January 30, 2011 by Jack Blood
Toxicology “didn’t play a role” in his death, officials said.
By CRIS BARRISH and ESTEBAN PARRA • The News Journal • January 28, 2011
Homicide victim John P. Wheeler III, a former Pentagon official and presidential aide whose body was discovered Dec. 31 in a Wilmington landfill, was beaten to death in an assault, the Delaware medical examiner’s office announced today.
The official cause of Wheeler’s slaying was “blunt force trauma,’’ agency spokesman Karl Kanefsky said about a case that has drawn worldwide media coverage.
Police reiterated today that the case remains under investigation but acknowledge they cannot fill in critical gaps in the murder mystery.
Within hours of the grisly New Year’s Eve discovery, state pathologists had ruled that the 66-year-old New Castle resident was a homicide victim, but until today authorities had been mum on the cause of his death — an unusual posture in Delaware, where such information is usually released promptly.
The four-week delay has helped fuel rampant speculation that Wheeler, a defense consultant and expert on chemical and biological weapons, was poisoned by enemies – a theory that persisted in part because he was seen stumbling around Wilmington in the days before he died and officials said they were awaiting the results of toxicology tests.
Hal G. Brown, deputy director of the medical examiner’s office, said he did not know what medications or chemicals, if any, were in Wheeler’s system, but said the death certificate makes it clear that toxicology “didn’t play a role’’ in Wheeler’s death.
Brown said blunt force trauma describes the result of being struck with an object or a body part such as a fist. Brown added that Deputy Chief Medical Examiner Adrienne Sekula-Perlman, who handled Wheeler’s autopsy, met with police and prosecutors today about her conclusions.
Newark police are the lead agency on a multi-force investigation because the garbage truck that dumped Wheeler’s body at Wilmington’s Cherry Island Landfill was emptying debris it had collected at trash bins in Newark. The FBI is also assisting the probe.
Newark police spokesman Lt. Mark Farrall was mum Friday on the official word that Wheeler was killed in an assault. “I can’t comment on his injuries,’’ Farrall said.
Farrall said detectives still do not know how Wheeler got to Newark or how he got into the dumpster.
“We’re still attempting to determine how he made his way to Newark and who is responsible for his murder,” Farrall said. “How he got the injuries, I just don’t know.”
Jason Miller, spokesman for Attorney General Beau Biden, said their office could not comment on the “ongoing investigation.’’
Wheeler, a graduate of the U.S. Military Academy, led fundraising efforts in the 1980s to construct the Vietnam memorial and served as an adviser to the last three Republican presidents — Ronald Reagan, George H.W. Bush and George W. Bush.
Most recently he worked part-time for the MITRE Corp., which provides systems engineering and information technology services to the government about issues such as aviation defense and intelligence.
Wheeler is believed to have been on a train from Washington, D.C., to Wilmington on Dec. 28, Newark police said.
A cabbie interviewed by The News Journal, however, said he picked Wheeler up at the train station on Dec. 29.
Video and witness accounts of Wheeler’s behavior in the 48 hours before his body was found show him disoriented, carrying one of his dress shoes, and looking in vain for his car in a Wilmington parking garage blocks from where his vehicle was located.
On Dec. 30, Wheeler was captured on surveillance video at the Nemours building at 10th and Orange streets in downtown Wilmington, where he asked for train fare at the Connolly Bove Lodge & Hutz law firm.
The last image of him that day was leaving the Nemours building and walking southeast on 11th Street, past and through the Hotel du Pont valet parking area. He continued southeast and crossed Market Street and was last seen in camera view at 8:42 p.m. walking toward the East Side, a low-income neighborhood known as a hot spot for crime.
Complete establishment coverage of the Wheeler case
John Wheeler (U.S. Air Force)
Dec. 13: John P. Wheeler III parks his vehicle at a garage on Martin Luther King Boulevard near the Wilmington train station.
A neighbor reports that for four days over Christmas, the television in Wheeler’s Third Street home in Old New Castle was blaring around the clock.
Dec. 26: Wheeler posts a photo of Manhattan snowstorm that he took from his condo on an electronic forum for 1966 graduates of West Point.
Dec. 28: Wheeler is believed to be on an Amtrak train from Washington to Wilmington.
5 p.m. — Wheeler’s last response to an ongoing e-mail conversation concerning West Point and college football.
11:30 p.m. — Firefighters discover a smoke bomb in a house under construction across the street from Wheeler’s. He and that home’s owners had been involved in a legal dispute. Officials have not linked Wheeler’s death to the smoke bomb incident.
State fire officials report finding several low-powered devices — commonly used to smoke out small animals. There are no suspects but investigators had hoped to speak to Wheeler.
8:48 a.m. — Cabbie Roland Spence picks up Wheeler outside the Wilmington train station and drops him off at the corner of 11th and Orange streets.
6 p.m. — Wheeler enters the Happy Harry’s on Del. 9 near New Castle and asks the pharmacist for a ride to Wilmington. Unable to give Wheeler a ride, the pharmacist offers to call a cab. Wheeler declines and leaves.
6:40 p.m. — Wheeler enters the parking lot adjacent to the county courthouse in Wilmington holding his right shoe in his left hand and telling a Colonial Parking attendant his briefcase has been stolen. He is seen on surveillance video shuffling back and forth, apparently confused and disoriented, before he leaves about 25 minutes later.
3:30 p.m. — Wheeler is spotted in the area of 10th and Orange streets in Wilmington.
Wheeler visited the 10th-floor offices of the Connolly Bove Lodge & Hutz law firm in the Nemours building and asked to speak to a managing partner. He also asked for train fare before leaving.
8:30 p.m. — Surveillance video captures Wheeler wandering through the Nemours Building at 10th and Orange streets. Several people approach him because he appears disoriented or confused. Wheeler declines their help. He is dressed differently from the day before.
8:42 p.m. — Wheeler is picked up on surveillance video leaving the Nemours Building through doors on the 11th Street side. He then continues southeast on 11th Street, walking through the Hotel du Pont valet parking area, crossing over Market Street, and is last seen walking on the west sidewalk of 11th Street, toward the city’s East Side.
4:20 a.m. — A Waste Management refuse truck starts its route through Newark, emptying trash bins, including one containing Wheeler’s body.
10 a.m. — Wilmington police are called to investigate a body found at Cherry Island Landfill.
Medical Examiner’s Office rules the death a homicide.
2 p.m. — Newark police are contacted after it is determined the body came from there.
Newark police identify the 66-year-old Wheeler as the victim.
Newark police crime-scene team spends the day at Wheeler’s home.
Jan. 4: Wilmington detectives ask Sunday Breakfast Mission workers if Wheeler has stayed in their shelter. He has not.
Jan. 5: Newark investigators are spotted near several bins near Newark Shopping Center. Police also ask at least one business there for security video of parking lot.
A City Cab driver is questioned by police as to why Wheeler’s cell phone contains his phone number. Other cabdrivers have been questioned through the week.
Jan. 28: The state Medical Examiner’s Office said Wheeler’s death was a result of blunt force trauma after being assaulted.
Tip helped head off potentially devastating series of plane explosions
WASHINGTON — A Saudi tip about a possible al-Qaida effort to bring down airplanes was relayed to U.S. authorities in early October, nearly three weeks before the group’s Yemen affiliate tried to ship mail bombs to the U.S. in cargo planes, U.S. intelligence officials said Friday.
The Saudi intelligence tip helped to head off what could have been a devastating series of plane explosions. Western officials credit the Saudis with playing a crucial role in finding two mail bombs recovered last week in Dubai and Britain before they reached the U.S.
On Friday, the Yemen-based al-Qaida in the Arabian Peninsula claimed responsibility for sending the two bombs and threatened more attacks on civilian and cargo planes. The group also said it had a role in the crash of a UPS cargo plane in Dubai in September, but investigators so far have insisted an accident was at fault.
Saudis warned U.S. 3 weeks before attack Updated 75 minutes ago 11/6/2010 4:58:12 AM +00:00 A Saudi tip about a possible al-Qaida effort to bring down airplanes was relayed to U.S. authorities nearly three weeks before a Yemen group tried to ship mail bombs, officials say. Full story
- Al-Qaida claims responsibility for cargo bombs
- Cuban airline pilot died as hero to villagers
- Bomb targets mosque of anti-Taliban elders
- Indonesia volcano burns whole villages
The Saudi tip in October contained no mention of cargo planes, or any details of the plot carried out last week, said U.S. officials, speaking on condition of anonymity to discuss classified matters. But they said it gave the U.S. and other Western officials enough of a warning to know what to look for when another Saudi tip arrived last week.
A CIA spokesman Friday night cited several allies that have provided key intelligence about terrorist activities.
“Over the past several months, we received intelligence — which was shared across our government — from our foreign partners about threats from AQAP and other terrorist groups,” said CIA spokesman George Little. “The United States receives this kind of information from other governments on a regular basis, as you would expect. Last week, we received specific intelligence that allowed the United States and our allies to disrupt the cargo plot. Our actions were swift and aggressive.”
Another U.S. official said the Yemeni terror group’s interest in plane attacks has been apparent since its failed Christmas Day attempt last year to bring down a Detroit-bound plane with explosives hidden in the underwear of a suicide bomber. Both the Christmas Day attack and the mail bombs sent last week used a powerful industrial explosive PETN, and the AQAP’s top bomb maker is considered a top suspect in both attempts.
But although the tip relayed in October did raise alarms about a plane attack, it did not mention cargo planes or where the plot might originate or even who the attackers might be, the official said.
U.S. intelligence had been monitoring steady intelligence on a possible attack such as this since early September, one U.S. official has said. And in late September, authorities also intercepted a group of packages shipped to Chicago which in retrospect is now seen as a likely test run by the terror group to gauge the logistics of shipping bombs by air to the U.S.
The report on the Saudi tip in October was first reported Friday by The New York Times and the German news magazine Der Spiegel.
On Friday, AQAP said it would continue to strike American and Western interests and specifically said it would target civilian and cargo aircraft.
“We have struck three blows at your airplanes in a single year,” the group said in a message posted on a militant website. “And God willing, we will continue to strike our blows against American interests and the interests of America’s allies.”
The authenticity of Friday’s claim could not be immediately verified. A U.S. intelligence official said authorities are not surprised to see this claim now.
Authorities in the U.S. and the UAE have said the Sept. 3 crash of the UPS plane in Dubai shortly after takeoff was caused by an onboard fire, but investigators are taking another loStart Slide Show with PicLens Lite
Published on 10-21-2010
Source: New York Times
WASHINGTON — The Obama administration has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that restrict military action on American soil.
The system would mirror that used when the military is called on in natural disasters like hurricanes or wildfires. A presidential order dispatches the military forces, working under the control of the Federal Emergency Management Agency.
Under the new rules, the president would approve the use of the military’s expertise in computer-network warfare, and the Department of Homeland Security would direct the work.
Officials involved in drafting the rules said the goal was to ensure a rapid response to a cyberthreat while balancing concerns that civil liberties might be at risk should the military take over such domestic operations.
10.10.10 Illusionati Ships from the Doc to Begin to See Beyond the Veil and Expose the World Wide Mind Control System
Check out the Official Illusionati Website Click the Banner BelowStart Slide Show with PicLens Lite
Most people in the independent research communities are well aware of P.N.A.C, the neo-con think tank Project for a New American Century. Headed once by Dick Cheney and fueled by Fox News, no “disbanded” think tank was able to predict the future like P.N.A.C. In September of 2000 they released a manifesto for “Transformation of America”, and after the cold ended with the biggest arms race in human history, they thought it was the perfect time to radically “Transform” the military and start a new arms race. Technology.
Most people who are familiar with this subject all remember the same thing, the founding principle:
The history of the 20th century should have taught us that it is important to shape circumstances before crises emerge, and to meet threats before they become dire. The history of the past century should have taught us to embrace the cause of American leadership.”
– From the Project’s founding Statement of Principles Project for a New American Century
On page 51 of the document states the true of “Transformation” and how it need to be thrust upon the country in its darkest hour:
Further, the process of transformation, even if it brings revolutionary change, is likely to be a long one, absent some catastrophic and catalyzing event – like a new Pearl Harbor. Domestic politics and industrial policy will shape the pace and content of transformation as much as the requirements of “current missions”.
One year to the month P.N.A.C got their “Christmas Wish List” on the night of 9.11.10. Maybe we should look and see what they didn’t get but intend to, as it is the most “top secret” mission. On the same page as the “new Pearl Harbor”, page 51, it reads:
• Control of space and cyberspace. Much as control of the high seas – and the protection of international commerce – defined global powers in the past, so will control of the new “international commons” be a key to world power in the future. An America incapable of protecting its interests or that of its allies in space or the “infosphere” will find it difficult to exert global political
• Pursuing a two-stage strategy for of transforming conventional forces. In exploiting the “revolution in military affairs,” the Pentagon must be driven by the enduring missions for U.S. forces. This process will have two stages: transition, featuring a mix of current and new systems; and true transformation, featuring new systems, organizations and operational concepts. This process must take a competitive approach, with services and joint-service operations competing for new roles and missions. Any successful process of transformation must be linked to the services, which are the institutions within the Defense Department with the ability and the responsibility for linking budgets and resources to specific missions.
The “revolution in military affairs” was 9.11.01, all the people who shut up were rewarded…. while the real hero’s like Lt. Col. Anthony Shaffer were humiliated and nearly had their lives destroyed by hurting his family with “disgrace”. Thankfully for the Shaffer family, the D.O.D.’s “disgrace” is God’s “Grace” and they were restored as the American Hero’s, this time the entire family.
The problem we are facing now is the Left/Right paradigm, and the illusion of control. There is a vital reason many people don’t read the entire “Rebuilding America’s Defenses” document, its long and boring, like Government… which by is supposed to be a “capitol” letter like the G in “God” or in “god we trust”, a “trust” is money… why do you think Jesus turned over the “money changer’s” table? Money is the root of all evil, that why it is green the color of “envy” of what? Nature… something “globalists” are now trying to control. Computers are starting to fail in this control. There is one thing that P.N.A.C. was clear about it was their own “fear”. The Enter Net or The Enter Web… to “them” it was getting out of control.
The most important section of the manifesto are entitled “Cyberpace, or ‘Net-War’”, where they decide to classify ‘outer space” and ‘cyber space’ as to be governed by the same laws and tactics of control.
If outer space represents an emerging
medium of warfare, then “cyberspace,” and
in particular the Internet hold similar
promise and threat. And as with space,
access to and use of cyberspace and the
Internet are emerging elements in global
commerce, politics and power. Any nation
wishing to assert itself globally must take
account of this other new “global
The Global Commons is now under attack from binary code. All of this is happening as the SPACECOM is testing the take over viruses to see if they can survive it. What was P.N.A.C. so afraid of? The Enter Net.
‘U.S. armed forces to remain
preeminent and avoid an Achilles Heel in
the exercise of its power’
The Internet is also playing an increasingly important role in warfare and human political conflict. From the early use of the Internet by Zapatista insurgents in Mexico to the war in Kosovo, communication by computer has added a new dimension to warfare. Moreover, the use of the Internet to spread computer viruses reveals how easy it can be to disrupt the normal functioning of commercial and even military computer networks. Any nation which cannot assure the free and secure access of its citizens to these systems will sacrifice an element of its sovereignty and its power. Although many concepts of “cyber-war” have elements of science fiction about them, and the role of the Defense Department in establishing “control,” or even what “security” on the Internet means, requires a consideration of a host of legal, moral and political issues, there nonetheless will remain an imperative to be able to deny America and its allies’ enemies the ability to disrupt or paralyze either the military’s or the commercial sector’s computer networks. Conversely, an offensive capability could offer America’s military and political leaders an invaluable tool in disabling an adversary in a decisive manner.
Taken together, the prospects for space
war or “cyberspace war” represent the truly
revolutionary potential inherent in the notion
of military transformation. Page 57 Rebuilding America’s Defenses September 2000
Now we are beginning to see why the binary code makers are banding together to resist the machine, because they know how many numbers there are 10. The 10 Commands. The numbers are a warning system. Now the computer viruses are the being launched not by some 13 year old kid in China… but by “intel” agents around the world. Israeli Mossad taking the blame for the “Stuxnet” virus… Stuck Net…. come on who come up with this stuff?
More importantly for the U.S. the “Cyber-Storm” drill is completed on 10.01.10. Cheat codes for the internet?Start Slide Show with PicLens Lite
2010 Cyber Storm III global cybersecurity exercise concludes on 10.01.10: All of at this coinsides with Mossad release of ‘Stuxnet Virus’
In places like Arlington, Va.; Washington, D.C.; across the U.S. and around the world, a global cybersecurity exercise is underway designed to test the limits not only of the “network of networks,” but the ingenuity of the people charged with protecting it.
Welcome to Cyber Storm III.
This is the third time that the Department of Homeland Security, in conjunction with other federal agencies, is holding this global cybersecurity exercise. Previous Cyber Storm exercises were conducted in 2006, and again in 2008. For the first time, DHS will manage its response to Cyber Storm III from its new National Cybersecurity and Communications and Integration Center.
Normally, this facility, located in a nondescript office building in Arlington is classified and closed to the public. But the NCCIC recently opened its doors for an inside look to let DHS officials brief the media on Cyber Storm III, a worldwide cybersecurity response exercise that has been underway since late Monday.
Brett Lambo, the director of the Cybersecurity Exercise Program with DHS’s National Cybersecurity Division, is the architect, or game master for this global cybersecurity exercise.
“The overarching philosophy,” he told reporters in a recent briefing at the NCCIC, “is that we want to come up with something that’s a core scenario, something that’s foundational to the operation of the Internet.”
Cyber Storm III includes many players in places across the U.S. and around the world:
* Seven federal departments: Homeland Security, Defense, Commerce, Energy, Justice, Treasury and Transportation.
* Eleven states: California, Delaware, Illinois, Iowa, Michigan, Minnesota, North Carolina, New York, Pennsylvania, Texas, Washington, plus the Multi-State Information Sharing and Analysis Center (ISAC). This compares with nine states that participated in Cyberstorm II.
* Twelve international partners: Australia, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden, Switzerland, and the United Kingdom (up from four countries that participated in Cyber Storm II).
DHS officials also say 60 private sector companies will participate in Cyber Storm III, up from 40 who participated in Cyber Storm II. Firms include banking and finance, chemical, communications, defense industrial, information technology, nuclear, transportation and water.
Lambo said to preserve the exercise’s value as a vigorous test of cybersecurity preparedness, exact details of the scenario which participants will deal with over the next three days are secret. However, he did share some of the broad parameters of the scenario he helped write, and which he will administer.
“In other exercises, you do have specific attack vectors; you have a denial of service attack, you have a website defacement, or you have somebody dropping a rootkit,” he said. “But we wanted to take that up a level to say, ‘All of those things can still happen, and based on what you do, if you’re concerned about the availability of infrastructure, we can look at what happens when the infrastructure is unavailable.’”
Lambo said another way to look at the scenario is that it builds upon what they learned from previous exercises.
“In Cyber Storm I, we attacked the Internet, in Cyber Storm II, we used the Internet as the weapon, in Cyber Storm III, we’re using the Internet to attack itself,” he said.
Lambo added under normal circumstances, the Internet operates based on trust that a file, or a graphic, or a computer script is what it says it is, and comes from a trusted source. But what if that source was not what it said it was, or the source has a malicious intent?
“What we’re trying to do is compromise that chain of trust,” he said, in further explaining in broad strokes of the Cyber Storm III exercise scenario.
Lambo and his colleagues at the Cyber Storm control center also will introduce new, and hopefully unexpected conditions to the scenario to further test participants.
“We have the ability to do what we call dynamic play,” he said. “If we get a player action coming back into the exercise that is either different from what we expected it to be, if it’s something we’d like to chase down further, or if it’s something we’d like to pursue, we have the ability to write injects on the fly.”
He said those injects could include new attacks.
The Cyber Storm exercise will be conducted primarily using secure messaging systems like e-mail or text messages to relay intersects to participants and that the simulated attacks are not being conducted over a live or a virtual network now in operation on the Internet, he said.
For the U.S. government, Cyber Storm III also offers the opportunity to test the DHS’ National Cyber Incident Response Plan.
“We want to focus on information sharing issues,:” he said. “We want to know how all of the different organizations are compiling, acting on, aggregating information that they’re sharing, especially when you’re thinking about classified lines coming into the unclassified domain. There’s a concept called tearlining, in which we take classified information, and get it below the tearline, so that those without security clearances and get it, and act on it.”
The Cyber Storm III exercise is expected to conclude by 10.01.10
Was Stuxnet Built to Attack Iran’s Nuclear Program?
By Robert McMillan, IDG News
A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran’s Bushehr nuclear reactor.
People who read this also read:
That’s the emerging consensus of security experts who have examined the Stuxnet worm. In recent weeks, they’ve broken the cryptographic code behind the software and taken a look at how the worm operates in test environments. Researchers studying the worm all agree that Stuxnet was built by a very sophisticated and capable attacker — possibly a nation state — and it was designed to destroy something big.
Though it was first developed more than a year ago, Stuxnet was discovered in July 2010, when a Belarus-based security company discovered the worm on computers belonging to an Iranian client. Since then it has been the subject of ongoing study by security researchers who say they’ve never seen anything like it before. Now, after months of private speculation, some of the researchers who know Stuxnet best say that it may have been built to sabotage Iran’s nukes.
Last week Ralph Langner, a well-respected expert on industrial systems security, published an analysis of the worm, which targets Siemens software systems, and suggested that it may have been used to sabotage Iran’s Bushehr nuclear reactor. A Siemens expert, Langner simulated a Siemens industrial network and then analyzed the worm’s attack.
Experts had first thought that Stuxnet was written to steal industrial secrets — factory formulas that could be used to build counterfeit products. But Langner found something quite different. The worm actually looks for very specific Siemens settings — a kind of fingerprint that tells it that it has been installed on a very specific Programmable Logic Controller (PLC) device — and then it injects its own code into that system.
Because of the complexity of the attack, the target “must be of extremely high value to the attacker,” Langner wrote in his analysis.
Langner is set to present his findings at a closed-door security conference in Maryland this week, which will also feature a technical discussion from Siemens engineers. Langner said he wasn’t yet ready to speak to a reporter at length (“the fact of the matter is this stuff is so bizarre that I have to make up my mind how to explain this to the public,” he said via e-mail) but others who have examined his data say that it shows that whoever wrote Stuxnet clearly had a specific target in mind. “It’s looking for specific things in specific places in these PLC devices. And that would really mean that it’s designed to look for a specific plant,” said Dale Peterson, CEO of Digital Bond.
This specific target may well have been Iran’s Bushehr reactor, now under construction, Langner said in a blog posting. Bushehr reportedly experienced delays last year, several months after Stuxnet is thought to have been created, and according to screen shots of the plant posted by UPI, it uses the Windows-based Siemens PLC software targeted by Stuxnet.
Peterson believes that Bushehr was possibly the target. “If I had to guess what it was, yes that’s a logical target,” he said. “But that’s just speculation.”
Langner thinks that it’s possible that Bushehr may have been infected through the Russian contractor that is now building the facility, JSC AtomStroyExport. Recently AtomStroyExport had its Web site hacked, and some of its Web pages are still blocked by security vendors because they are known to host malware. This is not an auspicious sign for a company contracted with handling nuclear secrets.
Tofino Security Chief Technology Officer Eric Byres is an industrial systems security expert who has tracked Stuxnet since it was discovered. Initially he thought it was designed for espionage, but after reading Langner’s analysis, he’s changed his mind. “I guessed wrong, I really did,” he said. “After looking at the code that Ralph hauled out of this thing, he’s right on.”
One of the things that Langner discovered is that when Stuxnet finally identifies its target, it makes changes to a piece of Siemens code called Organizational Block 35. This Siemens component monitors critical factory operations — things that need a response within 100 milliseconds. By messing with Operational Block 35, Stuxnet could easily cause a refinery’s centrifuge to malfunction, but it could be used to hit other targets too, Byres said. “The only thing I can say is that it is something designed to go bang,” he said.
Whoever created Stuxnet developed four previously unknown zero-day attacks and a peer-to-peer communications system, compromised digital certificates belonging to Realtek Semiconductor and JMicron Technology, and displayed extensive knowledge of industrial systems. This is not something that your run-of-the-mill hacker can pull off. Many security researchers think that it would take the resources of a nation state to accomplish.
Bushehr is a plausible target, but there could easily be other facilities — refineries, chemical plants or factories that could also make valuable targets, said Scott Borg, CEO of the U.S. Cyber Consequences Unit, a security advisory group. “It’s not obvious that it has to be the nuclear program,” he said. “Iran has other control systems that could be targeted.”
Iranian government representatives did not return messages seeking comment for this story, but sources within the country say that Iran has been hit hard by the worm. When it was first discovered, 60 percent of the infected Stuxnet computers were located in Iran, according to Symantec.
Now that the Stuxnet attack is public, the industrial control systems industry has come of age in an uncomfortable way. And clearly it will have more things to worry about
“The problem is not Stuxnet. Stuxnet is history,” said Langner in an e-mail message. “The problem is the next generation of malware that will follow.”
If you go to this link and listen to it 3 times in a row…. you tell me why the church banned this ghost band?
Please leave your comments on the original page… and wait to see what happens….guess what the church was scared off???
lets see who posts the right answer before October 31 2010
Banned by the Catholic Church
Categories: Sound Oddities
Sound Clip: Shepard Tone by Roger Shepard
This is a classic sound oddity and illusion. Or is it? There are some corrections to this post with much discussion, see below and follow the trail of comments to clarify the inaccuracies.
“It is rumored to be called the “devil’s tone” by the Catholic church. The Shepard tone is a sound consisting of a superposition of sine waves separated by octaves. When played with the base pitch of the tone moving upwards or downwards, it is referred to as the
Shepard Scale. This creates an auditory illusion that continually ascends or descends in pitch, yet which ultimately seems to get no higher or lower.”
Corrections here and below in comments from Brent Williams:
“Baned by the Catholic Church“, about a Shepard-Risset Glissando. This post contained links to certain webpages, but when the post went up (even before it was moderated) the links were missing. Just in case you want to put them up for your readers, here they are:
The original source page for this sound file is here . It is in French.
You can find the Wiki source page here . This contains a little more info on the sound. This is where I confirmed that the sound is a minor chord of synchronised Shepard-Risset glissandi.
Read about Diana Deutsch here . She is currently a Professor at UCSD.
All the best, and please continue with your excellent website.
Categories: Sound Oddities -
TORONTO – Two Torontonians are launching a $115-million class-action lawsuit against police on behalf of everyone detained during the G20 protests in July.
Miranda McQuade and Mike Barber, who were both arrested during the Summit, are suing on behalf of 1,150 people who were detained.
The statement of claim filed Thursday names the Toronto Police Services Board, the Attorney-General of Canada and the Regional Municipality of Peel Police Services Board as co-defendants.
QMI Agency’s requests for comment from the co-defendants were not immediately returned.
“The wholesale violation of civil liberties which occurred during the G20 must be addressed by the courts to preserve our democracy,” said lawyer David Midanik in a statement. “These violations will escalate unless and until people are willing to stand up for their rights in a court of law.”
The International Center for 9/11 Studies has secured the release of hundreds of hours of video footage and tens of thousands of photographs used by the National Institute of Standards and Technology (NIST) for its investigation of the collapse of the World Trade Center Twin Towers and Building 7. This material is being released to the Center under the Freedom of Information Act, in response to a lawsuit the Center filed against NIST.
The Center filed a FOIA Request with NIST on January 26, 2009, seeking production of “all of the photographs and videos collected, reviewed, cited or in any other way used by NIST during its investigation of the World Trade Center building collapses.” Following several unsuccessful attempts to get NIST to even acknowledge receipt of the Request, the Center was forced to file a lawsuit on May 28, 2009. Shortly after the lawsuit was filed, the Request was assigned a reference number, and NIST began periodically releasing batches of responsive records. To date, the Center has received over 300 DVDs and several external hard disk drives that contain responsive records – more than 3 terabytes of data so far – and NIST has indicated that additional records will be released in the future.
We are currently looking at the best ways to distribute these materials to interested researchers and journalists around the world. It has taken NIST more than 8 months so far to produce a partial archive of photographs and videos in their possession, but we hope to be more efficient in our efforts. Because of the huge volume of data, we are working on a wiki-style website to facilitate review and discussion of any interesting items that are discovered by researchers.
Justin Keogh, our Chief Technical Officer, is preparing the website and materials for release. The first batch of materials we are releasing is a group of video clips sent to us on an external hard disk drive labeled “NIST WTC Investigation Cumulus Video Clips.” We believe NIST entered these clips into a searchable database called the Cumulus database, and used them as the basis for the investigation and reports. Researchers may be interested to see which video clips NIST determined were important to its investigation, and compare these clips to the raw footage we release at a later date. Justin will be posting more details about the data release in the next week or two. Any questions about the FOIA Request, lawsuit, or data release should be submitted via the Contact Us page at the Center’s website: http://www.ic911studies.org/Contact_Us.html
Although the Center has extremely limited resources with which it can review this mountain of data, several interesting items have already been discovered. Below are five items the Center has uncovered so far. The items below have not been altered from the original provided by NIST, except in three cases where a short section of footage was extracted from a much longer video. Otherwise, no alterations have been made to the video or audio. For the best viewing experience, you should watch all of the videos below in the highest resolution available. We will supplement the list below in the coming days and weeks.
1. Video Footage of Explosion Before Collapse
In the video below, at about the 0:59 mark, a high-pressure explosion occurs in one of the Twin Towers, below the impact zone, while the building is still standing.
In the final report on the collapse of the Twin Towers issued by NIST, it appears to attempt an explanation for this explosion by suggesting it is a smoke puff resulting from a pressure pulse inside the building, perhaps from a collapsing wall or ceiling, or sudden opening of a door. (See NCSTAR1-5A, p. 52) However, as can be seen from the screen capture below, it isn’t merely smoke and dust being ejected. There appears to be a massive object being ejected along with the explosion.
2. Audio Evidence of Explosions During Collapse
Several videos released to the Center have clear audio tracks that contain distinct sounds of explosions occurring at the World Trade Center. These audio tracks provide support to the many eyewitness statements referring to explosions occurring when the buildings collapsed. Explosions can be heard at the initiation of the South Tower collapse in the following two videos. The explosions are clear enough at normal volumes, but turning your speaker volume up a bit can help provide a full appreciation of the sound.
The video below contains distinct sounds of explosions occurring throughout the collapse of the North Tower. The native audio track is at very low volume, so your speakers should be turned up enough to hear the explosions. (Please be careful to turn your volume back down after watching this video.)
In the next video, a loud, low-frequency boom can be heard just before the east penthouse of WTC 7 falls.
David Chandler will soon be publishing a video that contains a more in depth analysis of this footage, including audio enhancements of the explosion.
3. Visual Evidence of Explosions During Collapse
Several videos also have clear visible explosions that occur above the airplane impact/collapse zone in the South Tower. In the video below, the collapse begins at about the 3:45 mark. If you watch the corner of the South Tower nearest the camera, at a point about halfway between the airplane impact zone and the top of the building, you will see puffs of smoke and a flash at about the 3:49-3:50 mark. The corner of the building also appears to lose structural support (or “kink”) at this same location. These are the obvious result of explosive charges severing the steel structure at the near corner.
In the next video, a similar phenomenon can be seen, but from a different angle and not quite as clearly.
The video below is raw footage from a news outlet of the South Tower exploding. Explosions can be seen ahead of the collapse front. The newscaster even calls it a “huge explosion.”
4. Missing Video
Several clips from the Cumulus database show signs of editing. In the two video clips below, the collapse of the penthouse of World Trade Center 7 is cut out of the video. These videos happen to have been filmed from close to WTC 7, and have a high quality soundtrack that would have picked up explosion sounds from the charges that severed the columns supporting the penthouse, especially the explosion heard in the last video clip presented in item 2 above.
Another clip from the Cumulus database (below) begins after initiation of the WTC 7 collapse. The soundtrack is curiously silent during the entire collapse, only to turn on after the collapse has already finished.
In the next video, the camera catches the South Tower collapse from very close to the building. The initiation of the collapse is missing and appears to have been cut from the original.
The video clip below also begins after collapse initiation.
There are many video clips in the Cumulus database that do not show collapse initiation – the only event even purportedly explained in the final report from NIST on the Twin Towers.
5. Footage of WTC 7 Before Collapse
The video below is a series of clips taken near World Trade Center 7 after at least one of the Twin Towers has collapsed. This video shows Michael Hess yelling for help from the 8th floor window, beginning at about the 1:09 mark.
There was a time, not too long ago (relatively speaking), that governments and the groups of elites that controlled them did not find it necessary to conscript themselves into wars of disinformation. Propaganda was relatively straightforward. The lies were much simpler. The control of information flow was easily directed. In fact, during the early Middle-Ages in most European countries commoners were not even allowed to own a Bible, nor was the Bible allowed to be interpreted from Latin to another language, let alone any other tome that might breed “dangerous ideas”. This was due in large part to the established feudal system and its hierarchy of royals and clergy. Rules were enforced with the threat of property confiscation and execution for anyone who strayed from the rigid socio-political structure. Those who had theological, metaphysical, or scientific information outside of the conventional and scripted collective world view were tortured and slaughtered. The elites kept the information to themselves, and removed its remnants from mainstream recognition, sometimes for centuries before it was rediscovered.
With the advent of anti-feudalism, and most importantly the success of the American Revolution, elites were no longer able to dominate information with the edge of a blade or the barrel of a gun. The establishment of Democracies (and Democratic Republics), with their philosophy of open government and rule by the people, compelled Aristocratic minorities to plot more subtle ways of obstructing the truth and thus maintaining their hold over the world without exposing themselves to retribution from the masses. Thus, the complex art of disinformation was born. The technique, the “magic” of the lie, was refined and perfected. The mechanics of the human mind and the human soul became an endless obsession for the elites.
The goal was malicious, but socially radical; instead of expending the impossible energy needed to dictate the very form and existence of the truth, they would allow it to drift, obscured in a fog of contrived data. They would wrap the truth in a “Gordian Knot” of misdirections and fabrications so elaborate that they felt certain the majority of people would surrender, giving up long before they ever finished unraveling the deceit. The goal was not to destroy the truth, but to hide it in plain sight.
In modern times, and with carefully engineered methods, this goal has for the most part been accomplished. However, these methods also have inherent weaknesses. Lies are fragile. They require constant attentiveness to keep them alive. The exposure of a single truth can rip through an ocean of lies, evaporating it instantly. In this article, we will examine the methods used to fertilize and promote the growth of disinformation, as well as how to identify the roots of disinformation and effectively cut them, starving out the entire system of fallacies once and for all.
Media Disinformation Methods
The mainstream media, once tasked with the job of investigating government corruption and keeping elitists in line, has now become nothing more than a PR firm for corrupt officials and their Globalist handlers. The days of the legitimate “investigative reporter” are long gone, and journalism itself has deteriorated into a rancid pool of so called “TV Editorialists” who treat their own baseless opinions as supported fact.
The elitist co-opting of news has been going on in one form or another since the invention of the printing press, however, the first methods of media disinformation truly came to fruition under the supervision of newspaper magnate William Randolph Hearst, who believed the truth was “subjective” and open to his personal interpretation. Hearst’s legacy of lies and sensationalism lives on in the Hearst published magazine ‘Popular Mechanics’, who accuse the growing 9/11 Truth Movement of outrageous “conspiracy theory” while at the same time consistently publishing articles about UFO sightings and secret government flying saucer programs.
As we will show, this strange juxtaposition of mixed signals and hypocritical accusations is characteristic of all purveyors of disinformation.
Some of the main tactics used by the mainstream media to mislead the masses are as follows:
Lie Big, Retract Quietly
Mainstream media sources (especially newspapers) are notorious for reporting flagrantly dishonest and unsupported news stories on the front page, then quietly retracting those stories on the very back page when they are caught. In this case, the point is to railroad the lie into the collective consciousness. Once the lie is finally exposed, it is already too late, and a large portion of the population will not notice or care when the truth comes out. A good example of this would be the collusion of the MSM with the Bush administration to convince the American public after 9/11 that Iraq had WMDs, even though no concrete evidence existed to prove it. George W. Bush’s eventual admission that there had never been any WMDs in Iraq (except chemical weapons which the U.S. actually sold to Saddam under the Reagan / Bush administration) was lightly reported or glazed over by most mainstream news sources. The core reason behind a war that has now killed over a million people was proven to be completely fraudulent, yet I still run into people today who believe that Iraq had nukes…
Unconfirmed Or Controlled Sources As Fact
Cable news venues often cite information from “unnamed” sources, government sources that have an obvious bias or agenda, or “expert” sources without providing an alternative “expert” view. The information provided by these sources is usually backed by nothing more than blind faith. A recent example of this would be the Osama Bin Laden audio tapes which supposedly reveal that the Christmas “Underwear Bomber” was indeed Al-Qaeda:
The media treats the audio tape as undeniable fact in numerous stories, then at the same time prints a side story which shows that the White House cannot confirm that the tape is even real:
If the White House cannot confirm the authenticity of the tape, then why did the media report on its contents as if it had been confirmed?
Otherwise known as “cherry picking” data. One simple piece of information or root item of truth can derail an entire disinfo news story, so instead of trying to gloss over it, they simply pretend as if it doesn’t exist. When the fact is omitted, the lie can appear entirely rational. This tactic is also used extensively when disinformation agents and crooked journalists engage in open debate.
Distraction, and the Manufacture of Relevance
Sometimes the truth wells up into the public awareness regardless of what the media does to bury it. When this occurs their only recourse is to attempt to change the public’s focus and thereby distract them from the truth they were so close to grasping. The media accomplishes this by “over-reporting” on a subject that has nothing to do with the more important issues at hand. Ironically, the media can take an unimportant story, and by reporting on it ad nauseum, cause many Americans to assume that because the media won’t shut-up about it, it must be important! An example of this would be the recent push for an audit of the Federal Reserve which was gaining major public support, as well as political support. Instead of reporting on this incredible and unprecedented movement for transparency in the Fed, the MSM spent two months or more reporting non-stop on the death of Michael Jackson, a pop idol who had not released a decent record since “Thriller,” practically deifying the man who only months earlier was being lambasted by the same MSM for having “wandering hands” when children were about.
Dishonest Debate Tactics
Sometimes, men who actually are concerned with the average American’s pursuit of honesty and legitimate fact-driven information break through and appear on T.V. However, rarely are they allowed to share their views or insights without having to fight through a wall of carefully crafted deceit and propaganda. Because the media knows they will lose credibility if they do not allow guests with opposing viewpoints every once in a while, they set up and choreograph specialized T.V. debates in highly restrictive environments which put the guest on the defensive, and make it difficult for them to clearly convey their ideas or facts.
TV pundits are often trained in what are commonly called “Alinsky Tactics.” Saul Alinsky was a moral relativist, and champion of the lie as a tool for the “greater good;” essentially, a modern day Machiavelli. His “Rules for Radicals” were supposedly meant for grassroots activists who opposed the establishment, and emphasized the use of any means necessary to defeat one’s political opposition. But is it truly possible to defeat an establishment built on lies, by use of even more elaborate lies, and by sacrificing one’s ethics?
Today, Alinsky’s rules are used more often by the establishment than by its opposition. These tactics have been adopted by governments and disinformation specialists across the world, but they are most visible in TV debate. While Alinsky sermonized about the need for confrontation in society, his debate tactics are actually designed to circumvent real and honest confrontation of opposing ideas with slippery tricks and diversions. Alinsky’s tactics, and their modern usage, can be summarized as follows:
1) Power is not only what you have, but what the enemy thinks you have.
We see this tactic in many forms. For example, projecting your own movement as mainstream, and your opponent’s as fringe. Convincing your opponent that his fight is a futile one. Your opposition may act differently, or even hesitate to act at all, based on their perception of your power.
2) Never go outside the experience of your people, and whenever possible, go outside of the experience of the enemy.
Don’t get drawn into a debate about a subject you do not know as well as or better than your opposition. If possible, draw them into such a situation instead. Look for ways to increase insecurity, anxiety and uncertainty in your opposition. This is commonly used against unwitting interviewees on cable news shows whose positions are set up to be skewered. The target is blind-sided by seemingly irrelevant arguments that they are then forced to address. In television and radio, this also serves to waste broadcast time to prevent the target from expressing his own positions.
3) Make the enemy live up to their own book of rules.
The objective is to target the opponent’s credibility and reputation by accusations of hypocrisy. If the tactician can catch his opponent in even the smallest misstep, it creates an opening for further attacks.
4) Ridicule is man’s most potent weapon.
“Ron Paul is a crackpot.” “Dennis Kucinich is short and weird.” “9-11 twoofers wear tinfoil hats.” Ridicule is almost impossible to counter. It’s irrational. It infuriates the opposition, which then reacts to your advantage. It also works as a pressure point to force the enemy into concessions.
5) A good tactic is one that your people enjoy.
The popularization of the term “Teabaggers” is a classic example, it caught on by itself because people seem to think it’s clever, and enjoy saying it. Keeping your talking points simple and fun keeps your side motivated, and helps your tactics spread autonomously, without instruction or encouragement.
6) A tactic that drags on too long becomes a drag.
See rule number 6. Don’t become old news. If you keep your tactics fresh, its easier to keep your people active. Not all disinformation agents are paid. The “useful idiots” have to be motivated by other means. Mainstream disinformation often changes gear from one method to the next and then back again.
7) Keep the pressure on with different tactics and actions, and utilize all events of the period for your purpose.
Keep trying new things to keep the opposition off balance. As the opposition masters one approach, hit them from the flank with something new. Never give the target a chance to rest, regroup, recover or re-strategize. Take advantage of current events and twist their implications to support your position. Never let a good crisis go to waste.
The threat is usually more terrifying than the thing itself.
This goes hand in hand with Rule #1. Perception is reality. Allow your opposition to expend all of its energy in expectation of an insurmountable scenario. The dire possibilities can easily poison the mind and result in demoralization.
9) The major premise for tactics is the development of operations that will maintain a constant pressure upon the opposition.
The objective of this pressure is to force the opposition to react and make the mistakes that are necessary for the ultimate success of the campaign.
10) If you push a negative hard and deep enough, it will break through into its counterside.
As grassroots activism tools, Alinsky tactics have historically been used (for example, by labor movements) to force the opposition to react with violence against activists, which leads to popular sympathy for the activists’ cause. Today, false (or co-opted) grassroots movements use this technique in debate as well as in planned street actions. The idea is to provoke (or stage) ruthless attacks against ones’ self, so as to be perceived as the underdog, or the victim. Today, this technique is commonly used to create the illusion that a certain movement is “counterculture” or “anti-establishment.”
11) The price of a successful attack is a constructive alternative.
Never let the enemy score points because you’re caught without a solution to the problem. Today, this is often used offensively against legitimate activists, such as the opponents of the Federal Reserve. Complain that your opponent is merely “pointing out the problems.” Demand that they offer a solution.
12) Pick the target, freeze it, personalize it, and polarize it.
Cut off the support network and isolate the target from sympathy. The targets supporters will expose themselves. Go after individual people, not organizations or institutions. People hurt faster than institutions.
The next time you view an MSM debate, watch the pundits carefully, you will likely see many if not all of the strategies above used on some unsuspecting individual attempting to tell the truth.
Internet Disinformation Methods
Because the MSM’s bag of tricks has been so exhausted over such a long period of time, many bitter and enraged consumers of information are now turning to alternative news sources, most of which exist on the collective commons we call the internet. At first, it appears, the government and elitists ignored the web as a kind of novelty, or just another mechanism they could exploit in spreading disinformation. As we all now well know, they dropped the ball, and the internet has become the most powerful tool for truth history has ever seen.
That being said, they are now expending incredible resources in order to catch up to their mistake, utilizing every trick in their arsenal to beat web users back into submission. While the anonymity of the internet allows for a certain immunity against many of Saul Alinsky’s manipulative tactics, it also allows governments to attack those trying to spread the truth covertly. In the world of web news, we call these people “disinfo trolls.” Trolls are now being openly employed by governments in countries like the U.S. and Israel specifically to scour the internet for alternative news sites and disrupt their ability to share information.
Internet trolls, also known as “paid posters” or “paid bloggers,” are increasingly being employed by private corporations as well, often for marketing purposes. In fact, it is a rapidly growing industry.
Trolls use a wide variety of strategies, some of which are unique to the internet, here are just a few:
1) Make outrageous comments designed to distract or frustrate: An Alinsky tactic used to make people emotional, although less effective because of the impersonal nature of the web.
2) Pose as a supporter of the truth, then make comments that discredit the movement: We have seen this even on our own forums — trolls pose as supporters of the Liberty Movement, then post long, incoherent diatribes so as to appear either racist or insane. Here is a live example of this tactic in use on Yahoo! Answers.
The key to this tactic is to make references to common Liberty Movement arguments while at the same time babbling nonsense, so as to make those otherwise valid arguments seem ludicrous by association.
In extreme cases, these “Trojan Horse Trolls” have been known to make posts which incite violence — a technique obviously intended to solidify the false assertions of the notorious MIAC report and other ADL/SPLC publications which purport that constitutionalists should be feared as potential domestic terrorists.
3) Dominate Discussions: Trolls often interject themselves into productive web discussions in order to throw them off course and frustrate the people involved.
4) Prewritten Responses: Many trolls are supplied with a list or database with pre-planned talking points designed as generalized and deceptive responses to honest arguments. 9/11 “debunker” trolls are notorious for this.
5) False Association: This works hand in hand with item #2, by invoking the stereotypes established by the “Trojan Horse Troll.”
For example: calling those against the Federal Reserve “conspiracy theorists” or “lunatics”. Deliberately associating anti-globalist movements with big foot or alien enthusiasts, because of the inherent negative connotations. Using false associations to provoke biases and dissuade people from examining the evidence objectively.
6) False Moderation: Pretending to be the “voice of reason” in an argument with obvious and defined sides in an attempt to move people away from what is clearly true into a “grey area” where the truth becomes “relative.”
7) Straw Man Arguments: A very common technique. The troll will accuse his opposition of subscribing to a certain point of view, even if he does not, and then attacks that point of view. Or, the troll will put words in the mouth of his opposition, and then rebut those specific words. For example: “9/11 truthers say that no planes hit the WTC towers, and that it was all just computer animation. What are they, crazy?”
Sometimes, these strategies are used by average people with serious personality issues. However, if you see someone using these tactics often, or using many of them at the same time, you may be dealing with a paid internet troll.
Government Disinformation Methods
Governments, and the globalists who back them, have immense assets — an almost endless fiat money printing press — and control over most legal and academic institutions. With these advantages, disinformation can be executed on a massive scale. Here are just a handful of the most prominent tactics used by government agencies and private think tanks to guide public opinion, and establish the appearance of consensus:
1) Control The Experts: Most Americans are taught from kindergarten to ignore their instincts for the truth and defer to the “professional class” for all their answers. The problem is that much of the professional class is indoctrinated throughout their college years, many of them molded to support the status quo. Any experts that go against the grain are ostracized by their peers.
2) Control The Data: By controlling the source data of any investigation, be it legal or scientific, the government has the ability to engineer any truth they wish, that is, as long as the people do not care enough to ask for the source data. Two major examples of controlled and hidden source data include; the NIST investigation of the suspicious 9/11 WTC collapses, in which NIST engineers, hired by the government, have kept all source data from their computer models secret, while claiming that the computer models prove the collapses were “natural”. Also, the recent exposure of the CRU Climate Labs and their manipulation of source data in order to fool the public into believing that Global Warming is real, and accepting a world-wide carbon tax. The CRU has refused to release the source data from its experiments for years, and now we know why.
3) Skew The Statistics: This tactic is extremely evident in the Labor Department’s evaluations on unemployment, using such tricks as incorporating ambiguous birth / death ratios into their calculation in order to make it appear as though there are less unemployed people than there really are, or leaving out certain subsections of the population, like those who are unemployed and no longer seeking benefits.
3) Guilt By False Association: Governments faced with an effective opponent will always attempt to demonize that person or group in the eyes of the public. This is often done by associating them with a group or idea that the public already hates. Example: During the last election, they tried to associate Ron Paul supporters with racist groups (and more recently, certain Fox News anchors) in order to deter moderate Democrats from taking an honest look at Congressman Paul’s policies.
4) Manufacture Good News: This falls in with the skewing of statistics, and it also relies heavily on Media cooperation. The economic “Green Shoots” concept is a good example of the combination of government and corporate media interests in order to create an atmosphere of false optimism based on dubious foundations.
5) Controlled Opposition: Men in positions of power have known for centuries the importance of controlled opposition. If a movement rises in opposition to one’s authority, one must usurp that movement’s leadership. If no such movement exists to infiltrate, the establishment will often create a toothless one, in order to fill that social need, and neutralize individuals who might have otherwise taken action themselves.
During the 1960’s and 70’s, the FBI began a secretive program called COINTELPRO. Along with illegal spying on American citizens who were against the Vietnam conflict or in support of the civil rights movement, they also used agents and media sources to pose as supporters of the movement, then purposely created conflict and division, or took control of the direction of the movement altogether. This same tactic has been attempted with the modern Liberty Movement on several levels, but has so far been ineffective in stopping our growth.
The NRA is another good example of controlled opposition, as many gun owners are satisfied that paying their annual NRA dues is tantamount to actively resisting anti-gun legislation; when in fact, the NRA is directly responsible for many of the compromises which result in lost ground on 2nd amendment issues. In this way, gun owners are not only rendered inactive, but actually manipulated into funding the demise of their own cause.
6) False Paradigms: Human beings have a tendency to categorize and label other people and ideas. It is, for better or worse, a fundamental part of how we understand the complexities of the world. This component of human nature, like most any other, can be abused as a powerful tool for social manipulation. By framing a polarized debate according to artificial boundaries, and establishing the two poles of that debate, social engineers can eliminate the perceived possibility of a third alternative. The mainstream media apparatus is the key weapon to this end. The endless creation of dichotomies, and the neat arrangement of ideologies along left/right lines, offers average people a very simple (though hopelessly inaccurate) way of thinking about politics. It forces them to choose a side, usually based solely on emotional or cultural reasons, and often lures them into supporting positions they would otherwise disagree with. It fosters an environment in which beating the other team is more important than ensuring the integrity of your own. Perhaps most importantly, it allows the social engineer to determine what is “fair game” for debate, and what is not.
Alinsky himself wrote: “One acts decisively only in the conviction that all the angels are on one side and all the devils on the other.”
One merely needs to observe a heated debate between a Democrat and a Republican to see how deeply this belief has been ingrained on both sides, and how destructive it is to true intellectual discourse.
The best way to disarm disinformation agents is to know their methods inside and out. This gives us the ability to point out exactly what they are doing in detail the moment they try to do it. Immediately exposing a disinformation tactic as it is being used is highly destructive to the person utilizing it. It makes them look foolish, dishonest, and weak for even making the attempt. Internet trolls most especially do not know how to handle their methods being deconstructed right in front of their eyes, and usually fold and run from debate when it occurs.
The truth, is precious. It is sad that there are so many in our society that have lost respect for it; people who have traded in their conscience and their soul for temporary financial comfort while sacrificing the stability and balance of the rest of the country in the process. The human psyche breathes on the air of truth, without it, humanity cannot survive. Without it, the species will collapse in on itself, starving from lack of intellectual and emotional sustenance. Disinformation does not only threaten our insight into the workings of our world; it makes us vulnerable to fear, misunderstanding, and doubt, all things that lead to destruction. It can lead good people to commit terrible atrocities against others, or even against themselves. Without a concerted and organized effort to diffuse mass-produced lies, the future will look bleak indeed.