this earlier Russian hacking of VR Systems occurred?

Well, to answer that question, let’s first look at how Ms. Greenhalgh “knew” that Russians had hacked VR Systems. Much further into the article, more than halfway through, the Times tells us:

As the problems mounted, The Charlotte Observer reported that Durham’s e-poll book vendor was Florida-based VR Systems, which Ms. Greenhalgh knew from a CNN report had been hacked earlier by Russians. “Chills went through my spine,” she recalled.

So there were irregularities at the Durham county polling stations, and Durham county used VR Systems for its polling system, which Ms. Greenhalgh “knew” Russians had hacked because she’d heard it on CNN.

Mid-article, however, the Times also quotes Ms. Greenhalgh acknowledging, with respect to the specific case of Durham county, “We still don’t know if Russian hackers did this.”

If we don’t know whether Russian hacking was responsible for the supposed irregularities in Durham county’s polling station, why is the Times using it as an example to support the claim made in its headline that this hacking was more extensive than previously thought? If there are cases where there is evidence, why not feature one of those, instead?

The answer is that no such evidence exists; the Times has no evidence to support that claim in its headline. In fact, it acknowledges this in several other places in the article. What the Times is trying to do is to build the case that we can safely assume that what happened in Durham county was a consequence of Russian hacking. After all, if Russia hacked VR Systems, that certainly could explain those election-day irregularities, right?

But how solid is the Times‘ premise that Russia hacked VR Systems in the first place?

The Times doesn’t attempt to support this premise solely with hearsay about something CNN reported. It exerts slightly greater effort to convince the reader. Nine paragraphs into the article, we read:

Beyond VR Systems, hackers breached at least two other providers of critical election services well ahead of the 2016 voting, said current and former intelligence officials, speaking on condition of anonymity because the information is classified. The officials would not disclose the names of the companies.

Note here that the Times is once again acknowledging that it doesn’t actually have any evidence to support the claim that Russia hacked other companies in addition to VR Systems, which it is using to support the claim made in its headline that the Russian hacking was more widespread than previously thought. The Times is simply parroting government officials who’ve made this claim.

The Times‘ case crumbles even further the deeper one reads into the article. With respect to the Durham county irregularities, the Times next notes:

There are plenty of other reasons for such breakdowns — local officials blamed human error and software malfunctions — and no clear-cut evidence of digital sabotage has emerged, much less a Russian role in it. Despite the disruptions, a record number of votes were cast in Durham, following a pattern there of overwhelming support for Democratic presidential candidates, this time Hillary Clinton.

But months later, for Ms. Greenhalgh, other election security experts and some state officials, questions still linger about what happened that day in Durham as well as other counties in North Carolina, Virginia, Georgia and Arizona.

So keep in mind as we proceed that the Times is here once again acknowledging that no evidence exists to support the suspicion that the Durham county irregularities were due to Russian hacking. Yet it attempts to lead readers to that conclusion by suggesting that Russians did hack states’ electoral systems:

After a presidential campaign scarred by Russian meddling, local, state and federal agencies have conducted little of the type of digital forensic investigation required to assess the impact, if any, on voting in at least 21 states whose election systems were targeted by Russian hackers, according to interviews with nearly two dozen national security and state officials and election technology specialists.

Note that here the Times is attributing the claim that Russia hacked into states’ electoral systems to various sources. In its next paragraph, however, the Times does away with attribution and transforms this claiminto an ostensibly verified fact:

The assaults on the vast back-end election apparatus — voter-registration operations, state and local election databases, e-poll books and other equipment — have received far less attention than other aspects of the Russian interference, such as the hacking of Democratic emails and spreading of false or damaging information about Mrs. Clinton. Yet the hacking of electoral systems was more extensive than previously disclosed, The New York Times found.

Here we see that the Times is back to asserting as fact that the Russian hacking was more extensive than previously reported, even though it has admittedly not yet provided even a single piece of supporting evidence! How can it do that? Well, transparently, what is important to the Times is that its readers believe that its headline is true, not to actually demonstrate it. Whether it is actually true does not matter; it is just the belief that the Times is aiming to instill.

This is the nature of propaganda.

Turning to the premise, note that the Times is here claiming as fact that, one, US electoral systems were extensively hacked, and, two, Russia was responsible.

It continues:

Intelligence officials in January reassured Americans that there was no indication that Russian hackers had altered the vote count on Election Day, the bottom-line outcome. But the assurances stopped there.

Government officials said that they intentionally did not address the security of the back-end election systems, whose disruption could prevent voters from even casting ballots.

That’s partly because states control elections; they have fewer resources than the federal government but have long been loath to allow even cursory federal intrusions into the voting process.

That, along with legal constraints on intelligence agencies’ involvement in domestic issues, has hobbled any broad examination of Russian efforts to compromise American election systems. Those attempts include combing through voter databases, scanning for vulnerabilities or seeking to alter data, which have been identified in multiple states. Current congressional inquiries and the special counsel’s Russia investigation have not focused on the matter.

Note here how the Times is explaining that the federal government has not really focused much on investigating US election systems irregularities even while continuing to assert as fact that there were Russian efforts to compromise those systems! Further:

“We don’t know if any of the problems were an accident, or the random problems you get with computer systems, or whether it was a local hacker, or actual malfeasance by a sovereign nation-state,” said Michael Daniel, who served as the cybersecurity coordinator in the Obama White House. “If you really want to know what happened, you’d have to do a lot of forensics, a lot of research and investigation, and you may not find out even then.”

In interviews, academic and private election security experts acknowledged the challenges of such diagnostics but argued that the effort is necessary. They warned about what could come, perhaps as soon as next year’s midterm elections, if the existing mix of outdated voting equipment, haphazard election-verification procedures and array of outside vendors is not improved to build an effective defense against Russian or other hackers.

So, again, the Times is acknowledging that the kind of forensic investigation that would be required to determine whether US election systems were hacked have not actually been conducted. How, therefore, can the Times report as fact not only that such hacking occurred, but that Russia was responsible?

It gets worse. The Times at this point in the article has already acknowledged that there could be perfectly benign explanations for what happened in Durham county. As we continue reading, we learn that the those supposedly alarming irregularities the Times opened the article with were not actually all that irregular (and hence not all that alarming). To the contrary:

Still, some of the incidents reported in North Carolina occur in every election, said Charles Stewart III, a political scientist at the Massachusetts Institute of Technology and an expert on election administration.

“Election officials and advocates and reporters who were watching most closely came away saying this was an amazingly quiet election,” he said, playing down the notion of tampering.

The Times next quotes Ms. Greenhalgh’s admission that there’s no evidence hackers got into Durham county’s system (much less that Russia was responsible).

Keep in mind that the claim the government and media have been making is that Russia interfered in the US election to throw the vote to Donald Trump. Yet, in the case of Durham county, the result was that, as the Times informs, “Hillary Clinton won 78 percent of the 156,000 votes”. This is a strange outcome if we are to assume that Russia hacked the system to tamper with the election!

But the Times is not unskilled in the art of propaganda, so it has an explanation ready for us: Russia tried to hack the system there, but was just unsuccessful! It continues:

Details of the breach did not emerge until June, in a classified National Security Agency [NSA] report leaked to The Intercept, a national security news site. That report found that hackers from Russia’s military intelligence agency, the G.R.U., had penetrated the company’s computer systems as early as August 2016, then sent “spear-phishing” emails from a fake VR Systems account to 122 state and local election jurisdictions. The emails sought to trick election officials into downloading malicious software to take over their computers.

The N.S.A. analysis did not say whether the hackers had sabotaged voter data. “It is unknown,” the agency concluded, whether Russian phishing “successfully compromised the intended victims, and what potential data could have been accessed.”

VR Systems’ chief operating officer, Ben Martin, said he did not believe Russian hackers were successful. He acknowledged that the vendor was a “juicy target,” given that its systems are used in battleground states including North Carolina, Florida and Virginia. But he said that the company blocked access from its systems to local databases, and employs security protocols to bar intruders and digital triggers that sound alerts if its software is manipulated.

Take note again of the Times choice of verb: the NSA report “found” that hackers working for Russian intelligence had penetrated VR Systems’ computer systems. Through this choice of verb, the Times is communicating that it is a verified fact that Russia hacked VR Systems. But is it? To answer that, let’s turn to the Times‘ source.

The Intercept reported on this alleged hack much earlier, on June 5, 2017. Unlike the Times, however, The Intercept provided the following important caveat:

While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based. A U.S. intelligence officer who declined to be identified cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.

To reiterate, the supposed evidence that exists proving that Russia hacked VR Systems is classified and still unknown to either the public or the media, including The Intercept and New York Times.

As The Intercept notes, the NSA report “states unequivocally in its summary statement that it was Russian military intelligence, specifically the Russian General Staff Main Intelligence Directorate, or GRU, that conducted the cyber attacks described in the document.”

But upon what actual evidence is that unequivocal statement based?

The Intercept, like the Times, proceeds to accept this unequivocal summary statement as fact despite its acknowledged lack of access to the evidence supposedly supporting this claim:

The NSA has now learned, however, that Russian government hackers, part of a team with a “cyber espionage mandate specifically directed at U.S. and foreign elections,” focused on parts of the system directly connected to the voter registration process, including a private sector manufacturer of devices that maintain and verify the voter rolls.

Here The Intercept is being as disingenuous with its readers as the Times. Note again the deceptive verb choice. The NSA had not actually “learned” that Russia tried to hack US electoral systems; it had rather assessed that this was so. As the manufactured “intelligence” about Iraq’s WMDs should have taught us, those are far from the same thing.

Conveniently, The Intercept provides a graphic image from the NSA report illustrating the point:

The key element of this chart to note is in the left column, where it identifies the “Operators” responsible sending Phishing emails — emails designed to trick the recipient into giving away login credentials for whatever system the hackers were trying to get into. Note that, according to the NSA, these “Operators” were “Probably within” the GRU.

“Probably”.

So, does the NSA know that the Russian government was responsible for these Phishing emails?

No.

The NSA is claiming this is so. But the supposed evidence it is basing this claim upon has not been shown to even exist.

Now, perhaps the NSA has solid reasoning to arrive at this conclusion. Perhaps it has solid, though not definitive, evidence to back this up.

But the New York Times ought to be properly informing its readers that the Russian hacking of VR Systems is an allegation. It ought to be including the caveat with this information that this is according to the government, but that it has not yet been proven. Moreover, the Times ought to be informing its readers that the evidence supposedly supporting this conclusion has not been made public, and, further, that nobody at the Times has been able to verify it even exists.

But continuing in its propaganda effort, the Times reminds us that, “In an assessment of Russian cyberattacks released in January, intelligence agencies said Kremlin spy services had been collecting information on election processes, technology and equipment in the United States since early 2014.”

But that was just another example of the government making a claim for which no evidence has actually been provided. Each of these claims simply builds upon those that preceded it. In the next manifestation, the New York Times claim that Russia’s supposed hacking was even more extensive than previously known will likewise be presented as fact, and the acknowledgments about the lack of supporting evidence will be omitted, just as the Times omitted that important caveat from The Intercept.

Of course, to write and publish this kind of story requires extreme cognitive dissonance on the part of journalists and editors at the Times. This psychological phenomenon of holding two fundamentally contradictory beliefs at the same time is palpable throughout the piece. Once more, even while reporting its headlined claim as fact, the Times acknowledges that it has no evidence to support it:

Beginning in 2015, the American officials said, Russian hackers focused instead on other internet-accessible targets: computers at the Democratic National Committee, state and local voter databases, election websites, e-poll book vendors and other back-end election services.

Apart from the Russian influence campaign intended to undermine Mrs. Clinton and other Democratic officials, the impact of the quieter Russian hacking efforts at the state and county level has not been widely studied. Federal officials have been so tight-lipped that not even many election officials in the 21 states the hackers assaulted know whether their systems were compromised, in part because they have not been granted security clearances to examine the classified evidence.

Of course, nobody at the New York Times has seen that evidence, either, to be able to verify that it even exists.

The Times closes by noting that, unlike Ms. Greenhalgh, Durham county officials “have rejected any notion that an intruder sought to alter the election outcome.” Nevertheless, the county has turned over computers to the North Carolina State Board of Elections and Ethics Enforcement in order for the matter to be investigated.

Of course, the Times‘ purpose with this piece, rather than being to properly inform the public, is to lead readers into the belief that, regardless of whether it happened in Durham county, there were extensive efforts by the government of Russia to hack into state electoral systems.

Never mind that the Times presents not one shred of actual evidence to support either of the two claims it makes in its headline.

Conclusion

We can again recall how the media, including the New York Times, piled lie upon lie in order to manufacture consent for the US’s war of aggression against Iraq.

Here, again, the political establishment has an agenda. Donald Trump campaigned on a platform of seeking improved relations with Russia, a deescalation of tensions, and greater cooperation with Moscow. The so-called “Deep State” was upset by Hillary Clinton’s loss. In order for the national security state to retain the authoritarian powers it has assumed supposedly in order to keep Americans safe, it needs to convince Americans that they need protecting. Russia has been selected to serve as a useful “enemy” to that end.

Framing Russia as an enemy of the United States also serves the interests of the military/security complex and the goal of maintaining and expanding US hegemony across the globe. This narrative has been used, for example, to prevent Trump from deescalating in Syria and increasing cooperation with Russia there. Trump had indicated that he would shift US policy away from the Obama administration’s goal of seeking regime change in Syria and only focus on combating the so-called “Islamic State” (a.k.a., ISIS, ISIL, or Daesh). The national security state has maneuvered rather to ensure that relations between the US and Russia remain tense and that US policy remains effectively to prolong the violence.

Whatever the motives for the propaganda campaign, we can observe that this propaganda campaign is occurring. Members of the establishment media have not only failed to learn the relevant lesson from their reporting about Iraqi WMD, but refusing to do so almost seems a job prerequisite.

News consumers should not make the same mistake.

Scrutinize. Question. Think.

If we want the mainstream media to change its behavior and actually do its job of properly informing the public, then news consumers need to change their behavior. Ever news consumers knows the old adage that you can’t believe everything you read in the newspaper. Nevertheless, all too habitually, that is precisely what they do — just as the journalists and editors they are relying on for information all too habitually accept claims from government officials as fact.

It is supposed to be the job of news media to analyze information, assess the veracity of sources, question government claims, and reveal the truth. Yet the establishment media not only fail to do so, but actively serve to propagate conspiracy theories originating from the government, and thus to manufacture consent for various government policies and the private agendas of the politically and financially powerful.

In light of how the mainstream media serve this function, it is critical for the consumers to develop the analytic skills necessary to determine the truth for themselves and be able to identify state propaganda when they see it.

Hopefully, this exercise has provided some useful insights into how to do just that.

Advertisements
Posted in Conspiracy, corporate news, culture, False Flag, Geopolitics, Hackers, media, Militarization, news, propaganda, Psy-ops, Social Control, Social Engineering, society, State Crime, war | Tagged , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Media’s Grim Addiction to Perseverance Porn

By Adam Johnson

Source: FAIR

You’ve seen or heard or read the personal interest story a thousand times: An enterprising seven-year-old collects cans to save for college (ABC72/8/17), a man with unmatched moxie walks 15 miles to his job (Today2/20/17), a low-wage worker buys shoes for a kid whose mother can’t afford them (Fox512/14/16), an “inspiring teen” goes right back to work after being injured in a car accident (CBS News12/16/16). All heartwarming tales of perseverance in the face of impossible odds—and all ideological agitprop meant to obscure and decontextualize the harsh reality of dog-eat-dog capitalism.

Man walks eight miles in the snow to get to work every day (ABC 273/14/17). Or was it a teen walking 10 miles in freezing weather to a job interview (New York Daily News2/26/13)? Or was it 10 miles to work every day (Times Herald Record3/17/17)? Or was it 12 (ABC News2/22/17) or 15 (Today2/20/17) or 18 (Evening Standard, 2/9/09) or 21 (Detroit Free Press1/20/15)? Who cares—their humanity is irrelevant. They’re clickbait, stand-in bootstrap archetypes meant to validate the bourgeois morality of click-happy media consumers.

These stories are typically shared for the purposes of poor-shaming, typically under the guise of inspirational life advice. “This man is proof we all just need to keep walking, no matter what life throws at us,” insisted Denver ABC7 anchor Anne Trujillo, after sharing one of those stories of a poor person forced to walk thousands of miles a year to survive.

A healthy press would take these anecdotes of “can do” spirit and ask bigger questions, like why are these people forced into such absurd hardship? Who benefits from skyrocketing college costs? Why does the public transit in this person’s city not have subsidies for the poor? Why aren’t employers forced to offer time off for catastrophic accidents? But time and again, the media mindlessly tells the bootstrap human interest story, never questioning the underlying system at work.

One particularly vulgar example was CBS News(12/16/16) referring to an “inspiring” African-American kid who had to work at his fast food job with an arm sling and a neck brace after a car accident. To compound the perseverance porn, he was, at least in part, doing so to help donate to a local homeless charity. Here we have a story highlighting how society has colossally failed its most vulnerable populations—the poor, ethnic minorities, children and the homeless—and the take-home point is, “Ah gee, look at that scrappy kid.”

Journalism is as much—if not more—about what isn’t reported as what is. Here a local reporter is faced with a cruel example of people falling through the cracks of the richest country on Earth, and their only contribution is to cherry-pick one guy who managed—just barely—to cling on to the edge.

Perseverance porn goes hand in hand with the rise of a GoFundMe economy that relies on personal narrative over collective policy, emotional appeals over baseline human rights. $930 million out of the $2 billion raised on GoFundMe since its inception in 2010 was for healthcare expenses, while an estimated 45,000 people a year die a year due to a lack of medical treatment. Meanwhile, anchors across cable news insist that single-payer healthcare is “unaffordable,” browbeating guests who support it, while populating their broadcasts with these one-off tales of people heroically scraping by.

It’s part of a broader media culture of anecdotes in lieu of the macro, moralizing “success” rather than questioning systemic problems. Perseverance porn may seem harmless, but in highlighting handpicked cases of people overcoming hardship without showing the thousands that didn’t—much less asking broader questions as to what created these conditions—the media traffics in decidedly right-wing tropes. After all, if they can do it, so can you—right?

Posted in conditioning, Corporate Crime, corporate news, culture, Dystopia, Economics, Financial Crisis, Health, Inequality, Labor, media, propaganda, Social Control, Social Engineering, society, Sociology, Work | Tagged , , , , , , , , , , , , , , , , | 8 Comments

Two for Tuesday

Paris

Posted in Art, culture, Music Video, Two for Tuesday, Video | Tagged , , , , | Leave a comment

False Flag Terrorism Isn’t a “Theory” … It’s ADMITTED and Widespread

Source: Washington’s Blog

Presidents, Prime Ministers, Congressmen, Generals, Spooks, Soldiers and Police ADMIT to False Flag Terror

In the following instances, officials in the government which carried out the attack (or seriously proposed an attack) admit to it, either orally, in writing, or through photographs or videos:

(1) Japanese troops set off a small explosion on a train track in 1931, and falsely blamed it on China in order to justify an invasion of Manchuria. This is known as the “Mukden Incident” or the “Manchurian Incident”. The Tokyo International Military Tribunal found: “Several of the participators in the plan, including Hashimoto [a high-ranking Japanese army officer], have on various occasions admitted their part in the plot and have stated that the object of the ‘Incident’ was to afford an excuse for the occupation of Manchuria by the Kwantung Army ….” And see this, this and this.

(2) A major with the Nazi SS admitted at the Nuremberg trials that – under orders from the chief of the Gestapo – he and some other Nazi operatives faked several attacks on their own people and resources which they blamed on the Poles, to justify the invasion of Poland.    The staged attacks included:

  • The German radio station Sender Gleiwitz [details below]
  • The strategic railway at POSunka Pass (Jabłonków Incident), located on the border between Poland and Czechoslovakia
  • The German customs station at Hochlinden (today part of Rybnik-Stodoły)
  • The forest service station in Pitschen (Byczyna)
  • The communications station at Neubersteich (“Nieborowitzer Hammer” before 12 February 1936, now Kuznia Nieborowska)
  • The railroad station in Alt-Eiche (Smolniki), Rosenberg in Westpreußen district
  • A woman and her companion in Katowice

The details of the Gleiwitz radio station incident include:

On the night of 31 August 1939, a small group of German operatives dressed in Polish uniforms and led by Naujocks seized the Gleiwitz station and broadcast a short anti-German message in Polish (sources vary on the content of the message). The Germans’ goal was to make the attack and the broadcast look like the work of anti-German Polish saboteurs.

To make the attack seem more convincing, the Germans used human corpses to pass them off as Polish attackers. They murdered Franciszek Honiok, a 43-year-old unmarried German Silesian Catholic farmer known for sympathizing with the Poles. He had been arrested the previous day by the Gestapo. He was dressed to look like a saboteur, then killed by lethal injection, given gunshot wounds, and left dead at the scene so that he appeared to have been killed while attacking the station. His corpse was subsequently presented to the police and press as proof of the attack.

(3) The minutes of the high command of the Italian government – subsequently approved by Mussolini himself – admitted that violence on the Greek-Albanian border was carried out by Italians and falsely blamed on the Greeks, as an excuse for Italy’s 1940 invasion of Greece.

(4) Nazi general Franz Halder also testified at the Nuremberg trials that Nazi leader Hermann Goering admitted to setting fire to the German parliament building in 1933, and then falsely blaming the communists for the arson.

(5) Soviet leader Nikita Khrushchev admitted in writing that the Soviet Union’s Red Army shelled the Russian village of Mainila in 1939 – while blaming the attack on Finland – as a basis for launching the “Winter War” against Finland. Russian president Boris Yeltsin agreed that Russia had been the aggressor in the Winter War.

(6) The Russian Parliament, current Russian president Putin and former Soviet leader Gorbachev all admit that Soviet leader Joseph Stalin ordered his secret police to execute 22,000 Polish army officers and civilians in 1940, and then falsely blamed it on the Nazis.

(7) The British government admits that – between 1946 and 1948 – it bombed 5 ships carrying Jews who were Holocaust survivors attempting to flee to safety in Palestine right after World War II, set up a fake group called “Defenders of Arab Palestine”, and then had the psuedo-group falsely claim responsibility for the bombings (and see thisthis and this).

(8) Israel admits that in 1954, an Israeli terrorist cell operating in Egypt planted bombs in several buildings, including U.S. diplomatic facilities, then left behind “evidence” implicating the Arabs as the culprits (one of the bombs detonated prematurely, allowing the Egyptians to identify the bombers, and several of the Israelis later confessed) (and see this and this).

The U.S. Army does not believe this is an isolated incident. For example, the U.S. Army’s School of Advanced Military Studies said of Mossad (Israel’s intelligence service):

“Ruthless and cunning. Has capability to target U.S. forces and make it look like a Palestinian/Arab act.”

(9) The CIA admits that it hired Iranians in the 1950′s to pose as Communists and stage bombings in Iran in order to turn the country against its democratically-elected prime minister.

(10) The Turkish Prime Minister admitted that the Turkish government carried out the 1955 bombing on a Turkish consulate in Greece – also damaging the nearby birthplace of the founder of modern Turkey – and blamed it on Greece, for the purpose of inciting and justifying anti-Greek violence.

(11) The British Prime Minister admitted to his defense secretary that he and American president Dwight Eisenhower approved a plan in 1957 to carry out attacks in Syria and blame it on the Syrian government as a way to effect regime change.

(12) The former Italian Prime Minister, an Italian judge, and the former head of Italian counterintelligence admit that NATO, with the help of the Pentagon and CIA, carried out terror bombings in Italy and other European countries in the 1950s through the 1980s and blamed the communists, in order to rally people’s support for their governments in Europe in their fight against communism.

As one participant in this formerly-secret program stated: “You had to attack civilians, people, women, children, innocent people, unknown people far removed from any political game. The reason was quite simple. They were supposed to force these people, the Italian public, to turn to the state to ask for greater security” … so that “a state of emergency could be declared, so people would willingly trade part of their freedom for the security” (and see this) (Italy and other European countries subject to the terror campaign had joined NATO before the bombings occurred). And watch this BBC special. They also allegedly carried out terror attacks in France, Belgium, Denmark, Germany, Greece, the Netherlands, Norway, Portugal, the UK, and other countries.

The CIA also stressed to the head of the Italian program that Italy needed to use the program to control internal uprisings.

False flag attacks carried out pursuant to this program include – by way of example only:

(13) In 1960, American Senator George Smathers suggested that the U.S. launch “a false attack made on Guantanamo Bay which would give us the excuse of actually fomenting a fight which would then give us the excuse to go in and [overthrow Castro]”.

(14) Official State Department documents show that, in 1961, the head of the Joint Chiefs and other high-level officials discussed blowing up a consulate in the Dominican Republic in order to justify an invasion of that country. The plans were not carried out, but they were all discussed as serious proposals.

(15) As admitted by the U.S. government, recently declassified documents show that in 1962, the American Joint Chiefs of Staff signed off on a plan to blow up AMERICAN airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. See the following ABC news reportthe official documents; and watch this interview with the former Washington Investigative Producer for ABC’s World News Tonight with Peter Jennings.

(16) In 1963, the U.S. Department of Defense wrote a paper promoting attacks on nations within the Organization of American States – such as Trinidad-Tobago or Jamaica – and then falsely blaming them on Cuba.

(17) The U.S. Department of Defense also suggested covertly paying a person in the Castro government to attack the United States: “The only area remaining for consideration then would be to bribe one of Castro’s subordinate commanders to initiate an attack on Guantanamo.”

(18) A U.S. Congressional committee admitted that – as part of its “Cointelpro” campaign – the FBI had used many provocateurs in the 1950s through 1970s to carry out violent acts and falsely blame them on political activists.

(19) A top Turkish general admitted that Turkish forces burned down a mosque on Cyprus in the 1970s and blamed it on their enemy. He explained: “In Special War, certain acts of sabotage are staged and blamed on the enemy to increase public resistance. We did this on Cyprus; we even burnt down a mosque.” In response to the surprised correspondent’s incredulous look the general said, “I am giving an example”.

(20) A declassified 1973 CIA document reveals a program to train foreign police and troops on how to make booby traps, pretending that they were training them on how to investigate terrorist acts:

The Agency maintains liaison in varying degrees with foreign police/security organizations through its field stations ….

[CIA provides training sessions as follows:]

a. Providing trainees with basic knowledge in the uses of commercial and military demolitions and incendiaries as they may be applied in terrorism and industrial sabotage operations.

b. Introducing the trainees to commercially available materials and home laboratory techniques, likely to he used in the manufacture of explosives and incendiaries by terrorists or saboteurs.

c. Familiarizing the trainees with the concept of target analysis and operational planning that a saboteur or terrorist must employ.

d. Introducing the trainees to booby trapping devices and techniques giving practical experience with both manufactured and improvised devices through actual fabrication.

***

The program provides the trainees with ample opportunity to develop basic familiarity and use proficiently through handling, preparing and applying the various explosive charges, incendiary agents, terrorist devices and sabotage techniques.

(21) The German government admitted (and see this) that, in 1978, the German secret service detonated a bomb in the outer wall of a prison and planted “escape tools” on a prisoner – a member of the Red Army Faction – which the secret service wished to frame the bombing on.

(22) A Mossad agent admits that, in 1984, Mossad planted a radio transmitter in Gaddaffi’s compound in Tripoli, Libya which broadcast fake terrorist transmissions recorded by Mossad, in order to frame Gaddaffi as a terrorist supporter. Ronald Reagan bombed Libya immediately thereafter.

(23) The South African Truth and Reconciliation Council found that, in 1989, the Civil Cooperation Bureau (a covert branch of the South African Defense Force) approached an explosives expert and asked him “to participate in an operation aimed at discrediting the ANC [the African National Congress] by bombing the police vehicle of the investigating officer into the murder incident”, thus framing the ANC for the bombing.

(24) An Algerian diplomat and several officers in the Algerian army admit that, in the 1990s, the Algerian army frequently massacred Algerian civilians and then blamed Islamic militants for the killings (and see this video; and Agence France-Presse, 9/27/2002, French Court Dismisses Algerian Defamation Suit Against Author).

(25) In 1993, a bomb in Northern Ireland killed 9 civilians. Official documents from the Royal Ulster Constabulary (i.e. the British government) show that the mastermind of the bombing was a British agent, and that the bombing was designed to inflame sectarian tensions. And see this and this.

(26) The United States Army’s 1994 publication Special Forces Foreign Internal Defense Tactics Techniques and Procedures for Special Forces – updated in 2004 – recommends employing terrorists and using false flag operations to destabilize leftist regimes in Latin America. False flag terrorist attacks were carried out in Latin America and other regions as part of the CIA’s “Dirty Wars“. And see this.

(27) Similarly, a CIA “psychological operations” manual prepared by a CIA contractor for the Nicaraguan Contra rebels noted the value of assassinating someone on your own side to create a “martyr” for the cause. The manual was authenticated by the U.S. government. The manual received so much publicity from Associated Press, Washington Post and other news coverage that – during the 1984 presidential debate – President Reagan was confronted with the following question on national television:

At this moment, we are confronted with the extraordinary story of a CIA guerrilla manual for the anti-Sandinista contras whom we are backing, which advocates not only assassinations of Sandinistas but the hiring of criminals to assassinate the guerrillas we are supporting in order to create martyrs.

(28) A Rwandan government inquiry admitted that the 1994 shootdown and murder of the Rwandan president, who was from the Hutu tribe – a murder blamed by the Hutus on the rival Tutsi tribe, and which led to the massacre of more than 800,000 Tutsis by Hutus – was committed by Hutu soldiers and falsely blamed on the Tutis.

(29) An Indonesian government fact-finding team investigated violent riots which occurred in 1998, and determined that “elements of the military had been involved in the riots, some of which were deliberately provoked”.

(30) Senior Russian Senior military and intelligence officers admit that the KGB blew up Russian apartment buildings in 1999 and falsely blamed it on Chechens, in order to justify an invasion of Chechnya (and see this report and this discussion).

(31) As reported by the New York TimesBBC and Associated Press, Macedonian officials admit that in 2001, the government murdered 7 innocent immigrants in cold blood and pretended that they were Al Qaeda soldiers attempting to assassinate Macedonian police, in order to join the “war on terror”. They lured foreign migrants into the country, executed them in a staged gun battle, and then claimed they were a unit backed by Al Qaeda intent on attacking Western embassies”. Specifically, Macedonian authorities had lured the immigrants into the country, and then – after killing them – posed the victims with planted evidence – “bags of uniforms and semiautomatic weapons at their side” – to show Western diplomats.

(32) At the July 2001 G8 Summit in Genoa, Italy, black-clad thugs were videotaped getting out of police cars, and were seen by an Italian MP carrying “iron bars inside the police station”. Subsequently, senior police officials in Genoa subsequently admitted that police planted two Molotov cocktails and faked the stabbing of a police officer at the G8 Summit, in order to justify a violent crackdown against protesters.

(33) The U.S. falsely blamed Iraq for playing a role in the 9/11 attacks – as shown by a memo from the defense secretary – as one of the main justifications for launching the Iraq war.

Even after the 9/11 Commission admitted that there was no connection, Dick Cheney said that the evidence is “overwhelming” that al Qaeda had a relationship with Saddam Hussein’s regime, that Cheney “probably” had information unavailable to the Commission, and that the media was not ‘doing their homework’ in reporting such ties. Top U.S. government officials now admit that the Iraq war was really launched for oil … not 9/11 or weapons of mass destruction.

Despite previous “lone wolf” claims, many U.S. government officials now say that 9/11 was state-sponsored terror; but Iraq was not the state which backed the hijackers. (Many U.S. officials have allegedthat 9/11 was a false flag operation by rogue elements of the U.S. government; but such a claim is beyond the scope of this discussion. The key point is that the U.S. falsely blamed it on Iraq, when it knew Iraq had nothing to do with it.). 

(Additionally, the same judge who has shielded the Saudis for any liability for funding 9/11 has awarded a default judgment against Iran for $10.5 billion for carrying out 9/11 … even though no one seriously believes that Iran had any part in 9/11.)

(34) Although the FBI now admits that the 2001 anthrax attacks were carried out by one or more U.S. government scientists, a senior FBI official says that the FBI was actually told to blame the Anthrax attacks on Al Qaeda by White House officials (remember what the anthrax letters looked like). Government officials also confirm that the white House tried to link the anthrax to Iraq as a justification for regime change in that country. And see this.

(35) According to the Washington Post, Indonesian police admit that the Indonesian military killed American teachers in Papua in 2002 and blamed the murders on a Papuan separatist group in order to get that group listed as a terrorist organization.

(36) The well-respected former Indonesian president also admits that the government probably had a role in the Bali bombings.

(37) Police outside of a 2003 European Union summit in Greece were filmed planting Molotov cocktails on a peaceful protester.

(38) In 2003, the U.S. Secretary of Defense admitted that interrogators were authorized to use the following method: “False Flag: Convincing the detainee that individuals from a country other than the United States are interrogating him.” While not a traditional false flag attack, this deception could lead to former detainees – many of whom were tortured – attacking the country falsely blamed for the interrogation and torture.

(39) Former Department of Justice lawyer John Yoo suggested in 2005 that the US should go on the offensive against al-Qaeda, having “our intelligence agencies create a false terrorist organization. It could have its own websites, recruitment centers, training camps, and fundraising operations. It could launch fake terrorist operations and claim credit for real terrorist strikes, helping to sow confusion within al-Qaeda’s ranks, causing operatives to doubt others’ identities and to question the validity of communications.”

(40) Similarly, in 2005, Professor John Arquilla of the Naval Postgraduate School – a renowned US defense analyst credited with developing the concept of ‘netwar’ – called for western intelligence services to create new “pseudo gang” terrorist groups, as a way of undermining “real” terror networks. According to Pulitzer-Prize winning journalist Seymour Hersh, Arquilla’s ‘pseudo-gang’ strategy was, Hersh reported, already being implemented by the Pentagon:

“Under Rumsfeld’s new approach, I was told, US military operatives would be permitted to pose abroad as corrupt foreign businessmen seeking to buy contraband items that could be used in nuclear-weapons systems. In some cases, according to the Pentagon advisers, local citizens could be recruited and asked to join up with guerrillas or terrorists

The new rules will enable the Special Forces community to set up what it calls ‘action teams’ in the target countries overseas which can be used to find and eliminate terrorist organizations. ‘Do you remember the right-wing execution squads in El Salvador?’ the former high-level intelligence official asked me, referring to the military-led gangs that committed atrocities in the early nineteen-eighties. ‘We founded them and we financed them,’ he said. ‘The objective now is to recruit locals in any area we want. And we aren’t going to tell Congress about it.’ A former military officer, who has knowledge of the Pentagon’s commando capabilities, said, ‘We’re going to be riding with the bad boys.’”

(41) United Press International reported in June 2005:

U.S. intelligence officers are reporting that some of the insurgents in Iraq are using recent-model Beretta 92 pistols, but the pistols seem to have had their serial numbers erased. The numbers do not appear to have been physically removed; the pistols seem to have come off a production line without any serial numbers. Analysts suggest the lack of serial numbers indicates that the weapons were intended for intelligence operations or terrorist cells with substantial government backing. Analysts speculate that these guns are probably from either Mossad or the CIA. Analysts speculate that agent provocateurs may be using the untraceable weapons even as U.S. authorities use insurgent attacks against civilians as evidence of the illegitimacy of the resistance.

(42) In 2005, British soldiers dressed as Arabs were caught by Iraqi police after a shootout against the police. The soldiers apparently possessed explosives, and were accused of attempting to set off bombs. While none of the soldiers admitted that they were carrying out attacks, British soldiers and a column of British tanks stormed the jail they were held in, broke down a wall of the jail, and busted them out. The extreme measures used to free the soldiers – rather than have them face questions and potentially stand trial – could be considered an admission.

(43) Undercover Israeli soldiers admitted in 2005 to throwing stones at other Israeli soldiers so they could blame it on Palestinians, as an excuse to crack down on peaceful protests by the Palestinians.

(44) Quebec police admitted that, in 2007, thugs carrying rocks to a peaceful protest were actually undercover Quebec police officers (and see this).

(45) A 2008 US Army special operations field manual recommends that the U.S. military use surrogate non-state groups such as “paramilitary forces, individuals, businesses, foreign political organizations, resistant or insurgent organizations, expatriates, transnational terrorism adversaries, disillusioned transnational terrorism members, black marketers, and other social or political ‘undesirables.’” The manual specifically acknowledged that U.S. special operations can involve both counterterrorism and “Terrorism” (as well as “transnational criminal activities, including narco-trafficking, illicit arms-dealing, and illegal financial transactions.”)

(46) The former Italian Prime Minister, President, and head of Secret Services (Francesco Cossiga) advised the 2008 minister in charge of the police, on how to deal with protests from teachers and students:

He should do what I did when I was Minister of the Interior … infiltrate the movement with agents provocateurs inclined to do anything …. And after that, with the strength of the gained population consent, … beat them for blood and beat for blood also those teachers that incite them. Especially the teachers. Not the elderly, of course, but the girl teachers yes.

(47) An undercover officer admitted that he infiltrated environmental, leftwing and anti-fascist groups in 22 countries. Germany’s federal police chief admitted that – while the undercover officer worked for the German police – he acted illegally during a G8 protest in Germany in 2007 and committed arson by setting fire during a subsequent demonstration in Berlin. The undercover officer spent many years living with violent “Black Bloc” anarchists.

(48) Denver police admitted that uniformed officers deployed in 2008 to an area where alleged “anarchists” had planned to wreak havoc outside the Democratic National Convention ended up getting into a melee with two undercover policemen. The uniformed officers didn’t know the undercover officers were cops.

(49) At the G20 protests in London in 2009, a British member of parliament saw plain clothes police officers attempting to incite the crowd to violence.

(50) The oversight agency for the Royal Canadian Mounted Police admitted that – at the G20 protests in Toronto in 2010 – undercover police officers were arrested with a group of protesters. Videos and photos (see this and this, for example) show that violent protesters wore very similar boots and other gear as the police, and carried police batons. The Globe and Mail reports that the undercover officers planned the targets for violent attack, and the police failed to stop the attacks.

(51) Egyptian politicians admitted (and see this) that government employees looted priceless museum artifacts 2011 to try to discredit the protesters.

(52) Austin police admit that 3 officers infiltrated the Occupy protests in that city. Prosecutors admit that one of the undercover officers purchased and constructed illegal “lock boxes” which ended up getting many protesters arrested.

(53) In 2011, a Colombian colonel admitted that he and his soldiers had lured 57 innocent civilians and killed them – after dressing many of them in uniforms – as part of a scheme to claim that Columbia was eradicating left-wing terrorists. And see this.

(54) Rioters who discredited the peaceful protests against the swearing in of the Mexican president in 2012 admitted that they were paid 300 pesos each to destroy everything in their path. According to Wikipedia, photos also show the vandals waiting in groups behind police lines prior to the violence.

(55) On November 20, 2014, Mexican agent provocateurs were transported by army vehicles to participate in the 2014 Iguala mass kidnapping protests, as was shown by videos and pictures distributed via social networks.

(56) The highly-respected writer for the Telegraph Ambrose Evans-Pritchard says that the head of Saudi intelligence – Prince Bandar – recently admitted that the Saudi government controls “Chechen” terrorists.

(57) Two members of the Turkish parliamenthigh-level American sources and others admitted that the Turkish government – a NATO country – carried out the chemical weapons attacks in Syria and falsely blamed them on the Syrian government; and high-ranking Turkish government admitted on tape plans to carry out attacks and blame it on the Syrian government.

(58) The former Director of the NSA and other American government officials admit said that the U.S. is a huge supporter of terrorism. Jimmy Carter’s National Security Adviser Zbigniew Brzezinski admitted on CNN that the U.S. organized and supported Bin Laden and the other originators of “Al Qaeda” in the 1970s to fight the Soviets. The U.S. and its allies have been supporting Al Qaeda and other Islamic terrorist groups for many decades, and providing them arms, money and logistical support in LibyaSyriaMaliBosniaChechnyaIran, and many other countries. U.S. allies are also directly responsible for creating and supplying ISIS.

It’s gotten so ridiculous that a U.S. Senator has introduced a “Stop Arming Terrorists Act”, and U.S. Congresswoman – who introduced a similar bill in the House – says: “For years, the U.S. government has been supporting armed militant groups working directly with and often under the command of terrorist groups like ISIS and al-Qaeda in their fight to overthrow the Syrian government.”

(59) The Ukrainian security chief admits that the sniper attacks which started the Ukrainian coup were carried out in order to frame others. Ukrainian officials admit that the Ukrainian snipers fired on both sides, to create maximum chaos.

(60) Speaking of snipers, in a secret recording, Venezuelan generals admit that they will deploy snipers to shoot protesters, but keep the marksmen well-hidden from demonstrator and the reporters covering the events so others would be blamed for the deaths.

(61) Burmese government officials admitted that Burma (renamed Myanmar) used false flag attacks against Muslim and Buddhist groups within the country to stir up hatred between the two groups, to prevent democracy from spreading.

(62) Israeli police were again filmed in 2015 dressing up as Arabs and throwing stones, then turning over Palestinian protesters to Israeli soldiers.

(63) Britain’s spy agency has admitted (and see this) that it carries out “digital false flag” attacks on targets, framing people by writing offensive or unlawful material … and blaming it on the target.

(64) The CIA has admitted that it uses viruses and malware from Russia and other countries to carry out cyberattacks and blame other countries.

(65) U.S. soldiers have admitted that if they kill innocent Iraqis and Afghanis, they then “drop” automatic weapons near their body so they can pretend they were militants.

(66) Similarly, police frame innocent people for crimes they didn’t commit. The practice is so well-known that the New York Times noted in 1981:

In police jargon, a throwdown is a weapon planted on a victim.

Newsweek reported in 1999:

Perez, himself a former [Los Angeles Police Department] cop, was caught stealing eight pounds of cocaine from police evidence lockers. After pleading guilty in September, he bargained for a lighter sentence by telling an appalling story of attempted murder and a “throwdown”–police slang for a weapon planted by cops to make a shooting legally justifiable. Perez said he and his partner, Officer Nino Durden, shot an unarmed 18th Street Gang member named Javier Ovando, then planted a semiautomatic rifle on the unconscious suspect and claimed that Ovando had tried to shoot themduring a stakeout.

Wikipedia notes:

As part of his plea bargain, Pérez implicated scores of officers from the Rampart Division’s anti-gang unit, describing routinely beating gang members, planting evidence on suspects, falsifying reports and covering up unprovoked shootings.

(As a side note – and while not technically false flag attacks – police have been busted framing innocent people in many other ways, as well.)

(67) A former U.S. intelligence officer recently alleged:

Most terrorists are false flag terrorists or are created by our own security services.

(68) The head and special agent in charge of the FBI’s Los Angeles office said that most terror attacks are committed by the CIA and FBI as false flags.

(69) The Director of Analytics at the interagency Global Engagement Center housed at the U.S. Department of State, also an adjunct professor at George Mason University, where he teaches the graduate course National Security Challenges in the Department of Information Sciences and Technology, a former branch chief in the CIA’s Counterterrorism Center, and an intelligence advisor to the Secretary of Homeland Security (J.D. Maddox) notes:

Provocation is one of the most basic, but confounding, aspects of warfare. Despite its sometimes obvious use, it has succeeded consistently against audiences around the world, for millennia, to compel war. A well-constructed provocation narrative mutes even the most vocal opposition.

***

The culmination of a strategic provocation operation invariably reflects a narrative of victimhood: we are the 
victims of the enemy’s unforgivable atrocities.

***

In the case of strategic provocation the deaths of an aggressor’s own personnel are a core tactic of the provocation.

***

The persistent use of strategic provocation over centuries – and its apparent importance to war planners – begs the question of its likely use by the US and other states in the near term.

(70) Leaders throughout history have acknowledged the “benefits” of of false flags to justify their political agenda:

Terrorism is the best political weapon for nothing drives people harder than a fear of sudden death”.
– Adolph Hitler

“Why of course the people don’t want war … But after all it is the leaders of the country who determine the policy, and it is always a simple matter to drag the people along, whether it is a democracy, or a fascist dictatorship, or a parliament, or a communist dictatorship … Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is to tell them they are being attacked, and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same in any country.”
– Hermann Goering, Nazi leader.

“The easiest way to gain control of a population is to carry out acts of terror. [The public] will clamor for such laws if their personal security is threatened”.
– Josef Stalin

Postscript 1:  It is not just “modern” nations which have launched false flag attacks. For example, a Native American from one tribe (Pomunkey) murdered a white Englishwoman living in Virginia in 1697 and then falsely blamed it on second tribe (Piscataway). But he later admitted in court that he was not really Piscataway, and that he had been paid by a provocateur from a third tribe (Iroquois) to kill the woman as a way to start a war between the English and the Piscataway, thus protecting the profitable Iroquois monopoly in trade with the English.

Postscript 2:  On multiple occasions, atrocities or warmongering are falsely blamed on the enemy as a justification for war … when no such event ever occurred. This is more like a “fake flag” than a “false flag”, as no actual terrorism occurred.

For example:

  • The NSA admits that it lied about what really happened in the Gulf of Tonkin incident in 1964 … manipulating data to make it look like North Vietnamese boats fired on a U.S. ship so as to create a false justification for the Vietnam war
  • One of the central lies used to justify the 1991 Gulf War against Iraq after Iraq invaded Kuwait was the false statement by a young Kuwaiti girl that Iraqis murdered Kuwaiti babies in hospitals. Her statement was arranged by a Congressman who knew that she was actually the daughter of the Kuwaiti Ambassador to the U.S. – who was desperately trying to lobby the U.S. to enter the war – but the Congressman hid that fact from the public and from Congress
  • Pulitzer prize-winning journalist Ron Suskind reported that the White House ordered the CIA to forge and backdate a document falsely linking Iraq with Muslim terrorists and 9/11 … and that the CIA complied with those instructions and in fact created the forgery, which was then used to justify war against Iraq. And see this and this
  • Time magazine points out that the claim by President Bush that Iraq was attempting to buy “yellow cake” Uranium from Niger:

had been checked out — and debunked — by U.S. intelligence a year before the President repeated it.

  • The “humanitarian” wars in Syria, Libya and Yugoslavia were all justified by highly exaggerated reports that the leaders of those countries were committing atrocities against their people. And see this

Afterword: The corporate media will likely never report on false flags … as it is ALWAYS pro-war.

Posted in Authoritarianism, black ops, conditioning, Conspiracy, corporate news, culture, divide and conquer, Dystopia, Empire, False Flag, History, news, propaganda, Psy-ops, Social Control, Social Engineering, society, State Crime, war, war on terror | Tagged , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Conspiracy Theory

By Paul Craig Roberte

Source: PaulCraigRoberts.org

In the United States “conspiracy theory” is the name given to explanations that differ from those that serve the ruling oligarchy, the establishment or whatever we want to call those who set and control the agendas and the explanations that support the agendas.

The explanations imposed on us by the ruling class are themselves conspiracy theories. Moreover, they are conspiracy theories designed to hide the real conspiracy that our rulers are operating.

For example, the official explanation of 9/11 is a conspiracy theory. Some Muslims, mainly Saudi Arabians, delivered the greatest humiliation to a superpower since David slew Goliath. They outsmarted all 17 US intelligence agencies and those of NATO and Israel, the National Security Council, the Transportation Safety Administration, Air Traffic Control, and Dick Cheney, hijacked four US airliners on one morning, brought down three World Trade Center skyscrapers, destroyed that part of the Pentagon where research was underway into the missing $2.3 trillion, and caused the morons in Washington to blame Afghanistan instead of Saudi Arabia.

Clearly, the Saudia Arabians who humiliated Ameria were involved in a conspiracy to do so.

Is it a believable conspiracy?

The ability of a few young Muslim men to pull off such a feat is unbelievable. Such total failure of the US National Security State means that America was blindly vulnerable throughout the decades of Cold War with the Soviet Union. If such total failure of the National Security State had really occurred, the White House and Congress would have been screaming for an investigation. People would have been held accountable for the long chain of security failures that allowed the plot to succeed. Instead, no one was even reprimanded, and the White House resisted all efforts for an investigation for a year. Finally, to shut up the 9/11 families, a 9/11 Commission was convened. The commission duly wrote down the government’s story and that was the “investigation.”

Moreover, there is no evidence to support the official conspiracy theory of 9/11. Indeed, all known evidence contradicts the official conspiracy theory.

For example, it is a proven fact that Building 7 came down at freefall acceleration, which means it was wired for demolition. Why was it wired for demolition? There is no official answer to this question.

It is the known evidence provided by scientists, architects, engineers, pilots, and the first responders who were in the twin towers and personally experienced the numerous explosions that brought down the towers that is described as a conspiracy theory.

The CIA introduced the term “conspiracy theory” into public discourse as part of its action plan to discredit skeptics of the Warren Commission report on the assassination of President John F. Kennedy. Any explanation other than the one handed down, which is contradicted by all known evidence, was debunked as a conspiracy theory.

Conspiracy theories are the backbone of US foreign policy. For example, the George W. Bush regime was active in a conspiracy against Iraq and Saddam Hussein. The Bush regime created fake evidence of Iraqi “weapons of mass destruction,” sold the false story to a gullible world and used it to destroy Iraq and murder its leader. Similarly, Gaddafi was a victim of an Obama/Hillary conspiracy to destroy Libya and murder Gaddafi. Assad of Syria and Iran were slated for the same treatment until the Russians intervened.

Currently, Washington is engaged in conspiracies against Russia, China, and Venezuela. Proclaiming a non-existent “Iranian threat,” Washington put US missiles on Russia’s border and used the “North Korean threat” to put missiles on China’s border. The democratically elected leader of Venezuela is said by Washington to be a dictator, and sanctions have been put on Venezuela to help the small Spanish elite through whom Washington has traditionally ruled South American countries pull off a coup and reestablish US control over Venezuela.

Everyone is a threat: Venezuela, Yemen, Syria, Iran, Iraq, Afghanistan, tribes in Pakistan, Libya, Russia, China, North Korea, but never Washington. The greatest conspiracy theory of our time is that Americans are surrounded by foreign threats. We are not even safe from Venezuela.

The New York Times, the Washington Post, CNN, NPR, and the rest of the presstitutes are quick to debunk as conspiracy theories all explanations that differ from the explanations of the ruling interests that the presstitutes serve.

Yet, as I write and for some nine months to date, the presstitute media has itself been promoting the conspiracy theory that Donald Trump was involved in a conspiracy with the president of Russia and Russian intelligence services to hack the US presidential election and place Trump, a Russian agent, in the White House.

This conspiracy theory has no evidence whatsoever. It doesn’t need evidence, because it serves the interests of the military/security complex, the Democratic Party, the neoconservatives, and permits the presstitutes to show lavish devotion to their masters. By endless repetition a lie becomes truth.

There is a conspiracy, and it is against the American people. Their jobs have been offshored in order to enrich the already rich. They have been forced into debt in a futile effort to maintain their living standards. Their effort to stem their decline by electing a president who spoke for them is being subverted before their eyes by an utterly corrupt media and ruling class.

Sooner or later it will dawn on them that there is nothing they can do but violently revolt. Most likely, by the time they reach this conclusion it will be too late. Americans are very slow to escape from the false reality in which they live. Americans are a thoroughly brainwashed people who hold tightly to their false life within The Matrix.

For the gullible and naive who have been brainwashed into believing that any explanation that differs from the officially-blessed one is a conspiracy theory, there are available online long lists of government conspiracies that succeeded in deceiving the people in order that the governments could achieve agendas that the people would have rejected.

If liberty continues to exist on earth, it will not be in the Western world. It will be in Russia and China, countries that emerged out of the opposite and know the value of liberty, and it will be in those South American countries, such as Venezuela, Ecuador, and Bolivia that fight for their sovereignty against American oppression.

Indeed, as historians unconcerned with their careers are beginning to write, the primary lesson in history is that governments deceive their peoples.

Everywhere in the Western world, government is a conspiracy against the people.

Posted in black ops, CIA, Conspiracy, corporate news, culture, Deep State, Dystopia, Empire, False Flag, Geopolitics, History, media, propaganda, Psy-ops, Social Control, Social Engineering, society, State Crime, war, war on terror | Tagged , , , , , , , , , , , , , , , , | 3 Comments

Played by the Ruling Elite’s Control System, It’s Time for a New Paradigm

By Paul A. Philips

Source: Waking Times

People are waking up in droves, but the majority continue to be played by the ruling elite’s control system, unaware that almost every subject under the sun is rigged: In effect we are confined to living in a false or limiting paradigm. Against the ‘insurmountable odds,’ will there ever be a new paradigm experience? Having seen through the grand deception, will the awakened ever change the control system? Can we somehow go on to cultivate new theories and practices for a humane new paradigm experience, one that will create a world that truly makes a difference for everyone?

Before answering, here are just some of the ways in which the majority people in their ignorance are played by the ruling elite’s control system in the current false or limiting paradigm.

1. Fake science

Corporate/Banker sponsored pseudo-science has had a grip on humanity for quite some time, headed by highly dogmatic fake guru scientists. Try telling some followers in the church of scientism that these so-called Gurus are fake and wrong; they may look at you as if you have 3 heads, no matter how knowledgeable you are or good at communicating the real science.

(Hint:  Why were we taught very little or nothing about Nikola Tesla in school..?)

2. Fake Political Parties

Indeed, the awakened know that regardless of who’s in power all the major political party leaders are only puppets to the ruling elite puppet masters. Thus, the ruling elite make all the major political decisions regardless of who’s in power, making the parties and their leaders irrelevant. The masses are distracted from waking up to the realization of this: For instance, one of the latest tricks used to con the masses into giving their support has been to make the leader of a political party look like an ‘outsider’ who will not walk the dictated political white line.

As in the case of Trump during his presidential election campaign, he came across as an ‘outsider,’ telling the masses what they wanted to hear. He came across as anti-establishment. But in the end, his long lists of anti-establishment promises did not get fulfilled: The false promises were nothing more than gimmicks to win votes, while the same old same old still continues…

3. Fake Wars

Sadly, the majority are still falling for the fake wars narratives with their related psyops; false flags or divide and rule tactics, pushed on us for the ulterior motives of power, profit and political gains. The warmongers, aided and abetted by the mainstream media (real fake news) threaten the existence of not only every man, woman and child, but all life forms on this planet if nuclear war breaks out.

To find out what those war-hungry leaders don’t want you to know about go HERE.

4. Played by the ‘Beneficial’ Deception

As part of the deception, to get approval, the ruling elite present their agendas as ‘beneficial’ when, in fact, they are actually harmful or enslaving to the masses. The greater the difference between something that is perceived by the masses as ‘beneficial’ compared to the opposite of what it really is, the easier the elite can advance their agendas.

Agenda 2030 (Agenda 21 on speed), is a classic example. To take a look at how the perceived ‘benefits’ are presented, but, are in truth, extremely damaging, go HERE.

5. Played by ‘Confusion’

One of the tricks used to cover-up information and allow hidden crooked agendas to continue is to put the masses into a state of confusion or neutrality.

For example, through Big Pharma shills with their disinformation and/or the cover-up of scientific evidence in the elite’s owned and controlled mainstream media, the masses have been duped into confusion, not knowing what to do regarding choices on life-saving alternative health practices…

6. Played into Being Comfortably Numb

Are you comfortably numb or a truth-seeking activist?

Ruled and divided, wilfully ignorant and apathetic to the woes of the world, some people love their comfort zone so much they will do all they can to remain there. To avoid confrontation, they go into agreement with the general consensus of the masses while blindly accepting the rule of authority without ever questioning.

Labelled as Stockholm syndrome, some people even love their servitude under the rule of authority. Such individuals affected grovel away their lives in victimhood without ever realizing they’ve been ensnared in a web of deceit, while their cognitive dissonance and denial plays a major part in maintaining the status quo…

Many folks have been played into mindless habituation. For example, many spend endless hours languishing away, watching the T.V (moron box) brainwashed by mainstream media broadcasts…

 In effect, consistent with the Pink Floyd song these people have become “Comfortably numb…”

-Indeed the list goes on where so many are played by the ruling elite’s control system

Creating the New Paradigm

A major response to the imprisoning control system is to disconnect. Here are just a few examples:

Disconnect from giving your support to those power-drunk, dishonest, egomaniacal puppet politicians. All Western World government is a myth because it has been designed to give the illusion of choice or change. It’s the puppet masters we really need to get at not so much the puppeteered politicians. We need to expose their inhumane criminal activities to the world…

Disconnect from the increasingly health-threatening wireless technology and the internet of things. Stop using ‘smart’ technology (dumb technology). Stop using the electronic appliances: No longer giving these appliances to kids would be a good start. Stop using credit cards… Find alternative ways of bypassing the system…

Disconnect from consuming disease-causing food and water poisoned with GMO technology, toxic ingredients and additives, irradiated by nutrient-nuking manufacturing processes… Refuse toxic medicines such as vaccines. Foods and medicines are killing us. The select few belonging to the related establishments manufacturing the medicines are making trillions on us as a consequence of our increasing disease…

Disconnect from the greed-driven mega-corporations swallowing up small businesses while depriving the freedom of their owners in the monopolies. Support the small business man.

Reconnecting with our True Self

Humans have now reached unprecedented levels of selfishness. We are running amok with narcissism, materialistic greed and consumerism while the rich get even richer: It’s now been reported that 5 people nearly have as much wealth as half the world’s population. Around 90% of the world’s population lives in poverty. Mega-corporations are getting even fatter. Consider the case of Jeff Bezos and Amazon as an example…

-In effect we have been pushed to the limits. All this only adds up to the realization that change has to happen. The control system’s imprisoning status quo has to end as it continues to be an ever widening mismatch compared to our ongoing awakening.

Besides making the effort to disconnect from the ruling Elite’s control system, to stop us from being dictated, we also need to change our ways by reconnecting with our true self.

Reconnecting with the true self means changing our inner world to make intended changes manifest in our outer world. We need to be a stand for truth, honesty, integrity, kindness, caring and compassion for governing ourselves in a new paradigm experience.

So many people eek away their daily existences in dissatisfaction, frustration and servitude: It’s time that we felt good about ourselves again; make the shift from victim to victor… A monumental task, of course, but for our survival we need an open mindedness and open heartedness to build the multiple layers needed for complete change so that the new system is solid enough to bring lasting peace. Peace for ourselves, our children and their children to be.

Posted in Authoritarianism, conditioning, consciousness, Conspiracy, Corporate Crime, corporate news, culture, Dystopia, Election Fraud, Empire, GMOs, media, Militarization, news, Philosophy, propaganda, Psy-ops, Psychology, Social Control, Social Engineering, society, Sociology, Spirituality, State Crime, war | Tagged , , , , , , , , , , , , , , , , , | 1 Comment

Saturday Matinee: The President’s Analyst

“The President’s Analyst” (1967) is a political satire written and directed by Ted Flicker. James Coburn stars as Dr. Sidney Schaefer, a psychiatrist recruited by the U.S. government to serve as the president’s private psychoanalyst. Overwhelmed by stress and paranoia, he goes on the lam and is promptly hunted down by foreign and domestic intelligence agents as a pawn in a technocratic plot to control the world. The film’s comedic sensibility is at times dated but features themes which are even more relevant today such as the conflict between power and ethics, transhumanist aspirations of Big Data corporations, the ever-encroaching surveillance state and resultant loss of privacy.

Watch the full film here.

Posted in Art, Conspiracy, culture, Film, Humor, Saturday Matinee, Video | Tagged , , , , , | Leave a comment

Profit Maximization is Easy: Invest in Violence

By Robert J. Burrowes

For those of us committed to systematically reducing and, one day, ending human violence, it is vital to understand what is causing and driving it so that effective strategies can be developed for dealing with violence in its myriad contexts. For an understanding of the fundamental cause of violence, see ‘Why Violence?’

However, while we can tackle violence at its source by each of us making and implementing ‘My Promise to Children’, the widespread violence in our world is driven by just one factor: fear or, more accurately, terror. And I am not talking about jihadist terror or even the terror caused by US warmaking. Let me explain, starting from the beginning.

The person who is fearless has no use for violence and has no trouble achieving their goals, including their own defence, without it. But fearlessness is a state that few humans would claim. Hence violence is rampant.

Moreover, once someone is afraid, they will be less likely to perceive the truth behind the delusions with which they are presented. They will also be less able to access and rely on other mental functions, such as conscience and intelligence, to decide their course of action in any context. Worse still, the range of their possible responses to perceived threats will be extremely limited. And they will be more easily mobilised to support or even participate in violence, in the delusional belief that this will make them safe.

For reasons such as these, it is useful for political and corporate elites to keep us in a state of fear: social control is much easier in this context. But so is profit maximization. And the most profitable enterprise on the planet is violence. In essence then: more violence leads to more fear making it easier to gain greater social control to inflict more violence…. And starting early, by terrorizing children, is the most efficient way to initiate and maintain this cycle. See ‘Why Violence?’ and ‘Fearless Psychology and Fearful Psychology: Principles and Practice’.

So, for example, if you think the massive number of police killings of innocent civilians in the United States – see ‘Killed by Police’ and ‘The Counted: People killed by police in the US’ – is a problem, you are not considering it from the perspective of maintaining elite social control and maximizing corporate profit. Police killings of innocent civilians is just one (necessary) part of the formula for maintaining control and maximising profit.

This is because if you want to make a lot of money in this world, then killing or exploiting fellow human beings and destroying the natural world are the three most lucrative business enterprises on the planet. And we are now very good at it, as the record shows, with the planetary death toll from violence and exploitation now well over 100,000 human beings each day, 200 species driven to extinction each day and ecological destruction so advanced that the end of all life (not just human life) on Earth is postulated to occur within decades, if not sooner, depending on the scenario. See, for example, ‘The End of Being: Abrupt Climate Change One of Many Ecological Crises Threatening to Collapse the Biosphere’.

So what forms does this violence take? Here is a daily accounting.

Corporate capitalist control of national economies, held in place by military violence, kills vast numbers of people (nearly one million each week) by starving them to death in Africa, Asia and Central/South America. This is because this ‘economic’ system is designed and managed to allocate resources for military weapons and corporate profits for the wealthy, instead of resources for living.

Wars kill, wound and incapacitate a substantial number of civilians, mostly women and children, as do genocidal assaults, on a daily basis, in countries all over the planet. Wars also kill some soldiers and mercenaries.

Apart from those people we kill every day, we sell many women and children into sexual slavery, we kidnap children to terrorise them into becoming child soldiers and force men, women and children to work as slave labourers, in horrific conditions, in fields and factories (and buy the cheap products of their exploited labour as our latest ‘bargain’).

We condemn millions of people to live in poverty, homelessness and misery, even in industrialized countries where the refugees of western-instigated wars and climate-destroying policies are often treated with contempt. We cause many children to be born with grotesque genetic deformities because we use horrific weapons, like those with depleted uranium, on their parents. We also inflict violence on women and children in many other forms, ranging from ‘ordinary’ domestic violence to genital mutilation.

We ensnare and imprison vast numbers of people in the police-legal-prison complex. See ‘The Rule of Law: Unjust and Violent’. We pay the pharmaceutical industry and its handmaiden, psychiatry, to destroy our minds with drugs and electro-shocking. See ‘Defeating the Violence of Psychiatry’. We imprison vast numbers of children in school in the delusional belief that this is good for them. See ‘Do We Want School or Education?’ And we kill or otherwise exploit animals, mostly for human consumption, in numbers so vast the death toll is probably beyond calculation.

We also engage in an endless assault on the Earth’s biosphere. Apart from the phenomenal damage done to the environment and climate by military violence: we emit gases and pollutants to heat and destroy the atmosphere and destroy its oxygen content. We cut down and burn rainforests. We cut down mangroves and woodlands and pave grasslands. We poison the soil with herbicides and pesticides. We pollute the waterways and oceans with everything from carbon and nitrogenous fertilizers to plastic, as well as the radioactive contamination from Fukushima. And delude ourselves that our token gestures to remedy this destruction constitutes ‘conservation’.

So if you are seeking work, whether as a recent graduate or long-term unemployed person, then the most readily available form of work, where you will undoubtedly be exploited as well, is a government bureaucracy or large corporation that inflicts violence on life itself. Whether it is the military, the police, legal or prison system, a weapons, fossil fuel, banking, pharmaceutical, media, mining, agricultural, logging, food or water corporation, a farm that exploits animals or even a retail outlet that sells poisonous, processed and often genetically-mutilated substances under the label ‘food’ – see ‘Defeating the Violence in Our Food and Medicine’ – you will have many options to help add to the profits of those corporations and government ‘services’ that exist to inflict violence on you, your family and every other living being that shares this biosphere.

Tragically, genuinely ethical employment is a rarity because most industries, even those that seem benign like the education, finance, information technology and electronics industries, usually end up providing skilled personnel, finance, services or components that are used to inflict violence. And other industries such as those in insurance and superannuation, like the corporate banks, usually invest in violence (such as the military and fossil fuel industries): it is the most profitable.

So while many government bureaucracies and corporate industries exist to inflict violence, in one form or another, they can only do so because we are too scared to insist on seeking out ethical employment. In the end, we will take a job as a teacher, corporate journalist or pharmaceutical drug pusher, serve junk food, work in a bank, join the police or military, work in the legal system, assemble a weapons component… rather than ask ourselves the frightening questions ‘Is this nonviolent? Is this ethical? Does it enhance life?’

And yes, I know about structural violence and the way it limits options and opportunities for those of particular classes, races, genders…. But if ordinary people like us don’t consider moral issues and make moral choices, why should governments and corporations?

Moral choices? you might ask in confusion. In this day and age? Well, it might seem old-fashioned but, in fact, while most of us have been drawn along by the events in our life to make choices based on such considerations as self-interest, personal gain and ‘financial security’, there is a deeper path. Remember Gandhi? ‘True morality consists not in following the beaten track, but in finding the true path for ourselves, and fearlessly following it.’

Strange words they no doubt sound in this world where our attention is endlessly taken by all of those high-tech devices. But Gandhi’s words remind us that there is something deeper in life that the violence we have suffered throughout our lives has taken from us. The courage to be ourselves and to seek our own unique destiny.

Do you have this courage? To be yourself, rather than a cog in someone else’s machine? To refuse to submit to the violence that surrounds and overwhelms us on a daily basis?

If you are inclined to ponder these questions, you might also consider making moral choices that work systematically to end the violence in our world: consider participating in ‘The Flame Tree Project to Save Life on Earth’, signing the online pledge of ‘The People’s Charter to Create a Nonviolent World’ and/or helping to develop and implement an effective strategy to resist one or the other of the many threats to our survival using the strategic framework explained in Nonviolent Campaign Strategy.

Of course, these choices aren’t for everyone. As Gandhi observed: ‘Cowards can never be moral.’

 

Biodata: Robert J. Burrowes has a lifetime commitment to understanding and ending human violence. He has done extensive research since 1966 in an effort to understand why human beings are violent and has been a nonviolent activist since 1981. He is the author of ‘Why Violence?’ His email address is flametree@riseup.net and his website is here.

Robert J. Burrowes P.O. Box 68 Daylesford Victoria 3460 Australia

Email: flametree@riseup.net

Websites:
http://thepeoplesnonviolencecharter.wordpress.com (Nonviolence Charter)
http://tinyurl.com/flametree (Flame Tree Project to Save Life on Earth)
http://tinyurl.com/whyviolence (‘Why Violence?’)
https://nonviolentstrategy.wordpress.com/ (Nonviolent Campaign Strategy)
https://nonviolentliberationstrategy.wordpress.com/ (Nonviolent Defense/Liberation Strategy)
http://anitamckone.wordpress.com (Anita: Songs of Nonviolence)
http://robertjburrowes.wordpress.com (Robert)
https://globalnonviolencenetwork.wordpress.com/ (Global Nonviolence Network)

Posted in anti-war, conditioning, Corporate Crime, culture, Drug War, Economics, Environment, Militarization, Philosophy, police state, Psychology, Social Control, Social Engineering, society, Sociology, Spirituality, State Crime, war | Tagged , , , , , , , , , , , , , , , , , , , , , , | 2 Comments