Congressional Progressive Caucus | Wikipedia

Editor’s Note: The 98-member Congressional Progressive Caucus is closely allied with the Democratic Socialists of America. The Communist Party USA identifies Progressive Caucus members as its “allies in Congress.”

The Congressional Progressive Caucus (CPC) is a caucus within the Democratic congressional caucus in the United States Congress.[6] The CPC is a left-leaning organization that works to advance progressive and liberalissues and positions and represents the progressive faction of the Democratic Party.[7][8] It was founded in 1991 and has grown steadily since then.

Entering the 116th United States Congress, the CPC has 98 members, making it the second largest caucus within the Democratic Party and the third largest caucus in Congress. The CPC is currently co-chaired by U.S. Representatives Mark Pocan (D-WI) and Pramila Jayapal (D-WA).

Source: Wikipedia

Fake news is real — Artificial Intelligence is going to make it much worse | CNBC

“The Boy Who Cried Wolf” has long been a staple on nursery room shelves for a reason: It teaches kids that joking too much about a possible threat may turn people ignorant when the threat becomes an actual danger.

President Donald Trump has been warning about “fake news” throughout his entire political career putting a dark cloud over the journalism professional. And now the real wolf might be just around the corner that industry experts should be alarmed about.

The threat is called “deepfaking,” a product of AI and machine learning advancements that allows high-tech computers to produce completely false yet remarkably realistic videos depicting events that never happened or people saying things they never said. A viral video starring Jordan Peele and “Barack Obama” warned against this technology in 2018, but the message was not enough to keep Jim Carrey from starring in “The Shining” earlier this week.

The danger goes far beyond manipulating 1980s thrillers. Deepfake technology is allowing organizations that produce fake news to augment their “reporting” with seemingly legitimate videos, blurring the line between reality and fiction like never before — and placing the reputation of journalists and the media at greater risk.

Ben Zhao, a computer science professor at the University of Chicago, thinks the age of getting news on social media makes consumers very susceptible to this sort of manipulation.

“What the last couple years has shown is basically fake news is quite compelling even in [the] absence of actual proof. … So the bar is low,” Zhao said.

The bar to produce a convincing doctored video is lower than people might assume.

Earlier this year a clip purporting to show Democratic leader Nancy Pelosi slurring her words when speaking to the press was shared widely on social media, including at one point by Trump’s attorney Rudy Giuliani. However, closer inspection revealed that the video had been slowed to 75% of its normal speed to achieve this slurring effect, according to the Washington Post. Even with the real video now widely accessible, Hany Farid, a professor at UC Berkeley’s School of Information and a digital forensics expert, said he still regularly receives emails from people insisting the slowed video is the legitimate one.

“Even in these relatively simple cases, we are struggling to sort of set the record straight,” Farid said.

It would take a significant amount of expertise for a fake news outlet to produce a completely fabricated video of Oprah Winfrey endorsing Trump, but researchers say the technology is improving every day. At the University of Washington, computer vision researchers are developing this technology for positive, or at least benign, uses like making video conferencing more realistic and letting students talk to famous historical figures. But this research also leads to questions about potential dangers, as the attempts made by attackers are expected to continually improve.

How to detect a deepfake

To make one of these fake videos, computers digest thousands of still images of a subject to help researchers build a 3-D model of the person. This method has some limitations, according to Zhao, who noted the subjects in many deepfake videos today never blink, since almost all photographs are taken with a person’s eyes open.

However, Farid said these holes in the technology are being filled incredibly rapidly.

“If you asked me this question six months ago, I would’ve said, ‘Yeah, [the technology] is super cool, but there’s a lot of artifacts, and if you’re paying attention, you can probably tell that there’s something wrong,’” Farid said. “But I would say we are … quickly but surely getting to the point where the average person is going to have trouble distinguishing.”

In fact, Zhao said researchers believe the shortcomings that make deepfake videos look slightly off to the eye can readily be fixed with better technology and better hardware.

“The minute that someone says, ‘Here’s a research paper telling you about how to detect this kind of fake video,’ that is when the attackers look at the paper and say, ‘Thank you for pointing out my flaw. I will take that into account in my next-generation video, and I will go find enough input … so that the next generation of my video will not have the same problem,’” Zhao said.

“Once we live in an age where videos and images and audio can’t be trusted … well, then everything can be fake.” – Hany Farid, Professor at UC Berkeley’s School of Information

One of the more recent developments in this field is in generating speech for a video. To replicate a figure such as Trump’s voice, computers can now simply analyze hundreds of hours of him speaking. Then researchers can type out what they want Trump to say, and the computer will make it sound as if he actually said it. Facebook, Google and Microsoft have all more or less perfected this technology, according to Farid.

Manipulated videos of this sort aren’t exactly new — Forest Gump didn’t actually meet JFK, after all. However, Farid says this technology is hitting its stride, and that makes the danger new.

“To me the threat is not so much ‘Oh, there’s this new phenomenon called deepfakes,’” Farid said. “It’s the injection of that technology into an existing environment of mistrust, misinformation, social media, a highly polarized electorate, and now I think there’s a real sort of amplification factor because when you hear people say things, it raises the level of belief to a whole new level.”

The prospect of widespread availability of this technology is raising eyebrows, too. Tech-savvy hobbyists have long been using deepfakes to manufacture pornography, a consistent and comically predictable trend for new technology. But Zhao believes it is only a matter of time before the research-caliber technology gets packaged and released for mass-video manipulation in much broader contexts.

“At some point someone will basically take all these technologies and integrate and do the legwork to build a sort of fairly sophisticated single model, one-stop shop … and when that thing hits and becomes easily accessible to many, then I think you’ll see this becoming much more prevalent,” Zhao said. “And there’s nothing really stopping that right now.”

Facing a massive consumer trust issue

When this happens, the journalism industry is going to face a massive consumer trust issue, according to Zhao. He fears it will be hard for top-tier media outlets to distinguish a real video from a doctored one, let alone news consumers who haphazardly stumble across the video on Twitter.

“Once we live in an age where videos and images and audio can’t be trusted … well, then everything can be fake,” Farid said. “We can have different opinions, but we can’t have different facts. And I think that’s sort of the world we’re entering into when we can’t believe anything that we see.”

Zhao has spent a great deal of time speaking with prosecutors, judges — the legal profession is another sector where the implications are huge — reporters and other professors to get a sense for every nuance of the issue. However, despite his clear understanding of the danger deepfakes pose, he is still unsure of how news outlets will go about reacting to the threat.

“Certainly, I think what can happen is … there will be even less trust in sort of mainstream media, the main news outlets, legitimate journalists [that] sort of react and report real-time stories because there is a sense that anything that they have seen … could be in fact made up,” Zhao said.

Then it becomes a question of how the press deal with the disputes over reality.

“And if it’s someone’s word, an actual eyewitness’ word versus a video, which do you believe, and how do you as an organization go about verifying the authenticity or the illegitimacy of a particularly audio or video?” Zhao asked.

Defeating the deepfakes

Part of this solution may be found in the ledger technology that provides the digital infrastructure to support cryptocurrencies like bitcoin — the blockchain. Many industries are touting blockchain as a sort of technological Tylenol. Though few understand exactly how it works, many swear it will solve their problems.

Farid said companies like photo and video verification platform Truepic, to which he serves as an advisor, are using the blockchain to create and store digital signatures for authentically shot videos as they are being recorded, which makes them much easier to verify later. Both Zhao and Farid are hoping social platforms like Facebook and Twitter will then promote these videos that are verified as authentic over non-verified videos, helping to halt the spread of deepfakes.

“The person creating the fake always has the upper hand,” Farid said. “Playing defense is really, really hard. So I think in the end our goal is not to eliminate these things, but it’s to manage the threat.”

Until this happens, Zhao said the fight against genuinely fake news may not start on a ledger, but in stronger consumer awareness and journalists banding together to better verify sources through third parties.

“One of the hopes that I have for defeating this type of content is that people are just so inundated with news coverage and information about these types of videos that they become fundamentally much more skeptical about what a video means and they will look closer,” Zhao said. “There has to be that level of scrutiny by the consumer for us to have any chance of fighting back against this type of fake content.”

Nicholas Diakopoulos, assistant professor in Northwestern University’s School of Communication and expert on the future of journalism, said via email that the best solutions involve a mix of educational and sociotechnical advances.

“There are a variety of perceptual cues that can be tip-offs to a deepfake and we should be teaching those broadly to the public,” he said.

Diakopoulos has referenced Farid’s work on photo forensics among ideas outlined in an article he wrote for the Columbia Journalism Review last year. He also cited a research project called FaceForensics that uses machine learning to detect, with 98.1% accuracy, whether a video of a face is real. Another research technique under study: Blood flow in video of a person’s face can be analyzed in order to see if pixels periodically get redder when the heart pumps blood.

“On the sociotechnical side, we need to develop advanced forensics techniques that can help debunk synthesized media when put into the hands of trained professionals,” he told CNBC. “Rapid response teams of journalists should be trained and ready to use these tools during the 2020 elections so they can debunk disinformation as quickly as possible.”

Diakopoulos has studied the implications of deepfakes for the 2020 electionsspecifically. He also has written papers on how journalists need to think when “reporting in a machine reality.”

And he remains optimistic.

“If news organizations develop clear and transparent policies of their efforts using such tools to ensure the veracity of the content they publish, this should help buttress their trustworthiness. In an era when we can’t believe our eyes when we see something online, news organizations that are properly prepared, equipped and staffed are poised to become even more trusted sources of information.”

Source: CNBC

Assange psychologically tortured to ‘breaking point’ by ‘democratic states,’ UN rapporteur tells RT | RT.com

Jailed WikiLeaks co-founder Julian Assange shows clear signs of degrading and inhumane treatment which only adds to his deteriorating health, UN Special Rapporteur on Torture Nils Melzer told RT.

Assange has “all the symptoms typical for a person who has been exposed to prolonged psychological torture,” Melzer told RT’s Afshin Rattansi. This adds to the toll of his deteriorating physical state caused by a lack of adequate medical care for several years, he said.

Melzer said he was judging from two decades of experience in working with POWs and political prisoners, and only after applying “scientific” UN methods to assess Assange’s condition. But the journalist’s case still “shocked” him.

An individual has been isolated and singled out by several democratic states, and persecuted systematically… to the point of breaking him.

Earlier this month, a UK court sentenced the WikiLeaks co-founder to nearly a year in jail for skipping bail in 2012. The courts are now deciding whether to extradite Assange to the US where he is wanted for 17 charges under the Espionage Act. He can end up serving up to 175 years in prison if proven guilty.

Also in May, Sweden reopened an investigation into the allegations of rape by Assange, which he denies. The probe was originally dropped in 2017.

WikiLeaks warned that the journalist’s health had “significantly deteriorated” during the seven years he spent living in the Ecuadorian Embassy in London, and continued to worsen after he was evicted in April and placed in a British prison. According to WikiLeaks, he was recently moved to the prison’s “hospital wing.”

 

‘No future for dissidents’ on social media: Paul Joseph Watson reflects on Facebook ban

Popular internet pundit Paul Joseph Watson is mulling legal action after being banned from Facebook for spreading “hate,” telling RT that it’s clear social media platforms are cracking down on dissident political speech.

Facebook kicked Watson off its platform on May 2 – along with conservative commentator Laura Loomer, Infowars founder Alex Jones, and black nationalist leader Louis Farrakhan. The group was accused of spreading “hateful” content, although no warnings or concrete reasons were provided for their seemingly arbitrary bans.

Watson, who runs a YouTube channel that boasts more than 1.5 million subscribers, has become a well-known but polarizing commentator on culture and politics. A long-time Infowars contributor, Watson now has his own outlet, Summit News.

Although he’s been labeled as an “alt-right” conspiracy theorist, Watson insists that he’s been smeared – and de-platformed – simply because he holds contrarian views.

“There is clearly no future for dissident personalities on any major social media network. We will have to go back to mailing lists and websites as our primary, and perhaps only platforms for delivering content,” he said.

He told RT that he’s hired the “best media lawyers in London” who “have taken on numerous media giants in the past and won” and will advise him about what legal recourse he has against Facebook.

The first step towards suing Facebook over his ban, according to Watson, is to initiate a written request, called a Subject Access Request, which requires the company to release all information relevant to the individual’s case under Section 7 of the Data Protection Act.

The information would be needed to verify if an individual violated community standards or if the company merely made a politically-motivated decision. Watson also intends to put Facebook on notice about the harm they have caused to his reputation by putting him under the category of “dangerous individuals,” which is one of Facebook’s stated reasons for banning people under the company’s community standards.

The list Facebook has made for what counts as “dangerous individuals” includes: Terrorist activity, organized hate, mass or serial murder, human trafficking, and organized violence or criminal activity. Facebook would have to verifiably prove that the banned person engaged in any of these activities, or the decision could count as defamation of character.

The hate watchdog organization Southern Poverty Law Centre (SLPC) has publicly admitted it was behind the censorship. In its statement, the SPLC writes how the banning of these individuals shows that social media companies are responding to their “pressure,” but adds that they nonetheless haven’t done enough, claiming they “have more work to do against hateful content.”

“The SPLC is not a fact-checker, it’s a hyper-partisan political attack dog which solely exists to demonize its ideological adversaries. There is no way to hold them accountable, they are accountable only to their own agenda and bias,” Watson said.

Twitter has reportedly dropped the SPLC as a reliable source for detecting hate content online and to police its platform, but other social media giants like Facebook, Google, and Amazon have continued to use the watchdog to decide what content should be kept on their sites.

Facebook has also recently come under fire from its co-founder Chris Hughes, who wrote an exclusive op-ed in The New York Times on Thursday calling for Facebook’s monopoly to be broken up, as its CEO Mark Zuckerberg has “unilateral control over free speech,” adding that his power is “unprecedented and un-American.”

“Personally, if and when I am banned on everything, I will probably just move into the background until the environment is once again fertile and if big enough alternative platforms exist which actually support free speech,” Watson added.

Facebook isn’t the only social media platform to face accusations of shutting down political speech it doesn’t like: In April, the company banned two conservative British candidates running for European Parliament, Tommy Robinson and Carl Benjamin, less than a month before the election.

The site banned Alex Jones and all Infowars accounts in September 2018.

Source: RT.com

Constitution under siege: The Electoral College battle | Metro Voice News

“Every vote should count.” To many that sounds fair. It sounds right. But is it? “The Electoral College is wrong. The person who gets the most votes should be president.” Does that sound right to you?

The answer varies but falls under one fundamental belief: Do you believe America to be a democracy or a republic.

From that divide, you will understand the main difference between what conservatives are trying to preserve and what liberals are trying to fundamentally transform.

During the 2000 Presidential Election, many in the media and the left believed that Al Gore would win the Electoral College and Bush would in the popular vote. This was the last time the media and the Left staunchly defended the Electoral College while lying the groundwork for the very assault on it. It was after this election that I started studying what the Electoral College is and its importance.

So what is the Electoral College? Each state is afforded a certain number of votes, the amount of senators (2) combined with the amount of representatives in the house (which varies according to population). This makes the minimum amount of votes a state gives as three. These votes are determined by the popular vote each state making the winner the President of the United States.

The emphasis on States is important. Each state in America has different needs and desires. Each state under the Electoral College gets to choose which candidate they want as president by majority vote. (That’s the democracy in the republic you hear about.) The candidate that gets the most votes (270 at this time) from these states wins the Presidency. Under this system, each state matters and therefore the people of each individual state are important.

Under a popular vote, the one with the most votes wins. It’s simpler and therefore easier to circumvent most people. That means cheating is easier. Also ignoring large sects of this country also becomes expedient.

Elections are expensive. Under the popular vote, the middle is ignored because all a candidate need win is the big cities of the east and west coast. The Midwest, the Southwest, and parts of the South will no longer matter because their votes won’t win elections. Look at the state of New York. NYC rules the state, and the Democrat Party rules NYC with an iron fist.

Under a popular, every vote counts. That sounds great, but not every vote should count. “Every four years, the dead rise and vote democrat in Chicago,” the old joke says. The truth is sadder; in that, in many big cities, the dead vote. Add to that the millions of illegal aliens that vote. Then add to that those who vote more than once. Then add to that all those miraculous ballots that appear in bags which were handily put to the side in case needed to overturn an election barely won by a Republican which was how Al Franken won his seat in the Senate and many Republicans lost elections in 2018 they won on election night. Every vote counts. In the past election, some counties had more people vote in them than actually lived there by the thousands. Obviously, they all voted Democrats.

Once you put all those numbers together, it’s easy to see popular votes are easily doctored, and elections can easily be stolen. This is especially true because of an outwardly bias media who is out to cover for those on their side of the political aisle and dreg up the basest stories from the most unreliable sources to bury their competition. Many are willing to accept this because they want their candidate to win no matter what the cost. But what happens, when it’s someone they don’t like? At that point it doesn’t matter, because the republic is dead, and the government class rules us all without any checks or balances.

Ignorance is the greatest ally to the enemies of our Constitution. The reason so many are in favor of abolishing the Electoral College is that we have and Education system controlled by the Left who purposely keep their students from learning the importance of America’s greatness and what is needed to keep her free. Our institutes of educations have become indoctrination center of leftist ideology (socialism, humanism, atheism, etc.). Generations of children have become adults with no real understanding of our Constitution, and its greatness.

The Constitution is under siege. The States lost the battle for the Senate. Now the states may lose the battle of the Electoral College. We lose this and we lose the right to choose our leaders. The Republic needs you and me to educate the ignorant and show them why our founders were all against Democracies and why they chose a Republic instead.

Source: Metro Voice News

Conspiracy Theories That Became Conspiracy Facts | Mint Press News

Camp David Accords IntelligenceBy Jake Anderson

Sometimes conspiracy theories turn out to be true. Therefore, it’s worth assessing them, even if their claims appear wholly outlandish. Especially if their claims appear wholly outlandish.

Generally speaking, conspiracy theories form where there is a vacuum of verifiable facts associated with a controversial, usually tragic event. The concept has evolved over the years and is a part of our popular culture.

There are legions of conspiracy theorists and “truthers” who have devoted their lives to certain theories, and there are legions of skeptics who have devoted their lives to debunking those theories. All the while, conspiracy theories of every stripe and variety festoon the footnotes of history. Even the origin of the phrase itself is subject to conspiracy theory, as some researchers have argued that the CIA invented and promulgated the term in order to marginalize fringe thinkers and neutralize investigations.

The internet has obviously had a profound effect on conspiracy theories, simultaneously helping and hurting the cause. While a world of information is at people’s fingertips, so to are alternate worlds of manufactured propaganda. While the Internet may appear to be a democratized, unfiltered path toward facts and truth, it is easily manipulated. Powerful corporations pay a lot of money to have their dirty laundry buried in the search results underneath contrived puff pieces.

With nearly the entire mainstream media apparatus at their disposal, the government is a maestro at this practice. As we learned from so-called Operation Mockingbird — a conspiracy theory fact discussed in my first post on the subject, “Conspiracy Theories That Turned Out to Be True,” — hundreds, if not thousands of news organizations have been conscripted into working with the CIA to support pro-government narratives. That was in the 1960s. One can only imagine how vast the network is now. Not to mention the fact that a single proprietary algorithm owned by Google dictates the vast majority of the population’s exposure to a subject.

In Part 1, I noted that the list had been meticulously whittled down to focus only on conspiracies that have been irrefutably proven to be fact. There are hundreds of conspiracy theories I think are likely to be true that are not on this list because there simply isn’t enough hard evidence yet to confirm it 100%. I also aimed for a good mixture of old conspiracies and new conspiracies. With groups like Wikileaks and Anonymous out there, the last decade has witnessed a dam burst of new data and documents. Thanks to intrepid journalists, whistleblowers, hacktivists, and leakers, the human race continues to tear down the wall of lies erected by the corporatocracy.

Without further ado, let’s get to it….ten more conspiracy theories we can start calling conspiracy facts.

1. Operation Ajax, the CIA’s Iranian Coup

U.S. President Harry Truman, left, and Iranian Prime Minister Mohammad Mossadegh, right, stand together on Oct. 23, 1951. The coup d'état that led to the democratically elected Mossadegh's ouster two years later was orchestrated by the U.S. CIA, declassified documents confirm. (Photo/Abbie Rowe via Wikimedia Commons)

In Iran it was called 28 Mordad coup; the United Kingdom contributed under the name Operation Boot. However you refer to it, Operation Ajax was an Iranian coup that in 1953 deposed the democratically elected Muhammad Mossadeq and reinstalled the monarchical power of Shah Mohammed Reza Pahlavi. The primary cause of the coup was Mossadeq’s attempt to nationalize the Iran’s oil fields, which threatened the oil profits of Britain’s Anglo-Persian Oil Company (AIOC). The U.S. — in addition to protecting its ally’s petroleum monopoly — viewed Mossadeq’s move as communist aggression and therefore helped plan the return to power of one the world’s more insidious dictators, the shah. Operation Ajax resulted almost directly in 1979 Iranian revolution that created an anti-West Islamic republic led by the Ayatollah Khomeini.

Though it was long considered an open secret, the U.S. government kept the truth behind Operation Ajax concealed from the American people until very recently. The CIA declassified various documents on the 60th anniversary of the coup.

Because of the recent declassification, much information relevant to this CIA-sponsored coup is now available in the CIA’s archives.

In describing Operation Ajax, the CIA itself has become rather oddly self-reflective:

“The world has paid a heavy price for the lack of democracy in most of the Middle East. Operation Ajax taught tyrants and aspiring tyrants that the world’s most powerful governments were willing to tolerate limitless oppression as long as oppressive regimes were friendly to the West and to Western oil companies. That helped tilt the political balance in a vast region away from freedom and toward dictatorship.”

In a recent interview on Democracy Now, Bernie Sanders remarked to Amy Goodman that this seminal chapter in the history of U.S./Middle East relations is almost entirely ignored by mainstream media. “Have you seen many shows about that on NBC?” he asked the crowd.

2. “Nayirah,” the False Pretext for the first Gulf War

It’s now commonly believed that the second Iraq War was sold to the American people — and their congressional representatives — based on an elaborate web of lies and manipulated intelligence. What is less commonly known is that the first Iraq War came about in a very similar fashion. While, surprisingly, there is broad agreement that “Operation Desert Storm” was a worthwhile war, many people overlook the role of a fifteen-year-old girl named “Nayirah,” whose 1990 testimony to the Congressional Human Rights Caucus is credited with cementing the idea of Iraqi war crimes in the American popular consciousness. Nayirah testified to having witnessed Iraqi troops tearing babies from their incubators in Kuwaiti hospitals and leaving them to die on the floor. It’s a profoundly disturbing image….and one that was entirely fictitious.

The Nayirah testimony was a false testimony given before the Congressional Human Rights Caucus on October 10, 1990 by a 15-year-old girl who provided only her first name, Nayirah.

After a lengthy investigation, Amnesty International and other independent watchdog groups discovered that the situation described by Nayirah was fabricated by a PR firm named Hill & Knowlton (the largest in the world at this time), which was hired by the group Citizens for a Free Kuwait in order to create propaganda that would galvanize pro-war sentiment. The man overseeing the campaign was Bush political confidante Craig Fuller. This was a massive project utilizing 119 H&K executives in 12 offices across the United States and even involved casting Nayirah, who turned out to be Nayirah al-Sabah, daughter of Saud bin Nasir Al-Sabah, Kuwaiti ambassador to the United States. The Justice Department, which could have investigated the entire effort under the Foreign Agents Registration Act, turned a blind eye, allowing the Bush administration to pull off a massive “Wag the Dog”-style ideological false flag. Others call it “atrocity propaganda,” a form of psyop (psychological operation).

The “Nayirah” story is just another example of the government falsifying a narrative in order to manipulate the public into supporting war. This kind of psychological propaganda continued all through the second Iraq War and the War on Terror. Just recently, it was revealed that the Pentagon paid PR firm Bell Pottinger $540 million to create fake terrorist videos in Iraq.

3. Operation Paperclip

Originally called Operation Overcast, Operation Paperclip was the codename of the secret American plan to conscript Nazi scientists into U.S. intelligence services at the end of World War II. This ushered in and shielded about 1,500 Germans, including some engineers and technicians. Ostensibly, the purpose of this redeployment by the Joint Intelligence Objectives Agency (JIOA) was to prevent Nazi scientific intelligence from helping reconstitute a new German government; it was also a tactic meant to ensure the Soviet Union didn’t acquire any new technology.

Whatever strategic mindset might have lived inside Operation Paperclip, at its core, the project gave American identities to some of the most ruthless war criminals the world has ever seen.

According to Ynet, the new Nazi CIA scientists helped develop chemical weapons for the U.S. and worked alongside American scientists to develop LSD, which the CIA viewed as a ‘truth serum.’

4. Operation Gladio: Anti-Communist False Flags in Italy

Operation Gladio was the post-World War II love-child of a CIA/NATO/M16 plot to battle communism in Italy. The operation lasted two decades and used CIA-created “stay behind” networks as part of a “Strategy of Tension” that coordinated multiple terrorist attacks from the late 1960s to the early 1980s. Authorities blamed these attacks on Marxists and other left-wing political opponents in order to stigmatize and condemn communism. The operation involved multiple bombings that killed hundreds of innocent people, including children. The most notable attack was the August 2, 1980, bombing of the Bologna train station, which killed 85 people.

In an Anti-Media piece written about five confirmed false flag operations (which includes Operation Gladio, I wrote:

“How do we know about Operation Gladio in spite of its incredibly clandestine nature? There are two principle sources. One, the investigations of Italian judge Felice Casson, whose presentation was so compelling it forced Italian Prime Minister Giulio Andreotti to confirm Gladio’s existence. The second source is testimony from an actual Gladio operative, Vincenzo Vinciguerra, who is serving a life sentence for murder. In a 1990 interview with the Guardian, Vincenzo stated that Gladio was designed to psychologically coerce the Italian public to rely on the state for security.”

Operation Gladio is a textbook modern “false flag.” It used terror and violence to discredit an ideology (communism). And to think, this came at a time before the internet when the CIA didn’t have a fully entrenched mainstream media to trumpet, echo, and build consensus around every little nuance (though they were working on it with COINTELPRO and Operation Mockingbird). Nowadays, the CIA has multinational propaganda machines — the news networks — to make sure all terrorist attacks fit into the carefully scripted narrative that manufactures consent around our wars for oil, natural gas, and other resources.

5. Government uses insect and rodent drones to spy

It’s somewhat of a cliche to jokingly refer to a surrounding insect or bird as a clandestine spy deployed by the government to watch you. While we lack certain specifics on the ubiquity of the technology, we know definitively that the government has the technology to surveil citizens using insects and other small animals, and they use this technology in military applications.

There is some evidence to suggest that insect drones are used domestically to spy on citizens. In 2007, this theory conspiracy theory took shape when anti-war protesters reported strange buzzing insects. Written off as tin foil material, officials dismissed the suggestion that the government used insect drones to spy. Multiple witnesses reported erratic dragonfly-type objects hovering in the sky. The very next year, the U.S. Air Force announced their intended use of insect-sized spies ‘as tiny as bumblebees’ to infiltrate buildings in order to ‘photograph, record, and even attack insurgents and terrorists.‘ The government has come clean about its use of drones to spy on American citizens, so it’s difficult to believe they wouldn’t have at least tried insect drones.

While we can’t say with 100% certainty that there are insect drones spying on American citizens, though it’s exceedingly likely, what is irrefutable is the use of micro air vehicles (MAVs) and “spy animals” as war-time tools. DARPA launched its Stealthy Insect Sensor Project in 1999 as an effort to deputize bees as bomb locators in war zones. This was just the first phase in an ongoing project. In her book The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top Secret Military Research Agency, journalist Annie Jacobsen revealed that the agency’s near-future trajectory is to introduce “biohybrids” — part animal, part machine cyborgs — into the United States’ military arsenal.

In an interview with Coast to Coast AM, Jacobsen said:

DARPA has already succeeded in creating a rat that will be steered by remote control by implanting an electrode in its brain.

“And it’s done the same thing with a moth which is really remarkable because the scientists implanted the electrodes in the pupa stage of the moth when it was still a worm! And then it transformed into having wings, and those tiny little micro-sensors transformed with the moth and the DARPA scientists were able to steer that moth.”

This section references information from The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top Secret Military Research Agency by Annie Jacobsen. Details not linked to external sources are cited in this book.

6. CIA assassinations and coups in foreign countries

When operatives for the Democratic Party claim the 2016 United States presidential election was tampered with by a foreign entity, it’s hard not to cringe at the irony. Firstly, they’ve presented no evidence, except to claim that government intelligence agencies believe it to be true. Sorry, that’s not actually evidence. That’s like the police saying they have DNA evidence but never actually scientifically presenting it in court. It’s kind of unnerving that we even have to point that out. Secondly, our own government and intelligence agencies, namely the CIA, have actively and aggressively subverted countless foreign elections over the last century and, in some cases, have outright funded the assassinations of candidates.

This subject could easily fill a multi-volume book, and countless authors have worked over the years to uncover the role of the CIA in foreign coups. Using every tool in their arsenal — including white, grey, and black psychological operations, counterinsurgencies, and brutal coups aimed at repressing and destroying radically democratic candidates — the CIA has subverted the “will of the people” across the world.

The most commonly noted instances of the CIA meddling in foreign elections and governments include the following:

This is but a small sampling of countries where even mainstream news outlets and, in many cases, the CIA itself, admits calamitous U.S. involvement. There are literally dozens more and, of course, this is restricting the conversation to soft coups — otherwise, we could certainly include the complete military decimation of Iraq, Afghanistan, Libya, and other Middle Eastern countries during the War on Terror, as well as the myriad imperial wars against perceived communist threats.

‘A foreign government hacked and subverted our election!’

The irony is thick with this one. Payback’s a bitch…..which, of course, isn’t giving our intelligence agencies, who have proven themselves to be pathological liars, the benefit of the doubt regarding their claims of Russian collusion during the 2016 presidential election. It’s just to kind of say…..you reap the harvest you have sown. When you look at the track record of the United States government, it’s a wonder the average citizen is safe traveling abroad.

7. Mainstream media is the propaganda branch of the State Department

A man takes a photo of Hillary Clinton as she walks on to the stage to accept her nomination from the Democratic Party for president on the final night, July 28, of the Democratic National Convention.

People have long accused the media of being a proxy branch of the State Department, a highly sophisticated and well-produced form of manufactured consensus and controlled opposition all rolled into one. In ostensibly democratic nations, a free and independent press is of paramount importance. But in the U.S., we find a cohesion of the state and corporate news networks that do not constitute ‘state-run media’ in the traditional sense — but it’s close.

Our first solid documentation that the media is an echo chamber for the government came with the disclosure of what has come to be called Operation Mockingbird. This nefarious and far-reaching conspiracy was documented in Part 1 and involved the CIA essentially conscripting journalists, American news agencies, and major broadcasters to become domestic propagandists and spies. Eventually, this CIA/media symbiosis included journalists from all the top news organizations. Literally, thousands of people were involved.

This infiltration of the American media and press took place during the 1950s, at the start of the Cold War, and was carried out under the auspices of fighting communism. The CIA began to restrict its use of journalists in the Operation Mockingbird program in 1976, but many people believe it has since transmogrified into something far more powerful, nefarious, and ubiquitous today. We’re still in the early stages of proving to the masses that mainstream media is little more than a mouthpiece and propaganda machine for the government and its various agencies, but the evidence is accumulating.

During the 2016 presidential election, Wikileaks exposed a number of disturbing revelations showing collusion between the media and political operatives. This included collusion between the media, the Democratic National Committee, and the Hillary Clinton campaign. But it wasn’t just about swaying the election. New revelations showed that the government actively infiltrates powerful media corporations in order to shape their content and narratives. One of the best examples of this was the State Department’s role in affecting a CBS 60 Minutes interview with Julian Assange.

Edward Snowden

@Snowden

New government doc states @60Minutes planted government questions to shape @Wikileaks interview. If true, sad to see.

View image on Twitter

A more comprehensive list of examples of the Orwellian symbiotic relationship between the press and the government can be found here.

Perhaps the most disturbing recent addition to this chapter was the “Countering Disinformation Act” that President Obama slipped into the National Defense Authorization Act (NDAA) on Christmas Eve of last year. In the context of the still-festering narrative of foreign interference in the 2016 presidential election, the act’s putative goal was to fight “fake news,” which many believe is actually a campaign to silence and dismantle alternative media on the Internet.

In order to accomplish this, the government is establishing a Global Engagement Center for managing disinformation and propaganda. Since we already know our government routinely performs psychological operations (psyops, or as they’ve been recently rebranded, Military Information Support Operations [MISO]), it should come as no surprise that manipulating the civilian population is a permanent goal. In fact, in the 2013 National Defense Authorization Act, the government formally legalized the use of psyops on U.S. citizens. So how does this Global Engagement Center factor in?

The new law states:

“The Center is authorized to provide grants or contracts of financial support to civil society groups, media content providers, nongovernmental organizations, federally funded research and development centers, private companies, or academic institutions for the following purposes:

To support local independent media who are best placed to refute foreign disinformation and manipulation in their own communities.

To collect and store examples in print, online, and social media, disinformation, misinformation, and propaganda directed at the United States and its allies and partners.

To analyze and report on tactics, techniques, and procedures of foreign information warfare with respect to disinformation, misinformation, and propaganda.

To support efforts by the Center to counter efforts by foreign entities to use disinformation, misinformation, and propaganda to influence the policies and social and political stability of the United States and United States allies and partner nations.”

While it may not immediately strike one as sinister, this codification of repressing journalists and voices the government deems to be disinformation while creating an even more centralized infrastructure to control “fact-based narratives” in the media should be highly alarming to anyone who cares about a free press. It would seem that while the State already has a steel grip on corporate news networks, they are struggling to control the influence of online independent media. This new law may be the start of this century’s Operation Mockingbird — a new full-scale infiltration of the local news and a war against anti-establishment narratives on the Internet. This is already taking the form of algorithmic censorship through Facebook and Google, as well as a weaponization of the “fake news” narrative.

8. The Deep State (or the conspiracy theory formerly known as The New World Order)

I describe the Deep State in depth in an article entitled “Forget the New World Order — Here’s Who Really Runs the World.” In it I wrote:

“For decades, extreme ideologies on both the left and the right have clashed over the conspiratorial concept of a shadowy secret government often called the New World Order pulling the strings on the world’s heads of state and captains of industry.

“The phrase New World Order is largely derided as a sophomoric conspiracy theory entertained by minds that lack the sophistication necessary to understand the nuances of geopolitics. But it turns out the core idea — one of deep and overarching collusion between Wall Street and government with a globalist agenda — is operational in what a number of insiders call the “Deep State.”

In the wake of the 2016 election, the concept of the Deep State has grown into somewhat of a common phrase in the lexicon of alternative media theorists, crossing political boundaries and resonating across the ideological spectrum. Everyone from alt-left socialists to alt-righters now agrees there is an unelected cabal of elite neo-conservative corporatists and crony lawmakers running the geopolitical show.

Because it’s such a complex subject and permeates so many different academic, economic, and state apparatuses, it’s virtually impossible to issue a single, simple definition of the Deep State. If I were to hazard one, I would call it “the nexus of Wall Street and the national security state — a relationship where elected and unelected figures join forces to consolidate power and serve vested interests.” But even that is vague. We could also call it “the failure of our visible constitutional government and the cross-fertilization of corporatism with the globalist war on terror.”

Former Republican congressional aide Mike Lofgren gets more specific with who is involved:

“It is a hybrid of national security and law enforcement agencies: the Department of Defense, the Department of State, the Department of Homeland Security, the Central Intelligence Agency and the Justice Department. I also include the Department of the Treasury because of its jurisdiction over financial flows, its enforcement of international sanctions and its organic symbiosis with Wall Street.”

In his writing, Lofgren emphasized the role of FISA international surveillance courts. This was confirmed in a very interesting way when President Donald Trump accused former President Obama of tapping his phones, a charge Obama aides deflected by saying that if such a warrant had been issued, it would have been done through a FISA court. This shows how presidents are able to skirt the constitution by outsourcing surveillance requests. It also shows the interconnectedness of these agencies.

However you want to describe it, it’s the natural conclusion of Operation Mockingbird and most certainly a reality that the elites would have rather kept under the radar. Fortunately for the people of the Earth, revelations from Wikileaks and other whistleblowers have, over the last couple decades, made it abundantly clear that the Deep State (the New World Order) not only exists, but also that it’s far more sinister and powerful than early conspiracy theorists could have ever imagined.

9. CIA used psychics to infiltrate the Soviet Union during Cold War

It’s a plot in a science fiction movie or TV show we’ve all seen: a psychic being leveraged by a law enforcement agency to track down a criminal. The concept of a government psychic program was popularized by the film The Men Who Stare at Goats, which lampooned the mythical STARGATE program supposedly run by the CIA. Most people scoffed at the reality of this and considered it a wacky conspiracy theory, but a recently declassified trove of hundreds of thousands of CIA files finally confirmed not only that psychics are regularly used by police and other law enforcement agencies, but also that the government actually weaponized psychics during the Cold War to try to infiltrate the Soviet Union and gain information.

The documents, made publicly available thanks to the activist group Muckrock, confirm there were top-secret CIA and Defense Department programs to use remote viewing to infiltrate Soviet military installments. There were also programs developing ways to engage in “psychic warfare,” including the development of a “psychic shield” to block Soviet psychics.

10. CIA monitors U.S. citizens via their smart devices

James Clapper, John Brennan, James Comey, Michael Flynn,

Early in 2017, the organization Wikileaks began releasing their first post-2016 election cables with a series of explosive data dumps regarding the CIA’s cyber hacking abilities and exploits. It is called Vault 7. Updated serially in “Year Zero,” “Dark Matter,” “Marble,” “Grasshopper,” “HIVE,” “Weeping Angel,” and “Scribbles,” the documents show the unprecedented collection of cyber vulnerabilities, exploits, and hacking abilities consolidated within the agency that many believe constitute wide-ranging breaches of civil liberties.

Chief among these breaches is domestic surveillance and extrajudicial cyberhacking, which the Wikileaks documents confirm are taking place in an abundance of forms. The Vault 7 documents confirm that: The CIA can break into Android and iPhone handsets and all kinds of computers; the agency has the ability to hack into Apple iPhones and Android smartphones and actually assume full remote control of the device; the CIA can access consumer smart TVs to listen in on surrounding conversations; the agency looked into ways to hack into cars and crash them, allowing ‘nearly undetectable assassinations’ (an assertion that may be relevant to the Michael Hastings case); the CIA concealed vulnerabilities that could be exploited by hackers from other countries or governments.

This is just the beginning. Early in the release, Julian Assange said the documents released represented only a tiny fraction of the total data that was forthcoming. Wikileaks’ episodic data dumps on the CIA’s cyber hacking programs are nothing less than stunning. The establishment’s reaction to the ongoing releases verifies how big of a deal they are. One congressman went so far as to refer to Julian Assange and his whistleblowing outfit as a “foreign terrorist organization.” This isn’t new or unexpected, as the group’s slow but inexorable drips of revelations about government malfeasance continue to confound and disturb private citizens, consumer rights activists, tech companies, and international leaders alike.

Reality Check

Of course, not all conspiracy theories are true. In fact, there are hundreds, even thousands, that have been roundly debunked. Unfortunately, there are those who seek to lie and invent fictions for monetary gain and fame. Misinformation, propaganda, and dishonesty exist at all levels of society.

However, sometimes conspiracy theories turn out to be true. Therefore, it’s worth assessing them, even if their claims appear wholly outlandish. Especially if their claims appear wholly outlandish.

The conspiracy theory is a tool in a larger toolkit used by those who wish to decode the grossly imperfect and fluid narrative describing our world. When investigated responsibly, conspiracy theories function as part of a conceptual spectrum of analysis with which we can investigate government and corporate abuses of power and the manufacturing of ‘consensus reality.’ In the 21st century, when the very transmission of information can be considered criminal, being a responsible conspiracy theorist just means you practice due diligence and hunger for the truth.

Source: Mint Press News