From pollution to politics, the
era of deception and duplicity has reached new heights and hijacked
almost every form of media in the world. In the last frontiers for
truth such as the internet, disinformation operations are in full swing
to discredit and destroy any semblance of authentic and factual
information available to the public.
How many more lies will people
around the world accept as truth? Some say a global awakening is taking
place, but at what cost? Will it take the destruction of most of the
earth and its resources before people are enlightened?
The escalating media and political
reports are so far fetched, cunning, and so beyond reality, it's as
if each is trying to top the other with one sinister plot after the
next. To demonstrate the outright lies by national governments and the
media, let's take three examples from the last year alone, including
the H1N1 scandal, airport body scanners and the BP oil disaster.
The H1N1 Scandal
Last year, the H1N1 scandal reached
its pinnacle in the fall of 2009 when the world united on the internet
with a consensus and practical understanding of the World Health
Organization's
orchestratration to deceive the masses.
From
radio, internet, television, newspapers, magazines,
outdoor posters, signage and promotions, you could
not escape the
flu hype
campaigns so diligently pursued by all the
malicious agendas at play who only wanted one thing - to
promote a dangerous H1N1 vaccine. After
hundreds of reports exposed the criminal activity by all levels of government, we left the same people in power to do it all over again.
According to preliminary reports,
another round of pandemic vaccine campaigns are scheduled for the
2010/2011 season and they're already underway. However, there appears
to be a recombination that has
changed the H1N1 lab created virus into a more lethal form and it is not a hoax, but it may be yet another
CDC lab experiment.
The CDC has recently issued a
Health Advisory in connection with two summer outbreaks of H3N2 in Iowa. Other reports from Russia and
India
indicate that a real epidemic may be upon us if the virus steadily
recombines and acquires new genetics. Even though a new strain may have
accidentally evolved in eggs, reassortment of H1N1-H5N1 has been a
legitimate concern for years. The WHO first suggested the
reassortment of H1N1-H5N1 in 2004.
If this is really the case, how will
the public react after all the lies from health agencies who have
sworn to protect us? Will they hype another vaccine and if so, will the
public even respond?
Body Scanners
They've been approved all over the
world and marketed as the next greatest airport
scanning technology. The U.S., U.K., Russia,
Australia, Europe and Canada have all installed airport body scanners
which have potentially devastating health effects.
Many of these scanners are
reportedly using terahertz (THz) waves, the radiation
that fills the slot in the electromagnetic spectrum
between microwaves and infrared.
Evidence
suggests that although the forces generated are tiny,
resonant effects allow THz waves to unzip double-stranded DNA,
creating bubbles in the double strand that could significantly
interfere with processes such as gene expression and
DNA replication.
As the path toward rolling out wider use of whole-body scanners in U.S. airports ran through the White House,
Obama
expedited their deployment because the Department of Homeland
Security (DHS) and Transportation Security Administration (TSA) didn't
need legislation from Congress to start using the devices at any of
the 560 U.S. airports.
The White House ignored all the
scientific evidence presented which suggested negative health effects.
Politicians and regulatory agencies then covered up the bad publicity
on
naked body scanners and focused on the presumed benefits under the guise of public safety.
Privacy commisioners and airport
authorities have also insisted that there were no risks of images being
stored or personal details being revealed to security screeners. Now
there's new evidence to show that the scanners can do just that.
According to a
CNET report,
another federal agency, the U.S. Marshall's service, admitted that it
had actually stored over 30,000 images recorded by a full-body
scanner used at a Florida courthouse.
A watchdog group called the
Electronic Privacy Information Center
(EPIC) obtained over 100 of the images and states on its web site that,
"The images, which are routinely captured by the federal agency,
prove that body scanning devices store and record images of
individuals stripped naked." The group has filed a lawsuit to suspend
the deployment of body scanners at airports.
EPIC also discovered that the TSA
actually specified to manufacturers that the machines have the ability
to send and store images. The TSA says that these functions are only
for testing and training and
insists on its web site that the airport body scanners are delivered to airports with storage and recording functions disabled.
Again, the upper levels of the
echelon are caught lying and deceiving, yet they are still left to their
own devices to further manipulate and continue misrepresenting facts to
the gullible public.
BP Oil Disaster
When news unfolded about the April
20, 2010 BP oil disaster, it went from bad to worse. Instead of
immediately mobilizing for action in the face of a massive public
health threat, the response was to cover-up, deny and respond with
ignorance. After all the public will always believe them, or so they
thought.
The Obama administration,
Interior Secretary Ken Salazar, U.S. Coast Guard commandant admiral Thad
Allen, energy and climate-change policy adviser Carol Browner, BP and
all their contituents conspired to deliberately mislead the public from
the inception of the disaster to present day. What's worse is they all
agreed to further disseminate toxins in the Gulf by spraying 1.8 to 2
million gallons of the neurotoxin Corexit which was exposed by over a
hundred scientists,
toxicologists
and other experts who have unequivocally classified the irresponsible
aerial spraying of the chemical dispersant as a large-scale,
uncontrolled non-consensual human and environmental experiment is being
conducted in the Gulf region.
The
media was grossly censoring the extent of the devastation in the Gulf.
The poisons--oil and corexit are destined to spread globally, but
honest reporting was and still is restricted, and many independent
investigators have been arrested. Read
30 Facts Evidencing that The Gulf Oil Crisis Was Planned.
On June 12, 2010,
The Institute of Atmospheric Sciences and Climate (ISAC) released "
Risk of Global Climate Change By BP Oil Spill",
a document detailing how the BP spill may cause irreparable damage to
the Gulf Stream global climate thermoregulation activity. Read
Gulf Loop Current Destroyed: May Lead To Shut Down of Atlantic Thermoregulation, Rapid Cooling.
According to Dr. Gianluigi
Zangari, an Italian theoretical physicist, and major complex
and chaotic systems analyst at the Frascati National
Laboratories in Italy, the Loop Current in the Gulf of Mexico
has stalled as a consequence of the BP oil spill disaster. Zangari
notes that the effects of this stall have also begun to
spread to the Gulf Stream. This is because the Loop Current is a
crucial element of the Gulf Stream itself and why it is commonly
referred to as the “main engine” of the Stream.
The concern now, is
whether or not natural processes can re-establish the stalled
Loop Current. If not, we could begin to see global crop
failures as early as 2011.
Zangari's assessment is
based on daily monitoring of real-time data oceanographic
satellite public data feeds called “Real-Time Mesoscale
Altimetry” from the Jason, Topex/Poseidon, Geosat, Follow-On,
ERS-2 and Envisat satellites.
These satellite feeds are captured and made publicly available by NASA, NOAA and by the
Colorado Center for Astrodynamics Research (CCAR) at the University of Colorado at Boulder.
The CCAR is now being accused of
scientific fraud and tampering of data directly associated with the
events surrounding the Loop Current phenomenon and its current
anomalies. Various reporters have spear-headed the charge including
radio personality Dr. Bill Deagle who has featured Dr. Zangari on his
radio show
The Nutrimedical Report where he detailed the events leading up to the destruction of the Loop Current in the Gulf.
Dr. Zangari has stated that he will no longer use CCAR data due to its unreliability.
Organized and Professional Disinformation Operations
Well-funded and highly-organized
disinformation operations are in full-swing throughout the internet.
From forums to comment boards and even professional websites that have
only one purpose: Defame, distract, and destroy the truth.
However organized, the tactics are
very predictable in a world filled with lies and half-truths. This,
sadly, includes every day news media, one
of the worst offenders with respect to being
a source of disinformation.
Disinformation campaigns are
launched against those seeking to uncover and
expose the truth and/or the conspiracy. The H1N1 scandal was a prime
example of how hundreds of operations can be launched to sway opinions
on the facts. For every fact-based article on the
realities of the H1N1 vaccine,
there were both very primitive and sophisticated counters on message
boards, comment forums and hundreds of alternative and mainstream
websites.
Stephen Barrett's
Quackwatch.com and supporters such as
skeptic.org.uk and
skepticblog.com
are examples of websites which promote both synthetic and organic
disinformation on almost any topic that does not concur with mainstream
thought.
There are specific tactics
which disinfo artists tend to apply, as H. Michael
Sweeney has brilliantly detailed. Also included
with this material are eight common traits of the disinfo artist
which may also prove useful in
identifying players and motives. The more a
particular party fits the traits and is guilty of following the
rules, the more likely they are a
professional disinfo artist with a vested
motive. People can be bought, threatened, or blackmailed into providing
disinformation, so even "good guys" can be
suspect in many cases.
A rational person participating
as one interested in the truth will
evaluate that chain of evidence and conclude either that the links are
solid and conclusive, that one or more
links are weak and need further
development before conclusion can be arrived at, or that one or more
links can be broken, usually invalidating
(but not necessarily so, if parallel
links already exist or can be found, or if a particular link
was merely supportive, but not in itself key) the
argument. The game is played by raising
issues which either strengthen or weaken (preferably
to the point of breaking) these links. It is the job of a
disinfo artist to interfere with these
evaluation... to at least make people
think the links are weak or broken when, in truth, they are not... or
to propose alternative solutions leading
away from the truth. Often, by simply
impeding and slowing down the process through disinformation
tactics, a level of victory is assured because
apathy increases with time and rhetoric.
It would seem true in almost
every instance, that if one cannot break
the chain of evidence for a given solution, revelation of truth
has won out. If the chain is broken either a new
link must be forged, or a whole new chain
developed, or the solution is invalid an a new one
must be found... but truth still wins out. There is no shame
in being the creator or supporter of a
failed solution, chain, or link, if done
with honesty in search of the truth. This is the rational approach.
While it is understandable that a person can
become emotionally involved with a
particular side of a given issue, it is really
unimportant who wins, as long as truth wins. But the disinfo
artist will seek to emotionalize and
chastise any failure (real or false
claims thereof), and will seek by means of intimidation to prevent
discussion in general.
It is the disinfo artist and
those who may pull their strings (those
who stand to suffer should the crime be solved) MUST seek to prevent
rational and complete examination of any
chain of evidence which would hang them.
Since fact and truth seldom fall on their own, they must be
overcome with lies and deceit. Those who are
professional in the art of lies and
deceit, such as the intelligence community and the
professional criminal (often the same people or at least
working together), tend to apply fairly
well defined and observable tools in this
process. However, the public at large is not well armed against
such weapons, and is often easily led astray by
these time-proven tactics. Remarkably,
not even media and law enforcement have NOT BEEN
TRAINED to deal with these issues. For the most part, only the
players themselves understand the rules
of the game.
Twenty-Five Rules of Disinformation
1. Hear no evil, see no evil, speak no evil.
Regardless of what you
know, don't discuss it -- especially if you are a
public figure, news anchor, etc. If it's
not reported, it didn't happen, and you never have
to deal with the issues.
2. Become incredulous and indignant.
Avoid discussing key issues and
instead focus on side issues which can be
used to show the topic as being critical
of some otherwise sacrosanct group or theme. This is
also known as the 'How dare you!' gambit.
3. Create rumor mongers.
Avoid discussing issues by
describing all charges, regardless of
venue or evidence, as mere rumors and wild
accusations. Other derogatory terms mutually exclusive of truth may
work as well. This method works especially
well with a silent press because the
only way the public can learn of the facts are
through such 'arguable rumors'. If you can associate the material
with the Internet, use this fact to
certify it a 'wild rumor' from a 'bunch
of kids on the Internet' which can have no basis in fact.
4. Use a straw man.
Find or create a seeming element
of your opponent's argument which you can
easily knock down to make yourself look
good and the opponent to look bad. Either make up an issue you may
safely imply exists based on your
interpretation of the opponent/opponent
arguments/situation, or select the weakest aspect of
the weakest charges. Amplify their significance and destroy
them in a way which appears to debunk all
the charges, real and fabricated alike,
while actually avoiding discussion of the real issues.
5. Sidetrack opponents with name calling and ridicule.
This is also
known as the primary 'attack the messenger' ploy, though
other methods qualify as variants of that
approach. Associate opponents with
unpopular titles such as 'kooks', 'right-wing', 'liberal', 'left-wing',
'terrorists', 'conspiracy buffs',
'radicals', 'militia', 'racists',
'religious fanatics', 'sexual deviates', and so forth. This makes
others shrink from support out of fear of
gaining the same label, and you avoid
dealing with issues.
6. Hit and Run.
In any public forum, make a brief
attack of your opponent or the opponent
position and then scamper off before an answer
can be fielded, or simply ignore any answer. This works extremely
well in Internet and
letters-to-the-editor environments where a steady
stream of new identities can be called upon without having to
explain critical reasoning -- simply make
an accusation or other attack, never
discussing issues, and never answering any subsequent response, for
that would dignify the opponent's viewpoint.
7. Question motives.
Twist or amplify any fact which
could be taken to imply that the opponent
operates out of a hidden personal agenda or
other bias. This avoids discussing issues and forces the accuser on
the defensive.
8. Invoke authority.
Claim for yourself or associate
yourself with authority and present your
argument with enough 'jargon' and 'minutia'
to illustrate you are 'one who knows', and simply say it isn't so
without discussing issues or demonstrating
concretely why or citing sources.
9. Play Dumb.
No matter what evidence or
logical argument is offered, avoid
discussing issues except with denials they have any
credibility, make any sense, provide any proof, contain or
make a point, have logic, or support a
conclusion. Mix well for maximum effect.
10. Associate opponent charges with old news.
A derivative of the
straw man -- usually, in any large-scale matter of
high visibility, someone will make
charges early on which can be or were already easily
dealt with - a kind of investment for the future should the
matter not be so easily contained.) Where
it can be foreseen, have your own side
raise a straw man issue and have it dealt with early on as part of the
initial contingency plans. Subsequent
charges, regardless of validity or new
ground uncovered, can usually then be associated with the
original charge and dismissed as simply being a rehash
without need to address current issues --
so much the better where the opponent is or
was involved with the original source.
11. Establish and rely upon fall-back positions.
Using a minor
matter or element of the facts, take the 'high road' and
'confess' with candor that some innocent
mistake, in hindsight, was made -- but that
opponents have seized on the opportunity to blow it all out of
proportion and imply greater criminalities
which, 'just aren't so.' Others can
reinforce this on your behalf, later, and even publicly
'call for an end to the nonsense' because you have
already 'done the right thing.' Done
properly, this can garner sympathy and respect for
'coming clean' and 'owning up' to your mistakes without
addressing more serious issues.
12. Enigmas have no solution.
Drawing upon the overall umbrella
of events surrounding the crime and the
multitude of players and events, paint
the entire affair as too complex to solve. This causes those
otherwise following the matter to begin to lose
interest more quickly without having to
address the actual issues.
13. Alice in Wonderland Logic.
Avoid discussion of the issues by
reasoning backwards or with an apparent
deductive logic which forbears any actual
material fact.
14. Demand complete solutions.
Avoid the issues by requiring
opponents to solve the crime at hand
completely, a ploy which works best with
issues qualifying for rule 10.
15. Fit the facts to alternate conclusions.
This requires creative
thinking unless the crime was planned with
contingency conclusions in place.
16. Vanish evidence and witnesses.
If it does not exist, it is not fact, and you won't have to address the issue.
17. Change the subject.
Usually in connection with one of
the other ploys listed here, find a way
to side-track the discussion with
abrasive or controversial comments in hopes of turning attention to a
new, more manageable topic. This works
especially well with companions who can
'argue' with you over the new topic and polarize the discussion
arena in order to avoid discussing more key
issues.
18. Emotionalize, Antagonize, and Goad Opponents.
If you can't do
anything else, chide and taunt your opponents and draw
them into emotional responses which will
tend to make them look foolish and overly
motivated, and generally render their material somewhat less
coherent. Not only will you avoid discussing the
issues in the first instance, but even if
their emotional response addresses the issue, you
can further avoid the issues by then focusing on how
'sensitive they are to criticism.'
19. Ignore facts presented, demand impossible proofs.
This is
perhaps a variant of the 'play dumb' rule. Regardless of what
material may be presented by an opponent
in public forums, claim the material
irrelevant and demand proof that is impossible for the opponent to come
by (it may exist, but not be at his
disposal, or it may be something which is
known to be safely destroyed or withheld, such as a murder
weapon.) In order to completely avoid discussing
issues, it may be required that you to
categorically deny and be critical of media or
books as valid sources, deny that witnesses are acceptable, or
even deny that statements made by
government or other authorities have any
meaning or relevance.
20. False evidence.
Whenever possible, introduce new
facts or clues designed and manufactured
to conflict with opponent presentations -- as
useful tools to neutralize sensitive issues or impede resolution.
This works best when the crime was
designed with contingencies for the
purpose, and the facts cannot be easily separated from the fabrications.
21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body.
Subvert the (process) to your
benefit and effectively neutralize all
sensitive issues without open discussion.
Once convened, the evidence and testimony are required to be secret
when properly handled. For instance, if you
own the prosecuting attorney, it can
insure a Grand Jury hears no useful evidence and that
the evidence is sealed an unavailable to subsequent
investigators. Once a favorable verdict
is achieved, the matter can be considered
officially closed. Usually, this technique is applied to find the
guilty innocent, but it can also be used to
obtain charges when seeking to frame a
victim.
22. Manufacture a new truth.
Create your own expert(s),
group(s), author(s), leader(s) or
influence existing ones willing to forge new
ground via scientific, investigative, or social research or
testimony which concludes favorably. In
this way, if you must actually address
issues, you can do so authoritatively.
23. Create bigger distractions.
If the above does not seem to be
working to distract from sensitive
issues, or to prevent unwanted media
coverage of unstoppable events such as trials, create bigger news
stories (or treat them as such) to distract the
multitudes.
24. Silence critics.
If the above methods do not
prevail, consider removing opponents from
circulation by some definitive solution so that
the need to address issues is removed entirely. This can be by
their death, arrest and detention,
blackmail or destruction of their
character by release of blackmail information, or merely by destroying
them financially, emotionally, or severely
damaging their health.
25. Vanish.
If you are a key holder of
secrets or otherwise overly illuminated
and you think the heat is getting too hot, to avoid the
issues, vacate the kitchen.
Eight Traits of the Disinformationalist
1) Avoidance
They never actually discuss
issues head-on or provide constructive
input, generally avoiding citation of references or
credentials. Rather, they merely imply this, that, and the
other. Virtually everything about their
presentation implies their authority and
expert knowledge in the matter without any further justification
for credibility.
2) Selectivity
They tend to pick and choose
opponents carefully, either applying the
hit-and-run approach against mere commentators
supportive of opponents, or focusing heavier attacks on key
opponents who are known to directly
address issues. Should a commentator become
argumentative with any success, the focus will shift to include the
commentator as well.
3) Coincidental
They tend to surface suddenly and
somewhat coincidentally with a new
controversial topic with no clear prior
record of participation in general discussions in the particular public
arena involved. They likewise tend to
vanish once the topic is no longer of
general concern. They were likely directed or elected to be
there for a reason, and vanish with the reason.
4) Teamwork
They tend to operate in
self-congratulatory and complementary
packs or teams. Of course, this can happen naturally in
any public forum, but there will likely be an ongoing
pattern of frequent exchanges of this
sort where professionals are involved.
Sometimes one of the players will infiltrate the opponent camp to
become a source for straw man or other tactics
designed to dilute opponent presentation
strength.
5) Anti-conspiratorial
They almost always have disdain
for 'conspiracy theorists' and, usually,
for those who in any way believe JFK was
not killed by LHO. Ask yourself why, if they hold such disdain
for conspiracy theorists, do they focus on
defending a single topic discussed in a
News Group (NG) focusing on conspiracies? One might think they would
either be trying to make fools of everyone
on every topic, or simply ignore the
group they hold in such disdain. Or, one might more rightly
conclude they have an ulterior motive for their
actions in going out of their way to
focus as they do.
6) Artificial Emotions
An odd kind of 'artificial'
emotionalism and an unusually thick skin
-- an ability to persevere and persist even in
the face of overwhelming criticism and unacceptance. This likely
stems from intelligence community
training that, no matter how condemning the
evidence, deny everything, and never become emotionally involved or
reactive. The net result for a disinfo
artist is that emotions can seem
artificial. Most people, if responding in anger, for instance, will
express their animosity throughout their
rebuttal.
But disinfo types
usually have trouble maintaining the 'image' and are hot
and cold with respect to pretended
emotions and their usually more calm or
unemotional communications style. It's just a job, and they often seem
unable to 'act their role in character' as
well in a communications medium as they
might be able in a real face-to-face
conversation/confrontation.
You might have outright rage and
indignation one moment, ho-hum the next,
and more anger later -- an emotional
yo-yo. With respect to being thick-skinned, no amount of
criticism will deter them from doing their job, and they
will generally continue their old
disinfo patterns without any adjustments to
criticisms of how obvious it is that they play that game -- where a
more rational individual who truly cares
what others think might seek to improve
their communications style, substance, and so forth, or
simply give up.
7) Inconsistent
There is also a tendency to make
mistakes which betray their true
self/motives. This may stem from not really knowing
their topic, or it may be somewhat 'freudian', so to speak,
in that perhaps they really root for the
side of truth deep within.
I have
noted that often, they will simply cite contradictory information
which neutralizes itself and the author.
For instance, one such player claimed to
be a Navy pilot, but blamed his poor communicating skills
(spelling, grammar, incoherent style) on having only a
grade-school education. I'm not aware of
too many Navy pilots who don't have a
college degree. Another claimed no knowledge of a particular
topic/situation but later claimed first-hand
knowledge of it.
8) Time Constant
There are three ways this can
be seen to work, especially when the
government or other empowered player is
involved in a cover up operation:
- ANY NG posting by a
targeted proponent for truth can result in an
IMMEDIATE response. The government and
other empowered players can afford to pay people to sit
there and watch for an opportunity to do some damage.
SINCE DISINFO IN A NG ONLY WORKS IF THE
READER SEES IT - FAST RESPONSE IS CALLED FOR, or
the visitor may be swayed towards truth.
- When dealing in more direct
ways with a disinformationalist, such
as email, DELAY IS CALLED FOR - there
will usually be a minimum of a 48-72 hour delay. This allows a
sit-down team discussion on response strategy
for best effect, and even enough
time to 'get permission' or instruction from a formal chain of
command.
- In the NG example 1) above, it
will often ALSO be seen that bigger
guns are drawn and fired after the same 48-72 hours delay - the
team approach in play. This is especially true
when the targeted truth seeker or their
comments are considered more important with respect to
potential to reveal truth. Thus, a serious truth sayer
will be attacked twice for the same
sin.
Remarkably, even media and law
enforcement have NOT BEEN TRAINED to deal
with these issues. For the most part, only the players
themselves understand the rules of the game.
Marco Torres
is a research specialist, writer and consumer advocate
for healthy lifestyles. He holds degrees in Public Health and
Environmental Science and is a professional speaker on topics
such as disease prevention, environmental toxins and
health policy.