Syrian Tapestry of Terror – The Quintessential Video Exposing Media Lies About Syria and The White Helmets Terrorists

Live Leak version – https://www.liveleak.com/view?i=b5a_1490533325

Video and photo evidence reveals the links between the White Helmets who received a Hollywood Academy Award, the terrorist groups destroying Syria, the lead terrorist Saudi cleric Abdullah al-Muhaysini, and the US and UK media promoted propaganda disseminators for these murderous terrorist groups. This video includes substantial, verifiable direct connections that tie all these entities, individuals and nefarious actions together. Tapestry of Terror clearly exposes the White Helmets as the terrorists and fake humanitarian rescuers that they are. It also clearly links them to the FSA (Free Syrian Army) which is made up of dozens of Islamic jihadist groups who are being paid to destroy Syria, and have been caught on camera on numerous occasions conducting barbaric atrocities since the start of the Syrian war in 2011. Fair warning, some of those atrocities are featured in this highly revealing video.

You Tube version:

The video is also up on a dozen other You Tube sites. Please feel free to download, cache and share widely with other concerned citizens.

2nd short video clip highlights the flags of the ‘Syrian Revolution’. They aim for a complete Sunni Islamic radical terror state. There never was any peaceful revolution in Syria. It has always been about regime change. The propaganda pumped out by corrupt western mainstream outlets has simply been very effective at convincing western audiences otherwise as they have constantly portrayed Bashar Assad as the latest nefarious bogeyman.

This short video clip shows easily what is really behind the faux ‘Syrian Revolution’.

The image below is not from Syria, its from Germany where the FSA aligned White Helmets performed a mock promotional demonstration in Berlin in 2016.

Germany propahanda

More images highlight what is coming Europe’s way if the FSA and its associated terror groups win in Syria………FSA = Al-Nusra Front = Al-Qaeda = ISIS

They are all interchangeable.

FSA:ISIS march

McCain and FSA

Facebook plays a key role in helping them disseminate terrorist propaganda………the images below are a few of many, many examples…..

Screen Shot 2017-05-02 at 12.35.49 AM

Al-Nusra

Abdul Hamid lead shot

FSA set 2 al-Qaeda

The image below comes from the Facebook account of a White Helmet who was the main ‘reporter’ of the April 4, 2017 chemical weapons attack in Syria…..an obvious false flag attack that Donald Trump wrongly blamed and bombed the Syrian Air Force for…….the Syrian Air Force that is bombing and destroying ISIS and the FSA.

Al0Qaeda

That ‘reporter’ was featured all over western media providing them his version of the event. Western media is intentionally using these ‘news’ proxies in order to feed false information to the public in order to keep the war going.

This is him in White Helmets garb without his terrorist accomplices….Screen Shot 2017-06-22 at 2.28.46 PM.png

These are screenshots from the April 4th chemical event………

Lead 2Lead 1

Facebook screenshot of Anas al-Dyab and his White Helmets partner Hamid Kutini

anayus

Link to TRT World video they appeared in after false flag chemical weapons event…..

Clearly things are not as the western media portrays them in Syria. Things are exactly the opposite as a matter of fact. To understand fully that western citizens are being deceived by their own governments and media, check out my other posts on the subject of terrorist ruses in Syria.

Link to other Clarity of Signal posts on terrorist ruses related to the false flag chemical weapons event and the individuals above….

Father of Invention: Media Portrayed Grief Stricken Dad Turns Out To Be al-Nusra Front Terrorist

False Flagger: Al-Nusra Front Terrorist ‘Reporter’ Hadi Abdallah First Responder to Chemical Massacre in Idlib, Syria on April 4th, 2017

“Now You See Me” – Over 100 White Helmet Self-Posted Facebook Images Expose Fake Humanitarian Group as FSA Terrorists Linked with Al-Qaeda

Western Media Cover-up: Well-Known White Helmet Terrorist Was Present at Rashideen Bus Bombing That Killed 126 Women and Children on April 15, 2017

Direct Terrorist Collusion: Over One Dozen Videos Capture White Helmets Working Side-By-Side With Terrorist Groups in Syria

 

Link to Newsweek article where the media outlet attempts to cover for the White Helmets terrorists after one was recently caught being involved in the beheadings of Syrian soldiers

 

Have no doubt, if this isn’t stopped now, this is coming to Europe in full force in the near future. The global elite are sowing the chaos and have already decided to make it so in order to cover up for their own crimes. For the sake of humanity……..the terrorists……and their backers…….. cannot win.  

 

Newly Released Video: On-Camera Confessions of Dutch Banker Ronald Bernard Reveals Terrible Crimes of the Global Elite

The following videos feature Dutch Banker Ronald Bernard providing emotional testimony as to the debauched lifestyle he led while working in the most elite branches of the worlds banking system. His revelations prove to be incredibly revealing as to the practices of high level financial elitists. I will let the videos speak for themselves. They are incredibly powerful and moving to watch.

Caveat: This particular subject of (child sexual abuse by the global elite) is not one that I have delved into here at Clarity of Signal previously. My primary focus is on war, terrorism and geopolitics, particularly terrorist ruses in Syria and fascist war crimes in Ukraine, however, I do think there is something nefarious going on when it comes to the disturbing subject matter discussed in these videos, and the issue should be investigated much more thoroughly, thus, my reason for putting together this post to offer the opportunity for others to see all these videos in one specific location.

Bombard’s Body Language Analysis provides confirmation of Bernard’s real emotional turmoil.

Newly released video (June 13, 2017) : Part 2

As Parts 3, 4 and 5 become available in the near future they will also be added to this thread. Please download, cache, copy and share these videos to help get the word out about these uninvestigated crimes of the global elite. In my opinion, these are incredibly important issues that need much, much more daylight and with the proverbial foxes in charge of the hen house its very difficult to get a proper investigation off the ground.

Instead of looking into these matters seriously, authorities within the Deep State, along with the Washington Post, rolled out the anonymous group PropOrNot in the November 2016 post election environment and commenced denouncing any entity that exposed these issues as ‘fake news’. That Deep State ‘fake news’ agenda is continuing to be implemented by the corrupt mainstream media and its cohorts in government who are now using Facebook, Google, You Tube and other social media to censor and demonetize accounts that share this information. Please see my other Clarity of Signal posts on this subject.

Google Censors and Demonetizes High View Count Videos That Reveal The Truth About the Syrian War and the MSM’s ‘Fake News’ Agenda

Big Brother Watching: Huge Compendium of Screenshots Highlight Facebook and Other Forms of Censorship In New Age of Internet Surveillance and Control

 

Additional videos provided by the Dark Horse and Outer Dark You Tube channels provide further insight into other aspects of the strange rituals of global elitists. The 2016 Gottard Swiss Tunnel opening ceremony is quite interesting and bizarre due to the lengthy two part performance for the European global elite (including EU leaders) that features costumed characters conducting morose dances and imitating sex acts while dressed as horned beasts. (Caveat: I am personally not religious. I’m agnostic and simply posting that which I find of interest in regards to this very dark subject matter.)

 

2nd caveat: I consider myself a “conspiracy analyst and fact checker”. I believe that all human beings, including the global elite, conspire to do both good and bad things in this world and no one should be given a free pass just because of their government or elite status. The term conspiracy theorist has been used as a cudgel to silence dissent and differing opinions. In my opinion, that term is well past its sell by date and has no serious relevance to these important matters.

If one examines my investigative work here at Clarity of Signal WordPress site they will see quite clearly that the elitist controlled media has been lying to the public on a massive scale for quite some time, particularly about war, terrorism and the corrupt enrichment that occurs in conjunction with it. The corrupt mainstream media, the government and Hollywood’s pushing of the White Helmets terrorist ruse proves beyond a reasonable doubt that these “people in charge” are capable of some very, very evil acts. Nothing is beyond the pale for them when it comes to their own financial survival. Take that for what its worth and let your conscience guide your way as you examine these videos.

 

More information on the BIS (Bank of International Settlements) can be found here:

Bank of International Settlements – How the Rothschild Banking Dynasty Rules the World

The directly above link will also lead you to a large amount of information on the role of the Trilateral Commission and Zbigniew Brzezinski’s shaping of foreign policy that leads to nefarious actions…….i.e. support for terrorist groups and repressive regimes, implementing coups, starting wars, etc.

 

For additional information on Pizzagate please see my tribute post on CBS46 investigative reporter Ben Swann who brought the story mainstream attention:

https://clarityofsignal.com/2017/05/29/tribute-and-compendium-of-videos-of-cbs46-reporter-ben-swann-who-revealed-us-support-for-terrorist-groups-in-syria/

The link above features the official WikiLeaks links to Podesta emails on the subject of pizza. Those links are also listed here:

Wikileaks – Pizzagate

Wikileaks: Podesta Emails

Most controversial Podesta email – Handkerchief

 

 

 

 

The BBC’s Ukraine Anomalies – Maidan’s Hotel Ukraine Snipers and the Confusing Reporting of Gabriel Gatehouse

The massacre at Kiev’s Maidan was a major turning point in the Ukrainian crisis in which the BBC played a key role on reporting of events. This post will examine the BBC video reports of reporter Gabriel Gatehouse as he covered the Maidan sniper massacre and it will demonstrate that the videos his team filmed clearly show that Gatehouse’s own on camera acceptance of an undercover British forensic investigative team version of events fails to match his own personal experience of being shot at by a sniper in the Hotel Ukraine, a sniper, who incidentally, was not included in the ‘official’ investigation final report conducted by the post coup Kiev based government of Ukraine.

At the time of the Maidan Massacre on February 20, 2014, the Hotel Ukraine was occupied and controlled by opposition forces including the Right Sector neo-nazi groups led by Andriy Parubiy that were the frontline foot soldiers being used as a battering ram against the Yankovich led government.

In the following video filmed on February 20th, 2014, we see Gabriel Gatehouse and his BBC team clearly shot at from the Hotel Ukraine at the 2:35 mark. The BBC report verifies snipers were in the Hotel Ukraine behind protesters. Gatehouse even goes so far as to identify the room the shooters are located in, stating ” from one of the upper windows of the hotel a shot rang out…….up there, yes….our hotel…..upper window 5th row from the left…2nd from the top….the one that is open”. He then states ” I saw the shooter, he was wearing one of the protester’s green helmets”.

In this 2nd video at the 3:50 mark we see Gabriel Gatehouse in the unedited version of the same video cursing about the rifle shot which just barely misses him. Before being shot at he states clearly “What is that, that window facing directly to us……fuck….let’s get the fuck out of here!”

Now here is where things get interesting. In the following BBC video, filmed 4 days later, and featuring the very same Gabriel Gatehouse, he accepts the version of events of a team of anonymous undercover British forensic experts who neglect to include the sniper that shot at him and his BBC crew from the Hotel Ukraine. He makes no mention of this fact, nor does he correct their reporting, and instead, simply accepts their stated version of events that the snipers were in other locations and government positions which has been deduced by the anonymous team based on bullet scars on surrounding objects.

At the 1:58 mark above, Gatehouse states “It’s amazing how you can work that all out”. The anonymous forensic expert then states “It was just a bloodbath really……wasn’t it?” To which Gatehouse quizzically nods and says “Yes it was”. 

At the 2:26 mark, while standing in front of a barricade, Gatehouse then states “The investigator’s say that there were at least 4 sniper positions…..one at ground level, here at this barricade, and then another 3 in the tall buildings behind it over there (points at government side) they were shooting directly down this road in the direction of the hotel where we were staying (camera then pans towards the Hotel Ukraine) and the square beyond”. Gatehouse makes no mention whatsoever of the sniper that shot at his crew in the previous BBC videos taken on February 20th, 2014.  The rest of the video features interviews with members of the groups who took over the city and a short BBC expose’ on Victoria Yankovich’s estate.

 

The following BBC video was released a full year later on February 12, 2015 and finally features Gabriel Gatehouse revealing there were snipers shooting from other buildings than the ones the anonymous British forensic team cited. The BBC video makes no direct mention of these snipers intentionally shooting protesters, nor does it accurately portray that 10 Ukrainian Berkut police officers were killed by snipers, instead, it inaccurately states that only 3 police officers were killed in the footnotes to the video and it creates an even more confusing version of events. This video does features Berkut police radio communications pointing out clearly that a sniper was in the Hotel Ukraine and even gives a precise location description stating at the 2:16 mark “Second level from the top on the left side of the Hotel Ukraine”. Now be careful to pay close attention to what Gabriel Gatehouse states in the video below at the 4:24 mark after interviewing Andriy Parubiy (Right Sector Commandant). He states ” the location matters, the Hotel Ukraine was that morning largely under the control of government forces, but the conservatory building several hundred meters away was firmly in the hands of protesters.” Later in the BBC video, a new narrative is introduced about a sniper in the conservatory building. The statement that the Hotel Ukraine was under government control is obviously inaccurate due to the fact that Gabriel Gatehouse had already previously identified a green helmeted protester in the window that he pointed out in this video and previous videos. He also had stated previously that the Hotel Ukraine was occupied by protestors as a makeshift medical facility. Yet, strangely, in this fourth video he refers to it as a building under the control of government forces. Then he interviews Andriy Parubiy again on the possibilities of snipers in the Hotel Ukraine and takes his words at face value that his Maidan Right Sector neo-nazi foot-soldiers did not locate a sniper in the Hotel Ukraine (once again, this provides more proof that the hotel was not under government control as Gatehouse previously stated).

Gatehouse redeems himself somewhat at the 11:40 mark when he states ” I’ve spoken to a senior investigator at the general prosecutors office here, he’s convinced that whoever was firing from the Hotel Ukraine was targeting both sides. He’s gathering evidence that he says will prove that the massacre on Maidan on the 20th of February was the culmination of a carefully worked out plot….the aim of which was to cause maximum chaos…..but he says that his investigation is constantly being blocked by the courts.” (Note that nothing of substance has ever come of this Kiev led investigation, instead a few Berkut officers have been scapegoated for the killings).

Gatehouse’s reporting then reverts to narratives based on Russia blaming put forth by the same Andriy Parubiy, CIA blaming put forth by anonymously cited Russians and finally wrapping up with the statement that Maidan was all about good people coming together, yet, unfortunately people were manipulated and no one knows by whom……..thus, resulting in the waters being thoroughly muddied enough to conceal everything, even though the BBC itself has previously reported on the dangers of Maidens Right Sector neo-nazis.

Judging from all the above, if the BBC’s goal was to confuse the hell out of the general public with their ‘reporting’, then they have performed a remarkable job. The waters are completely muddied, there’s been plenty of time for all evidence to be destroyed (even the tree’s were removed) and a complete cloud of confusion now hovers over the sniper murders that took place at Maidan on February 20th, 2014. A closer look at the actions of participating BBC interviewee Andriy Parubiy would certainly be a good place to start when it comes to accessing the truth about the snipers that killed the so called ‘heavenly 100’ at Maidan.

On a more professional and decent note, there have been some remarkable researchers cacheing information and investigating what really happened in Kiev on February 20th, 2014 and I will link to them here so that other researchers may continue to look more deeply into this terrible tragedy that has now led to the New Cold War between the United States and Russia.

The best place to start is here:

The “Snipers’ Massacre” on the Maidan in Ukraine
by Ivan Katchanovski, Ph.D. School of Political Studies University of Ottawa

https://www.academia.edu/8776021/The_Snipers_Massacre_on_the_Maidan_in_Ukraine

The “Snipers’ Massacre” on the Maidan in Ukraine

A Closer Look on Syria website also compiled a huge amount of information related to the event as well as one of the best Maidan video troves online:

A Closer Look on Syria – Ukraine’s Maidan snipers

A Closer Look on Syria – Talk: Kiev Maidan Snipers

A Closer Look on Syria – Maidan snipers/Suspects

A Closer Look on Syria – Kiev Maidan snipers/Victims

September 2014 German TV investigation disproves the West’s claim that Yanukovych was responsible for killing of dozens of Ukrainian protestors. (English Subs)

 

Linked below is the most shocking video showing the sniper killings up close (Graphic Warning). This particular group of victims appear to have all been shot from behind by the snipers in the Hotel Ukraine, the evidence proving such (trees with bullets lodged in them showing azimuth of fire) were removed not long after the massacre. The fact that these victims were all sent forth from the Hotel Ukraine with no firearms of their own is also cause for suspicion on the actions of Andriy Paruiby and his Right Sector soldiers who were occupying the Hotel Ukraine.

Highly recommended IMBD documentary – Maidan Massacre 2014

Russian version in English language –

No proper investigation has ever been conducted by the Kiev regime that performed a coup utilizing neo-nazi battalions and took control of the Ukrainian government in February 2014. For those looking for more regarding the US instigated New Cold War with Russia please see my CoS posts on Zbigniew Brzezinski’s Grand Chessboard and implementation of the war in Ukraine.

IMI- Analysis – Understanding the Grand Chessboard

https://clarityofsignal.com

Compilation of Important Articles and Videos Detail NATO/US/UK/French Government’s Support for Terrorists in Libya and Direct Responsibility for the Manchester Arena Terror Attack

In the wake of the May 22, 2017 Manchester Arena Bombing a number of highly revealing articles were published that exposed direct western government responsibility for training, aiding and financing the al-Qaeda and ISIS affiliated terrorist groups involved in the overthrow of the Libyan government in 2011 and beyond. These important articles and videos below detail specific western actions that have now led to the 9/11 style “blowback’ of the Manchester Arena bombing. Although the most important excerpt’s are highlighted here, I recommend reading each article in its entirety in order to ascertain the clear larger picture.

Article 1 –

No Laughing Matter: The Manchester Bomber is the Spawn of Hillary and Barack’s Excellent Libyan Adventure

Screen Shot 2017-05-31 at 3.31.28 PM

Excerpt 1:

Last Monday, jihadi suicide bomber Salman Abedi blew himself up at an Ariana Grande concert in Manchester, England, killing 22 people. Salman grew up in an anit-Qaddafi Libyan immigrant family. In 2011, his father, Ramadan Abedi, along with other British Libyans (including one who was under house arrest), “was allowed to go [to Libya], no questions asked,” to join the Libyan Islamic Fighting Group (LIFG), an al-Qaeda-affiliate, to help overthrow Qaddafi. In Manchester, as Max Blumenthal puts it, in his excellent Alternet piece, it was all “part of the rat line operated by the MI5, which hustled anti-Qaddafi Libyan exiles to the front lines of the war.” In Manchester, Salman lived near a number of LIFG militants, including an expert bomb maker. This was a tough bunch, and everybody—including the cops and Salman’s Muslim neighbors—knew they weren’t the Jets and the Sharks. As Middle East Eye reports, he “was known to security services,” and some of his acquaintances “had reported him to the police via an anti-terrorism hotline.”

Could it be any clearer? The Abedi family was part of a protected cohort of Salafist proxy soldiers that have been used by “the West” to destroy the Libyan state. There are a number of such cohorts around the world that have been used for decades to overthrow relatively prosperous and secular, but insufficiently compliant, governments in the Arab and Muslim world—and members of those groups have perpetrated several blowback attacks in Western countries, via various winding roads. In this case, the direct line from Libya to Mali to Manchester is particularly easy to trace.

Excerpt 2 – Regarding US politics and the current cognitive dissonance amongst red team/blue team politically divided and conquered US citizens……

Manchester is the latest iteration of a scenario we’ve gone through so many times now, like some groundhog-day dream. At the end of my post two years ago, I was urging and hoping that Americans would wake up. But a lot of American liberals and lefties, including Berniebots, still like to imagine there’s a political space they can inhabit called Progressive Except Imperialism. There isn’t. Imperialism with Social Security and Medicare and Obamacare—even single-payer healthcare—is imperialism, and it’s reactionary and supremacist. Equal-opportunity imperialism is imperialism. African-American, women, Latinx, or LGBTQ presidents, generals, and drone operators do not make it any less criminal, or dangerous, or any less inevitably erosive of all those cherished progressive domestic programs.

Ignoring or putting aside what the U.S. does in Libya, or Iraq, or Syria, or Palestine because…Trump! The Republicans! is ignoring a fundamental element of a progressive politics as well as an immediate danger to the country. One can do it, but those who do, can’t claim to be seriously confronting the horrors of a tragedy like Manchester, no matter how many tears they shed.

The article below is by world renowned investigative war correspondent John Pilger and must be read in its entirety to grasp the full scope of western culpability for the Manchester Arena bombing……..

Article 2 –

Terror in Britain: What Did the Prime Minister Know?    by John Pilger

Screen Shot 2017-05-31 at 11.24.27 AM

Excerpt 1 – Pertaining to the actions of Theresa May and David Cameron:

The unsayable in Britain’s general election campaign is this. The causes of the Manchester atrocity, in which 22 mostly young people were murdered by a jihadist, are being suppressed to protect the secrets of British foreign policy. Critical questions – such as why the security service MI5 maintained terrorist “assets” in Manchester and why the government did not warn the public of the threat in their midst – remain unanswered, deflected by the promise of an internal “review”.

The alleged suicide bomber, Salman Abedi, was part of an extremist group, the Libyan Islamic Fighting Group, that thrived in Manchester and was cultivated and used by MI5 for more than 20 years. The LIFG is proscribed by Britain as a terrorist organisation which seeks a “hardline Islamic state” in Libya and “is part of the wider global Islamist extremist movement, as inspired by al-Qaida”.

The “smoking gun” is that when Theresa May was Home Secretary, LIFG jihadists were allowed to travel unhindered across Europe and encouraged to engage in “battle”: first to remove Mu’ammar Gadaffi in Libya, then to join al-Qaida affiliated groups in Syria.

The Manchester atrocity lifts the rock of British foreign policy to reveal its Faustian alliance with extreme Islam, especially the sect known as Wahhabism or Salafism, whose principal custodian and banker is the oil kingdom of Saudi Arabia, Britain’s biggest weapons customer.

Screen Shot 2017-05-31 at 2.48.50 PM

Excerpt 2 pertaining to the actions of MI5 and the US government under the leadership of Barack Obama:

In 2011, according to Middle East Eye, the LIFG in Manchester were known as the “Manchester boys”. Implacably opposed to Mu’ammar Gadaffi, they were considered high risk and a number were under Home Office control orders – house arrest – when anti-Gadaffi demonstrations broke out in Libya, a country forged from myriad tribal enmities. Suddenly the control orders were lifted. “I was allowed to go, no questions asked,” said one LIFG member. MI5 returned their passports and counter-terrorism police at Heathrow airport were told to let them board their flights.

The overthrow of Gaddafi, who controlled Africa’s largest oil reserves, had been long been planned in Washington and London. According to French intelligence, the LIFG made several assassination attempts on Gadaffi in the 1990s – bank-rolled by British intelligence. In March 2011, France, Britain and the US seized the opportunity of a “humanitarian intervention” and attacked Libya. They were joined by Nato under cover of a UN resolution to “protect civilians”.

Screen Shot 2017-05-31 at 2.43.06 PM

Last September, a House of Commons Foreign Affairs Select Committee inquiry concluded that then Prime Minister David Cameron had taken the country to war against Gaddafi on a series of “erroneous assumptions” and that the attack “had led to the rise of Islamic State in North Africa”. The Commons committee quoted what it called Barack Obama’s “pithy” description of Cameron’s role in Libya as a “shit show”.

In fact, Obama was a leading actor in the “shit show”, urged on by his warmongering Secretary of State, Hillary Clinton, and a media accusing Gaddafi of planning “genocide” against his own people. “We knew… that if we waited one more day,” said Obama, “Benghazi, a city the size of Charlotte, could suffer a massacre that would have reverberated across the region and stained the conscience of the world”.

Article 3 –

Alternet article by Max Blumenthal

The Manchester bombing is blowback from the West’s disastrous interventions and covert proxy wars

Screen Shot 2017-05-31 at 1.31.55 PM

Lead excerpt highlights UK government responsibility for Manchester Arena attack:

The heinous suicide bombing by British-born Salman Abedi of an Arianna Grande concert in Manchester was not merely the work of an “evil loser,” as Donald Trump called it. It was blowback from interventionist policies carried out in the name of human rights and “civilian protection.” Through wars of regime change and the arming and training of Islamist proxy groups, the US, UK and France played out imperial delusions across the Middle East. In Syria and Libya, they cultivated the perfect petri dish for jihadist insurgency, helping to spawn weaponized nihilists like Abedi intent on bringing the West’s wars back home.

The son of anti-Qaddafi immigrants to the UK, Abedi grew up in Manchester’s community of Libyan exiles. A report in the London Telegraph indicated that he had traveled just weeks before his attack to Libya, where Salafi-jihadi militias are competing for control of the destabilized country. Abedi had also reportedly traveled to Syria to join up with the extremist rebels that have waged a six-year-long insurgency against the country’s government, with billions of dollars in assistance from the West and its Gulf allies. According to French Interior Minister Gerard Collomb, it was in these conflict zones where Abedi was radicalized.

The impressionable 22-year-old returned to the UK with enough training to make a fairly sophisticated bomb that massacred 22 concert goers, many of them children. “It seems likely — possible — that he wasn’t doing this on his own,” Britain’s home secretary, Amber Rudd, told the BBC. She described the bomb as “more sophisticated than some of the attacks we’ve seen before.” According to the Telegraph, “A group of Gaddafi dissidents, who were members of the outlawed Libyan Islamic Fighting Group (LIFG), lived within close proximity to Abedi in Whalley Range.” They included Abd al-Baset Azzouz, an expert bomb maker who controls an Al Qaeda-affiliated militia in eastern Libya.

2nd important excerpt covers well the actions of John McCain, Hillary Clinton and Nicolas Sarkozy:

When the Libyan uprising broke out in March 2011, Qatar and the United Arab Emirates immediately pumped arms and logistical support into the armed opposition. Then-Secretary of State Hillary Clinton saw the insurgency as an opportunity for America to assert its influence amidst the tumult of the Arab Spring. She advocated arming the rebels on the grounds that Washington could get “skin in the game,” according to her Middle East advisor, Dennis Ross. Ignoring warnings from NATO’s supreme allied commander Adm. James Stavridis about the presence of Al Qaeda in the opposition, President Barack Obama approved shipments of TOW missiles, armored Humvees, and advanced radar systems to the Libyan insurgents.

When she learned of the newly up-armed rebels’ rapid advances, Clinton reportedly exclaimed, “Good! This is the only language that Qaddafi is understanding.” French President Nicolas Sarkozy, a subject of Qatari political influence and alleged bribery over the 2022 FIFA World Cup vote, urged his Western allies to “ask our Arab friends” to distribute weapons to the National Transitional Council, the official body of the Libyan opposition. When a French shipment of missiles and machine guns arrived through the port of Benghazi, the NTC’s acting defense minister handed them over to Belhaj and the LIFG.

As the insurgency gathered steam, Belhaj found a powerful ally in John McCain, the Republican chairman of the Senate Foreign Relations Committee. After a friendly meeting with Belhaj and his militiamen in Benghazi on April 22, 2011, McCain called on “responsible nations” to provide the Libyan rebels with “battlefield intelligence, training, and weapons.” McCain emerged from the meeting stirred with inspiration. “I met these courageous fighters, and they are not al-Qaeda,” the senator proclaimed. “To the contrary: they are Libyan patriots who want to liberate their nation. We need to help them do that.”

More at link above…..

Below I will highlight an important series of videos that also documents the direct culpability of western powers in the destabilization and war in Libya utilizing terrorist groups.

This informative May 2016 video from the South Front geopolitical analysis group covered well the western government support for al-Qaeda leader Abdul Hakim Belhaj in Libya when putting together a post war start up government that included known terrorists.

The video above proves quite clearly that the west does indeed negotiate with terrorists. Not only do they negotiate with then, they reward them handsomely with large sums of money and powerful political positions.

Insightful comment at the linked above video:

Simplified Western coup formula –

Step 1: Stir an uprising utilizing nefarious proxy groups, then kill the leader of the sovereign (prosperous) nation, after lying your way into the airspace of that country under total BS pretext using social media groups suck as Soros funded MoveOn and Avaaz (just like Syria and Ukraine, but got pulled back due to Russia intervening on behalf of the NATO targeted country).

Step 2: Quickly install a puppet regime while blanketing the media with distractions and false stories, if not implemented quickly, start to create confusion by blaming ”allies” who also committed the illegal act of war in order to achieve the coup, and start giving more influential roles to influential terrorist scum (who we were hoping would just kill each other off) in order to create a semi-puppet government that allows for time and maneuverability. General public now stands completely confused about root causes and actions inside the affected country.

Step 3: Ultimately get this proxy terrorist ”government” to ”invite” the NATO tyrannic army and create bases for an indefinite stay in order to further project power down into sub-Sahara Africa.

Thus, coup accomplished via terrorist scum proxy group detour. Blowback inevitable.

Additional May 2016 video by South Front exposes the expansion of ISIS in Libya after NATO toppled Gaddafi…….

More from South Front here –

At the 4:32 mark in the following South Front video the narrator warns that “the growing destabilization in Libya will also increase the illegal immigration flow to Europe, and moreover, the Mediterranean migration route opens a highway for terrorists aiming to set up sleeper terrorist cells or conduct terrorist actions across the whole of Europe”

Whitney Webb at Mint Press News rounds out the real narrative on UK grooming of terrorists from Libya……

Article 4 –

Manchester Bomber May Have Been Groomed By UK Intelligence

The alleged perpetrator of last week’s bombing in Manchester has been linked to a Libyan terror group that has been aided in the past by British intelligence authorities – a fact that has been conveniently ignored by mainstream media, despite their intense coverage of the attack.

By Whitney Webb | May 27, 2017

MANCHESTER — As the worst terrorist attack to hit the United Kingdom since 2005, last week’s bombing of a concert in Manchester has since been a constant fixture of the news cycle both in the UK and abroad. Absent from mainstream media accounts of the event – and the man allegedly behind it – are several key coincidences that have raised concerns, particularly regarding links between British intelligence and the alleged suicide bomber, British-born Salman Abedi.

Absent from mainstream media accounts of the event, however – and the man allegedly behind it – are several key coincidences that have raised concerns, particularly regarding links between British intelligence and the alleged suicide bomber, British-born Salman Abedi.

Media reports have already established that Abedi, a Libyan national, was radicalized in the hotbed of radical extremism that Libya has become since the U.S.-NATO backed invasion that ousted Libyan leader Muammar Gaddafi.

Though most mainstream accounts don’t mention the UK’s role in destabilizing and overthrowing the Libyan government in 2011 – that is, causing Libya’s current state of chaos by arming right-wing rebels who now make up al-Qaeda and ISIS – several have mentioned the link between Abedi and the Libyan Islamic Fighting Group (LIFG).

More at link above……

 

Additional Clarity of Signal post on the plight of sub-Saharan Africans in Libya post NATOs intervention –

CNN caught lying about the plight of sub-Saharan Africans in Libya- Clinton’s war

Tribute and Compendium of Videos of CBS46 Reporter Ben Swann Who Revealed US Support For Terrorist Groups in Syria

The following post chronicles the courageous reporting and highly revealing videos of CBS46 investigative reporter Ben Swann who was the leading US mainstream media reporter exposing US government and mainstream media lies about the wars on Syria, Iraq and Libya. He also achieved infamy for his 2013 interview with US President Barack Obama where he was the first reporter who questioned the president of the United States on the CIA providing weapons to terrorist groups in Syria. As he was gaining ascendency in the public eye in the 2016 post election environment he suddenly went ‘dark’, deleted all of his social media accounts and stopped reporting on highly controversial subject matter such as the US backed terrorist ‘rebels’ in newly liberated Aleppo, Syria, and US support for terrorists across the Middle East, as well as the highly controversial issue of Pizzagate which sprang forth due to the October 2016 Wikileaks release of the John Podesta emails.

Days after his Pizzagate story was released, Ben Swann suddenly announced that he had to suspend all of his projects, the most important of which was a story on the US government’s involvement in the creation of ISIS. He released a statement saying: “Heading back to CBS46 Monday but going to be changes. Biggest one, this page will go dark Tzuday, Feb 1st. Those who know me, trust me.”

The attached image to Ben’s post had a tiny rebel or resistance logo from Star Wars, only a few pixels wide. Within minutes that post was deleted and almost immediately after another identical post was made without the resistance logo. The non-logo social media posts are cached here.

Screen Shot 2017-05-29 at 11.37.39 AM

Screen Shot 2017-05-29 at 10.59.15 AM

Screen Shot 2017-05-29 at 10.58.36 AM

In early 2017, after the above posts and Tweets he was only seen once on CBS46 where his mic was off, thus, no one could hear him speaking. He was completely off-the-radar for the following two months. Immediately after his “shutdown”, his massive fanbase did some digging, as they knew he would not accidentally misspell “Tuesday” as “Tzuday”, especially since February 1st was not actually a Tuesday…..but instead, was a Wednesday. Researching fans looked into Sun Tzu’s “Art of War” and cross referenced phrases related to “dark” and located the following quote: “Let your plans be dark and impenetrable as night, and when you move, fall like a thunderbolt”. Now it is widely believed that Ben knew what he was up against (after all he has a young family to support) and he went into temporary hiding, or played along with his station bosses for the time being for the sake of his career and family income.

But as there was no contact with him, many presumed him possibly fallen victim to something more nefarious. After all, his website was shut down and all of his YouTube videos suddenly deleted. CBS46’s link on his profile on his website then took viewers to a fake FB page for him including only a picture of his face. His personal FB page was deleted, as well as his Twitter account. The only evidence that he had ever created any reporting on the aforementioned controversial issues are now mirror copies on other peoples YouTube accounts scattered across the Internet along with mentions and links of his content on threads and blogs. Even an image search for the tiny resistance logo Ben put up on his earlier “going dark” post was incredibly difficult to find. (Huge thanks to Sean Slomka credited at the end of this post for tracking down the image and additional material for this post.)

Note the additional small rebel logo below the date of Feb 1, 2017 in the image below.

Screen Shot 2017-05-30 at 10.58.20 AM.png

 

In April 2017 Ben was reporting again for CBS46, however, when he returned to air he made no mention of the reason’s for his hiatus, and he reported only on primarily everyday matters that are more inline with most US mainstream ‘programming’. It appears likely that Ben was “muffled” and most likely told by higher-ups at CBS to drop the controversial subject matter that threatens the status quo or risk losing his job permanently, and thus, seriously affecting his family.

On April 1, 2017, the Anti-Media website and Facebook page released this linked video of Ben Swann, however, they mention in the comments below the video report on America’s tax system that it was filmed in 2016 and released by them, while also stating also that he will be back soon.

Anti-Media released New Report from Ben Swann on America’s Broken Tax System

Ben is now regularly working as an anchor at CBS46, albeit his reports are incredibly toned down compared to his previous groundbreaking geopolitical reporting.Screen Shot 2017-05-29 at 11.00.57 AM.png

The videos below feature Ben’s most important work relating to the lies being put forth by the mainstream media and US government in regards to the Syrian war. They are accumulated from You Tube accounts where wise researchers cached Ben’s material. It is truly an impressive body of work by a real fighter for the truth and humanity who deserves accolades for bringing the truth to light in America…….and throughout the  World. Ben Swann truly represents the best of the American journalism profession.

Ben’s 2013 reporting on Syria highlights how ahead of the pack he truly was as he highlights the nefarious actions of traitor to the United States and humanity John McCain…

Ben’s interview with President Barack Obama showed his true desire to help expose the lies of war and US support for terrorist groups. No other reporter throughout the entire country was brave enough to put forth questions to the President of the United States like Ben did.

Ben’s coverage of the CIA lies about Russian hacking of the US election in 2016 were ground breaking due to his extensive knowledge of what the US had really been up to with FSA terrorists in Syria in comparison to Russian actions of really wiping out ISIS and their affiliated terrorist groups.

Ben’s reporting on Pizzagate was the first legitimate MSM discussion of the highly controversial subject of child molestation by high level politico’s which was initially revealed through the Podesta emails which were leaked by Wikileaks in late October 2016 during the last weeks run up to the U.S. Election.

The actual Wikileaks controversial emails, links and discussion on the subject of Pizzagate are here:

Wikileaks Pizzagate

Wikileaks: The Podesta Emails – search term Pizza

Most controversial Podesta Pizza email – Handkerchief Pizza Map

Ben Swann Truth in Media Facebook page is a site set up by Ben Swann supporters to cover all matters related to Ben after his own social media sites were shut down:

Ben Swann: truth in Media – Facebook page

Bens coverage of the Benghazi, Libya ordeal in 2012 was where he first started to gain real extensive nationwide fame. Its seems that his station manager was fine with this type of reporting at that time (possibly because Benghazi was a sided political issue).  In 2017 there is some small evidence that he had become too politically revealing and thus was no longer allowed to dig too deep with his investigative reporting.

 

The “Ben Swann Truth in Media” Facebook page is a site set up by Ben Swann supporters to cover all matters related to Ben after his own social media sites were shut down –

Ben Swann: Truth in Media Facebook page

The above Facebook link will lead you to current information on Ben and his reporting for CBS46.

The following screen captured image provides some insight into why Ben was silenced in regards to reporting on heavily controversial subject matter that highlights the crimes of the global elite (Examples: Syrian war lies, FSA terrorist supplied by the US, ISIS receiving US weapons,  Pizzagate- as revealed in the Wikileaks Podesta emails).

Screen Shot 2017-05-28 at 2.13.59 PM.png

It is highly likely that the following screenshot reveals what really took place regarding Ben’s ability to report the truth. Controversial propagandist, sheep-herder and MSM gate-keeper David Brock at Media Matters has initiated a campaign to silence truth-seekers like Ben by going after advertisers and threatening to reduce station revenue.

Screen Shot 2017-05-28 at 3.12.31 PM.png

The following videos and screenshots highlight additional excellent in-depth research and reporting that Ben Swann was conducting prior to his “muffling”.

This August 2012 video exposes the real theft and deception related to the US Federal Reserve System and its initial establishment at the Jekyll Island meeting in 2013.

Off topic: For readers interested in more on the establishment of the U.S. Federal Reserve System please see my Clarity of Signal post on globalist banker Paul Warburg and how he played the lead role in getting the Federal Reserve bank and system off the ground. This is an eye-opening post due to the fact that Paul Warburg was also the man that established the US Council on Foreign Relations (CFR) in 1920 and  he was also the CEO of I.G. Farben’s US branch (The German war machine / largest company in the world) when he died in 1932. The above video,once again highlights Ben’s bravery as he enters into territory that most U.S. media would never touch.

The Rothschild’s representative at 1913 Federal Reserve, the CFR,+ I.G. Farben

Below is Ben’s excellent 2015 report on the CIA origins of ISIS……Note that in this report Ben highlights that the leading FSA general of the Northern Front in Syria states that unless western governments send more weapons the FSA (comprised of dozens of terror groups) would lose the war in less than a month. Ben includes his interview with President Obama and presents the question as to why the U.S. would fund the so called ‘rebels’. Obama in his response states that they would only supply ‘non-lethal’ support, which of course, turned out to be completely untrue, as Ben highlights that these weapons ended up in the hands of ISIS fighters intertwined with the US backed Free Syrian Army.

The following images highlight how far ahead of the curve Ben’s reporting was……shown in chronological order they paint a picture that clearly exposes US government corruption and support for terrorists in Syria. For this work Ben Swann truly deserves a medal…..he is a great humanitarian……..and a great American. Exposing war lies and government corruption is the most noble thing any of us can do. Real patriotism requires dissent when one sees that their government is acting criminally.

Screen Shot 2017-05-28 at 2.45.13 PM.pngScreen Shot 2017-05-28 at 2.45.43 PM.pngScreen Shot 2017-05-28 at 2.47.11 PM.pngScreen Shot 2017-05-28 at 2.47.59 PM.pngScreen Shot 2017-05-28 at 2.49.03 PM.pngScreen Shot 2017-05-28 at 2.49.59 PM.pngScreen Shot 2017-05-28 at 2.51.23 PM.pngScreen Shot 2017-05-28 at 2.52.01 PM.pngScreen Shot 2017-05-28 at 2.52.29 PM.png

Even though Ben is no longer reporting on these incredibly important subjects shown above, it is important to remember that he has laid the necessary and vital ground work while setting a stellar example for others to seek out the truth. Many people are waiting for a hero to arrive and lead the way in the current geopolitical unknown terrain. I think that We The People should strive to be the hero’s we seek. We should follow Ben’s example and keep his work alive.

Please download, save and copy his videos above, reupload them to video sharing sites and make sure to share them with your friends and family. That is how we change the world………through the mind of one caring person at a time.  Follow Ben’s example: You are the hero and the change you seek. The new age of citizen journalism needs you now ……..it needs us working together. Help wake others up. Many can’t see it, but there is a global awakening taking place as the crimes of the global elite that profit from war are revealed more and more each day. Have hope………we are winning.

I wanted to include a simple gift and tribute to Ben and his family, and to what America is supposed to represent. Its 48 minutes of beautiful adventure on the John Muir trail with some nice music, and it captures the spirit, beauty and wonder of America in all its beautiful natural glory.    Here’s a memorial day tribute to Ben Swann……..

 

 

(Credit to War on Syria Researcher Sean Slomka for outstanding help in ascertaining information for this post.)

Direct Terrorist Collusion: Over One Dozen Videos Capture White Helmets Working Side-By-Side With Terrorist Groups in Syria

The videos below shows over a dozen occasions where the White Helmets are directly operating alongside armed terrorist groups in Syria. It also features the Saudi cleric leader of al-Nusra Front (al-Qaeda in Syria) stating on record that the White Helmets (civil defence) are mujahideen (Islamic jihadists). Additionally, it features videos of the White Helmets lead propaganda disseminator Hadi Abadallah working alongside numerous radical Islamic terrorist groups. At the conclusion of the post, some of the best western voices reveal the truth about the US and UK support for the FSA terrorists in Syria.

Direct collusion……

Abdullah al-Muhaysini,, the Saudi cleric leader of al-Nusra Front in Syria declares that the White Helmets (civil Defense) are Mujahideen brothers in holy war (jihadists).

Abdullah al-Muhaysini, the Saudi cleric leader of al-Nusra Front in Syria asks ISIS to join him in jihad (holy war).

John Cantle who was captured by ISIS and held in Islamic State territory is shown on video with White Helmets in the background.

Additional link to John Cantle’s pro-ISIS video here: John Cantle in ISIS Video Proves White Helmets Work for ISIS (NEVER BEFORE SEEN)

White Helmets meeting held at FSA HQ directly links them to Free Syrian Army which is comprised of dozens of terrorist groups and has been filmed on camera on numerous occasions conducting atrocities and working directly in conjunction with al-Nusra Front (al-Qaeda in Syria)  terrorists.

Video of Hadi Abdallah, the lead propaganda disseminator for the White Helmets directly colluding with al-Nusra Front terrorists….

Video below shows that Hadi Abdallah was also involved with the White Helmets for the chemical event in Idlib, Syria on April 4, 2017.

Additional Clarity of Signal links on Hadi Abdallah:

https://clarityofsignal.com/2017/04/10/false-flagger-al-nusra-front-terrorist-reporter-hadi-abdallah-first-responder-to-chemical-massacre-in-idlib-syria-on-april-4th-2017/

https://clarityofsignal.com/2017/05/02/father-of-invention-media-portrayed-grief-stricken-dad-turns-out-to-be-al-nusra-front-terrorist/

Additional videos linking Hadi Abdallah to al-Nusra Front (al-Qaeda in Syria):

Hadi Abdallah Embraces al-Nusra Front Jihadists

Live Leak Links to White Helmets videos linking them to FSA and terror groups

Live Leak Video Links White Helmets Who Received Oscar Directly to FSA Terror Groups

New Footage of White Helmets Caught on Camera Working with Terrorists and Western NGO

Ben Swann’s Reality Check Exposes the Truth About US Support For FSA Terrorists (al-Qaeda) in Syria

Dr Marcus Papadopoulos reveals the truth about the White Helmets on the BBC

US Congressional Representative Tulsi Gabbard conducts interview with Mumina, a victim of the FSA who beheaded members of her family.

Tyranny Unmasked Uncovers the true face of the White Helmets

White Helmets filmed colluding with al- Nusra terrorist’s disposing of corpses in shovel of a tractor in 2015.

Final video shows White Helmets attending an August 2016 rally led by Abdullah al-Muhaysini the Saudi cleric leader of al-Nusra Front terrorist group (al-Qaeda in Syria).

New video has been uploaded that feature a White Helmets member participating in unloading a truck filled with beheaded Syrian soldiers. Shown below are two videos of the truck. The 1st video is from Twitter and shows a blue shirted White Helmet member with the group logo on the back unloading beheaded corpses. The 2nd video shows the same truck at the time of the loading of the bodies.

White Helmets Film Themselves Participating in Beheading of Syrian Soldiers

Pt 1 Beheaded soliders in truck. Note broken rear window, center brake light, broken left tail light verifies it as the same truck with SAA bodies.

 

 

Recognizing the Enemy of Truth: Cryptome’s Guide To Forum Spies – GCHQ and COINTELPRO Disruption Techniques

25 February 2014. Related: GCHQ Full-Spectrum Cyber Effects:

http://cryptome.org/2014/02/gchq-cyber-effects.pdf

24 February 2014. Related: GCHQ Online Deception:

http://cryptome.org/2014/02/gchq-online-deception.pdf

GCHQ DISRUPTION Operational Playbook:

http://cryptome.org/2014/02/gchq-disruption.pdf

29 January 2014. Related: GCHQ Squeaky Dolphin Psychological Operations:

http://cryptome.org/2014/01/gchq-squeaky-dolphin.pdf (18MB)

4 March 2012. Precursor to this sabotage, OSS Sabotage of Organizations:

http://svn.cacert.org/CAcert/CAcert_Inc/Board/oss/oss_sabotage.html

12 July 2012

The Gentleperson’s Guide To Forum Spies (spooks, feds, etc.)

http://pastebin.com/irj4Fyd5

1. COINTELPRO Techniques for dilution, misdirection and control of a internet forum
2. Twenty-Five Rules of Disinformation
3. Eight Traits of the Disinformationalist
4. How to Spot a Spy (Cointelpro Agent)
5. Seventeen Techniques for Truth Suppression
______________________________________________________________________________________
COINTELPRO Techniques for dilution, misdirection and control of a internet forum..

There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a ‘uncontrolled forum.’

Technique #1 – ‘FORUM SLIDING’

If a very sensitive posting of a critical nature has been posted on a forum – it can be quickly removed from public view by ‘forum sliding.’ In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to ‘age.’ Each of these misdirectional forum postings can then be called upon at will to trigger a ‘forum slide.’ The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a ‘forum slide’ and ‘flush’ the critical post out of public view it is simply a matter of logging into each account both real and fake and then ‘replying’ to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting ‘slides’ down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and unuseful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.

Technique #2 – ‘CONSENSUS CRACKING’

A second highly effective technique (which you can see in operation all the time at http://www.abovetopsecret.com) is ‘consensus cracking.’ To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made – but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger ‘evidence’ or disinformation in your favour is slowly ‘seeded in.’ Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then ‘abort’ the consensus cracking by initiating a ‘forum slide.’

Technique #3 – ‘TOPIC DILUTION’

Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a ‘RESOURCE BURN.’ By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a ‘gossip mode.’ In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to ‘drive in the wedge.’ By being too far off topic too quickly it may trigger censorship by a forum moderator.

Technique #4 – ‘INFORMATION COLLECTION’

Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a ‘show you mine so me yours’ posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your ‘favourite weapon’ and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favourite ‘technique of operation.’ From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.

Technique #5 – ‘ANGER TROLLING’

Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes – without the requirement to ‘stage’ a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to ‘lead’ the forum by replying to your own posting with your own statement of violent intent, and that you ‘do not care what the authorities think!!’ inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.

Technique #6 – ‘GAINING FULL CONTROL’

It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings – and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the ‘ultimate victory’ as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a ‘honey pot’ gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.

CONCLUSION

Remember these techniques are only effective if the forum participants DO NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation can completely fail, and the forum can become uncontrolled. At this point other avenues must be considered such as initiating a false legal precidence to simply have the forum shut down and taken offline. This is not desirable as it then leaves the enforcement agencies unable to track the percentage of those in the population who always resist attempts for control against them. Many other techniques can be utilized and developed by the individual and as you develop further techniques of infiltration and control it is imperative to share then with HQ.
______________________________________________________________________________________

Twenty-Five Rules of Disinformation

Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.

1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the ‘How dare you!’ gambit.

3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such ‘arguable rumors’. If you can associate the material with the Internet, use this fact to certify it a ‘wild rumor’ from a ‘bunch of kids on the Internet’ which can have no basis in fact.

4. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

5. Sidetrack opponents with name calling and ridicule. This is also known as the primary ‘attack the messenger’ ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as ‘kooks’, ‘right-wing’, ‘liberal’, ‘left-wing’, ‘terrorists’, ‘conspiracy buffs’, ‘radicals’, ‘militia’, ‘racists’, ‘religious fanatics’, ‘sexual deviates’, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism, reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

7. Question motives. Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough ‘jargon’ and ‘minutia’ to illustrate you are ‘one who knows’, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

10. Associate opponent charges with old news. A derivative of the straw man — usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with – a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the ‘high road’ and ‘confess’ with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, ‘just isn’t so.’ Others can reinforce this on your behalf, later, and even publicly ‘call for an end to the nonsense’ because you have already ‘done the right thing.’ Done properly, this can garner sympathy and respect for ‘coming clean’ and ‘owning up’ to your mistakes without addressing more serious issues.

12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues.

13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.

14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.

15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.

16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won’t have to address the issue.

17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can ‘argue’ with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

18. Emotionalize, Antagonize, and Goad Opponents. If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how ‘sensitive they are to criticism.’

19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the ‘play dumb’ rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations — as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.

21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.

22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.

25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

______________________________________________________________________________________

Eight Traits of the Disinformationalist

1) Avoidance. They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.

2) Selectivity. They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.

3) Coincidental. They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.

4) Teamwork. They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.

5) Anti-conspiratorial. They almost always have disdain for ‘conspiracy theorists’ and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain.Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.

6) Artificial Emotions. An odd kind of ‘artificial’ emotionalism and an unusually thick skin — an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial.

Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal. But disinfo types usually have trouble maintaining the ‘image’ and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It’s just a job, and they often seem unable to ‘act their role in character’ as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later — an emotional yo-yo.

With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game — where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.

7) Inconsistent. There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat ‘freudian’, so to speak, in that perhaps they really root for the side of truth deep within.

I have noted that often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I’m not aware of too many Navy pilots who don’t have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.

8) Time Constant. Recently discovered, with respect to News Groups, is the response time factor. There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:

a) ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NG ONLY WORKS IF THE READER SEES IT – FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.

b) When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR – there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to ‘get permission’ or instruction from a formal chain of command.

c) In the NG example 1) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay – the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.

______________________________________________________________________________________

How to Spot a Spy (Cointelpro Agent)

One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?

1) The message doesn’t get out.

2) A lot of time is wasted

3) The activist is frustrated and discouraged

4) Nothing good is accomplished.

FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established.

Their purpose is to prevent any real movement for justice or eco-peace from developing in this country.

Agents come in small, medium or large. They can be of any ethnic background. They can be male or female.

The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs.

This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists.

It is the agent’s job to keep the activist from quitting such a group, thus keeping him/her under control.

In some situations, to get control, the agent will tell the activist:

“You’re dividing the movement.”

[Here, I have added the psychological reasons as to WHY this maneuver works to control people]

This invites guilty feelings. Many people can be controlled by guilt. The agents begin relationships with activists behind a well-developed mask of “dedication to the cause.” Because of their often declared dedication, (and actions designed to prove this), when they criticize the activist, he or she – being truly dedicated to the movement – becomes convinced that somehow, any issues are THEIR fault. This is because a truly dedicated person tends to believe that everyone has a conscience and that nobody would dissimulate and lie like that “on purpose.” It’s amazing how far agents can go in manipulating an activist because the activist will constantly make excuses for the agent who regularly declares their dedication to the cause. Even if they do, occasionally, suspect the agent, they will pull the wool over their own eyes by rationalizing: “they did that unconsciously… they didn’t really mean it… I can help them by being forgiving and accepting ” and so on and so forth.

The agent will tell the activist:

“You’re a leader!”

This is designed to enhance the activist’s self-esteem. His or her narcissistic admiration of his/her own activist/altruistic intentions increase as he or she identifies with and consciously admires the altruistic declarations of the agent which are deliberately set up to mirror those of the activist.

This is “malignant pseudoidentification.” It is the process by which the agent consciously imitates or simulates a certain behavior to foster the activist’s identification with him/her, thus increasing the activist’s vulnerability to exploitation. The agent will simulate the more subtle self-concepts of the activist.

Activists and those who have altruistic self-concepts are most vulnerable to malignant pseudoidentification especially during work with the agent when the interaction includes matter relating to their competency, autonomy, or knowledge.

The goal of the agent is to increase the activist’s general empathy for the agent through pseudo-identification with the activist’s self-concepts.

The most common example of this is the agent who will compliment the activist for his competency or knowledge or value to the movement. On a more subtle level, the agent will simulate affects and mannerisms of the activist which promotes identification via mirroring and feelings of “twinship”. It is not unheard of for activists, enamored by the perceived helpfulness and competence of a good agent, to find themselves considering ethical violations and perhaps, even illegal behavior, in the service of their agent/handler.

The activist’s “felt quality of perfection” [self-concept] is enhanced, and a strong empathic bond is developed with the agent through his/her imitation and simulation of the victim’s own narcissistic investments. [self-concepts] That is, if the activist knows, deep inside, their own dedication to the cause, they will project that onto the agent who is “mirroring” them.

The activist will be deluded into thinking that the agent shares this feeling of identification and bonding. In an activist/social movement setting, the adversarial roles that activists naturally play vis a vis the establishment/government, fosters ongoing processes of intrapsychic splitting so that “twinship alliances” between activist and agent may render whole sectors or reality testing unavailable to the activist. They literally “lose touch with reality.”

Activists who deny their own narcissistic investments [do not have a good idea of their own self-concepts and that they ARE concepts] and consciously perceive themselves (accurately, as it were) to be “helpers” endowed with a special amount of altruism are exceedingly vulnerable to the affective (emotional) simulation of the accomplished agent.

Empathy is fostered in the activist through the expression of quite visible affects. The presentation of tearfulness, sadness, longing, fear, remorse, and guilt, may induce in the helper-oriented activist a strong sense of compassion, while unconsciously enhancing the activist’s narcissistic investment in self as the embodiment of goodness.

The agent’s expresssion of such simulated affects may be quite compelling to the observer and difficult to distinguish from deep emotion.

It can usually be identified by two events, however:

First, the activist who has analyzed his/her own narcissistic roots and is aware of his/her own potential for being “emotionally hooked,” will be able to remain cool and unaffected by such emotional outpourings by the agent.

As a result of this unaffected, cool, attitude, the Second event will occur: The agent will recompensate much too quickly following such an affective expression leaving the activist with the impression that “the play has ended, the curtain has fallen,” and the imposture, for the moment, has finished. The agent will then move quickly to another activist/victim.

The fact is, the movement doesn’t need leaders, it needs MOVERS. “Follow the leader” is a waste of time.

A good agent will want to meet as often as possible. He or she will talk a lot and say little. One can expect an onslaught of long, unresolved discussions.

Some agents take on a pushy, arrogant, or defensive manner:

1) To disrupt the agenda

2) To side-track the discussion

3) To interrupt repeatedly

4) To feign ignorance

5) To make an unfounded accusation against a person.

Calling someone a racist, for example. This tactic is used to discredit a person in the eyes of all other group members.

______________________________________________________________________________________

Saboteurs

Some saboteurs pretend to be activists. She or he will ….

1) Write encyclopedic flyers (in the present day, websites)

2) Print flyers in English only.

3) Have demonstrations in places where no one cares.

4) Solicit funding from rich people instead of grass roots support

5) Display banners with too many words that are confusing.

6) Confuse issues.

7) Make the wrong demands.

Cool Compromise the goal.

9) Have endless discussions that waste everyone’s time. The agent may accompany the endless discussions with drinking, pot smoking or other amusement to slow down the activist’s work.

______________________________________________________________________________________

Provocateurs

1) Want to establish “leaders” to set them up for a fall in order to stop the movement.

2) Suggest doing foolish, illegal things to get the activists in trouble.

3) Encourage militancy.

4) Want to taunt the authorities.

5) Attempt to make the activist compromise their values.

6) Attempt to instigate violence. Activisim ought to always be non-violent.

7) Attempt to provoke revolt among people who are ill-prepared to deal with the reaction of the authorities to such violence.

______________________________________________________________________________________

Informants

1) Want everyone to sign up and sing in and sign everything.

2) Ask a lot of questions (gathering data).

3) Want to know what events the activist is planning to attend.

4) Attempt to make the activist defend him or herself to identify his or her beliefs, goals, and level of committment.

______________________________________________________________________________________

Recruiting

Legitimate activists do not subject people to hours of persuasive dialog. Their actions, beliefs, and goals speak for themselves.

Groups that DO recruit are missionaries, military, and fake political parties or movements set up by agents.

______________________________________________________________________________________

Surveillance

ALWAYS assume that you are under surveillance.

At this point, if you are NOT under surveillance, you are not a very good activist!

______________________________________________________________________________________

Scare Tactics

They use them.

Such tactics include slander, defamation, threats, getting close to disaffected or minimally committed fellow activists to persuade them (via psychological tactics described above) to turn against the movement and give false testimony against their former compatriots. They will plant illegal substances on the activist and set up an arrest; they will plant false information and set up “exposure,” they will send incriminating letters [emails] in the name of the activist; and more; they will do whatever society will allow.

This booklet in no way covers all the ways agents use to sabotage the lives of sincere an dedicated activists.

If an agent is “exposed,” he or she will be transferred or replaced.

COINTELPRO is still in operation today under a different code name. It is no longer placed on paper where it can be discovered through the freedom of information act.

The FBI counterintelligence program’s stated purpose: To expose, disrupt, misdirect, discredit, and otherwise neutralize individuals who the FBI categorize as opposed to the National Interests. “National Security” means the FBI’s security from the people ever finding out the vicious things it does in violation of people’s civil liberties.

______________________________________________________________________________________

Seventeen Techniques for Truth Suppression

Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.

1. Dummy up. If it’s not reported, if it’s not news, it didn’t happen.

2. Wax indignant. This is also known as the “How dare you?” gambit.

3. Characterize the charges as “rumors” or, better yet, “wild rumors.” If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through “rumors.” (If they tend to believe the “rumors” it must be because they are simply “paranoid” or “hysterical.”)

4. Knock down straw men. Deal only with the weakest aspects of the weakest charges. Even better, create your own straw men. Make up wild rumors (or plant false stories) and give them lead play when you appear to debunk all the charges, real and fanciful alike.

5. Call the skeptics names like “conspiracy theorist,” “nutcase,” “ranter,” “kook,” “crackpot,” and, of course, “rumor monger.” Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the “more reasonable” government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own “skeptics” to shoot down.

6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).

7. Invoke authority. Here the controlled press and the sham opposition can be very useful.

8. Dismiss the charges as “old news.”

9. Come half-clean. This is also known as “confession and avoidance” or “taking the limited hangout route.” This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal “mistakes.” This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.

10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.

11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely free press. If evidence exists that the Vince Foster “suicide” note was forged, they would have reported it. They haven’t reported it so there is no such evidence. Another variation on this theme involves the likelihood of a conspiracy leaker and a press who would report the leak.

12. Require the skeptics to solve the crime completely. E.g. If Foster was murdered, who did it and why?

13. Change the subject. This technique includes creating and/or publicizing distractions.

14. Lightly report incriminating facts, and then make nothing of them. This is sometimes referred to as “bump and run” reporting.

15. Baldly and brazenly lie. A favorite way of doing this is to attribute the “facts” furnished the public to a plausible-sounding, but anonymous, source.

16. Expanding further on numbers 4 and 5, have your own stooges “expose” scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.

17. Flood the Internet with agents. This is the answer to the question, “What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?” Don t the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.

Guardian UK – Revealed: US spy operation that manipulates social media

Military’s ‘sock puppet’ software creates fake online identities to spread pro-American propaganda

The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda.

A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an “online persona management service” that will allow one US serviceman or woman to control up to 10 separate identities based all over the world.

The project has been likened by web experts to China’s attempts to control and restrict free speech on the internet. Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives.

The discovery that the US military is developing false online personalities – known to users of social media as “sock puppets” – could also encourage other governments, private companies and non-government organisations to do the same.

The Centcom contract stipulates that each fake online persona must have a convincing background, history and supporting details, and that up to 50 US-based controllers should be able to operate false identities from their workstations “without fear of being discovered by sophisticated adversaries”.

Ntrepid Timestream product allows for “Across the board” propaganda rollout- cohesion of information to multiple affiliated media sources. (Note video highlights pro-Kiev (Ukraine) information agenda.

 

Cryptome link to all compiled documentation utilized in this post: https://cryptome.org/2012/07/gent-forum-spies.htm