Top Questions & Doubts About UFO Whistleblower, Luis Elizondo

TruthFact
Source: NoMoreFakeNews.com
Jon Rappoport
January 5, 2017

“The day of final UFO revelation is at hand! Glory! The government heroes in the shadows have stepped forward with the good news! All hail! Let us praise these insiders and bow down! Our efforts have not been in vain!”

No.

No kid gloves, no fawning gratitude toward sources.

For far too long, government insiders who offer UFO “revelations” have been given a free pass.

They should be treated like any other sources for breaking stories. “Your information is fascinating, but I have lots of questions about you and your background.”

There is a history of these insiders spreading disinformation or lies mixed with truth. This is how intelligence and propaganda operatives work. For instance, they could present tidbits about actual UFO sightings along with false claims about recovering “alien bodies.” Those latter claims would be part of their covert agenda.

Suppose secret government/corporate programs have been using the stolen work of Tesla and other outlier researchers to achieve advanced propulsion technology? They cover up that fact by spinning tales about alien ET tech. I’m not asserting that’s what happened, but it would illustrate why they would float lies…

Journalism—by which I mean independent journalism—should be miles past the point of asking softball questions and naïvely accepting “breakthrough revelations” from government sources.

In the wake of recent NY Times UFO disclosures from Luis Elizondo, a former intelligence operative who headed up a secret Pentagon program to study UFOs, many questions arise. Not one reporter who has gained access to Elizondo has publicly queried him at length about his suspect background in the intelligence community.

It would be more than interesting to get serious answers from Mr. Elizondo. They would provide a new jumping off point for further investigation.

Vetting a government insider isn’t easy. You ask many questions, you observe how he answers them, you keep pressing and probing and form your best assessment of the person. You don’t just lie down and accept him running you over like steamroller.

Here are questions Mr. Elizondo should respond to:

Mr. Elizondo, in your extensive high-level work as an intelligence case officer, did you ever plant stories in the press? False stories? If not, let me put it to you this way: if you had seen the value of planting a false story, in order to move a covert operation forward, would you have done it?

Mr. Elizondo, you resigned from the Pentagon in October. Almost immediately, you began revealing secret UFO information to the public and the press. What about your non-disclosure agreements with the government? You violated them, didn’t you?

Did you have permission from the government to ignore those agreements? If so, how did you arrange that?

If not, what has the government told you about your violations?

It appears the Pentagon wanted you to speak publicly about UFOs. True? If so, why?

According to Pentagon sources, you took several UFO videos with you when you resigned. You originally obtained these videos, in order to train pilots on how to respond when they encountered UFOs—but then you turned around and used the videos to inform the press and public about the reality of UFOs. Is this true? Has the government communicated with you about this?

In your interviews, you mention that the government, or one of its sub-contractors, has been studying materials from UFOs. What specific materials? How were they obtained? From captured UFOs? Crashed UFOs? Where are these UFOs now? Did the reporters at the New York Times ask you about this?

Is it true that scientists have been unable to analyze the composition of “UFO metals?”

Why, after decades of denial and silence, did the New York Times suddenly use you as a main source for a UFO story? Did the Times have a green light from the Pentagon?

You state that the secret Pentagon program, under your leadership, studied reports of UFOs and compared the probable technological capability of those vehicles to the technology the US possesses. Did you probe what has been going on at the Lockheed Skunkworks in Palmdale, California? What have you discovered about advanced secret technology at the Skunkworks and other facilities?

As a “whistleblower,” have you decided to parcel out what you know in small pieces, over time? If so, why?

How did you move from working as a case officer, running clandestine operations in Latin America, to heading up a secret Pentagon program on UFOs? The shift seems odd, to say the least?

Surely you understand that, because intelligence operatives are trained to lie and deceive, there are doubts about your veracity now. Your comments?

Why did the New York Times suddenly break a huge UFO story? Why now? It certainly appears that you, the Times, and the Pentagon are operating in concert, bypassing the usual secrecy, denial, and skepticism. What’s going on?

Your background includes “Microbiology, Immunology and Parasitology, with research experience in tropical diseases.” Where did you study these subjects? For what purpose?

You’re now a member of Tom DeLonge’s team at To the Stars Academy. Several members have significant medical backgrounds. Here are quotes from the Academy’s website:

Dr. Norm Kahn’s career with the CIA “culminat[ed] in his development and direction of the Intelligence Community’s Counter-Biological Weapons Program.”

Dr. Paul Rapp “is a Professor of Military and Emergency Medicine at the Uniformed Services University.”

Dr. Garry Nolan “is the Rachford and Carlota A. Harris Professor in the Department of Microbiology and Immunology at Stanford University School of Medicine…He holds a B.S. in genetics from Cornell University, a Ph.D. in genetics from Stanford University.”

Dr. Adele Gilpin, “is a scientist with biomedical academic and research experience as well as an active, licensed, attorney.”

Dr. Colm Kelleher “is a biochemist with a twenty-eight-year research career in cell and molecular biology currently working in senior management in the aerospace sector. He served as Laboratory Director at biotech company, Prosetta Corporation, leading several small molecule drug discovery programs focused on viruses of interest to the United States Department of Defense. He worked for eight years as Deputy Director of the National Institute for Discovery Science (NIDS), a research organization using forensic science methodology to unravel scientific anomalies. From 2008-2011, he served as Deputy Administrator of a US government funded threat assessment program focused on advanced aerospace technology. Dr. Kelleher has authored more than forty peer reviewed scientific articles in cell and molecular biology, immunology and virology as well as two best-selling books, “Hunt for the Skinwalker” and “Brain Trust”. He holds a Ph.D. in biochemistry from the University of Dublin, Trinity College.”

What are all these medical people doing on your team? Are we about to be treated to warnings about “viruses from outer space?” What is the bio-medical component of UFO disclosure? Are you looking for huge government funding for new programs in this area? Is THIS a covert agenda behind your breakout story about UFOs?

If you were running a UFO disinformation op on the public, what is the most important lie you would float, and why?

Would you agree that such disinformation ops have been run in the past? Give us an example or two.

Your Academy has released a statement which claims “there is sufficient credible evidence of UAP [Unidentified Aerial Phenomena] that proves exotic technologies exist that could revolutionize the human experience.” Are some of those technologies already under the control of the Lockheed Skunkworks? One member of your new team is Steve Justice, who “is the recently retired Program Director for Advanced Systems from Lockheed Martin Advanced Development Programs – better known as the ‘Skunk Works’.” He should know the answer to that question. What does Steve have to say? How would you suggest we check his statements?

Mr. Elizondo, I’m asking all these questions, because the mainstream press isn’t.

If you claim we are in a new era of honest Disclosure, that honesty should include you answering these and other inquiries. After all, you’re the prime source of the current story. As such, you should be willing to open up and address doubts.

Or are you banking on naïve public acceptance of your assertions?

If that’s the case, you’re only adding to the decades of obfuscation surrounding the UFO issue.

I’m here, I’m ready, able, and willing to have you lay your cards on the table.

No, I don’t expect you to contact me. But I do air these questions so people can compare them to what reporters will ask you in the months to come.

Which brand of whistleblower are you? The limited-hangout variety, or a no-holds-barred truth teller?

Certainly, you know we are used to hearing from government limited-hangout artists, and the truth tellers are rare, to say the least.

If you want to be recognized as authentic, you’ll have to go the extra mile.

To put it another way, if a career intelligence officer, who has worked with the US Army, the DOD, the National Counterintelligence Executive, the Director of National Intelligence; who has conducted and supervised highly sensitive espionage and terrorism investigations around the world; who has acted as an intelligence case officer running clandestine operations in Latin America and the Middle East—if such a person approached me with secret information about UFOs, I would naturally want do everything I could to vet him.

Well, that person is you. That is your resume.

You should be willing to answer a very large number of pointed and specific queries.

Are you?

Read More At: NoMoreFakeNews.com

Breakaway Guide To Censorship, Disinformation, Logical Fallacies & More

logic3
TheBreakaway | BreakawayConciousness
Zy Marquiez
May 18, 2017

As a preamble, let me preface this with a big thanks of appreciation to all of those individuals who have contributed to the crucial information provided below and who have sought to make it available to everyone.

Now, in order to learn how to navigate through the nefarious web of deception created these days within all types of media, there will be five distinct articles cited at length that outline information that’s quite vital for incisive individuals to know so they can become self-sufficient in their ability to discern the truth from veritable smoke screens.  It is suggested these are studied regularly until they are learned given how important and efficient they are.

Logical Fallacies will be the first tool addressed.  This is because logic is arguably one of the most important – if not the most important – tool an individual will have at their disposal in order to maneuver through their everyday life more efficiently, especially when dealing with the daily nonsense that the establishment and mainstream media espouses.  For those seeking additional information on Logic, please read 13 Great Reasons To Study Logic, and Socratic Logic V3.1 by Peter Kreeft Ph.D.

We will commence by citing a piece that was shared earlier this year.

In Logical Fallacies Employed In Every Day Life, we shared:

What is a logical fallacy?

A logical fallacy is a flaw in reasoning. Strong arguments are void of logical fallacies, whilst arguments that are weak tend to use logical fallacies to appear stronger than they are. They’re like tricks or illusions of thought, and they’re often very sneakily used by politicians, media, and others to fool people. Below follow some of the more common fallacies.

Strawman
Misrepresenting Someone’s Argument To Make It Easier To Attack
By exaggerating, misrepresenting, or just completely fabricating someone’s argument, it’s much easier to prevent your own position as being reasonable, but this is kind of dishonest and serves to undermine honest rational debate.
Example: After will said we should put more money into health and education, Warren responded by saying he was surprised that Will hates our country so much that he wants to leave it defenseless by cutting military spending.

Slippery Slope
Asserting That If We Allow A to happen, then Z will consequently happen too, therefore A should not happen.
The problem with this reasoning is that it avoids engaging with the issue at hand, and instead shifts attention to extreme hypotheticals. Because no proof is presented to show that such extreme hypotheticals will in fact occur, this fallacy has the form of an appeal to emotion fallacy by leveraging fear. In effect the argument at hand is unfairly tainted by unsubstantiated conjecture.
Example: Colin Closet asserts that if we allow same-sex couples to marry, then the next thing we know we’ll be allowing people to marry their parents, their cars and even monkeys.

False Cause
Presuming that a real or perceived relationship between things means that one is the cause of the other.
Example
: Pointing to a fancy chart, a Senator shows how temperatures have been rising over the past few centuries, whilst at the same time the numbers of terrorist attacks have been increasing; thus global warming causes terrorism. [Don’t believe me? Look it up – an actual senator that said this.]

Ad Hominem
Attacking your opponent’s character or personal traits in an attempt to undermine their argument.
Example: After Sally presents an eloquent and compelling case for a more equitable taxation system, Sam asks the audience whether we should believe anything from a woman who isn’t married, was once arrested, and smells a bit weird.

Special Pleading
Moving the goalposts to create exceptions when a claim is shown to be false.
Example: Edward Johns claimed to be psychic, but when his ‘abilities’ were tested under proper scientific conditions, they magically disappeared. Edward explained this saying that one had to have faith in his abilities for them to work.

Loaded Question
Asking a question that has an assumption built into it so that it can’t be answered without appearing guilty.
Example: Grace and Helen were both romantically interested in Brad. One day, with Brad sitting within earshot, Grace asked in an inquisitive tone whether Helen was having any problems with a fungal infection.

The Gambler’s Fallacy
Believing that ‘runs’ occur to statistically independent phenomena such as roulette wheel spins.
Example: Red had come up six times in a row on the roulette wheel, so Greg knew that it was close to certain that black would be next up. Suffering an economic form of natural selection with this thinking, he soon lost all of his savings.

Bandwagon
Appealing to popularity or the fact that many people do something as an attempted form of validation.
Example: Shamus pointed a drunken finger at Sean and asked him to explain how so many people could believe in leprechauns if they’re only a silly old superstition. Sean, however, had had a few too many Guinness himself and fell off his chair.

Black-Or-White
Where two alternative states are presented as the only possibilities, when in fact more possibilities exist.
Example: Whilst rallying support for his plan to fundamentally undermine citizens’ rights, the Supreme Leader told the people they were either on his side, or on the side of the enemy. [Note: George Bush did this by the way…]

Begging The Questions
A circular argument in which the conclusion is included in the premise.
Example: The word of Zorbo the Great is flawless and perfect. We know this because it says so in The Great and Infallible Book of Zorbo’s Best and Most Truest Things that are Definitely True and Should Not Ever Be Questioned.

Appeal To Authority
Using the opinion or position of an authority figure, or institution of authority, in place of an actual argument.
Example: When an individual states that vaccines are safe just because doctors say so, even though countless studies can be cited to eviscerate the ‘safety’ argument.

Appeal To Nature
Making the argument that because something is ‘natural’ it is therefore valid, justified, inevitable, good, or ideal.
Example: The medicine man rolled into town on his bandwagon offering various natural remedies, such as very special plain water. He said that it was only natural that people should be wary of ‘artificial’ medicines such as antibiotics. The converse is also true, which could be in a way called Appeal To Technology/Science.

Composition / Division
Assuming that what’s true about one part of something has to be applied to all, or other, parts of it.
Example: Daniel was a precocious child and had a liking for logic. He reasoned that atoms are invisible, and that he was made of atoms and therefore invisible too. Unfortunately, despite his thinky skills, he lost the game of hide and go seek.

Anecdotal
Using personal experience or an isolated example instead of a valid argument.
Example: Jason said that that was all cool and everything, but his grandfather smoked, like, 30 cigarettes a day and lived until 97 – so don’t believe everything you read about meta analyses of sound studies showing proven causal relationships.

Appeal To Emotion
Manipulating an emotional response in place of a valid or compelling argument.
Example: Luke didn’t want to eat his sheep’s brains with chopped liver and brussels sprouts, but his father told him to think about the poor, starving children in a third world country who weren’t fortunate enough to have any food at all.

The Fallacy Fallacy
Presuming that because a claim has been poorly argued, or a fallacy has been made, that it is necessarily wrong.
Example: Recognizing that Amanda had committed a fallacy in arguing that we should eat healthy food because a nutritionist said it was popular, Alyse said we should therefore eat bacon double cheeseburgers every day.

Tu Quoque
Avoiding having to engage with criticism by turning it back on the accuser – answering criticism with criticism.
Example: The blue candidate accused the red candidate of committing the tu quoque fallacy. The red candidate responded by accusing the blue candidate of the same, after which ensued an hour of back and forth criticism with not much progress.

Personal Incredulity
Saying that because one finds something difficult to understand that it’s therefore not true.
Example: Kirk drew a picture of a fish and a human and with effusive disdain asked Richard if he really thought we were stupid enough to believe that a fish somehow turned into a human through just, like, random things happening over time.

Burden Of Proof
Saying that the burden of proof lies not with the person making the claim, but with someone else to disprove.
Examples: Bertrand declares that a teapot is, at this very moment, in orbit around the Sun between the Earth and Mars, and that because no one can prove him wrong his claim is therefore a valid one.

Ambiguity
Using double meanings or ambiguities of language to mislead or misrepresent the truth.
Example: When the judge asked the defendant why he hadn’t paid his parking fines, he said that he shouldn’t have to pay them because the sign said ‘Fine for parking here’ and so he naturally presumed that it would be fine to park there.

No True Scotsman
Making what could be called an appeal to purity as a way to dismiss relevant criticisms or flaws of an argument.
Example: Angus declares that Scotsmen do not put sugar on their porridge, to which Lachlan points out that he is a Scotsman and puts sugar on his porridge. Furious, like atrue Scot, Angus yells that no true Scotsman sugars his porridge.

Genetic
Judging something good or bad on the basis of where it comes from, or from whom it comes.
Example: Accused on the 6 o’clock news of corruption and taking bribes, the senator said that we should all be very wary of the things we hear in the media, because we all know how very unreliable the media can be.

The Texas Sharpshooter
Cherry-picking data clusters to suit an argument, or finding a pattern to fit a presumption.
Example: The makers of Sugarette Candy Drinks point to research showing that of the five countries where Sugarette drinks sell the most units, three of them are in the top ten healthiest countries on Earth, therefore Sugarette drinks are healthy.

Middle Ground
Saying that a compromise, or middle point, between two extremes is the truth.
Example: Holly said that vaccinations are safe, but her scientifically well-read friend Caleb said that this claim was untrue because there were dozens of studies proving otherwise. Their friend Alice offered a compromise that vaccinations are sometimes safe.

__________________________________________________________________________________

Next we will proceed by citing various ways truth if often suppressed.  Many of these techniques are seen nigh daily, which is why its important to remain cognizant of them.

In Thirteen Techniques For Truth Suppression, David Martin of [BrassCheck.com] writes:

Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.

  1. Dummy up. If it’s not reported, if it’s not news, it didn’t happen.
  2. Wax indignant. This is also known as the “how dare you?” gambit.
  3. Characterize the charges as “rumors” or, better yet, “wild rumors.” If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through “rumors.”
  4. Knock down straw men. Deal only with the weakest aspect of the weakest charges. Even better, create your own straw men. Make up wild rumors and give them lead play when you appear to debunk all the charges, real and fanciful alike.
  5. Call the skeptics names like “conspiracy theorist,” “nut,” “ranter,” “kook,” “crackpot,” and of course, “rumor monger.” You must then carefully avoid fair and open debate with any of the people you have thus maligned.
  6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money.
  7. Invoke authority. Here the controlled press and the sham opposition can be very useful.
  8. Dismiss the charges as “old news.”
  9. Come half-clean. This is also known as “confession and avoidance” or “taking the limited hang-out route.” This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal “mistakes.” This stratagem often requires the embrace of a fall-back position quite different from the one originally taken.
  10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.
  11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. For example: We have a completely free press. If they know of evidence that the Bureau of Alcohol, Tobacco, and Firearms (BATF) had prior knowledge of the Oklahoma City bombing they would have reported it. They haven’t reported it, so there was no prior knowledge by the BATF. Another variation on this theme involves the likelihood of a conspiracy leaker and a press that would report it.
  12. Require the skeptics to solve the crime completely.
  13. Change the subject. This technique includes creating and/or reporting a distraction.

______________________________________________________________________________

Tackling the fundamentals in Disinformation – How It Works, Brandon Smith [Alt-Market.com] writes:

There was a time, not too long ago (relatively speaking), that governments and the groups of elites that controlled them did not find it necessary to conscript themselves into wars of disinformation.

Propaganda was relatively straightforward. The lies were much simpler. The control of information flow was easily directed. Rules were enforced with the threat of property confiscation and execution for anyone who strayed from the rigid socio-political structure. Those who had theological, metaphysical or scientific information outside of the conventional and scripted collective world view were tortured and slaughtered. The elites kept the information to themselves, and removed its remnants from mainstream recognition, sometimes for centuries before it was rediscovered.

With the advent of anti-feudalism, and most importantly the success of the American Revolution, elitists were no longer able to dominate information with the edge of a blade or the barrel of a gun. The establishment of Republics, with their philosophy of open government and rule by the people, compelled Aristocratic minorities to plot more subtle ways of obstructing the truth and thus maintaining their hold over the world without exposing themselves to retribution from the masses. Thus, the complex art of disinformation was born.

The technique, the “magic” of the lie, was refined and perfected. The mechanics of the human mind and the human soul became an endless obsession for the establishment.

The goal was malicious, but socially radical; instead of expending the impossible energy needed to dictate the very form and existence of the truth, they would allow it to drift, obscured in a fog of contrived data. They would wrap the truth in a Gordian Knot of misdirection and fabrication so elaborate that they felt certain the majority of people would surrender, giving up long before they ever finished unraveling the deceit. The goal was not to destroy the truth, but to hide it in plain sight.

In modern times, and with carefully engineered methods, this goal has for the most part been accomplished. However, these methods also have inherent weaknesses. Lies are fragile. They require constant attentiveness to keep them alive. The exposure of a single truth can rip through an ocean of lies, evaporating it instantly.

In this article, we will examine the methods used to fertilize and promote the growth of disinformation, as well as how to identify the roots of disinformation and effectively cut them, starving out the entire system of fallacies once and for all.

Media Disinformation Methods

The mainstream media, once tasked with the job of investigating government corruption and keeping elitists in line, has now become nothing more than a public relations firm for corrupt officials and their Globalist handlers. The days of the legitimate “investigative reporter” are long gone (if they ever existed at all), and journalism itself has deteriorated into a rancid pool of so called “TV Editorialists” who treat their own baseless opinions as supported fact.

The elitist co-opting of news has been going on in one form or another since the invention of the printing press. However, the first methods of media disinformation truly came to fruition under the supervision of newspaper magnate William Randolph Hearst, who believed the truth was “subjective” and open to his personal interpretation.

Some of the main tactics used by the mainstream media to mislead the masses are as follows:

Lie Big, Retract Quietly: Mainstream media sources (especially newspapers) are notorious for reporting flagrantly dishonest and unsupported news stories on the front page, then quietly retracting those stories on the very back page when they are caught. In this case, the point is to railroad the lie into the collective consciousness. Once the lie is finally exposed, it is already too late, and a large portion of the population will not notice or care when the truth comes out.

Unconfirmed Or Controlled Sources As Fact: Cable news venues often cite information from “unnamed” sources, government sources that have an obvious bias or agenda, or “expert” sources without providing an alternative “expert” view. The information provided by these sources is usually backed by nothing more than blind faith.

Calculated Omission: Otherwise known as “cherry picking” data. One simple piece of information or root item of truth can derail an entire disinfo news story, so instead of trying to gloss over it, they simply pretend as if it doesn’t exist. When the fact is omitted, the lie can appear entirely rational. This tactic is also used extensively when disinformation agents and crooked journalists engage in open debate.

Distraction, And The Manufacture Of Relevance: Sometimes the truth wells up into the public awareness regardless of what the media does to bury it. When this occurs their only recourse is to attempt to change the public’s focus and thereby distract them from the truth they were so close to grasping. The media accomplishes this by “over-reporting” on a subject that has nothing to do with the more important issues at hand. Ironically, the media can take an unimportant story, and by reporting on it ad nauseum, cause many Americans to assume that because the media won’t shut-up about it, it must be important!

Dishonest Debate Tactics: Sometimes, men who actually are concerned with the average American’s pursuit of honesty and legitimate fact-driven information break through and appear on T.V. However, rarely are they allowed to share their views or insights without having to fight through a wall of carefully crafted deceit and propaganda. Because the media know they will lose credibility if they do not allow guests with opposing viewpoints every once in a while, they set up and choreograph specialized T.V. debates in highly restrictive environments which put the guest on the defensive, and make it difficult for them to clearly convey their ideas or facts.

TV pundits are often trained in what are commonly called “Alinsky Tactics.” Saul Alinsky was a moral relativist, and champion of the lie as a tool for the “greater good”; essentially, a modern day Machiavelli. His “Rules for Radicals” were supposedly meant for grassroots activists who opposed the establishment and emphasized the use of any means necessary to defeat one’s political opposition. But is it truly possible to defeat an establishment built on lies, by use of even more elaborate lies, and by sacrificing one’s ethics? In reality, his strategies are the perfect format for corrupt institutions and governments to dissuade dissent from the masses. Today, Alinsky’s rules are used more often by the establishment than by its opposition.
Alinsky’s Strategy: Win At Any Cost, Even If You Have To Lie

Alinsky’s tactics have been adopted by governments and disinformation specialists across the world, but they are most visible in TV debate. While Alinsky sermonized about the need for confrontation in society, his debate tactics are actually designed to circumvent real and honest confrontation of opposing ideas with slippery tricks and diversions. Alinsky’s tactics, and their modern usage, can be summarized as follows:

1) Power is not only what you have, but what the enemy thinks you have.

We see this tactic in many forms. For example, projecting your own movement as mainstream, and your opponent’s as fringe. Convincing your opponent that his fight is a futile one. Your opposition may act differently, or even hesitate to act at all, based on their perception of your power. How often have we heard this line: “The government has predator drones. There is nothing the people can do now…” This is a projection of exaggerated invincibility designed to elicit apathy from the masses.

2) Never go outside the experience of your people, and whenever possible, go outside of the experience of the enemy.

Don’t get drawn into a debate about a subject you do not know as well as or better than your opposition. If possible, draw them into such a situation instead. Go off on tangents. Look for ways to increase insecurity, anxiety and uncertainty in your opposition. This is commonly used against unwitting interviewees on cable news shows whose positions are set up to be skewered. The target is blind-sided by seemingly irrelevant arguments that they are then forced to address. In television and radio, this also serves to waste broadcast time to prevent the target from expressing his own position.

3) Make the enemy live up to their own book of rules.

The objective is to target the opponent’s credibility and reputation by accusations of hypocrisy. If the tactician can catch his opponent in even the smallest misstep, it creates an opening for further attacks, and distracts away from the broader moral question.

4) Ridicule is man’s most potent weapon.

“Ron Paul is a crackpot.” “Gold bugs are crazy.” “Constitutionalists are fringe extremists.” Baseless ridicule is almost impossible to counter because it is meant to be irrational. It infuriates the opposition, which then reacts to your advantage. It also works as a pressure point to force the enemy into concessions.

5) A good tactic is one that your people enjoy.

The popularization of the term “Teabaggers” is a classic example; it caught on by itself because people seem to think it’s clever, and enjoy saying it. Keeping your talking points simple and fun helps your side stay motivated, and helps your tactics spread autonomously, without instruction or encouragement.

6) A tactic that drags on too long becomes a drag.

See rule No. 5. Don’t become old news. If you keep your tactics fresh, it’s easier to keep your people active. Not all disinformation agents are paid. The “useful idiots” have to be motivated by other means. Mainstream disinformation often changes gear from one method to the next and then back again.

7) Keep the pressure on with different tactics and actions, and utilize all events of the period for your purpose.

Keep trying new things to keep the opposition off balance. As the opposition masters one approach, hit them from the flank with something new. Never give the target a chance to rest, regroup, recover or re-strategize. Take advantage of current events and twist their implications to support your position. Never let a good crisis go to waste.

8) The threat is usually more terrifying than the thing itself.

This goes hand in hand with Rule No. 1. Perception is reality. Allow your opposition to expend all of its energy in expectation of an insurmountable scenario. The dire possibilities can easily poison the mind and result in demoralization.

9) The major premise for tactics is the development of operations that will maintain a constant pressure upon the opposition.

The objective of this pressure is to force the opposition to react and make the mistakes that are necessary for the ultimate success of the campaign.

10) If you push a negative hard and deep enough, it will break through into its counterside.

As grassroots activism tools, Alinsky tactics have historically been used (for example, by labor movements or covert operations specialists) to force the opposition to react with violence against activists, which leads to popular sympathy for the activists’ cause. Today, false (or co-opted) grassroots movements and revolutions use this technique in debate as well as in planned street actions and rebellions (look at Syria for a recent example).

11) The price of a successful attack is a constructive alternative.

Never let the enemy score points because you’re caught without a solution to the problem. Today, this is often used offensively against legitimate activists, such as the opponents of the Federal Reserve. Complain that your opponent is merely “pointing out the problems.” Demand that they offer not just “a solution”, but THE solution. Obviously, no one person has “the” solution. When he fails to produce the miracle you requested, dismiss his entire argument and all the facts he has presented as pointless.

12) Pick the target, freeze it, personalize it and polarize it.

Cut off the support network and isolate the target from sympathy. The target’s supporters will expose themselves. Go after individual people, not organizations or institutions. People hurt faster than institutions.

The next time you view an MSM debate, watch the pundits carefully, you will likely see many if not all of the strategies above used on some unsuspecting individual attempting to tell the truth.
Internet Disinformation Methods

Internet trolls, also known as “paid posters” or “paid bloggers,” are increasingly and openly being employed by private corporations as well governments, often for marketing purposes and for “public relations” (Obama is notorious for this practice). Internet “trolling” is indeed a fast growing industry.

Trolls use a wide variety of strategies, some of which are unique to the internet, here are just a few:

  1. Make outrageous comments designed to distract or frustrate: An Alinsky tactic used to make people emotional, although less effective because of the impersonal nature of the Web.
  2. Pose as a supporter of the truth, then make comments that discredit the movement: We have seen this even on our own forums — trolls pose as supporters of the Liberty Movement, then post long, incoherent diatribes so as to appear either racist or insane. The key to this tactic is to make references to common Liberty Movement arguments while at the same time babbling nonsense, so as to make those otherwise valid arguments seem ludicrous by association. In extreme cases, these “Trojan Horse Trolls” have been known to make posts which incite violence — a technique obviously intended to solidify the false assertions of the think tank propagandists like the SPLC, which purports that Constitutionalists should be feared as potential domestic terrorists.
  3. Dominate Discussions: Trolls often interject themselves into productive Web discussions in order to throw them off course and frustrate the people involved.
  4. Prewritten Responses: Many trolls are supplied with a list or database with pre-planned talking points designed as generalized and deceptive responses to honest arguments. When they post, their words feel strangely plastic and well rehearsed.
  5. False Association: This works hand in hand with item No. 2, by invoking the stereotypes established by the “Trojan Horse Troll.” For example: calling those against the Federal Reserve “conspiracy theorists” or “lunatics”; deliberately associating anti-globalist movements with racists and homegrown terrorists, because of the inherent negative connotations; and using false associations to provoke biases and dissuade people from examining the evidence objectively.
  6. False Moderation: Pretending to be the “voice of reason” in an argument with obvious and defined sides in an attempt to move people away from what is clearly true into a “grey area” where the truth becomes “relative.”
  7. Straw Man Arguments: A very common technique. The troll will accuse his opposition of subscribing to a certain point of view, even if he does not, and then attacks that point of view. Or, the troll will put words in the mouth of his opposition, and then rebut those specific words.

Sometimes, these strategies are used by average people with serious personality issues. However, if you see someone using these tactics often, or using many of them at the same time, you may be dealing with a paid internet troll.

Stopping Disinformation

The best way to disarm disinformation agents is to know their methods inside and out. This gives us the ability to point out exactly what they are doing in detail the moment they try to do it. Immediately exposing a disinformation tactic as it is being used is highly destructive to the person utilizing it. It makes them look foolish, dishonest and weak for even making the attempt. Internet trolls most especially do not know how to handle their methods being deconstructed right in front of their eyes and usually fold and run from debate when it occurs.

The truth is precious. It is sad that there are so many in our society who have lost respect for it; people who have traded in their conscience and their soul for temporary financial comfort while sacrificing the stability and balance of the rest of the country in the process.

The human psyche breathes on the air of truth. Without it, humanity cannot survive. Without it, the species will collapse, starving from lack of intellectual and emotional sustenance.

Disinformation does not only threaten our insight into the workings of our world; it makes us vulnerable to fear, misunderstanding, and doubt: all things that lead to destruction. It can drive good people to commit terrible atrocities against others, or even against themselves. Without a concerted and organized effort to diffuse mass-produced lies, the future will look bleak indeed.

__________________________________________________________________________________

Knowing how disinformation works, now we will take a gander at 25 Rules Of Disinformation that were written by H. Michael Sweeney, although we found them personally at WashingtonsBlog.com:

Preface: This handy set of rules covers most of the games which disinformation artists play on the Internet (and offline). When you know the tricks, you’ll be able to spot the games. Even if you’ve read this list before, you might be surprised at how useful it is to brush up on these tricks.

1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

  1. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit.
  2. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method works especially well with a silent press, because the only way the public can learn of the facts are through such “arguable rumors”. If you can associate the material with the Internet, use this fact to certify it a “wild rumor” which can have no basis in fact.
  3. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.
  4. Sidetrack opponents with name calling and ridicule. This is also known as the primary attack the messenger ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as “kooks”, “right-wing”, “liberal”, “left-wing”, “terrorists”, “conspiracy buffs”, “radicals”, “militia”, “racists”, “religious fanatics”, “sexual deviates”, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.
  5. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.
  6. Question motives. Twist or amplify any fact which could so taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.
  7. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough “jargon” and “minutiae” to illustrate you are “one who knows”, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.
  8. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues with denial they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.
  9. Associate opponent charges with old news. A derivative of the straw man usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with. Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually them be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.
  10. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the “high road” and “confess” with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, “just isn’t so.” Others can reinforce this on your behalf, later. Done properly, this can garner sympathy and respect for “coming clean” and “owning up” to your mistakes without addressing more serious issues.
  11. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to loose interest more quickly without having to address the actual issues.
  12. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards with an apparent deductive logic in a way that forbears any actual material fact.
  13. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best for items qualifying for rule 10.
  14. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.
  15. Vanishing evidence and witnesses. If it does not exist, it is not fact, and you won’t have to address the issue.
  16. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can “argue” with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.
  17. Emotionalize, Antagonize, and Goad Opponents. If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how “sensitive they are to criticism”.
  18. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
  19. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.
  20. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed an unavailable to subsequent investigators. Once a favorable verdict (usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim) is achieved, the matter can be considered officially closed.
  21. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.
  22. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.
  23. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by proper intimidation with blackmail or other threats.
  24. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

_______________________________________________________________________________

Now to anchor all of the above information, we will cite How To Spot – And Defeat – Disruption On The Internet which comes from WashingtonsBlog.com:

We’ve seen a number of tactics come and go over the years.  Here are the ones we see a lot of currently.

  1. Start a partisan divide-and-conquer fight or otherwise push emotional buttons to sow discord and ensure that cooperation is thwarted.   Get people fighting against each other instead of the corrupt powers-that-be.  Use baseless caricatures to rile everyone up.  For example,  start a religious war whenever possible using stereotypes like “all Jews are selfish”, “all Christians are crazy” or “all Muslims are terrorists”.  Accuse the author of being a gay, pro-abortion limp-wristed wimp  or being a fundamentalist pro-war hick when the discussion has nothing to do with abortion, sexuality, religion, war or region.  Appeal to people’s basest prejudices and biases. And – as Sweeney explains – push the author into a defensive posture:

Sidetrack opponents with name calling and ridicule … Associate opponents with unpopular titles such as “kooks”, “right-wing”, “liberal”, “left-wing”, “terrorists”, “conspiracy buffs”, “radicals”, “militia”, “racists”, “religious fanatics”, “sexual deviates”, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

  1. Pretend it’s hopeless because we’ll be squashed if we try.  For example, every time a whistleblower leaks information, say “he’s going to be bumped off”.   If people talk about protesting, organizing, boycotting, shareholder activism, spreading the real facts, moving our money or taking other constructive action, write things to scare and discourage people, say something like  “we don’t have any chance because they have drones and they’ll just kill us if we try”,  or “Americans are too stupid, lazy and greedy, so they’ll never help out.”  Encourage people to be apathetic instead of trying to change things.
  2. Demand complete, fool-proof and guaranteed solutions to the problems being discussed.   For example, if a reporter breaks the story that the big banks conspired to rig a market, ask “given that people are selfish and that no regulation can close all possible loopholes … how are you going to change human nature?”, and pretend that it’s not worth talking about the details of the market manipulation.  This discourages people from reporting on and publicizing the corruption, fraud and other real problems.  And it ensures that not enough people will spread the facts so that the majority know what’s really going on.
  3. Suggest extreme, over-the-top, counter-productive solutions which will hurt more than help, or which are wholly disproportionate to what is being discussed.   For example, if the discussion is whether or not to break up the big banks or to go back on the gold standard, say that everyone over 30  should be killed because they are sell-outs and irredeemable, or that all of the banks should be bombed. This discredits the attempt to spread the facts and to organize, and is simply the web method of the provocateur.
  4. Pretend that alternative media – such as blogs written by the top experts in their fields, without any middleman – are untrustworthy or are motivated solely by money (for example, use the derogatory term “blogspam” for any blog posting, pretending that there is no original or insightful reporting, but that the person is simply doing it for ad revenue).
  5. Coordinate with a couple of others to “shout down” reasonable comments.  This is especially effective when the posters launch an avalanche of comments in quick succession … the original, reasonable comment gets lost or attacked so much that it is largely lost.
  6. Use an army of sock puppets.  You can either hire low-wage workers in India or other developing countries to “astroturf” or – if you work for the government – you can use hire military personnel and subcontractors to monitor social media and “correct” information which you don’t like (and see this), or use software which allows you to quickly create and alternate between numerous false identities, each with their own internet address.
  7. Censor social media, so that the hardest-hitting information is buried. If you can’t censor it, set up “free speech zones” to push dissent into dank, dark corners where no one will see it.
  8. When the powers-that-be cut corners and take criminally reckless gambles with our lives and our livelihoods, protect them by pretending that the inevitable result – nuclear accidents, financial crisesterrorist attacks or other disasters – were “unforeseeable” and that “no could have known”.
  9. Protect the rich and powerful by labeling any allegations of criminal activity as being a “conspiracy theory”.  For example, when Goldman gets caught rigging markets, label the accusations as mere conspiracies.

The following 4 tactics from Sweeney are also still commonly used …

  1. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit.
  2. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.
  3. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.
  4. Question motives. Twist or amplify any fact which could so taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.
  5. Associate opponent charges with old news. A derivative of the straw man usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with. Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually them be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

Postscript:  Over a number of years, we’ve found that the most effective way to fight disruption and disinformation is to link to a post such as this one which rounds up disruption techniques, and then to cite the disinfo technique you think is being used.

Specifically, we’ve found the following format to be highly effective in educating people in a non-confrontational manner about what the disrupting person is doing:

Good Number 1!

Or:

Thanks for that textbook example of Number 7!

(include the link so people can see what you’re referring to.)

The reason this is effective is that other readers will learn about the specific disruption tactic being used … in context, like seeing wildlife while holding a wildlife guide, so that one learns what it looks like “in the field”.   At the same time, you come across as humorous and light-hearted instead of heavy-handed or overly-intense.

__________________________________________________________________________________

The above amalgamation of tools, techniques, tips, and data points should not only be able to help individuals ascertain the modus operandi used against them regarding censorship, disinformation, deception et al. but also assist in what to do in response to them where applicable.

Be it a newcomer, or an old timer, this information will serve as an excellent foundation for those looking to learn the ways that the establishment casts its nefarious webs, or perhaps serve as a review to those that have been doing this for a long time.

Make sure to review it from time to time in order to make sure it’s not forgotten.

___________________________________________________________

Suggested resources reviewed below for those seeking ideas to self-teach and become autodidacts:

7 Phenomenal Books For Homeschoolers, Self-Directed Learners & Autodidacts
13 Great Reasons To Study Logic
Open Source Education – Examples
What’s An Elite Education?  Famous Teacher Explains
Socratic Logic V3.1 by Peter Kreeft Ph.D.
The Trivium – The Liberal Arts Of Grammar & Rhetoric by Sister Miriam Joseph Ph.D.
How To Read A Book – The Classic Guide To Intelligent Reading by Mortimer J. Adler & Charles Van Doren
Philosophy 101 – An Introduction To Philosophy Via Plato’s Apology by Peter Kreeft Ph.D.
The Complete Workbook For Arguments – A Complete Course In Critical Thinking [2nd Ed.] by David R. Morrow & Anthony Weston
The Imaginative Argument – A Practical Manifesto For Writers by Frank L. Cioffi
Sherlock Holmes – The Complete Stories by Arthur Conan Doyle

The following books reviewed below cover the disturbing issues within the public schooling system:

Rotten To The Common Core by Dr. Joseph P. Farrell Ph.D.& Gary Lawrence
Dumbing Us Down – The Hidden Curriculum Of Compulsory Schooling by John Taylor Gatto
A Different Kind Of Teacher – Solving The Crisis Of American Schooling by John Taylor Gatto
Weapons Of Mass Instruction by John Taylor Gatto
Drilling Through The Core, by Sandra Stotsky & Contributors

Related Links:

The True Purpose Of Modern Schooling
How A Generation Lots Its Culture by Professor Patrick Deneen
Underground History Of American Education With John Taylor Gatto
The Pathological Methodology Of Forced Schooling
Charlotte Iserbyt – The Secret History Of Western Education [Full Documentary]
Against School – How Public Education Cripples Our Kids & Why
Lessons From IKEA Founder & MIT Admissions Director
What Is Education?  Elite Curriculum

___________________________________________________________
This article is free and open source.  All individuals are encouraged to share this content and have permission to republish this article under a Creative Commons license with attribution to Zy Marquiez and TheBreakaway.wordpress.com.
___________________________________________________________
About The Author:

Zy Marquiez is an avid book reviewer, researcher, an open-minded skeptic, yogi, humanitarian, and freelance writer who studies and mirrors regularly subjects like Consciousness, Education, Creativity, The Individual, Ancient History & Ancient Civilizations, Forbidden Archaeology, Big Pharma, Alternative Health, Space, Geoengineering, Social Engineering, Propaganda, and much more.

His other blog, BreakawayConsciousnessBlog.wordpress.com features mainly his personal work, while TheBreakaway.wordpress.com serves as a media portal which mirrors vital information nigh always ignored by mainstream press, but still highly crucial to our individual understanding of various facets of the world.

The Fallacy Of Circular Reasoning: A Vast Infection In Public Discourse

Is Circular Reasoning Always Fallacious? | GospelSpam.com
Source: NoMoreFakeNews.com
Jon Rappoport
January 9, 2017

The simplest definition of circular reasoning is: assuming what you’re trying to prove.

But that makes no sense.

Exactly.

As an abstract example—it always rains in Seattle. Today, it’s cloudy in the city. Therefore, it’s going to rain today.

Not necessarily, unless you assume up front that it “always” rains in Seattle. You give the impression of proving it’s going to rain today, but actually you’re already assuming that.

How about this? Mayor X is a racist. When he says he hopes black people living in the city will help the police catch criminals by providing eyewitness testimony, he’s demeaning black people.

Well, no. He may be correct or incorrect in believing these residents will, in fact, make reports to the police, but his statement isn’t, on its own, racist—unless you assume, in advance, that the mayor IS racist.

And if you do assume he is, then you ought to provide evidence.

—To which some readers will reply, “What you’re talking about here is miles beyond what happens in real life. There is no thought in real life. There are just knee-jerk reactions.”

No, not among all people. Raising the level of logic and understanding is an extremely worthwhile activity, and it benefits those who can grasp the essentials.

Here is another example: “We know Senator X is guilty of the crime he’s charged with, because no one reaches the level of senator unless he’s been blackmailed for committing crimes.” There are people who would accept this as a given, but it’s spreading a generality over all senators. And furthermore, even if Senator X has committed crimes, that doesn’t means he’s guilty of the one he’s been charged with recently. Perhaps, for instance, he’s been charged in order to smear his reputation, because he’s supporting a bill that would endanger the profits of a large corporation.

Here are three slightly different versions of circular reasoning:

“There is no reason to allow Politician X to air his views on television talk shows. He doesn’t have a following because his ideas don’t make an impact.” Really? Perhaps his ideas make no impact because no one will allow him exposure on national television.

“If the herbal treatment you’re suggesting had value, it would have been studied and tested at universities.” Is that so? Maybe it wasn’t tested at universities because it did have potential value, and would present a challenge to pharmaceutical drugs.

“Europe doesn’t need a leader like him. He’s a divider, he sets people against each other, and we need unity.” Again, the person being marginalized is rejected by definition. Maybe he divides people because he’s the only one who will speak up against a unity based on submission and abject compliance.

How about this? “The science is settled, and here comes that professor with his crazy ideas.” The professor is defined as crazy and out of step. But maybe he’s the one who will show the science isn’t settled at all, or shouldn’t be.

“He’s all about money. We want a better society where everyone can share, but he wants to keep everything for himself. He’s a greedy capitalist. Capitalism is dead. It’s been discredited.” The person being attacked is buried under a welter of preconceptions, with no evidence offered as to why he’s “bad.”

In circular reasoning, the deception happens right at the beginning. That’s where the conclusion is embedded. Then, some appearance of reasoning and proof are advanced. But there is no reasoning or proof.

Here is an example I would call disguised circular reasoning. It’s a bit slippery: “Frank’s cousin Sam was convicted of bank fraud in 1998. Now Frank has been brought up on the same basic charge. Wouldn’t you say that’s a pretty odd coincidence?” Yes, it is odd, but if you’re going to imply Frank is guilty, you’re going to need more than his cousin’s conviction. A lot more. Some people would call this example guilt by association, and it is, but there is also the telltale assumption of “proof” right at the start, when there is no proof.

“Look, I just counted 27 articles in respected newspapers claiming that the Russians hacked the election. I mean, what else do you want? The facts are obvious. So this guy who comes along and says there is no evidence—he’s spreading fake news. That’s the other thing all these newspapers are talking about: the pernicious spread of fake news.” Same basic approach, used with a bit more complexity: pile on the preconceptions right from the get-go, and then make it seem as if actual reasoning and evidence are being supplied to demean the “denier.” This is also an example of the ad hominem fallacy: attack the person and ignore what he has to say.

Continue Reading At: JonRappoport.wordpress.com
____________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at NoMoreFakeNews.com or OutsideTheRealityMachine.

Must Read: 10 Basic Forms Of Fake News Used By Major Media

fakenews
Source: NoMoreFakeNews.com
Jon Rappoport
January 5, 2017

The basic purpose of these ten forms is the presentation of a false picture of reality.

You could find more forms, or divide these ten into sub-categories.

The ten basic forms are:

* Direct lying about matters of fact.

* Leaving out vital information.

* Limited hangout. (This is an admission of a crime or a mistake, which only partially reveals the whole truth. The idea is that by admitting a fraction of what really happened and burying the biggest revelations, people will be satisfied and go away, and the story will never be covered again.)

* Shutting down the truth after publishing it—includes failing to follow up and investigate a story more deeply.

* Not connecting dots between important pieces of data.

* Censoring the truth, wherever it is found (or calling it “fake news”).

* Using biased “experts” to present slanted or false “facts.”

* Repeating a false story many times—this includes the echo-chamber effect, in which a number of outlets “bounce” the false story among themselves.

* Claiming a reasonable and true consensus exists, when it doesn’t, when there are many important dissenters, who are shut out from offering their analysis.

* Employing a panoply of effects (reputation of the media outlet, voice quality of the anchor, acting skills, dry mechanical language, studio lighting, overlay of electronic transmissions, etc.) to create an impression of elevated authority which is beyond challenge.

These are all traditional forms and methods.

Here’s an example of a big story that deployed all ten forms of fake news: the Swine Flu pandemic of 2009.

In the spring of 2009, the World Health Organization (elevated authority beyond challenge) announced that Swine Flu was a level-6 pandemic—its highest category of “danger.” In fact, there were only 20 confirmed cases at the time (direct lying about “danger”). And W.H.O. quietly changed the definition of “level-6” so widespread death and damage were no longer required (another aspect of direct lying).

The story was, of course, picked up by major media outlets all over the world (echo chamber effect, fake consensus, never connected dots re W.H.O. lies), and quite soon, Swine Flu case numbers rose into the thousands (direct lying, as we’ll soon see).

Medical experts were brought in to bolster the claims of danger (biased experts; important dissenters never given space to comment).

In the early fall of 2009, Sharyl Attkisson, then a star investigative reporter for CBS News, published a story on the CBS News website. She indicated that the CDC had secretly stopped counting the number of Swine Flu cases in America. No other major news outlet reported this fact (omitting vital information).

Attkisson discovered the reason the CDC had stopped counting: the overwhelming number of blood samples taken from the most likely Swine Flu patients were coming back from labs with: no trace of Swine Flu or any other kind of flu. Therefore, a gigantic hoax was revealed. The pandemic was a dud, a fake.

Despite Attkisson’s efforts, CBS never followed up on her story (shutting down the truth after exposing it). Never probed the lying by the CDC (failure to connect dots). In a sense, CBS turned Attkisson’s story into a limited hangout—a further investigation would have uncovered acres of criminal behavior by both the CDC and the World Health Organization, to say nothing of the governments and media outlets that supported these lying agencies. The mainstream press essentially censored Attkisson’s revelations.

Then, about three weeks after CBS published Attkisson’s story, WebMD published a piece in which the CDC claimed that its own (lying) estimate of 10,000 or so cases of Swine Flu in the US was a gross understatement. Truly, there were 22 MILLION cases of Swine Flu in the US (doubling-down on lying).

And that was that.

Which leads to an 11th form of fake news: if one lie doesn’t quite fly, tell a much bigger lie.

And these mainstream sources are currently shouting and bloviating about independent media spreading fake news. I guess you could call that number 12: accusing their opponents of committing the crimes they are, in fact, committing.

Read More At: JonRappoport.wordpress.com
______________________________________________________
Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at NoMoreFakeNews.com or OutsideTheRealityMachine.

Here’s the Best Summary of The Washington Post’s Latest ‘Fake News’ Fiasco

washingtonpostSource: LibertyBlitzkrieg.com
Michael Krieger
January 3, 2017

It’s quite ironic that the one newspaper most hysterical in warning the American public about the dangers of “fake news,” has become the most prolific publisher of it. The most recent example, of course, relates to the entirely made up story that those dastardly Russians had hacked into the U.S. power grid through a Vermont utility. The paper’s source for the story? Anonymous government officials. Unsurprisingly, the entire thing was a fairytale.

Most of you will already be aware of the story, but this is such a monumental example of journalistic malpractice, it deserve far more attention and scrutiny.

In that regard, Forbes contributor Kalev Leetaru, has done an excellent job of shining further light on how it all went down in his piece, “Fake News” And How The Washington Post Rewrote Its Story On Russian Hacking Of The Power Grid. Here are some key excerpts:

Continue Reading At: LibertyBlitzkrieg.com

WaPo’s anti-Russian narrative is to ‘justify the loss’ to Donald Trump – professor

Source: RT
January 4, 2017

The Washington Post recently published a story claiming that Russia had hacked a Vermont utility and penetrated the US power grid – which has since been debunked and retracted. Robin Anderson, a communications and media studies professor at Fordham University, discusses the bogus article with RT America’s Manila Chan.

New Department Of Truth Signed Into Law

Source: GizaDeathStar.com
Dr. Joseph P. Farrell
December 29, 2016

This may be a case of you tell me, and indeed I’d be interested in seeing people’s reaction to this bit of legislation that was quietly signed into law during the past few days’ holiday season:

Obama Quietly Signs The “Countering Disinformation And Propaganda Act” Into Law

The heart of the concerns is reflected in these paragraphs:

Recall that as we reported in early June, “a bill to implement the U.S.’ very own de facto Ministry of Truth had been quietly introduced in Congress. As with any legislation attempting to dodge the public spotlight the Countering Foreign Propaganda and Disinformation Act of 2016 marks a further curtailment of press freedom and another avenue to stultify avenues of accurate information. Introduced by Congressmen Adam Kinzinger and Ted Lieu, H.R. 5181 seeks a “whole-government approach without the bureaucratic restrictions” to counter “foreign disinformation and manipulation,” which they believe threaten the world’s “security and stability.”

Also called the Countering Information Warfare Act of 2016 (S. 2692), when introduced in March by Sen. Rob Portman, the legislation represents a dramatic return to Cold War-era government propaganda battles. “These countries spend vast sums of money on advanced broadcast and digital media capabilities, targeted campaigns, funding of foreign political movements, and other efforts to influence key audiences and populations,” Portman explained, adding that while the U.S. spends a relatively small amount on its Voice of America, the Kremlin provides enormous funding for its news organization, RT.

“Surprisingly,” Portman continued, “there is currently no single U.S. governmental agency or department charged with the national level development, integration and synchronization of whole-of-government strategies to counter foreign propaganda and disinformation.”

Long before the “fake news” meme became a daily topic of extensive conversation on such discredited mainstream portals as CNN and WaPo, H.R. 5181 would task the Secretary of State with coordinating the Secretary of Defense, the Director of National Intelligence, and the Broadcasting Board of Governors to “establish a Center for Information Analysis and Response,” which will pinpoint sources of disinformation, analyze data, and — in true dystopic manner — ‘develop and disseminate’ “fact-based narratives” to counter effrontery propaganda.

In short, long before “fake news” became a major media topic, the US government was already planning its legally-backed crackdown on anything it would eventually label “fake news.”

And so, with the likes of WaPo having already primed the general public to equate “Russian Propaganda” with “fake news” (despite admitting after the fact their own report was essentially “fake“), while the US media has indoctrinated the public to assume that any information which is not in compliance with the official government narrative, or dares to criticize the establishment, is also “fake news” and thus falls under the “Russian propaganda” umbrella, the scene is now set for the US government to legally crack down on every media outlet that the government deems to be “foreign propaganda.”

Just like that, the US Ministry of Truth is officially born.

Now I don’t know about you, but all sorts of images and thoughts are running through my mind. Not the least of these is Josef Goebbels, the Third Reich’s Propaganda Minister. Goebbels was nothing if not cunning. Goebbels knew that outright lies would never work. For propaganda to be effective, it had to contain enough truth to sell the lie, which is the purpose of propaganda: sell the lie. How to do it? Wrap it in truth. Thus, the old Deutsche Wochenschau newsreels would show the decimation of the German cities as Allied and Soviet bombers were pummeling them into rubble. That was the truth part. It would not have done to say the bombing effort was unreal, or ineffective, since millions of Germans could easily see otherwise. The lie was contained in the pledges of “final victory”, in the rumors of secret weapons, strategies, reserve armies, and so on. The technique, at its most basic, is a human one: tell (or show) the truth, inculcate trust, then sell the lie.

To reinforce the lie when even it could no longer be sold, it was reinforced with summary executions if a German even questioned the propaganda, and this is the problem with all propaganda ministries and “departments of truth.”  And I submit that it is also a problem inherent with this bill.

But I strongly suspect the real dangers already lie elsewhere, and it’s an epistemological problem the corporate controlled media and any government propaganda organ now faces: their moral capital is already so low that no one trusts them any more, even if they should suddenly tell the truth, not just as the occasional matter, but as a consistent agenda. Think of the boy who cried wolf, once too often, until the wolf actually appeared, and no one believed him any more. Our corporate controlled media have been lying to us to drive political agendas for so long that no one believes them, from the USS Maine sinking, to the magic bullet, to Waco and “we did it for the children,” to the whole 9/11 narrative, to dodging Darth Hillary’s health issues and the constant drumbeat of a Hillary victory, and now, to the whole (largely collapsed) Russia hacked our elections meme. (No one seems to recall those Russian allegations years ago of US attempts to steal their elections from Mr. Putin).

Countering their own deplorable fake news record will be difficult, and the way that they will do so will be not through direct confrontation, but via already tried and tested means: planting false stories, having “fake commenters” commenting on websites, and particularly foreign ones, such as PressTV (the Iranian site), Al Jazeera, RT, and of course on various free and independent media sites. And these attacks will come in the form of exhibiting or displaying “more thorough research”… after all, the government has lots of money, and can hire researchers to nitpick anything to death, to find…

Continue Reading At: GizaDeathStar.com
_______________________________________________________________

About Joseph P. Farrell
Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

The Birth Of The Ministry Of ‘Truth’: Obama Quietly Signs The “Countering Disinformation And Propaganda Act” Into Law

Source: ZeroHedge.com
December 26, 2016

Late on Friday, with the US population embracing the upcoming holidays and oblivious of most news emerging from the administration, Obama quietly signed into law the 2017 National Defense Authorization Act (NDAA) which authorizes $611 billion for the military in 2017.

In a statement, Obama said that:

Today, I have signed into law S. 2943, the “National Defense Authorization Act for Fiscal Year 2017.” This Act authorizes fiscal year 2017 appropriations principally for the Department of Defense and for Department of Energy national security programs, provides vital benefits for military personnel and their families, and includes authorities to facilitate ongoing operations around the globe. It continues many critical authorizations necessary to ensure that we are able to sustain our momentum in countering the threat posed by the Islamic State of Iraq and the Levant and to reassure our European allies, as well as many new authorizations that, among other things, provide the Departments of Defense and Energy more flexibility in countering cyber-attacks and our adversaries’ use of unmanned aerial vehicles.”

Much of the balance of Obama’s statement blamed the GOP for Guantanamo’s continued operation and warned that “unless the Congress changes course, it will be judged harshly by history,” Obama said. Obama also said Congress failed to use the bill to reduce wasteful overhead (like perhaps massive F-35 cost overruns?) or modernize military health care, which he said would exacerbate budget pressures facing the military in the years ahead.

But while the passage of the NDAA – and the funding of the US military – was hardly a surprise, the biggest news is what was buried deep inside the provisions of the Defense Authortization Act.

Recall that as we reported in early June, “a bill to implement the U.S.’ very own de facto Ministry of Truth had been quietly introduced in Congress. As with any legislation attempting to dodge the public spotlight the Countering Foreign Propaganda and Disinformation Act of 2016 marks a further curtailment of press freedom and another avenue to stultify avenues of accurate information. Introduced by Congressmen Adam Kinzinger and Ted Lieu, H.R. 5181 seeks a “whole-government approach without the bureaucratic restrictions” to counter “foreign disinformation and manipulation,” which they believe threaten the world’s “security and stability.”

Also called the Countering Information Warfare Act of 2016 (S. 2692), when introduced in March by Sen. Rob Portman, the legislation represents a dramatic return to Cold War-era government propaganda battles. “These countries spend vast sums of money on advanced broadcast and digital media capabilities, targeted campaigns, funding of foreign political movements, and other efforts to influence key audiences and populations,” Portman explained, adding that while the U.S. spends a relatively small amount on its Voice of America, the Kremlin provides enormous funding for its news organization, RT.

“Surprisingly,” Portman continued, “there is currently no single U.S. governmental agency or department charged with the national level development, integration and synchronization of whole-of-government strategies to counter foreign propaganda and disinformation.”

Long before the “fake news” meme became a daily topic of extensive conversation on such discredited mainstream portals as CNN and WaPo, H.R. 5181 would task the Secretary of State with coordinating the Secretary of Defense, the Director of National Intelligence, and the Broadcasting Board of Governors to “establish a Center for Information Analysis and Response,” which will pinpoint sources of disinformation, analyze data, and — in true dystopic manner — ‘develop and disseminate’ “fact-based narratives” to counter effrontery propaganda.

In short, long before “fake news” became a major media topic, the US government was already planning its legally-backed crackdown on anything it would eventually label “fake news.”

* * *

Fast forward to December 8, when the “Countering Disinformation and Propaganda Act” passed in the Senate, quietly inserted inside the 2017 National Defense Authorization Act (NDAA) Conference Report.

And now, following Friday’s Obama signing of the NDAA on Friday evening, the Countering Disinformation and Propaganda Act is now law.

* * *

Here is the full statement issued by the generously funded Senator Rob Portman (R- Ohio) on the singing into law of a bill that further chips away at press liberties in the US, and which sets the stage for future which hunts and website shutdowns, purely as a result of an accusation that any one media outlet or site is considered as a source of “disinformation and propaganda” and is shut down by the government.

President Signs Portman-Murphy Counter-Propaganda Bill into Law

Portman-Murphy Bill Promotes Coordinated Strategy to Defend America, Allies Against Propaganda and Disinformation from Russia, China & Others

U.S. Senators Rob Portman (R-OH) and Chris Murphy (D-CT) today announced that their Countering Disinformation and Propaganda Act – legislation designed to help American allies counter foreign government propaganda from Russia, China, and other nations has been signed into law as part of the FY 2017 National Defense Authorization Act (NDAA) Conference Report. The bipartisan bill, which was introduced by Senators Portman and Murphy in March, will improve the ability of the United States to counter foreign propaganda and disinformation from our enemies by establishing an interagency center housed at the State Department to coordinate and synchronize counter-propaganda efforts throughout the U.S. government. To support these efforts, the bill also creates a grant program for NGOs, think tanks, civil society and other experts outside government who are engaged in counter-propaganda related work. This will better leverage existing expertise and empower our allies overseas to defend themselves from foreign manipulation. It will also help foster a free and vibrant press and civil society overseas, which is critical to ensuring our allies have access to truthful information and inoculating people against foreign propaganda campaigns.

“Our enemies are using foreign propaganda and disinformation against us and our allies, and so far the U.S. government has been asleep at the wheel,” Portman said. “But today, the United States has taken a critical step towards confronting the extensive, and destabilizing, foreign propaganda and disinformation operations being waged against us by our enemies overseas. With this bill now law, we are finally signaling that enough is enough; the United States will no longer sit on the sidelines. We are going to confront this threat head-on. I am confident that, with the help of this bipartisan bill, the disinformation and propaganda used against us, our allies, and our interests will fail.”

The use of propaganda to undermine democracy has hit a new low. But now we are finally in a position to confront this threat head on and get out the truth. By building up independent, objective journalism in places like eastern Europe, we can start to fight back by exposing these fake narratives and empowering local communities to protect themselves,” said Murphy. “I’m proud that our bill was signed into law, and I look forward to working with Senator Portman to make sure these tools and new resources are effectively used to get out the truth.”

NOTE: The bipartisan Countering Disinformation and Propaganda Act is organized around two main priorities to help achieve the goal of combatting the constantly evolving threat of foreign disinformation from our enemies:

  • The first priority is developing a whole-of-government strategy for countering THE foreign propaganda and disinformation being wages against us and our allies by our enemies. The bill would increase the authority, resources, and mandate of the Global Engagement Center to include state actors like Russia and China as well as non-state actors. The Center will be led by the State Department, but with the active senior level participation of the Department of Defense, USAID, the Broadcasting Board of Governors, the Intelligence Community, and other relevant agencies. The Center will develop, integrate, and synchronize whole-of-government initiatives to expose and counter foreign disinformation operations by our enemies and proactively advance fact-based narratives that support U.S. allies and interests.
  • Second, the legislation seeks to leverage expertise from outside government to create more adaptive and responsive U.S. strategy options. The legislation establishes a fund to help train local journalists and provide grants and contracts to NGOs, civil society organizations, think tanks, private sector companies, media organizations, and other experts outside the U.S. government with experience in identifying and analyzing the latest trends in foreign government disinformation techniques. This fund will complement and support the Center’s role by integrating capabilities and expertise available outside the U.S. government into the strategy-making process. It will also empower a decentralized network of private sector experts and integrate their expertise into the strategy-making process.

* * *

And so, with the likes of WaPo having already primed the general public to equate “Russian Propaganda” with “fake news” (despite admitting after the fact their own report was essentially “fake“), while the US media has indoctrinated the public to assume that any information which is not in compliance with the official government narrative, or dares to criticize the establishment, is also “fake news” and thus falls under the “Russian propaganda” umbrella, the scene is now set for the US government to legally crack down on every media outlet that the government deems to be “foreign propaganda.”

Just like that, the US Ministry of Truth is officially born.

Read More At: ZeroHedge.com

Washington Post-CIA Connections Destroy Post’s “Election Hack” Claim

QuestionEverything2
Source: NoMoreFakeNews.com
Jon Rappoport
December 12, 2016

“The CIA says” is never a great way to start a sentence. But that’s the basis of the latest charge that Russia hacked the US presidential election.

Members of Congress have now been secretly briefed by the CIA on “the Russian affair,” and media, led by the Washington Post, are running with the story that Russia influenced the US election on the side of Trump.

Until and unless the denizens of Langley decide to show specific and convincing evidence for their claim, this is disinformation.

It’s easy to assemble a circumstantial case. But each case has to be judged on its own merits, and the devil is in the details. If we aren’t privy to those details in the “Russian affair,” no judgement is possible. Of course, major media outlets don’t seem bothered by that. They’re happy to cite the CIA as an authority—conveniently ignoring the fact that people in the intelligence field are taught to lie. It’s their stock in trade.

You might remember the Washington Post’s role in defaming and destroying Gary Webb, who, in 1996, published a series of articles in the Mercury News about the CIA seeding black Los Angeles neighborhoods with crack cocaine. The Post basically asked the CIA whether the charge was true, and when the Agency denied it, the Post attacked Webb as a “fake news” reporter. The same Washington Post is now leading the campaign to tie the Russian government to Hillary Clinton’s defeat. And the Post, once again, is using unproven statements from the CIA to back up their claim.

I could go on and on about the Post and its historic CIA ties. But now, right now, the owner of the Post is Jeff Bezos, who also owns Amazon. And Amazon has a $600 million contract to provide the CIA cloud computing services (more here and here).

Boom.

Ordinarily, that would be called a fatal conflict of interest, whenever the Post opens up its yap about the CIA in any context.

However, mainstream news outlets, the very big ones, don’t go around criticizing each other’s ownerships; so the Bezos-CIA relationship is conveniently ignored and left “in the past.”

An honest lead paragraph on the current Russia-CIA-Trump allegations in the Post, however, would start this way:

“Our paper is owned by Jeff Bezos, and Jeff is making $600 million to provide the CIA with computing services, so take everything below with a grain of salt the size of Langley.”

Going one step further, Amazon and the CIA are both in the data-collecting business. What are the chances that Amazon, in the interest of “national security,” has been sharing its massive customer data with the CIA and other US intelligence agencies?

This should lead to another conflict-of-interest statement from the Washington Post: “As you read any article in our paper, keep in mind that our owner may be data-mining you and passing the information to the CIA. Have a nice day.”

Am I being too hard on Amazon? Do they have the basic guts to stand up to the intelligence community and resist its demands? Here is what author Norman Solomon had to say about that in 2014 (Huffington Post):

“Amazon’s trajectory into the CIA’s spooky arms may be a bit more than just corporate eagerness to land a lucrative contract. In late 2010 — amid intense public interest in documents that WikiLeaks was posting to illuminate U.S. actions overseas — Amazon took a notable step. As the Guardian reported at the time, Amazon ‘pulled the plug on hosting the whistleblowing website in reaction to heavy political pressure.’

“It didn’t take much for Amazon to cave. ‘The company announced it was cutting WikiLeaks off … only 24 hours after being contacted by the staff of Joe Lieberman, chairman of the Senate’s committee on homeland security,’ the Guardian noted.”

Let’s see. In 2010, Amazon cuts off WikiLeaks, proving its willingness to cave to the intelligence community.

In 2013, Jeff Bezos, the owner of Amazon, buys the Washington Post.

In 2016, during the presidential campaign, WikiLeaks releases tons of email data exposing Hillary Clinton, the Democratic National Committee, and associated players.

In 2016, after Clinton loses, the CIA—now Amazon’s business partner…

Continue Reading At: JonRappoport.wordpress.com
_________________________________________________________
Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at NoMoreFakeNews.com or OutsideTheRealityMachine.

Geoengineering Watch Global Alert News, December 3, 2016 [Geoengineeringwatch.org]

Source: Geoengineeringwatch.org
Dane Wigington
December 3, 2016

How stable are the world’s democracies?  “Warning Lights Are Flashing Red” is a recent headline on the subject to consider. More and more of the Earth’s atmosphere is being saturated with toxic particles from the constantly expanding climate engineering global assault. An update from Australia, as many as 8500 people were reportedly hospitalized from “thunderstorm asthma”. Does anyone believe that this is the real reason behind the health catastrophe? The Weather Channel continues to lie about the geoengineering insanity. Since the US military is their primary sponsor, The Weather Channel’s lying to cover the tracks of climate engineering comes as no surprise. We are told that over 100,000,000 trees have now died in California due to the drought, but there are lies contained in the media reports that say so. First, there are many more than 100,000,000 trees dead, it is not just the drought, and climate engineering is the primary factor related to the tree die off. The biosphere as a whole continues to collapse, more weather warfare is on the way for the Dakota water protectors, and all while a climate disinformation event in Arizona is attempting to deny there is anything even wrong with the climate or the environment ( http://www.geoengineeringwatch.org/is… ) Countless biases are held by the masses and these biases are fueled by the power structure. How can such bias be overcome?