Some Thoughts On J. Allen Hynek

FakeNews

Source:RichardDolanPress.com
Richard Dolan
April 21, 2002

[Author’s Note: With a few modifications, this article is essentially excerpted from the second edition of UFOs and the National Security State, Volume 1. I am indebted to UFO researcher Val Germann for his assistance in preparing this article.]

Astronomer J. Allen Hynek is universally regarded as the most important scientist in the history of Ufology. He has even been called the “Galileo” of UFO research.

Yet, it is impossible to ignore Hynek’s complicity in publicly debunking UFOs for years. His own justification is well known: in order to retain access to official UFO reports, he could not afford to risk an open confrontation with the Air Force. Hynek made these claims as a matter of self defense, years after the fact in the 1970s, after he had been criticized by nearly everyone in the UFO field as an Air Force lackey. That this was Hynek’s reputation in the 1950s and 1960s seems all but forgotten today.

Jacques Vallee worked very closely with Hynek for years during the 1960s, and eventually concluded that “the Air Force kept Hynek around only as long as he was silent.” This is certainly true. The question is, why did Hynek keep silent? Was it because he was an unassertive type of person – that is, because of a feature of his personality? Nearly all UFO researchers who have written about Hynek say, in effect: yes, for all of his scientific virtues, he was not a fighter. An unfortunate but all too human weakness.

A detached analysis of the historical record does not justify this conclusion.

Generally speaking, Hyenk was a genial man who did not seek out open confrontations. This, in fact, was one of the important traits that made him valuable to national security interests. In the first place, Hynek was much more than a mere civilian scientist who “helped out” the Air Force. From 1942 to 1946, Hynek took a leave of absence from Ohio State University to work at the Johns Hopkins University, in Silver Springs, Maryland. While there, he was in charge of document security for the highly classified project sponsored by the Navy to develop a radio proximity fuse.

Along with radar and the atomic bomb, this is often considered as one of the three great scientific developments of the war. The device was a radio-operated fuse designed to screw into the nose of a shell and timed to explode at any desired distance from target.

  1. Allen Hynek. A central, and problematic, figure in the history of UFO research.

Many scientists, of course, performed work for the defense establishment during World War Two. But Hynek’s project was of considerable importance, and it does not appear that his main contribution was scientific: after all, he was an astrophysicist. Rather, one of his main efforts was in a security related area.

Vallee kept a diary during the period that he worked with Hynek. It remained unpublished until 1992 as Forbidden Science, long after Hynek was dead and enshrined as the “father of scientific ufology.” When read with care, Vallee’s observations make it clear that there was much more to J. Allen Hynek than initially met the eye. And yet, the UFO research community has continued to ignore the implications, and even the plain facts, that Vallee related.

The proximity fuse was six times more effective than the timed fuses it replaced. Hynek was in charge of document security for the development of this important weapon

For example, rumors had abounded through the 1960s that Blue Book was a public relations facade, and that there was a “secret study” of UFOs going on. Vallee, too, had his suspicions, and broached this subject with Hynek every so often. Hynek inevitably rejected such opinions without reservation. Blue Book, Hynek maintained, was the real thing, albeit a project that was being done incompetently.

Vallee was never quite convinced. He noticed Hynek’s cagey attitude about UFOs, that he seemed to know much more than he usually let on about the subject, that he often appeared to be more interested in self promotion than actual study of the problem, and that his personal records were in a state of near disaster.

Then Vallee found the infamous “Pentacle Memorandum” in Hynek’s office. This was a highly classified document from January 1953, proving the existence of a separate study group of UFOs, and which urged that the Robertson Panel be delayed until they had come to their own conclusions. Very strong stuff. In the mid 1960s, there was still no inkling among the wider public that there was any such study as this.

On another occasion, a colleague of Vallee and Hynek showed Vallee “some very interesting photographs taken from an airplane.” Here is the relevant passage:

“Do you know who took these? Allen did! But he hasn’t recorded the place, the date or the time …” It turns out Allen was aboard an airliner when he suddenly noticed a white object at his altitude, seemingly flying at the same speed as the plane. He made sure it wasn’t a reflection and he convinced himself it must be some faraway cloud with an unusual shape. He pulled out his camera ‘to see how fast he could snap pictures.’ In all he took two pairs of stereoscopic photographs and gave it no more thought.

The photographs themselves appeared in a book authored by Hynek and Vallee in 1975, The Edge of Reality. They may or may not be of a flying saucer, but they are certainly not clouds. The importance of stereoscopic photographs cannot be overemphasized. Such a camera is of outstanding evidentiary value. Hynek, in effect, had captured a possible Holy Grail on film. But what happened?

Vallee continues:

Fred only learned about this a few weeks later. But then Hynek had lost the negatives and one shot from every pair was missing. … Naturally the loss of the negatives makes it impossible to determine whether it was really a cloud or not. Fred is indignant: “Sometimes I have the feeling Allen doesn’t want to know,” he says.

Hynek, who had headed document security for the proximity fuse project, “lost” one (and only one) negative from such a set as this. One might well wonder, to whom did he actually pass this material?

One of the two photographs Hynek took from a plane with a stereoscopic camera. He nevertheless lost one (and only one) negative from each image.

During another conversation, Hynek mentioned to Vallee that the Air Force had sent him a new contract draft. He did not know whether or not he should sign it, and gave it to Vallee to read.

Vallee wrote:

The contract, I was surprised to read, was not really with the Air Force but with the Dodge Corporation, a subsidiary of McGraw Hill. “What’s McGraw Hill doing in the middle of all this?” I asked without trying to hide my bafflement. “Is that some sort of cut out?” “Oh, they are just contractors to the Foreign Technology Division,” Hynek replied. “By working through companies like McGraw Hill, which is a textbook publisher, it’s easier for them to hire professors and scholars to conduct some Intelligence activities, keeping up with Soviet technology, for example. Many academics would be nervous saying they were working for the Foreign Technology Division.” The contract clearly puts Hynek under the administrative supervision of a man named Sweeney, who is not a scientist. And it clearly specifies Hynek’s task as evaluating the sightings of unknown objects to determine if they represent a danger for the security of the United States.

Hynek’s substantial Air Force money was passed to him through a third party. Thus, Hynek’s relationship with “security” continued right through the 1960s. We also learn from Vallee that Hynek, despite his monthly trips to Wright-Patterson AFB, almost never saw Blue Book Chief Hector Quintanilla, but was received personally by the commander, who usually took him to lunch at the officer’s club. When Vallee asked Hynek what they talked about, Hynek replied, “innocently,” the weather and foreign cuisine.

The preceding passage raises other unanswered questions, such as how many other academics were receiving cut out money to hide their intelligence value? Hynek’s remarks implied that he knew quite a lot about this topic, but unfortunately, the conversation appeared to stop dead at that point. One might also wonder, who was Sweeney? And, since Hynek was being funded through one cut out organization, why not two (not at all an unusual intelligence practice)? That is, was the Air Force itself a cut out for another organization? This is currently an unanswerable question, but well worth asking in light of the clear evidence that the CIA was a major perhaps the major player behind the scenes in the UFO mystery.

Another interesting and generally ignored fact about Hynek was the close relationship he had with C. The astronomical community has always been small, and of course it is not surprising that, aside from the issue of UFOs, the two men would know each other well. But this relationship was more than a simple professional acquaintance.

From 1955 to 1960, for instance, Hynek was associate director of the Smithsonian Institution’s Astrophysics Observatory in Cambridge, Massachusetts, and headed its optical satellite tracking program. During this period he also lectured at Harvard University. Menzel, meanwhile, had been a full professor at Harvard since 1938 and was the most prestigious astrophysicist in North America. For all intents and purposes, Menzel was Harvard’s Astronomy Department. While Hynek was in town, Menzel was full director of the Harvard Observatory, and (as Vallee noted in passing) was Hynek’s mentor. On one occasion, Hynek declined to write a Forward for Menzel’s book. One assumes, then, that Menzel asked in the first place.

Donald Menzel was an arch-UFO debunker, senior member of the U.S. intelligence community, and an alleged MJ-12 member. He was also a mentor of J. Allen Hynek.

When considering the public opposition the two occasionally had (such as their participation in a scientific debate on UFOs in late 1952), this closeness seems out of place. But the public view is often the misleading view.

Menzel, of course, was not merely one of the world’s leading astronomers. He was a man tightly connected to the upper levels of the American national security community, and personally close to Vannevar Bush. During the war, Menzel chaired the Radio Propagation Committee of the Joint and Combined Chiefs of Staff and the Section of Mathematical and Physical Research of U.S. Naval Communications. He was a top level cryptologist who had a longstanding association with the National Security Agency, possessed a Navy Top Secret Ultra security clearance, consulted for 30 companies on classified projects, and worked for the CIA. Through the entire 1950s, Menzel was still a serving intelligence officer.

Revelations such as these about are especially important when one considers how sanitized Hynek’s treatment continues to be at the hands of most writers in the UFO field. Indeed, even Menzel is sanitized. Jerome Clark, for instance, claimed that Menzel’s secret government work “does not significantly differentiate him from many other elite scientists of his generation.” There is some truth in this statement, but the larger picture is missed. What matters is that the surface and undercurrent move in different directions.

In the 1950s, as today, UFOs were a topic of great secrecy. They were important. In this context, the classified lives of men like Hynek and Menzel matter a very great deal. These were men strongly connected with the topic of UFOs, who by their outward appearance were at antipodes. Yet, below the surface, many commonalities existed.

Hynek’s defenders have remained at the surface, claiming that his position on UFOs evolved over the years from skeptic to believer. Such a simple transition is unlikely. For years, Hynek had access to classified Air Force UFO reports. Many of those reports were unusual and unconventional – as Hynek himself stated years after the fact – and the Air Force official explanations for many of these were clearly absurd. Yet, for year after year, he did nothing. Even followers in good faith might ask: what took him so long?

Hynek’s remarks and insights, provided years after the fact, remain of value to the UFO researcher. But the careful reader must remain mindful of Hynek’s history in this subject. It is a history that, depending upon which character flaw was his correct one, leads any serious researcher into a stance of wariness regarding J. Allen Hynek.

Read More At: RichardDolanPress.com

Top Ten Reasons To Doubt Official Story On Assad Poison-Gas Attack

fakenews
Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
Jon Rappoport
April 13, 2017

The sarin-gas attack story prompted the US missile strike on a Syrian runway. Here are the top ten reasons for doubting that story, and instead calling it a convenient pretext:

ONE: Photos show rescue workers treating/decontaminating people injured or killed in the gas attack. The workers aren’t wearing gloves or protective gear. Only the clueless or crazy would expose themselves to sarin residue, which can be fatal.

TWO: MIT professor Thomas Postol told RT, “I believe it can be shown, without doubt, that the [US intelligence] document does not provide any evidence whatsoever that the US government has concrete knowledge that the government of Syria was the source of the chemical attack in Khan Shaykhun…Any competent analyst would have had questions about whether the debris in the crater was staged or real. No competent analyst would miss the fact that the alleged sarin canister was forcefully crushed from above, rather than exploded by a munition within it.” How would a canister purportedly dropped from an Assad-ordered plane incur “crushing from above?”

THREE: Why would President Assad, supported by Russia, scoring victory after victory against ISIS, moving closer to peace negotiations, suddenly risk all his gains by dropping sarin gas on his own people?

FOUR: In an interview with Scott Horton, ex-CIA officer Philip Giraldi states that his intelligence and military sources indicate Assad didn’t attack his own people with poison gas.

FIVE: Ex-CIA officer Ray McGovern states that his military sources report an Assad air strike did hit a chemical plant, and the fallout killed people, but the attack was not planned for that purpose. There was no knowledge the chemicals were lethal.

SIX: At consortiumnews.com, journalist Robert Parry writes, “There is a dark mystery behind the White House-released photo showing President Trump and more than a dozen advisers meeting at his estate in Mar-a-Lago after his decision to strike Syria with Tomahawk missiles: Where are CIA Director Mike Pompeo and other top intelligence officials?”

“Before the photo was released on Friday, a source told me that Pompeo had personally briefed Trump on April 6 about the CIA’s belief that Syrian President Bashar al-Assad was likely not responsible for the lethal poison-gas incident in northern Syria two days earlier — and thus Pompeo was excluded from the larger meeting as Trump reached a contrary decision.”

“After the attack, Secretary of State Tillerson, who is not an institutional intelligence official and has little experience with the subtleties of intelligence, was the one to claim that the U.S. intelligence community assessed with a ‘high degree of confidence’ that the Syrian government had dropped a poison gas bomb on civilians in Idlib province.”

“While Tillerson’s comment meshed with Official Washington’s hastily formed groupthink of Assad’s guilt, it is hard to believe that CIA analysts would have settled on such a firm conclusion so quickly, especially given the remote location of the incident and the fact that the initial information was coming from pro-rebel (or Al Qaeda) sources.”

“Thus, a serious question arises whether President Trump did receive that ‘high degree of confidence’ assessment from the intelligence community or whether he shunted Pompeo aside to eliminate an obstacle to his desire to launch the April 6 rocket attack.”

SEVEN: As soon as the Assad gas attack was reported, the stage was set for a US missile strike. No comprehensive investigation of the purported gas attack was undertaken.

EIGHT: There are, of course, precedents for US wars based on false evidence—the missing WMDs in Iraq, the claims of babies being pushed out of incubators in Kuwait, to name just two.

NINE: Who benefits from the sarin gas story? Assad? Or US neocons; the US military-industrial complex; Pentagon generals who want a huge increase in their military budget; Trump and his team, who are suddenly praised in the press, after a year of being pilloried at every turn; and ISIS?

TEN: For those who doubt that ISIS has ever used poison gas, see the NY Times (11/21/2016). While claiming that Assad has deployed chemical attacks, the article also states that ISIS has deployed chemical weapons 52 times since 2014.

I’m not claiming these ten reasons definitely and absolutely rule out the possibility of an Assad-ordered chemical attack. But they do add up to a far more believable conclusion than the quickly assembled “Assad-did-it” story.

These ten reasons starkly point to the lack of a rational and complete investigation of the “gas attack.”

And this lack throws a monkey wrench into Trump’s claim that he was ordering the missile strike based on “a high degree of confidence.”

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Everyone is Doing it: Injecting Micro-Chips is Cool!

microchipss
Source: TheDailyBell.com
April 12, 2017

The government isn’t quite ready to force microchip injections on citizens. But if you want to do it on your own, it just makes tracking you and your data that much easier!

You can be just like the cool kids who are having microchips injected in their hands in order to open locked doors and store payment information. A wave of the hand is all it will take to start your car, buy a latte, or share all your data with governments and corporations.

“I’m turning the internet of things into the internet of us,” said Jowan Osterlund in an interview with Recode. Osterlund is the founder of Biohax, a Swedish company that specializes in injecting small microchips, about the size of a grain of rice, under people’s skin.

The microchips, says Osterlund, can be programmed to speak to other networked devices, like coffee makers, speakers or doors with electronic locks. The idea is that it’s more convenient to wave your hand in front of the door than use a key card.

Inserted by a syringe into the skin between the thumb and the index finger, the chips communicate with other devices using Near Field Communication. It’s a wireless way of linking devices in close proximity to each other, similar to the way Bluetooth works. Contactless payment systems, like Apple Pay, also use NFC.

Last year, Microsoft invited Biohax to its TechDays conference in Sweden to implant some of the speakers at the conference, as well as a few Microsoft executives in attendance, according to Osterlund.

See it’s not scary or weird! Even hip Microsoft executives have it done. And they are on the front lines of technology! If they are doing it, maybe we all should.

The CIA Likes This Plan

And how could becoming a part of the internet of things ever pose any risks? When he was the Director of the CIA, General Petraeus was pretty excited about spying on you “through your dishwasher.”

Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”

All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.

“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said

Now the CIA might just get the opportunity to spy on you through the microchip embedded in the fleshy part of the hand between the thumb and index finger.

Right now, the chips going into employees only work in one direction, to send information, not receive it. And they do have to be scanned just inches away in order to give off any information, meaning they aren’t quite GPS chips just yet.

But while all RFID (Radio Frequency Identification) chips may look similar, they are not created equal. The CIA has actually invested in multiple companies which make RFID microchips, some significantly more advanced than the ones used to buy snacks and get into the building.

[The CIA] also likes companies that are working on making smaller batteries, like Qynergy, a New Mexico-based company working on radioisotope batteries, and Infinite Power Solutions, a Colorado developer of thin-film batteries that can power RFID (Radio Frequency Identification) tracking chips.

Speaking of RFID, In-Q-Tel seems to see potential there. In 2008 it invested in Massachusetts-based ThingMagic, a company that makes RFID chips that can “track anything.” The Florida State Attorney’s Office for West Palm Beach uses them to track felony case files, and Ford offered them up as an additional feature for pickup trucks. A contractor can put the tags on all of his tools, so that a quick scan of the truck bed with an RFID scanner will reveal everything in there. ThingMagic was acquired last month by GPS device maker Trimble Navigation for an undisclosed amount. In-Q-Tel has also invested in GainSpan, a company finding ways to make everything wi-fi-enabled, from refrigerators to health monitoring devices, for richer information on something than just its location.

And now we start seeing stories pop up in the media touting the benefits, convenience, and coolness factor of becoming micro-chipped. Dystopian images of the government forcing citizens to become implanted with microchips may, in fact, be overblown. People will do it to themselves, without coercion, just with a little mainstream media promotion.

But Micro-chipping is Convenient So…

A company in Sweden promotes the trend because it makes opening doors and buying smoothies so easy and convenient, and your coworkers will even throw a party for you once you take the plunge to become a cyborg.

The injections have become so popular that workers at Epicenter hold parties for those willing to get implanted.

“The biggest benefit I think is convenience,” said Patrick Mesterton, co-founder and CEO of Epicenter. As a demonstration, he unlocks a door by merely waving near it. “It basically replaces a lot of things you have, other communication devices, whether it be credit cards or keys.”

And that is all great, but your company will also be able to see when you get to work when you leave, how often you use the bathroom, what types of snacks you buy and at what time; basically any location or use data involved with the chip. And of course there are other corporations to think about; mining data is a huge industry.

Since most people are attached to their phones anyway, cell phone data can give a pretty good play by play of what people are doing. Microchips take that one step further so that literally every move you make could be tracked by your employer, other companies, and government agencies. They can map out your movements and activities with such precision and accuracy that they will know more about your habits than you do.

It is actually too bad that we don’t get to enjoy any cool technology because we know the government is just going to exploit it to spy on us. There are clearly benefits to RFID microchips, such as the ease of unlocking doors, starting cars, paying for things and so on.

But while the CIA has its hands in the venture, we, unfortunately, cannot trust that the data gathered from the use of embedded chips won’t be put to nefarious use.

Read More At: TheDailyBell.com

Deep State Battle – Trump, CIA & Cold War 2 – Professor Peter Dale Scott

Source: DarkJournalist
Daniel Liszt
April 7, 2017

The Real Deep State

In this exciting part 2 episode on Deep Politics, Dark Journalist, Daniel Liszt’s interview former Canadian diplomat, UC Berkeley professor and author, Peter Dale Scott. Scott coined the term “Deep State” and has been writing about it for 50 years. His works include ‘Deep Politics and the Death of JFK’, ‘The Road to 9/11’ and ‘American War Machine’. His latest book, ‘The American Deep State’ studies the unelected, unaccountable, shadow government of the US.

Professor Scott explains how the Mainstream Media is conducting a disinformation campaign to try to minimize his concept of the Deep State by characterizing it as a ‘conspiracy’ and denying his in-depth research on what he has described as a covert political system. According to Scott this system exists as a coalescence of interests that include private contractors for US intelligence agencies, media conglomerates, Wall Street forces and Big Oil funding, which work together to manufacture “Deep Events”, such as 9/11, the JFK assassination and their subsequent coverups, for motives of profit and control.

The Deep State and President Trump

The Deep State has looked at Trump with a weary eye since he becomes the Republican Nominee and have fought both his upset election and his smooth transition to the Presidency. This concerted effort has included unsubstantiated leaks about Trump’s personal life and conduct, damaging information about his high profile aides, and the concoction of bizarre narrative picked up by the media that President Trump is somehow in ‘collusion’ with Russia and its leader President Putin, even though they have provided zero evidence to support the wild accusation.

The CIA & Cold War II

Professor Scott opines that the real reason behind the Deep State’s efforts to bring down the Trump Administration may have to do with their deep desire, which became visible during the Obama Administration, to heat up a new Cold War II to ramp up some profits for the War Machine. He describes a program developed under Obama to ‘modernize’ America’s Nuclear Forces to the tune of One Trillion Dollars. This type of inflated budget will have a hard time being allocated without a Nuclear enemy in sight so these covert forces are busy developing an entire anti-Russia campaign with help from the media. He sees it as a dangerous game and makes the observation that since the time that President Kennedy resolved the Cuban Missile Crisis peacefully, there have been forces inside the Deep State that are willing to recklessly bring the world to the brink of Nuclear War!

Strange Patterns in Deep Events 9/11 and the JFK Assassination
In Professor Scott’s terminology, a ‘Deep Event’ like 9/11 is sometimes initiated by the Deep State to make a dramatic impact on public and foreign policy. Strange movements and price fluctuations of stocks and financial concerns prior to Deep Events like 9/11 and the JFK Assassination suggest foreknowledge by powerful covert groups of the impending historical tragedies to come. These patterns suggest that the hidden groups are interested in making a huge profit while initiating foreign wars and changing the very face of American society with an agenda that has not been voted upon or debated in any public forum.

The major changes put in place after 9/11 have given us warrantless detention and a state of emergency that has been renewed under every president since George W. Bush. This state of emergency puts an army division on American soil for the first time under Joint Special Operations Command to quell domestic unrest should it arise. This subverts the laws relating to Posse Comitatus in the United States that explicitly state that federal personnel shall not be used to enforce domestic policies. Professor Scott sees this as a great breach of Constitutional Authority and believes that a campaign should be waged that removes the State of Emergency now in place.

How to Be Alert to Risks but Not Engulfed by Fear

GoodEvil
Source: TheDailyBell.com
Joe Jarvis
March 31, 2017

If you are flying a jet, and approaching a thunderstorm, is it better to go through the thunderstorm, or to fly above it, safely out of range? The thunderstorm exists, and is dangerous; you cannot change that. But what you can change is how you interact with that storm, and therefore how it affects you. Avoiding the danger still requires recognizing the storm, to understand it’s scope, and trajectory.

Last week The Daily Bell posted three articles about fear. Some readers may have mistook this for promoting fear; did The Daily Bell jump on the the mainstream media “be afraid” bandwagon? But take a closer look, and you will see that two of the articles were actually calling out the use of fear as a tool for control, and the third was alerting you to a real concern.

You could say two were trying to stop the mainstream media from dragging you into the thunderstorm, an the third was trying to help you recognize the nature of the storm, in order to avoid it.

Warning: The Media is Trying to Kill You certainly sounds like it would be promoting fear. But the article was actually about the influence the media has on humanity to the extent that their reporting on things like suicide and murder can actually increase suicides and murders. It was a warning about the amount of power the media can exert over people through their reporting. The article actually warned not to let the media scare you into taking the action they want (being engulfed in the thunderclouds).

Another article was sarcastically titled, 3 Exciting New Ways to Destroy Humanity That Everyone is Talking AboutIn it, we were actually pointing out how ridiculous the three scenarios were that the media was promoting as possible extinction events for humanity. We assumed the title would be understood as a joke; as if it was exciting and popular to discuss the end of humanity. The scenarios discussed, while possible, had no basis in reality. The point was despite their unlikelihood, that didn’t stop the media from reporting them in a way which spreads fear of those events, even giving absurd percentage chance of the extinction events occurring, making them seem like a plausible threat (the fear of lightning striking you at any moment).

But a third article was actually warning about something that should be on your radar. What Everyone Should Know About the New Quarantine Regulation, was meant to inform you about a threat to your rights. The government has granted itself the power to ignore due process under certain circumstances, when they deem the public health to outweigh your individual rights (recognizing the storm gathering around a supposed epidemic).

This all brings up an interesting point: when should we report things which should be kept on your radar, without going too far to end up promoting fear, and keeping you pinned down by the storm?

Media “Fear Porn”

When the mainstream media makes up a percentages for the likelihood of different cataclysmic events wiping out humanity, that is what is called “fear porn” as at least one commenter put it. Some people, apparently, get a rise out of the doom and gloom. They love a good thunderstorm.

Another mainstream article I would classify as “fear porn” is an article from Bloomberg called Fears Grow of Terror in U.S. With Weaponized Civilian Drones.

(Like this one!)

Does the article ever give evidence of these supposedly growing fears? No, not unless you think the opinion of the Deputy Director of the National Counter-terrorism Center is a good indicator of U.S. fears. He is the only person the article talks about being fearful of private drones being used in terrorist attacks.

And why is he fearful of this? Of course one possibility is that he is not fearful of this, he simply wants everyone else to be fearful of it. But another possibility is that because he has been involved in the U.S. effort to spread fear and terror via drone bombings, he sees this as a threat. He is in the midst of the storm. It’s like how power-hungry people who nefariously undermine their opponents are paranoid that they will be targeted in the same way.

Clearly the government wants you to be scared of personal drone attacks, even though it has never happened inside the U.S. before. But why?

And here is where the line becomes blurred between rejecting all fear mongering and making sure we stay abreast of their tactics for control.

We should be aware that when the government starts to promote fear of a certain event, they themselves may be planning to exploit those fears for more power. Do they want people to clamor for more regulation of private drones? Do they want the public to be primed for a false flag carried out with a personal drone?

This is like yet another article we have recently published called Another DHS “Exercise” Planned: The Risk of Terrorism Drills Becoming Reality. If we can recognize patterns seen in government, we can stop the events we fear from happening. We are not trying to spread fear of possible false flag attacks from government, rather recognize the danger in order to prevent them. If we see the storm on the horizon, we can fly over or around it, rather than through it.

Government fear plays into their goals; get citizens to accept their protection and safety net in order to maintain power and control.

Unless you think The Daily Bell is part of a government PSYOP (which apparently some readers do believe) then anything we share that seems fearful is only intended to warn of actual dangers, and not attempted to influence your behavior to run to the government for salvation. I don’t think that would work on the healthy skeptics who read The Daily Bell.

I think Daily Bell readers are far past the point of allowing the government to scare them into certain behaviors, so this probably wouldn’t be the most efficient use of CIA resources.

Nefarious Conclusion

I think the behavior most at risk of being induced among The Daily Bell readers is a paranoia about just how much control the government has, which can paralyze any productive action that would give power back to the individual.

Sometimes if we feel overwhelmed by the evil powers that supposedly dominate the earth, we may become depressed, and give up all hope of progress.

Keep in mind how incompetent the government is in almost any area. Do we really think they excel when it comes to the total control many fear they have, coupled with their uncanny ability to keep it under wraps?

In reality, the government probably wants us to think they have more control than they really do. It is like the South Park episode where Bush wants people to think he carried out 9/11 so that they will fear him, giving him more power, when in reality (in the South Park episode) he had nothing to do with it.

So remember that: among our demographics, the government may benefit more from the fear that they are all powerful megalomaniacs bent on world domination, even if such is not entirely the case (or even if their world dominance is more segmented and less organized than we are sometimes led to believe).

So the real question is, to what extent should we inform you of actual threats, and at what point does this have the opposite effect of promoting the fear we want to avoid influencing behavior?

We want to help you fly above the storm, which requires alerting you to where lightning is striking, and in what direction the storm is moving. And we want to alert you to these dangers without dragging you into the thick of the turbulence.

We try to strike a balance, but sometimes we miss. Let’s have a discussion in the comments below. Tell me what you think is the proper scope of reporting on fear, versus avoiding fear mongering.

Read More At: TheDailyBell.com

WikiLeaks Vault 7 Reveals CIA Can Disguise Hacks, Malware As Russian Or Chinese


Source: ActivistPost.com
Matt Agorist
March 31, 2017

Moments ago, WikiLeaks released another set of data from the Vault 7 CIA documents which, believe it or not, paints an even more ominous picture of the world’s most unscrupulous spy agency. The latest leak consists of 676 source code files from the CIA’s anti-forensic “Marble” framework — which allows the CIA to covertly create malware, trojans, and hacking attacks — while attributing them to foreign entities.

With each release from these Vault 7 leaks, it becomes more apparent that everything we thought the CIA might get in this 1984-esque world — they already have.

According to WikiLeaks, Marble is able to hide or cloak their virus signature by “by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivalent of a specialized CIA tool to place covers over the English language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.”

Marble is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.”

Over the course of the last 4 months, the deep state has claimed — without evidence — that Russia has interfered in US elections. With this technology, the CIA could theoretically present the evidence it needs to “prove” Russian meddling.

According to WikiLeaks, this blame game is possible due to the fact that the source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

According to Marble, the CIA could create a virus that would potentially devastate entire systems — and then blame it on anyone they want.

As Leak of Nations reports, in the second batch of ‘Vault 7’ documents, WikiLeaks released a user guide for Sonic Screwdriver – an implant on the Apple Thunderbolt-to-USB converter that allows code to be booted onto an attached device, even if the device is password-protected.

What this means is that the CIA can infect the firmware of Macs at the core of the system with a trojan horse. Having a proverbial ocean of computers to choose from, the CIA could then pick one of those infected computers, launch an attack, use Marble to cover it up and blame it on whomever they wish.

It is no wonder Ubuntu founder Mark Shuttleworth called this “a trojan horse of monumental proportions.”

For now, however, the only one to be caught hacking US elections is the Department of Homeland Security. As the Free Thought Project previously reported, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.

Prior to the hacks in Indiana, it was the State of Georgia to expose DHS meddling in their elections.

While these…

Read More At: ActivistPost.com

WikiLeaks Reveals “Marble”: Proof CIA Disguises Their Hacks As Russian, Chinese, Arabic…

Source: ZeroHedge.com
March 31, 2017

WikiLeaks’ latest Vault 7 release contains a batch of documents, named ‘Marble’, which detail CIA hacking tactics and how they can misdirect forensic investigators from attributing viruses, trojans and hacking attacks to their agency by inserted code fragments in foreign languages.  The tool was in use as recently as 2016.  Per the WikiLeaks release:

“The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.”

 

The latest release is said to potentially allow for ‘thousands‘ of cyber attacks to be attributed to the CIA which were originally blamed on foreign governments.

WikiLeaks said Marble hides fragments of texts that would allow for the author of the malware to be identified. WikiLeaks stated the technique is the digital equivalent of a specialized CIA tool which disguises English language text on US produced weapons systems before they are provided to insurgents.

 

It’s “designed to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms” often link malware to a specific developer, according to the whistleblowing site.

 

The source code released reveals Marble contains test examples in Chinese, Russian, Korean, Arabic and Farsi.

 

“This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion,” WikiLeaks explains, “But there are other possibilities, such as hiding fake error messages.”

 

The code also contains a ‘deobfuscator’ which allows the CIA text obfuscation to be reversed. “Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA.”

 

Previous Vault7 releases have referred to the CIA’s ability to mask its hacking fingerprints.

 

WikiLeaks claims the latest release will allow for thousands of viruses and hacking attacks to be attributed to the CIA.

And the rabbit hole just got even deeper.

* * *

Full release from WikiLeaks:

Today, March 31st 2017, WikiLeaks releases Vault 7 “Marble” — 676 source code files for the CIA’s secret anti-forensic Marble Framework. Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

Marble does this by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA tool to place covers over the english language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.

Marble forms part of the CIA’s anti-forensics approach and the CIA’s Core Library of malware code. It is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.

The Marble source code also includes a deobfuscator to reverse CIA text obfuscation. Combined with the revealed obfuscation techniques, a pattern or signature emerges which can assist forensic investigators attribute previous hacking attacks and viruses to the CIA. Marble was in use at the CIA during 2016. It reached 1.0 in 2015.

The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

The Marble Framework is used for obfuscation only and does not contain any vulnerabilties or exploits by itself.

Read More At: ZeroHedge..com