Journalism

Libyan Internet reporter Mohammed Nabbous killed in Benghazi

198319_10150124194117310_507907309_6347192_2840306_n.jpg

Mohammad Nabbous, face of citizen journalism in Libya, is killed | World news | guardian.co.uk
Mohamed Nabbous somehow got around every Internet blockade and dragged the news out of Benghazi, Libya, at great risk. His fear and determination to overcome it was unmistakeable when I first saw it.
Nabbous apparently died in a hail of gunfire as Gaddafi's troops assaulted Benghazi this weekend. This is the last clip, a phone interview cut short:

A memorial group on FB: In honor of Mohamed Nabbous. Libya Alhurra -One person posted:

Putting together a tribute for Mohammed Nabbous
Would greatly apprecciate your help ,
Please add your voice - record your words and thoughts for Mohammed
Please make it around 45seconds or less , we want to include as many voices as we can get
Email us at ask.a.libyan@gmail.com
Thank you

Twitter / Andy Carvin:
Mohammad Nabbous was my primary contact in Libya, and the face of Libyan citizen journalism. And now he's dead, killed in a firefight.

CNN put on a nice segment:

Here's a pretty awesome moment from Feb 26 w CNN reporters joking around about the Ghaddafi Drugs Coffee thing:

A nice writeup: A NEW WAR/My Friend Mo « C. Dalton Brigham

Another nice memorial video:



Nabbous isn't the only one who put it on the line. Al-Jazeera cameraman Ali Hassan Al Jaber also was shot outside Benghazi last week. Till we meet again, friends, the truth still won't arrive freely.

War on WikiLeaks? Nasty intelligence plan to destroy "center of gravity" Wikileaks as threat to INFOSEC & Cyber CounterIntelligence: Military principle of total war against the media??


Well this is grim! The ACIC or Army Counterintelligence Center published in March 2008 a National Security Information Special Report, under the auspices of the Department of Defense Intelligence Analysis Program (DIAP). Michael D Horvath of the Cyver Counterintelligence Assessments Branch does not really believe or understand the First Amendment, apparently, and his mind must be a spooky place. It was a HQ Department of Army Production Requirement C764-97-0005 and ACIC Product ID Number is RB08-0617.

This document indicates that the Pentagon is pretty dangerous. But what else is new?

Source: U.S. Intelligence planned to destroy WikiLeaks, 18 Mar 2008

U.S. Intelligence planned to destroy WikiLeaks

WikiLeaks release: March 15, 2010

keywords: WikiLeaks, U.S. intelligence, U.S. Army, National Ground Intelligence Center, NGIC, classified, SECRET,

NOFORN

restraint: Classified SECRET/NOFORN (US)

title: Wikileaks.org - An Online Reference to Foreign Intelligence Services, Insurgents, Or Terrorist Groups?

date: March 18, 2008

group: United States Army Counterintelligence Center, Cyber Counterintelligence Assessments Branch; Department

of Defence Intelligence Analysis Program

author: Michael D. Horvath

link: http://wikileaks.org/file/us-intel-wikileaks.pdf

pages: 32

Description

By Julian Assange (julian@wikileaks.org)

This document is a classifed (SECRET/NOFORN) 32 page U.S. counterintelligence investigation into WikiLeaks.

“The possibility that current employees or moles within DoD or elsewhere in the U.S. government are providing

sensitive or classified information to Wikileaks.org cannot be ruled out”. It concocts a plan to fatally marginalize

the organization. Since WikiLeaks uses “trust as a center of gravity by protecting the anonymity and identity of the

insiders, leakers or whisteblowers”, the report recommends “The identification, exposure, termination of employment,

criminal prosecution, legal action against current or former insiders, leakers, or whistlblowers could potentially damage

or destroy this center of gravity and deter others considering similar actions from using the Wikileaks.org Web site”.

[As two years have passed since the date of the report, with no WikiLeaks’ source exposed, it appears that this plan

was ineffective]. As an odd justificaton for the plan, the report claims that “Several foreign countries including China,

Israel, North Kora, Russia, Vietnam, and Zimbabwe have denounced or blocked access to the Wikileaks.org website”.

The report provides further justification by enumerating embarrassing stories broken by WikiLeaks—U.S. equipment

expenditure in Iraq, probable U.S. violations of the Cemical Warfare Convention Treaty in Iraq, the battle over the

Iraqi town of Fallujah and human rights violations at Guantanmo Bay. Note that the report contains a number of

inaccurances, for instance, the claim that WikiLeaks has no editorial control. The report concludes with 13 items of

intelligence to be answered about WikiLeaks.


(U) Wikileaks.org—An Online Reference to Foreign

Intelligence Services, Insurgents, or Terrorist Groups?

NGIC-2381-0617-08

Information Cutoff Date: 28 February 2008

Publication Date: 18 March 2008

National Security Information

Unauthorized Disclosure Subject to Criminal Sanctions

Derived from: Multiple sources

Declassify on: Source documents marked 25X1

Date of source: 20060725

This Counterintelligence Analysis Report is published under the auspices of the Department of

Defense Intelligence Analysis Program (DIAP).

Prepared by:

Michael D. Horvath

Cyber Counterintelligence Assessments Branch

Army Counterintelligence Center

External Coordination: National Ground Intelligence Center[1]

This product responds to HQ, Department of Army, production requirement C764-97-0005.

ACIC Product Identification Number is RB08-0617.

(U) Purpose

(U) This special report assesses the counterintelligence threat posed to the US Army by the

Wikileaks.org Web site.

 

SECRET//NOFORN

SECRET//NOFORN

Page 2 of 32

(U) Executive Summary

(S//NF) Wikileaks.org, a publicly accessible Internet Web site, represents a potential force

protection, counterintelligence, operational security (OPSEC), and information security

(INFOSEC) threat to the US Army. The intentional or unintentional leaking and posting of US

Army sensitive or classified information to Wikileaks.org could result in increased threats to

DoD personnel, equipment, facilities, or installations. The leakage of sensitive and classified

DoD information also calls attention to the insider threat, when a person or persons motivated by

a particular cause or issue wittingly provides information to domestic or foreign personnel or

organizations to be published by the news media or on the Internet. Such information could be of

value to foreign intelligence and security services (FISS), foreign military forces, foreign

insurgents, and foreign terrorist groups for collecting information or for planning attacks against

US force, both within the United States and abroad.

(S//NF) The possibility that a current employee or mole within DoD or elsewhere in the US

government is providing sensitive information or classified information to Wikileaks.org cannot

be ruled out. Wikileaks.org claims that the ―leakers‖ or ―whistleblowers‖ of sensitive or

classified DoD documents are former US government employees. These claims are highly

suspect, however, since Wikileaks.org states that the anonymity and protection of the leakers or

whistleblowers is one of its primary goals. Referencing of leakers using codenames and

providing incorrect employment information, employment status, and other contradictory

information by Wikileaks.org are most likely rudimentary OPSEC measures designed to protect

the identity of the current or former insiders who leaked the information. On the other hand, one

cannot rule out the possibility that some of the contradictions in describing leakers could be

inadvertent OPSEC errors by the authors, contributors, or Wikileaks.org staff personnel with

limited experience in protecting the identity of their sources.

(U) The stated intent of the Wikileaks.org Web site is to expose unethical practices, illegal

behavior, and wrongdoing within corrupt corporations and oppressive regimes in Asia, the

former Soviet bloc, Sub-Saharan Africa, and the Middle East. To do so, the developers of the

Wikileaks.org Web site want to provide a secure forum to where leakers, contributors, or

whistleblowers from any country can anonymously post or send documentation and other

information that exposes corruption or wrongdoing by governments or corporations. The

developers believe that the disclosure of sensitive or classified information involving a foreign

government or corporation will eventually result in the increased accountability of a democratic,

oppressive, or corrupt the government to its citizens.[2]

(S//NF) Anyone can post information to the Wikileaks.org Web site, and there is no editorial

review or oversight to verify the accuracy of any information posted to the Web site. Persons

accessing the Web site can form their own opinions regarding the accuracy of the information

posted, and they are allowed to post comments. This raises the possibility that the Wikileaks.org

Web site could be used to post fabricated information; to post misinformation, disinformation,

and propaganda; or to conduct perception management and influence operations designed to

convey a negative message to those who view or retrieve information from the Web site.[3]

 

 

(U) Diverse views exist among private persons, legal experts, advocates for open government

and accountability, law enforcement, and government officials in the United States and other

countries on the stated goals of Wikileaks.org. Some contend that the leaking and posting of

information on Wikileaks.org is constitutionally protected free speech, supports open society and

open government initiatives, and serves the greater public good in such a manner that outweighs

any illegal acts that arise from the posting of sensitive or classified government or business

information. Others believe that the Web site or persons associated with Wikileaks.org will face

legal challenges in some countries over privacy issues, revealing sensitive or classified

government information, or civil lawsuits for posting information that is wrong, false,

slanderous, libelous, or malicious in nature. For example, the Wikileaks.org Web site in the

United States was shutdown on 14 February 2008 for 2 weeks by court order over the publishing

of sensitive documents in a case involving charges of money laundering, grand larceny, and tax

evasion by the Julius Bare Bank in the Cayman Islands and Switzerland. The court case against

Wikileaks.org was dropped by Julius Bare Bank, the US court order was lifted and the Web site

was restored in the United States. Efforts by some domestic and foreign personnel and

organizations to discredit the Wikileaks.org Web site include allegations that it wittingly allows

the posting of uncorroborated information, serves as an instrument of propaganda, and is a front

organization of the US Central Intelligence Agency (CIA).[4]

(S//NF) The governments of China, Israel, North Korea, Russia, Thailand, Zimbabwe, and

several other countries have blocked access to Wikileaks.org-type Web sites, claimed they have

the right to investigate and prosecute Wikileaks.org and associated whistleblowers, or insisted

they remove false, sensitive, or classified government information, propaganda, or malicious

content from the Internet. The governments of China, Israel, and Russia claim the right to

remove objectionable content from, block access to, and investigate crimes related to the posting

of documents or comments to Web sites such as Wikileaks.org. The governments of these

countries most likely have the technical skills to take such action should they choose to do so.[5]

(S//NF) Wikileaks.org uses trust as a center of gravity by assuring insiders, leakers, and

whistleblowers who pass information to Wikileaks.org personnel or who post information to the

Web site that they will remain anonymous. The identification, exposure, or termination of

employment of or legal actions against current or former insiders, leakers, or whistleblowers

could damage or destroy this center of gravity and deter others from using Wikileaks.org to make

such information public.

 

 

(U) Key Judgments

(S//NF) Wikileaks.org represents a potential force protection, counterintelligence,

OPSEC, and INFOSEC threat to the US Army.

(S//NF) Recent unauthorized release of DoD sensitive and classified documents provide

FISS, foreign terrorist groups, insurgents, and other foreign adversaries with potentially

actionable information for targeting US forces.

(S//NF) The possibility that current employees or moles within DoD or elsewhere in the

US government are providing sensitive or classified information to Wikileaks.org cannot

 

be ruled out. The claim made by Wikileaks.org that former US government employees

leaked sensitive and classified information is highly suspect, however, since

Wikileaks.org states that the anonymity of the whistleblowers or leakers is one of its

primary goals.

(U//FOUO) The Wikileaks.org Web site could be used to post fabricated information,

misinformation, disinformation, or propaganda and could be used in perception

management and influence operations to convey a positive or negative message to

specific target audiences that view or retrieve information from the Web site.

(U//FOUO) Several countries have blocked access to the Wikileaks.org Web site and

claim the right to investigate and prosecute Wikileaks.org members and whistleblowers

or to block access to or remove false, sensitive, or classified government information,

propaganda, or other malicious content from the Internet.

(U//FOUO) Wikileaks.org most likely has other DoD sensitive and classified information

in its possession and will continue to post the information to the Wikileaks.org Web site.

(U//FOUO) Web sites such as Wikileaks.org use trust as a center of gravity by protecting

the anonymity and identity of the insiders, leakers, or whistleblowers. The identification,

exposure, termination of employment, criminal prosecution, legal action against current

or former insiders, leakers, or whistleblowers could potentially damage or destroy this

center of gravity and deter others considering similar actions from using the

Wikileaks.org Web site.

(U) Table of Contents

(U) Purpose

(U) Executive Summary

(U) Key Judgments

(U) Background

(U) Discussion

(U) Intelligence Gaps

(U) Conclusions

(U) Point of Contact

(U) References

(U) Appendix A: Glossary

(U) Appendix B: Methodology Used by Authors for Analysis of Leaked Tables of

Equipment for US Forces in Iraq and Afghanistan

(U) Tables

(U) Table 1. Abbreviated Listing of the Iraq Transition Team (UIC - M94216) Table of

Equipment (TOE)

(U) Table 2. Descriptive Entry of the File and How it is Catalogued by Wikileaks.org for

the NGIC Report Entitled ―(U) Complex Environments: Battle of Fallujah I, April 2004‖

[NGIC-1127-7138-06] posted on its Web site

 

(U) Figures

(U) Figure 1. M33A1 Bulk CS Chemical Dispenser

(S//NF) Figure 2. Map from Page 4 of NGIC Report Entitled ―(U) Complex

Environments: Battle of Fallujah I, April 2004‖ As Published in a Wikileaks.org Article.

 

 

(U) Background

(U//FOUO) Wikileaks.org was founded by Chinese dissidents, journalists, mathematicians, and

technologists from the United States, China, Taiwan, Europe, Australia, and South Africa. Its

Web site became operational in early 2007. The advisory board for Wikileaks.org includes

journalists, cryptographers, a ―former US intelligence analyst,‖ and expatriates from Chinese,

Russian, and Tibetan refugee communities. The ACIC does not have any information to

associate or link the ―former US intelligence analyst‖ on the Wikileaks.org advisory board with

the leakage of sensitive or classified DoD documents posted to the Web site.[6]

(U) Wikileaks.org claims to have developed an uncensorable version of the publicly available

Wikipedia interface that is intended for mass leakage of sensitive documents that expose

wrongdoing and for allowing users to comment on the documents posted to the Web site.

Through its Web site, Wikileaks.org encourages large-scale anonymous leaking and posting of

sensitive and confidential government and business documents on the Internet. Wikileaks.org

claims to have received more than 1.2 million documents from dissident communities and

anonymous sources throughout the world. If true, additional articles involving sensitive or

classified DoD will most likely be posted to the Wikileaks.org Web site in the future.[7]

(S//NF) Wikileaks.org uses its own coded software combined with Wiki, MediaWiki, OpenSSL,

FreeNet, TOR, and PGP to make it difficult for foreign governments, FISS, law enforcement

agencies, and foreign businesses to determine where a leaked document originated from and who

was responsible for leaking the document. The goal of Wikileaks.org is to ensure that leaked

information is distributed across many jurisdictions, organizations, and individual users because

once a leaked document is placed on the Internet it is extremely difficult to remove the document

entirely.[8]

(S//NF) The obscurification technology[9] used by Wikileaks.org has exploitable vulnerabilities.

Organizations with properly trained cyber technicians, the proper equipment, and the proper

technical software could most likely conduct computer network exploitation (CNE) operations or

use cyber tradecraft to obtain access to Wikileaks.org‘s Web site, information systems, or

networks that may assist in identifying those persons supplying the data and the means by which

they transmitted the data to Wikileaks.org. Forensic analysis of DoD unclassified and classified

networks may reveal the location of the information systems used to download the leaked

documents. The metadata, MD5 hash marks, and other unique identifying information within

digital documents may assist in identifying the parties responsible for leaking the information. In


 

addition, patterns involving the types of leaked information, classification levels of the leaked

information, development of psychological profiles, and inadvertent attribution of an insider

through poor OPSEC could also assist in the identification of insiders.

(U) Wikileaks.org supports the US Supreme Court ruling regarding the unauthorized release of

the Pentagon Papers by Daniel Ellsberg, which stated that ―only a free and unrestrained press can

effectively expose deception in government.‖ The Wikileaks.org Web site further states the

following:

―We aim for maximum political impact. We believe that transparency in

government activities leads to reduced corruption, better government, and

stronger democracies. All governments can benefit from increased scrutiny by the

world community, as well as their own people. We believe this scrutiny requires

information. Historically that information has been costlyin terms of human life

and human rights. But with technological advancesthe Internet, and

cryptographythe risks of conveying important information can be lowered.‖[10]

(U) The OPSEC measures used in the submission of leaked information to Wikileaks using the

Internet are designed to protect the identity and personal security of the persons or entities

sending or posting information to the Web site. Wikileaks.org claims that any attempt at trace

routing of IP addresses, MAC addresses, and other identifying information of a home computer

submissions (as opposed to cyber café submissions) through Wikileaks.org‘s Internet submission

system would require a knowledge of information available only to Wikileaks.org programmers

and to a rights organization serving the electronic community, or would require specialized

ubiquitous traffic analysis of Internet messages and routing systems. Nevertheless, it remains

technically feasible for FISS, law enforcement organizations, and foreign businesses that have

the motivation, intentions, capability, and opportunity to gain online access or physical access to

Wikileaks.org information systems to identify and trace whistleblowers through cyber

investigations, advanced cyber tools, and forensics.[11]

(U) Another method of posting leaked information to the Web site anonymously is for leakers to

use postal mail to send the information to volunteers in various countries who have agreed to

receive encrypted CDs and DVDs from leakers. These volunteers then forward the information

to designated personnel, who then upload the data on the CDs and DVDs to the Wikileaks.org

Web servers. To protect or mask the sender, leakers can take OPSEC measures such as using

Wikileaks.org encryption protocols when writing CDs and DVDs; using gloves while wrapping,

taping, handling, and mailing packages; and not including a return address or including a fake

return address on packages containing leaked information. Such measures are designed to protect

the identity of the leakers and prevent FISS, law enforcement, and postal inspectors from

intercepting the mail and decoding the information on the data storage devices in transit.

Wikileaks.org also claims that it is developing easy-to-use software to encrypt the CDs and

DVDs. Use of such methods also protects facilitators or intermediaries from harm because they

would not know the content of the encrypted submissions.[12]

(U) A Wikileaks.org spokesperson stated in early January 2007 that about 22 persons are

involved in the Open Society Initiative to make governments and corporations more accountable

 

to the citizens of the world. Wikileaks intends to seek funding from individual persons and

groups such as humanitarian organizations that fund sociopolitical activity intended to promote

democracy and human rights around the world through open access to government and business

information.[13]

(S//NF) Several foreign countries including China, Israel, North Korea, Russia, Vietnam, and

Zimbabwe have denounced or blocked access to the Wikileaks.org Web site to prevent citizens

or adversaries from accessing sensitive information, embarrassing information, or alleged

propaganda. The governments of China, Israel, and Russia have asserted that they have a right to

remove from the Internet protected government information, disinformation, and propaganda that

is intended to embarrass or make false allegations against their governments. China, Israel, North

Korea, and Russia are assessed to have state-sponsored CNE, computer network attack (CNA),

and cyber forensics capabilities that would most likely allow penetration or disrupt viewing of

the Wikileaks.org Web site. China, Israel, and Russia have used or are suspected of having used

CNA to target terrorist or dissident Web sites that have posted objectionable material intended to

embarrass, harm, or encourage terrorism or opposition to the government.[14]

 

(U) Discussion

(U//FOUO) An insider could present a potential force protection, counterintelligence, OPSEC, or

INFOSEC threat to the US Army through deliberate unauthorized release of official DoD

documents and posting of sensitive or classified information to the Internet. Several recent

postings to the Wikileaks.org Web site in November 2007 of sensitive US Army information

marked UNCLASSIFIED//FOR OFFICIAL USE ONLY and in December 2007 of US Army

information classified SECRET//NOFORN highlight the insider threat to DoD. The actual

perpetrators responsible for the unauthorized released of such documents could be subject to

administrative action, nonjudicial punishment, or criminal charges and prosecution if they are

identified.

Controlling 9/11 "crippled epistemology" via fake 'CIA' Internet Conspiracy Theories, COINTELPRO & "cognitive infiltration of extremist groups": Huge jackass/Obama Info Czar Cass Sunstein favors infiltrating conspiracy groups, planting disinfo, diversions

140110top2.jpg"....we will suggest below that if the hard core arises for certain identifiable reasons, it can be broken up or at least muted by government action." .... "We suggest a role for government efforts, and agents, in introducing such diversity.  Government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action."

SSRN-Conspiracy Theories by Cass Sunstein, Adrian Vermeule

This is one hell of a chestnut. It seems obvious, in retrospect, the best way to conceal the truth of establishment shady business and institutionalized crime is to mix in a ton of bullshit in order to turn all the skeptics and inquirers against each other. Only now it's Obama's dang 'information czar' pitching the strategy!

Interestingly, the more I broaden my sources, the more I appreciate the broad spectrum of people that have cancelled their subscriptions to Establishment Bollox and the Lies of the Mighty Wurlitzer. It's amazing how so many features of Establishment Reality are so widely loathed from within so many different worldviews.

This important fact is what people like Cass Sunstein don't understand. Like faux Establishment 'Centrists', they believe that ontological truth, or even the 'optimal' policy outcome, is like @ the 50% mark between where the dialectical left & right goalposts are placed.

It's like Howard Fineman - accurately dubbed the Weathervane because you only have to look which way he's pointing to determine what reassuring centrist reality is today's hot item. Howard Fineman is the precise opposite of a 'conspiracy theorist' in Sunstein's world.

The Establishment's Hegelian social control techniques are obvious: just set the left and right goalposts, stir and repeat. Problem-reaction-solution. If one can influence both the left and right goalposts in the great false dichotomy, it makes the product of "centrists" far more acceptable. Everything floating around outside this parlor game is the prima materia of 'conspiracy' that the State should attack professionally, Sunstein says!

Sunstein's tidy worldview brushes over the complex role of deceptive bullshit operatives around there, laying the groundwork for stupid establishment narratives. For example, what are we to make of the ever-shady Gerald Posner, spoonfed the FBI goodies on China? Or Adam Ciralski, helping Blackwater's Erik Prince perpetrate some classic exposure-threatening graymail about U.S. covert ops. Are these merely products of rotten epistomology? [PD Scott with a solid takedown of Posner - Scott's the real deal with The War Conspiracy and more here.]

*****

Anyhow Cass Sunstein was appointed by President Obama as some kind of info czar. Interestingly he wrote a paper about how to manipulate conspiracy theorists by attempting to throw their groups off the Hegelian deep end, thus opening an opportunity for defamatory information warfare. Fascinating stuff, and it's got Alex Jones incensed!!

More links, then some snippets: Obama Information Czar Calls For Banning Free Speech, Sunstein’s Paper Provides More Evidence COLINTELPRO Still Operational, etc.

This whole thing reminds me of how the JFK conspiracy scene is managed as "A Story/B Story" wherein there are two alternate, mutually irreconcilable narratives. Dribs and drabs of facts supporting A and B (roughly, CIA/Mafia and Lone Gunman, usually) can be offered and safely paddle around on the History Channel.

Let us share a few choice links about how the CIA type control system AKA the Intelligence Power controls the World of Conspiracy. This is good stuff -- this is exactly how Mama Cass wants the world of conspiracies organized.

For The Win: Fintan Dunne called the Sunstein approach years ago!

My favorite all-in-one shotgun approach comes from Fintan Dunne of BreakForNews.com: BreakForNews.com : The CIA's Internet Fakes


The CIA Fakes is a catchphrase term to describe a group which includes:

-- Covert Operatives of the CIA, NSA and DIA; of the U.S. Corporate/Military Industrial Complex; of the intelligence services of U.K. Spain, France Holland, Germany, and Russia.
-- Political Agents working within the Democratic Party, Republican Party, Democratic Black Caucus, Green Party, and Patriot Movement.
--
Politicians in the U.S., U.K. Spain, France, Germany and Russia --who pose as 9/11 skeptics.
-- Media, including
Mainstream, Alternative Media and Internet broadcasting media who either front for, cooperate with, or are directly employed by intelligence services mentioned above.

The primary objectives of the CIA FAKES are:

-- To leverage the Fakes into position as the leadership/spokespersons
    for the 9/11 skeptics movement.
-- To splinter and divide that movement.
-- To promote lame, tame and/or booby-trapped questions about 9/11.
-- To be sufficiently over-the-top as to prevent the 9/11 issue getting
    any traction in the media or left-wing.
-- To ensure that the movement would not have a politically-active
    leadership capable of turning it into an effective political lobby campaign.

The questions about 9/11 were bound to be asked, the important
aspect for the perpetrators was and is ...by whom?

Bravo, Mr. Dunne, Bravo. You scored big on this one... A general roundup to be found @ The Next Level :: View topic - Uncovered: The Rat's Nest of 9/11 of effective gatekeepers -- and its true that his set of people, in aggregate, has the 9/11 conspiracy topic cornered and setup a certain way.
More along these lines: 9/11, 7/7 & the War on Freedom :: View topic - The Planned Demolition of Alex Jones, The COUP had foreknowledge of 9-11 (YES!), the criticism about Sibel Edmonds, Scheuer, Ray McGovern, etc: WagNews: Our Good Friends in the CIA - NOT !, (i.e "The alternative media is ridden with ex-FBI, ex-CIA, ex-NSA, ex-MI5 people who are on "our side". It's all total BS.") WagNews: Alex Jones, Hopsicker & the 9/11 CIA Fakes -Audio.

This one is suddenly salient: WagNews: Ellsberg, Sibel Edmonds & The Secret Team:

WHAT FLAVOR CONSPIRACY YOU WANT?

One big corner of that overall 9/11 picture is formed by four disparate-seeming individuals: a veteran whistleblower, an attractive novice whistleblower, a campaigning journalist and a reputed lingerie model; jigsaw peices called Ellsberg, Edmonds, Hopsicker and Keller. Ellsberg supports Edmonds, confirmed by Hopsicker --backed by eyewitness accounts from Keller. But they're all telling different flavors of the same story.

To specify which story that is, let's take a look at the popular tales of 9/11. The notorious main division is between LIHOP and MIHOP. But it's much more detailed than that. Explanations come in a full range of flavors --starting with the official story:

A. Official story:
CIA/FBI were incompetent; Bush and/or Clinton were complacent.
B. Official Lame Conspiracy:
CIA/FBI were incompetent; Bush/Cheney maybe let it happen; Israelis Knew.
C. Official LIHOP Conspiracy:
CIA/FBI were compromised; Bush/Cheney did let it happen; Israelis Helped.
D. Official LIHOP Wild Conspiracy:
CIA/FBI compromised; Bush/Cheney/Neocons let it happen; Israelis Did It.
E. Official LIHOP Tinfoil Conspiracy:
Israelis/Neocons/Bush/Cheney Did It; CIA/FBI looked the other way.
F. Official MIHOP 'Serious' Conspiracy:
Israelis/Neocons/CIA/FBI/Bush/Cheney/Military-Industrial-Complex Did It.
G. Official Loony Conspiracies:
Rothschilds and/or Rockefellers and/or CFR and/or Bildebergers did it.
Globalists who want to run everything in a World Government did it.
Jews and Jewish bankers -who already run everything- did it.
Satanists, Opus Dei or Reptilians did it.
It's a terrific variety of theories.
It plays out something like this:
  • The mainstream media push version A; hint at B; sneer at G.
  • The controlled right/intellectual media pushes version B.
  • The controlled left/intellectual media pushes version C.
  • The 'moderate' Fake internet sites push versions C and D.
  • The 'softcore' Fake internet sites push versions D and E.
  • The 'independent' Fake internet sites push version F.
  • The 'loony' Fake interent sites push variations of version G.
But every single one, from A to G are OFFICIAL versions, sanctioned and promoted by the 9/11 intelligence coverup operation and their CIA Fakes network. They have a flavor for every market.

The creation of this multiplicity of explanations is a core element of the coverup. Left to their own devices, people on the Internet might have figured out the truth themselves. But with this circus in action, there is always plenty of distraction and lots of division in opinion.

The intelligence coverup is not trying to stop 9/11 conspiracy theories on the internet. It's creating them. Then playing off supporters of the different theories against each other. That's a classic Cointelpro-style tactic.

***********More from good Ol L Fletcher Prouty on CIA / Ellsberg limited hangout type conspiracy control!
Let's get to the brand-new material from the White House info czar, it's wild!!...... Conspiracy Theories by Cass Sunstein & Adrian Vermeule:

Our main though far from exclusive focus – our running example – involves

conspiracy theories relating to terrorism, especially theories that arise from and post-date

the 9/11 attacks. These theories exist within the United States and, even more virulently,

in foreign countries, especially Muslim countries. The existence of both domestic and

foreign conspiracy theories, we suggest, is no trivial matter, posing real risks to the

government’s antiterrorism policies, whatever the latter may be. Terrorism-related

theories are thus a crucial testing ground for the significance, causes, and policy

implications of widespread conspiracy theorizing. As we shall see, an understanding of

conspiracy theories has broad implications for the spread of information and beliefs;

many erroneous judgments are a product of the same forces that produce conspiracy

theories, and if we are able to see how to counteract such theories, we will have some

clues about how to correct widespread errors more generally.

Part I explores some definitional issues and lays out some of the mechanisms that

produce conspiracy theories and theorists. We begin by discussing different

understandings of the nature of conspiracy theories and different accounts of the kinds of

errors made by those who hold them. Our primary claim is that conspiracy theories

typically stem not from irrationality or mental illness of any kind but from a “crippled

epistemology,” in the form of a sharply limited number of (relevant) informational

sources. Those who hold conspiracy theories do so because of what they read and hear. In

that sense, acceptance of such theories is not irrational from the standpoint of those who

adhere to them. There is a close connection, we suggest, between our claim on this count

and the empirical association between terrorist behavior and an absence of civil rights

and civil liberties.10 When civil rights and civil liberties are absent, people lack multiple

information sources, and they are more likely to accept conspiracy theories.

Part II discusses government responses and legal issues, in light of the discussion

in Part I. We address several dilemmas of governmental response to conspiracy theories,

such as the question whether it is better to rebut such theories, at the risk of legitimating

them, or to ignore them, at the risk of leaving them unrebutted. Conspiracy theories turn

out to be especially hard to undermine or dislodge; they have a self-sealing quality,

rendering them particularly immune to challenge. We suggest several policy responses

that can dampen the supply of conspiracy theorizing, in part by introducing diverse

viewpoints and new factual assumptions into the hard-core groups that produce such

theories. Our principal claim here involves the potential value of cognitive infiltration of

extremist groups, designed to introduce informational diversity into such groups and to

expose indefensible conspiracy theories as such.

Tell me this, Sunstein: how does all that drug money get through the Federal Reserve System? Everyone has been so eager to confront that 'conspiracy theory,' haven't they?

Blah blah blah... let's get to the good stuff: [Below the fold - favorite chunks of much of the crazy essay]

Reuters: Afghanistan occupation PSYOPS and press offices to formally merge; what else is new?!

Why actually win a hopeless war, when you can run a perception management campaign to trick the American public into thinking you're winning?!?

"Information Operations, Spinstorms & latent contradictions" indeed... Previously noted: "The strategic target remains our population:" Some more tasty links: military industrial complex in America and in yr brains! | HongPong.com

and another example of the program - exposed via FOIA: NYTimes: Behind TV Analysts, Pentagon’s Hidden Hand

Sometimes these cats make my paranoia obsolete. It's sooo easy :)

For your reference: The official US Army Psychological Operations manual.

The target is your brains!!! Ahh formalized domestic-directed propaganda, so clean & polished. I wonder how many contractors will profit! (huge hat tip to barrisj_redux @agonist)

Press And "Psy Ops" to Merge At NATO Afghan HQ - Sources - NYTimes.com

Press And "Psy Ops" to Merge At NATO Afghan HQ: SourcesBy REUTERS Published: November 29, 2008

Filed at 2:01 a.m. ET

KABUL (Reuters) - The U.S. general commanding NATO forces in Afghanistan has ordered a merger of the office that releases news with "Psy Ops," which deals with propaganda, a move that goes against the alliance's policy, three officials said.

The move has worried Washington's European NATO allies -- Germany has already threatened to pull out of media operations in Afghanistan -- and the officials said it could undermine the credibility of information released to the public.

Seven years into the war against the Taliban, insurgent influence is spreading closer to the capital and Afghans are becoming increasingly disenchanted at the presence of some 65,000 foreign troops and the government of President Hamid Karzai.

Taliban militants, through their website, telephone text messages and frequent calls to reporters, are also gaining ground in the information war, analysts say.

U.S. General David McKiernan, the commander of 50,000 troops from more than 40 nations in NATO's International Security Assistance Force (ISAF), ordered the combination of the Public Affairs Office (PAO), Information Operations and Psy Ops (Psychological Operations) from December 1, said a NATO official with detailed knowledge of the move.

"This will totally undermine the credibility of the information released to the press and the public," said the official, who declined to be named.

ISAF spokesman Brigadier General Richard Blanchette said McKiernan had issued a staff order to implement a command restructure from December 1 which was being reviewed by NATO headquarters in Brussels, but he declined to go into details of the reorganization.

"This is very much an internal matter," he said. "This is up with higher headquarters right now and we're waiting to get the basic approval. Once we have the approval we will be going into implementation."

But another ISAF official confirmed that the amalgamation of public affairs with Information Operations and Psy Ops was part of the planned command restructure. This official, who also declined to be named, said the merger had caused considerable concern at higher levels within NATO which had challenged the order by the U.S. general.

"DECEPTION ACTIVITIES"

NATO policy recognizes there is an inherent clash of interests between its public affairs offices, whose job it is to issue press releases and answer media questions, and that of Information Operations and Psy Ops.

Information Operations advises on information designed to affect the will of the enemy, while Psy Ops includes so-called "black operations," or outright deception.

While Public Affairs and Information Operations, PA and Info Ops in military jargon, "are separate, but related functions," according to the official NATO policy document on public affairs, "PA is not an Info Ops discipline."

The new combined ISAF department will come under the command of an American one-star general reporting directly to McKiernan, an arrangement that is also against NATO policy, the NATO official said.

"While coordination is essential, the lines of authority will remain separate, the PA reporting directly to the commander. This is to maintain credibility of PA and to avoid creating a media or public perception that PA activities are coordinated by, or are directed by, Info Ops," the NATO policy document says.

"PA will have no role in planning or executing Info Ops, Psy Ops, or deception activities," it states.

The United States has 35,000 of the 65,000 foreign troops in Afghanistan, operating both under ISAF and a separate U.S.-led coalition operation, but both come under McKiernan's command.

Washington is already scheduled to send another 3,000 troops to arrive in the country in January and is now considering sending 20,000 more troops in the next 12 to 18 months, further tipping the numerical balance among ISAF forces.

"What we are seeing is a gradual increase of American influence in all areas of the war," the NATO official said. "Seeking to gain total control of the information flow from the campaign is just part of that."

(Editing by John Chalmers)

A link dump for Wednesday! The War on Drugs, the Sibel Edmonds case, and other hyperfragments of Deep Reality?

A lot of stuff piled up on my computer over the last couple weeks. So here it is in a highly messy, condensed and frankly ugly fashion. Also I have to say, my Ecto is having a little trouble making clean links. This post is one of the more badly formatted ones I think I've ever made. *bow*

The war on drugs has been lost. Unless it was all fake to begin with... Hmmm: Smartest drug story of the year: Rolling Stone on the war on drugs. - By Jack Shafer - Slate Magazine and Rolling Stone: How America Lost the War on Drugs.

On a related note: blow your mind with the rotating naked chick 3D mindfuck brain trick! The Right Brain vs Left Brain. More here.

ArmsControlWonk: Curveball! The Book!

Another great moment in Italian politics via Infowars: Ex-Italian President: Intel Agencies Know 9/11 An Inside Job, Man who set up Operation Gladio tells Italy's largest newspaper attacks were run by CIA, Mossad. On the other hand, these are machiavellians: tell the people what they want to hear?

"[Bin Laden supposedly confessed] to the Qaeda September [attack] to the two towers in New York [claiming to be] the author of the attack of the 11, while all the [intelligence services] of America and Europe ... now know well that the disastrous attack has been planned and realized from the CIA American and the Mossad with the aid of the Zionist world in order to put under accusation the Arabic Countries and in order to induce the western powers to take part ... in Iraq [and] Afghanistan."

Ah well. Also on Infowars: Yeah the North American Union exists. A classic: Texas To Track Emergency Evacuees Using RFID. w0w.

Wars to Watch Out For- by Justin Raimondo: 2008 will bring us an abundant crop of overseas crises. and What Antiwar Activists Have to Be Thankful For- by Justin Raimondo.

Mark Baard's Parallel Normal is a new one: World food supply will be rooted in India’s troubled soil. Apparently: "Watching those who watch the watchers: I am a technology reporter tracking the work of conspiracy and esoteric researchers, with an emphasis on brain-chipping, psyops, alternate realities and the apparatus of globalism." Sounds like a good idea there. Nifty site really.

Liberty Dollars wiped out. Take that, alternate currency! Federal Reserve again rules supreme in money printing department!!!1!

BBC: Lifespan link to depression drug.

Shit! Virtual furniture theft leads to real bust.

Why not? knowledgedrivenrevolution.com. Has the latest stuff on Information Warfare without Limits (PSYOPS for the American Consumer Brain). And Information Warfare Using Aggressive Psychological Operations .

More about the surfer dude with the new theory of reality: Penniless Surfer Devises Intriguing Cosmological Theory of Everything. BBC: 248-dimension maths puzzle solved, Upon further review, surfer's new Theory of Everything may be deficient.

The latest from the metal masters: Puscifer by Tool's Maynard James Keenan.

Packet Forgery By ISPs: A Report on the Comcast Affair | Electronic Frontier Foundation.

Net neutrality to get new life in Congress | Tech news blog - CNET News.com

EFF study confirms Comcast's BitTorrent interference. Comcast Sued for Blocking P2P Sites - News and Analysis by PC Magazine

Comcast Using Malicious Hacker Technique Against Own Customers, New Report Says | Threat Level from Wired.com

Pakistan! NPQ: ANTI-AMERICAN ISLAMIC NATIONALISM IS BEHIND PAKISTAN CRISIS. A SMART REVIEW! Sic Semper Tyrannis 2007: Pakistan Was a Bad Idea. The Pakistani Democracy Chimera : NO QUARTER.

The Drone and the Falafel Watchlist : NO QUARTER

Amazon.com: What Orwell Didn't Know: Propaganda and the New Face of American Politics: Books: Andras Szanto,Orville Schell

FCC: The Winds Blow and Blow and Blow … : NO QUARTER.

Another Meaningless Taser Death: Police Use Of Stun Guns Out Of Control at Infowars.


SPECIAL REPORT: Turning The Police State Apparatus Against Dissenters At infowars.

These Days, Everyone Dares Call Everything Treason. More about the "Internet Radicalization" Crush the Meddling Kids Act.

Today's economic crisis: More than "Sheets" Hitting the Fan. Yep. Taki's Top Drawer: Was it oil all along?

Economic Expert Says Global Crash Imminent via Infowars. Internet under attack.


Always good to look at Cryptogon: Subprime Mortgage Crisis: U.S. Takes Page from Banana Republic Playbook :

We should know better by now. We should know that They’re just not going to let the thing go off the rails and crash in a single, violent event. The purpose of the American Corporate State is to externalize the costs of unthinkable plunder onto the backs of people who are mostly too tired, dumb and angry to understand anything that’s happening to them. Americans, in general, are content to flush more of their children’s futures down the gurgler and thank Christ for their big screen TVs. Anyone who’s not behind the plan to save the criminal gangs on Wall Street must be with Bin Laden.

Al Martin Raw: Iran contra conspirator who keeps it real, with totally incomprehensible options trading. Amazing conspiracy book too: "The Conspirators: Secrets of an Iran Contra Insider." See also: Recession – Inflation – Deflation – Depression – Stagflation - Global Collapse…?

The Bernanke Fed: Following the ‘Economic Collapse’ Script

(9-24-07) This is the long and broad view of what Bernanke is doing with the Fed. He is simply inheriting and following the script, as it were, from the Greenspan Fed. The Greenspan Fed has been roundly criticized for reducing interest rates, thus creating a lot of cheap money, which has fueled speculative bubbles worldwide. Then there are the reasons why nobody applauds him because it’s an area that no one dares talk about…


To defend himself, Greenspan says that he was simply lowering rates to prevent the onset of a recession in 2001 and 2002. On the surface, it makes sense to say that, because clearly the economy was headed to recession by the end of 2001.


The recession was being driven by two factors. One of those factors gets overlooked because it’s not politically convenient – the collapse in the speculative bubble in equities beginning in March of 2000, which was a long unwinding process into the autumn of 2002, wherein equity prices fell consistently, combined with the installation of a fiscally reckless regime – i.e., a Bush Cheney Regime – and the reinstitution of Bushonomics, which we refer to as Bushonomics II, which had the effect of depleting all of the $158-billion fiscal surplus that the Bush Cheney Regime inherited from its fiscally prudent predecessor.


On the day the Bush Cheney Regime came to power (January 20, 2001), it inherited from its successor a $158-billion federal surplus. It had all of that surplus diminished, and indeed generated a deficit, by the end of its first year in power, which is part and parcel, as we’ve pointed out before, of Bushonomics.


So what are the differences between the terms referred to as recession and inflation? Inflation and inflationary periods invariably precede recessions.


The economic boom/bust cycle – that the United States has always had and will always have as long as it follows Smithsonian capitalism – has effectively been turned on its ear by the Bush Cheney Regime. How? Through cheap money and easy liquidity -- by creating a series of speculative bubbles in asset prices whose intent is more political than economic, from the regime’s point of view.......

America's Back Is About To Break | The Agonist

A Conservative View of Iran - by Philip Giraldi. This is pre-NIE news.

Giuliani's Culture of Corruption- by Justin Raimondo. Hooey-liani’s Best Bud Needs Our Help ($$$) : NO QUARTER.

Peter Hitchens definitely wrote a good one about North Korea: Prisoners in Camp Kim. WOW.

Philip Giraldi: The Violent Radicalization and Homegrown Terrorism Prevention Act - Politics on The Huffington Post

Group claiming 2004 Ohio election fraud asks Dann to investigate

A little time with BradBlog, a good spot for voter suppression and miscellaneous whistleblower scandals: The BRAD BLOG : Chairman Waxman Asks Attorney General to Intercede in White House Obstruction in CIA Leak Case. The BRAD BLOG : 'Daily Voting News' For November 25 and 26, 2007

More about BradBlog and Sibel Edmonds below.

Think Progress » Bob Woodward Still Has Never Heard Of The Voter Suppression Tactic ‘Caging’

Old news: the GOP and Nazi affairs, operation paperclip and so forth. The Bush family and its work via Harriman Brothers to monetize the cash end of the economic alignments known as "the merger of state and corporate power." Siege Heil: The Bush-Rove-Schwarzenegger Nazi Nexus and the Destabilization of California.

Snotr : The ultimate place for great videos!

Old news from 2005: Why AIPAC Indictment Is Bad News for Rove. And also the stuff about Strategic Communication, per today's earlier post about the Orwellian Centers of Excellence: Psy-ops propaganda goes mainstream. - By Sharon Weinberger - Slate Magazine.

Let Sibel Edmonds Speak is the HQ for this stuff.

We are going to list a few nice links for the case: Sibel Edmonds in Let Sibel Edmonds Speak: What the heck is Sibel Edmonds' Case about? And why should I care?

"Essentially, there is only one investigation – a very big one, an all-inclusive one... But I can tell you there are a lot of people involved, a lot of ranking officials, and a lot of illegal activities that include multi-billion-dollar drug-smuggling operations, black-market nuclear sales to terrorists and unsavory regimes, you name it... You can start from the AIPAC angle. You can start from the Plame case. You can start from my case. They all end up going to the same place, and they revolve around the same nucleus of people."

That is the good stuff, folks. Here we go:

Wot Is It Good 4: Sibel Edmonds: America's Watergate

Wot Is It Good 4: Sibel, Giraldi, American Conservative Mag

The BRAD BLOG : EXCLUSIVE: Daniel Ellsberg Says Sibel Edmonds Case 'Far More Explosive Than Pentagon Papers'

The BRAD BLOG : What The Heck is the Sibel Edmonds Case Anyway? And Why Should You Care About It?

Daily Kos: State of the Nation on Sibel Edmonds Case: the untellable story of AIPAC which I posted here earlier, but this has a hearty 300+ comments of buzz too.

Wot Is It Good 4: David Swanson and Sibel

Stress » An Open Letter to Chris Matthews

Liberty Coalition & National Security Whistleblowers Coalition

Revaluing the Dollar | The Agonist

Ritalin proven defective: Drug Pushers Don't Care If Their Drugs Are Good For You Either | The Agonist

Related: The Immorality of Moral People | The Agonist.

Doing internet media? Lessons from Steve Outing's Enthusiast Group. and Specialized journalism, a partisan press, online journalism students and cheap laptops: More stuff to argue about.

Joe Klein is one of those lame mainstream media pundits. He told everyone that the new FISA bill would stop the mean ol' wiretapping. But he lied and won't correct himself. TIME is sticking with their man, and it's another fabulous lesson in shitty mainstream media affairs for Blog World. Glenn Greenwald on Salon. Center for Citizen Media: On Klein’s Errors, Time’s Semi-Stonewall and the Net’s Power. Everything that is rancid and corrupt with modern journalism: The Nutshell. Nicely done Mr. Greenwald.

Tom Toles cartoon on Obama smears. Jon Swift: Journalism 101.

The latest Bin Laden tape (if real) dissected by Michael Scheuer: Asia Times Online: Bin Laden talks of victory, not defeat

What Do Conservatives Spend Their Time Thinking About? | The Agonist. Answer: gay stuff. exclusively.

Well kids that was about 2 or 3 weeks worth of nifty links. I'm not too happy it's such an ugly post, but mainly I just wanted to float all those weird fragments of Un Reality to spice your day.

Coming soon: a truly crazy little project. :-)

Another great moment for the Establishment: Snow & Gregory say Internet's too mean to us big rollers!!

I'm copying this post from thinkprogress today because it illustrates yet again that EVERYONE FUCKING SUCKS. AND TEH LOL the media is TEH L4m3r5. And whatever other stereotypical blog hacker sayings you want to throw in.

Basically the point is that they know they aren't really the brightest bulbs, that real debate is too much to deal with, and that celebrity journalists and the media don't fucking feel like doing their homework, like analysis of past statements, policy, deception and bullshit.

If you listen carefully, it becomes clear that NBC's David Gregory doesn't feel obliged to actually analyze anything. Not opine, analyze. They literally don't think it's actually their responsibility.

Here we go with ThinkProgress:
***************

In a press roundtable at the National Press Club tonight, White House Press Secretary Tony Snow led a discussion with White House correspondents about the impact of the internet on their respective jobs. Their conclusion? They don’t like being challenged by blogs.

NBC News’ David Gregory bemoaned how political coverage has “become so polarized in this country…because it’s the internet and the blogs that have really used this White House press conferences to somehow support positions out in America, political views.” Tony Snow admitted he sometimes reads blogs (”I’ll occasionally punch it up”) only to find “wonderful, imaginative hateful stuff that comes flying out.”

Newsweek’s White House correspondent Richard Wolffe added, “[Bloggers] want us to play a role that isn’t really our role. Our role is to ask questions and get information. … It’s not a chance for the opposition to take on the government and grill them to a point where they throw their hands up and surrender.”

Watch it:

Screenshot

Digg It!

Transcript:

David Gregory, White House correspondent for NBC News:

“I think politics and political coverage has become so polarized in this country…because it’s the internet and the blogs that have really used this White House press conferences to somehow support positions out in America, political views. And they will clip and digitize portions of these briefings to fit into their particular argument.”

Tony Snow, White House Press Secretary:

You’ve got this wonderful, imaginative hateful stuff that comes flying out. I think one of the most important takeaways is — it’s the classical line — not only should you not believe your own press, you probably shouldn’t believe your opposition blogs either.”

Richard Wolffe, White House correspondent for Newsweek:

They want us to play a role that isn’t really our role. Our role is to ask questions and get information. … It’s not a chance for the opposition to take on the government and grill them to a point where they throw their hands up and surrender. … It’s not a political exercise, it’s a journalistic exercise. And I think often the blogs are looking for us to be political advocates more than journalistic ones.”

Syndicate content