Connect with us

Intelligence

How Facebook and other Social Media Suppress Key Truths

Eric Zuesse

Published

on

On April 23rd, the great independent investigative journalist, Craig Murray — a former British diplomat — headlined at his blog, “Condemned By Their Own Words”, and he posted there the translated-to-English transcript (excerpted below) to this Israeli radio Hebrew broadcast on April 21st, in which an Israeli Brigadier-General, named Fogel, explained why Israel’s troops are doing the right thing to shoot and even to kill Gazans who come (an unspecified) too close to the wall which separates Israel from Gaza:

Any person who gets close to the fence, anyone who could be a future threat to the border of the State of Israel and its residents, should bear a price for that violation. If this child or anyone else gets close to the fence in order [the soldier thinks possibly] to hide an explosive device or [to] check if there are any dead zones there or to cut the fence so someone could infiltrate the territory of the State of Israel to kill us …

Nesiel

[the interviewer]: Then, then his punishment [for being suspected] is death?

Fogel: His punishment is death. As far as I’m concerned then yes, if you can only shoot him to stop him, in the leg or arm – great. But if it’s more than that then, yes, you want to check with me whose blood is thicker, ours or theirs. It is clear to you that if one such person will manage to cross the fence or hide an explosive device there …

Nesiel: But we were taught that live fire is only used when the soldiers face immediate danger. … It does not do all that well for us, those pictures that are distributed around the world.

Fogel: Look, Ron, we’re even terrible at it

[at suppressing those pictures]. There’s nothing to be done, David always looks better against Goliath. And in this case, we are the Goliath. Not the David. That is entirely clear to me. … It will drag us into a war. I do not want to be on the side that gets dragged. I want to be on the side that initiates things. I do not want to wait for the moment where it finds a weak spot and attacks me there. If tomorrow morning it gets into a military base or a kibbutz and kills people there and takes prisoners of war or hostages, call it as you like, we’re in a whole new script. I want the leaders of Hamas to wake up tomorrow morning and for the last time in their life see the smiling faces of the IDF [Israel’s army]. That’s what I want to have happen. But we are dragged along. So we’re putting snipers up because we want to preserve the values we were educated by [that Israel’s soldiers are jury, judge, and even executioner, when suspecting a Gazan — Gaza is Israel’s free-fire zone].

The interviewer didn’t challenge any of that, though he didn’t like “those pictures are distributed around the world.” Israel wants all nations to block the truth.

Murray closed by adding a very brief comment of his own: “There is no room to doubt the evil nature of the expansionist apartheid state that Israel has now become. Nor the moral vacuity of its apologists in the western media.” Since this was, of course, a damning statement about mainstream ‘news’ media in The West, these mainstream ‘news’ media, including Facebook, can be expected to dislike that — and they evidently do.

On April 25th Murray headlined “Blocked By Facebook and the Vulnerability of New Media”, and he reported:

This site’s visitor numbers are currently around one third normal levels, stuck at around 20,000 unique visitors per day. The cause is not hard to find. Normally over half of our visitors arrive via Facebook. These last few days, virtually nothing has come from Facebook:

What is especially pernicious is that Facebook deliberately imposes this censorship in a secretive way. The primary mechanism when a block is imposed by Facebook is that my posts to Facebook are simply not sent into the timelines of the large majority of people who are friends or who follow. I am left to believe the post has been shared with them, but in fact it has only been shown to a tiny number. Then, if you are one of the few recipients and do see the post and share it, it will show to you on your timeline as shared, but in fact the vast majority of your own friends will also not receive it. Facebook is not doing what it is telling you it is doing – it shows you it is shared – and Facebook is deliberately concealing that fact from you.

Twitter have a similar system known as “shadow banning”. Again it is secretive and the victim is not informed. I do not appear to be shadow banned at the moment, but there has been an extremely sharp drop – by a factor of ten – in the impressions my tweets are generating.

I am among those who argue that the strength of the state and corporate media is being increasingly and happily undermined by our ability to communicate via social media. But social media has developed in such a way that the channels of communication are dominated by corporations – Facebook, Twitter and Google – which can in effect turn off the traffic to a citizen journalism site in a second. The site is not taken down, and the determined person can still navigate directly to it, but the vast bulk of the traffic is cut off. What is more this is done secretly, without your being informed, and in a manner deliberately hard to detect. The ability to simply block the avenues by which people get to see dissenting opinions, is terrifying.

Furthermore neither Facebook nor Twitter contact you when they block traffic to your site to tell you this is happening, let alone tell you why, and let alone give you a chance to counter whatever argument they make. I do not know if I am blocked by Facebook as an alleged Russian bot, or for any other reason. I do know that it appears to have happened shortly after I published the transcript of the Israeli general discussing the procedures for shooting children.

This hidden, never-explained, but clearly systematic, news-suppression, exemplifies the widespread and coordinated operation by the major media, against any independent sites which document things that the Establishment, the aristocracy, the “Deep State,” or however you call the controlling owners of the corporations that advertise in and own the media, hire their journalists and editors to block from reaching the public.

This is a multifaceted but coordinated operation, of censoring-out the key truths, which are those truths that none of the controlling owners want the public to know (such as Craig Murray has now, apparently, done once too often for Facebook to continue allowing). It’s how they are enabled to use the government so that it serves them, and not the public-at-large. This is, likewise, the source of the obscene inequality of wealth that results, the vast economic inequality that they all benefit from at the public’s expense. Money is power, and they have it. And they use it, against the powerless. Though the controlling owners compete amongst themselves to sell to the public, they all suppress these key truths from reaching the public; because, if they did not, then the ‘wrong’ politicians would get elected to public offices. Whereas some of the ‘right’ politicians are Republicans, and some are Democrats, they all serve the same aristocracy, just different sides of it. Because, otherwise, they wouldn’t stand even a chance to be elected.

Here’s another example of how this works: The CIA is a branch of the U.S. federal government that virtually only serves America’s aristocracy, which is why it lies — consciously misrepresents — in almost everything it says publicly about international relations, such as it did in 2002, when it asserted that Saddam Hussein still had and still was building weapons of mass destruction. The U.S. government, of which the CIA is a part, used that ‘information’ to ‘justify’ invading and occupying a nation (Iraq) which had never invaded nor even threatened to invade the United States. That’s aggression. They’re doing the same in Syria, Libya, Ukraine, Yemen, etc. It’s key truths that are kept hidden from the public. The key truths are the ones that expose and disprove the lies that the Establishment push.

Wikipedia is an example of this. Wikipedia is edited by the CIA, not only in the sense that anyone (including you) can edit what is on Wikipedia, but also in the sense that Wikipedia itself blocks edits or changes that introduce facts and evidence which disprove some of the allegations that are made in Wikipedia articles, and that Wikipedia doesn’t tell such a person why a revision or addition to the article was rejected and will not be considered by Wikipedia: the secret people who control the articles, and the secret process by which they do it, are secrets, disclosed to no outsiders, but known to the people who control Wikipedia. The perpetrators know what the key truths are, but the public do not, because the media hide the key truths.

Furthermore, major news media that report things which aren’t so, are no longer simply burying their after-the-fact ‘corrections’ so that perhaps only 1% of the people who were deceived by an article get to see that it had been false, but now also by simply refusing to issue any ‘correction’ at all — they’re totally ignoring the reader’s right not to be deceived by that major news medium. (Most such ‘news’ media have also terminated or else severely limited their reader-comments section, because otherwise a reader-comment could slip through that disproves the given ‘news’ article, and the aristocratically controlled media’s goal is to block those truths from reaching their audience.)

The Washington Post, which made famous the accusation that non-mainstream newsmedia are fake news, is itself a leader of fake ‘news’, and was so during 2002 and early 2003, by stenographically reporting to its readership the George W. Bush administration’s falsehoods about “Saddam’s WMD” and the rightfulness for America to invade a country (Iraq) that had never invaded nor even threatened to invade the United States.

The entire major media, and almost all of the ‘alternative’ media, are owned or otherwise controlled by the ruling aristocracy and censor out crucial facts which disprove allegations that the government (the ruling aristocracy) wants the public not to know. Above all, they exclude articles like the present one, which (like all articles I do) is being submitted to all of them for publication free-of-charge. So: wherever this article is not published, you know that fake ‘news’ is published. For example, that’s how America now is invading and occupying many countries — all on the basis of lying, because none of these nations invaded the United States, ever, and none is invading the United States now; America’s invasions, in recent decades, have all been blatant violations of international law. If the American people knew this, then would we vote for the politicians who tolerate it, and who vote for it? That explains the ‘news’ media.

And this explains America as the permanent-war-for-permanent-‘peace’ champion of the entire world. Of course, if international law were equitably enforced, then every U.S. President in recent decades would be and die in prison. So, obviously, only the few (and none of them are anything close to being “mainstream”) honest newsmedia will publish this article. You can web-search for this article to find out which ones they are. All the others don’t want you to know the truths that this article reports and (via its links) documents.

Is this article alleging a conspiracy? No major corporation exists that doesn’t carry out conspiracies, because doing that is essential to their success. The very allegation that conspiracies don’t exist amongst the most powerful people and even within and between the most powerful organizations, is ludicrous, but the aristocracy everywhere brainwashes the public everywhere, to think that only the ‘they’ perpetrate conspiracies, the ‘we’ don’t. They all do; it’s the way that the world actually works, which is the reason why the aristocracy hide this — the most basic fact about the world. They do it in order to block the public from understanding how things actually happen. And they block the public from understanding that no mere mass of people conspires — ‘the Jews’ ‘the Masons’, etc. — but that only the very few people at the very top can, and do, and that they actually must, in order to remain successful and in power. It’s called, and it is, in fact, “strategizing.” That is what a conspiracy does, anywhere: it develops and executes strategy. To keep the public dumb and misled, the hired propagandists allege the exact opposite.

So: just web-search for this article, and you will see yet more evidence that what it says is true — that it is hidden, not published, by all the ‘respectable’ news-outlets. Like most of the articles I write, it is sent to all of them as a dare — and none of them accepts the dare and publishes anything from me. This is one of the ways I know that what I write about the way that the ‘news’ media work, is true, and that what they say about the way that they work, is false. I am continually testing them, and hoping for one of them to prove me wrong, just one time. It hasn’t happened, yet.

originally posted at strategic-culture.org

Investigative historian Eric Zuesse is the author, most recently, of They’re Not Even Close: The Democratic vs. Republican Economic Records, 1910-2010

Continue Reading
Comments

Intelligence

Where does allegiance lie?

Bob Budahl

Published

on

Dongfan “Greg” Chung who is a native of China and a naturalized U.S. Citizen had “secret” security clearance while working with Rockwell and Boeing Corporations on the Space Shuttle project. He had retired in 2002 but returned a year later as a contractor until fall 2006. The government proved Chung committed espionage by taking and concealing Boeing secrets regarding the Delta IV rocket and also the Space Shuttle. He did this for the People’s Republic of China. He was convicted on charges of acting as an agent of the PRC as well as economic espionage.

The investigation of a different engineer working within the U.S is what led to Chung’s investigation and resulting conviction. He was sentenced to more than 24 years in prison.

The Chinese had sent letters requesting information as far back as 1979. In correspondence with the PRC Chung expressed his wishes to help the PRC modernize. He also sent 24 manuals related to the important B-1 Bomberfrom Rockwell Corporation which was very damaging.

Travel trips to the People’s Republic of China occurred on multiple occasions to lecture but he also met with government officials. In letters from his handlers they use his wife Rebecca and Chi Mak to transmit information. In the fall of 2006 FBI and NASA agents searched his home and discovered more than 250,000 documents from Boeing, Rockwell and others which were secret.

The Shuttle Drawing System or “SDS” that Rockwell and Boeing engineers created held information regarding performing processes regarding the Space Shuttle. The engineers need a password and authorization to be able to access this system and files. This is a clear case that defensive counterintelligence measures could have prevented printing, concealment and removal of documents from the workplace. One great example of offensive counterespionage was the search of Chung’s trash which led to much revealing evidence.Also his extensive travel to the PRC was an indicator that his scope of activities while in the PRC were above speaking engagements, seminars, teaching, personal. The authorities did conduct offensive counterintelligence to the best of their abilities once it learned via the other agent implicated in similar dealings with the PRC.

Continue Reading

Intelligence

Hacking of the Newswires connected with Trading: A refresher for the business community

Bob Budahl

Published

on

This case I am touching on is regarding Leonid Momotok in which he and other traders used insider trading information from not yet released press releases to amass windfalls in illegal trading. He pleaded guilty to conspiracy to commit wire fraud in his role to hack into three business newswires and obtain through theft the information related to finance that enabled illegal trading advantages. Their trades resulted in at least $30million in illegal profits. He pleaded guilty and faced up to 20 years in prison, restitution, a fine and criminal forfeiture.

The crux of the enabling operation to obtain an illegal advantage was gained through computer hackers in Ukraine who gained intrusion into Marketwired L.P, PR Newswire Association LLC (PRN) and Business Wire (Newswire Companies).Marketwired is owned by NASDAQ Inc., Business Wire is part of the billionaire Warren Buffet’s Berkshire Hathaway and PR Newswire is a Cision unit. The hackers used cyber-attack methods to obtain entry into the Newswire Companies’ networks. Once in, they stole upcoming press announcements about earnings, gross margins, confidential and material financial information and revenue information. They even sent messages regarding their activities. They went on to state they had gained access to the log-on to 15 wire business employees. While the traders made lists of what information they wanted, the hackers provided instructions on how to access and use the overseas server networks. And by having insider information before the public release the traders capitalized by placing trades prior to release date of the press releases. Caterpillar, Hewlett Packard, Panera Bread, Home Depot and others were some of those affected regarding nonpublic information. The hackers received a percentage of the profits and received it through shell corporations.       

The Dubovoy Group defendants tried to avoid detection by spreading their trading to more than 10 brokers firms in various names, etc. They helped each other with the activities as much as able. They stole over 100,000 unpublished press releases. Leonid Momotok owned 1% interest in two of Arkadiy Dubovoy’s companies.“He advised Arkadiy Dubovoy how to trade using the stolen information, and he had formal trading authority for brokerage accounts used in the scheme but held in the name of other members of the Dubovoy Group, …p 12.’

Involvement in the apprehension and prosecution of the perpetrators included many government agencies. The President’s Financial Fraud Enforcement Task Force had a leading hand in the pursuit and prosecution.

Continue Reading

Intelligence

9-11 Terrorist Attack: Defensive countermeasures of deter and detect

Bob Budahl

Published

on

On September 11, 2001 at 8:46 a.m. an airliner slammed into the North Tower of the World Trade Center in New York City. At 9:03 a.m. a 2nd airliner slammed into the South Tower. The planes carried thousands of gallons of jet-fuel aboard in effect making them lethal weapons. Tens of thousands of people worked in these buildings daily and both buildings fell to the ground within 90 minutes. More than 2,600 people died in the World Trade Center tower attacks. Then at 9:37 a.m. a 3rd airliner rammed into the western side of the Pentagon. 125 people died in the Pentagon attack. And a 4thairliner was intended for attack in either the U.S. Capitol or White House but the heroics of passengers crashed the plane, hence thwarting the attack. A total of 256 people died in the four planes. The death toll even surpassed the Pearl Harbor attacks of 1941.

Those responsible for the horrific attack were 19 Arabs carrying out Islamist extremists plans. Their headquarters were located in Afghanistan. They were resourceful and some had lived in the United States for some time and four of them had trained to be pilots. They were not well educated. They carried out the terrible attacks with knives, cutters, mace, etc. And they had tried to bring down the World Trade Center in 1993 but failed however in the result killed six people and wounded a thousand. It was an effort led by Ramzi Yousef. Others including Omar Abdel Rahman who had plans to blow up the Lincoln and Holland tunnels and other New York City landmarks, but they were arrested. Ramzi Yousef and others had various other terror plans of which some succeeded and some fortunately did not.

Bin Ladin was known and thought to be a financier but not thought of as a terrorist leader until later. In 1998 Bin Ladin and four others issued a fatwa in which it was publicly declaring it was God’s order that Muslims should try to kill any American they could. Bin Ladin was a wealthy Saudi and had conducted jihadist activities against the Soviet Union. But he also held grievances against the United States such as a U.S. troop presence in Saudi Arabia. He recruited and trained followers in Afghanistan and continued carrying out acts of terror, including on the United States. His people attacked embassies, hotels, and even attempted to sink the USS Cole Navy Ship by a terrorist attack. His rhetoric is derived from Islam, history and the economic and political disorder in the area. He formed an alliance between the al Qaeda group he led and the Taliban. The Clinton administration had tried cruise missile strikes against al Qaeda in Afghanistan and tried to get the Taliban to force Bin Ladin to leave Afghanistan. The U.S. unsuccessfully utilized CIA paid foreign agents to try to capture or kill Bin Ladin and his group.

As early as 1998 or 1999 Bin Ladin had been contacted by Khalid Sheikh Mohammed with an idea of using the planes as a method of attacking the World Trade Center and other targets. The original plans were for 10 planes to target both east and west coasts of the United States. The CIA did uncover some reports of Bin Ladin’s intent on attacks. The U.S. continued its disruption attempts globally and also utilized diplomacy with countries. The “predator drone” was eventually fitted with a missile should an attack on Bin Ladin provide an opportunity. Some of the reasons and connections to the actions of the perpetrators of the planned 9-11 terrorist attack became apparent after the attack. Unrest had come to the surface in the time before the attack as the Taliban leader opposed attacking the United States, in contrast to Bin Ladin’s wishes.

On 9/11 the terrorists were successful in hijacking the four planes. The planes were being used as terrorist weapons and confusion was present with air control. But eventually the FAA and NORAD who controlled airspace did receive a “shoot down order” but it was after the plane in Pennsylvania had been forced down by passengers in the only way to stop the plane from being used as a weapon.      

The enactment of the United States “Patriot Act” removed barriers that had impeded terrorism investigations in their outlay, scope and means. And in effect sped up the investigation and prosecution of the defendants. The FBI was point on the investigation that followed the attack and the operation was named Operation PENTTBOM. At one time more than half of the FBI’s personnel worked on the case. They followed through on more than one-half million leads. It was the largest crime scene in the FBI’s history.  Also in the time period following the 9/11 attack the Department of Homeland Security was created in March 2003, which brought together 22 separate agencies and offices into a Cabinet level department. The 9/11 Commission had made several recommendations and in this report some details are brought forward. These would be included under the defensive counterintelligence support mode of operation and include the principles of deter and detect within the countermeasures. It included recognizing 72 fusion centers throughout the country which acts as a focal point for receipt, analysis and sharing of threat related information. Also establishing related training and informational programs to deal with threats. One such example is the National Terrorism Advisory System. And the DHS developed and implemented a risk-based transportation security strategy. An action taken such as strengthening airline passenger’s pre-screening and targeting terrorist travel will deter terrorists as they become aware of increased security measures and thwart terrorists from attempting to board airlines for terrorist activities. The airliner’s cabin cockpit doors have been hardened post-911 and Air Marshalls are used appropriately as well as some flight crew being eligible to carry firearms. The TSA behavior detection officers use non-intrusive behavior observation to identify people who may be high risk. The TSA also utilizes detection methods such as canine teams to sniff for explosives on passengers and in luggage. Post 9/11 all cargo on U.S. planes is screened commensurate with their checked luggage. The flights coming into the U.S. from foreign countries are required to provide information prior to departure and checks all passengers against watch lists the government utilizes such as the Secure Flight Program. It also increases efficiency by allowing those cross-checked with biometrics to have expedited travel.

Today a significant defensive countermeasure post-911 is that airlines now screen all checked and carry-on baggage for explosives. The U.S. has increased security of U.S. borders and identification documents. Certain areas are closely watched and critical security improvements along the Northern and maritime are emplaced. The Dept. Of Homeland Security has taken aggressive action to enhance the security of the nation’s infrastructure and also cyber infrastructure and networks. There in a federal government system cyber intrusion detection system which includes EINSTEIN and the National Cybersecurity and communications integration center is the nation’s hub for organizing cyber response efforts. DHS and DOD are working together to protect against threats to military and civilian computer systems and networks. This is another example of defensive countermeasures. DNDO is affiliated with nuclear detection and back in 2003 only 68% of arriving trucks and passenger vehicles were scanned along the northern border with no system on the southwest border. But today the systems scan 100% of all containerized cargo and personal vehicles arriving in the U.S. through land port of entries and up to 99% of sea containers. Counter-proliferation of nuclear and biological threats is a high priority of the DHS. The tragic occurrence of 9-11 has brought about real focus on the danger of leaving vulnerabilities open to exploitation. The DHS also has importantly increased efforts to track and disrupt terrorist financing through programs such as ECTF or Electronic Crimes Task Force.

Another action taken post-9/11 was the creation of the National Counterterrorism Center or NCTC which was to serve 5 functions which were; Threat Analysis, Identity Management, Information sharing, Strategic Operational Planning and National Intelligence Management.

The U.S. Department of Justice charged ZACARIAS MOUSSAOUI with numerous terrorism charges and indicates others involved in the terrorist acts. The United States Department of Defense obtained a video tape of Bin Ladin basically accepting responsibility of the 9-11 attacks and the DOD has a transcript of the video and a portion I will quote is as follows. UBL refers to Osama Bin Ladin: “UBL: The brothers, who conducted the operation, all they knew was that they have a martyrdom operation and we asked each of them to go to America but they didn’t know anything about the operation, not even one letter.  But they were trained and we did not reveal the operation to them until they are there and just before they boarded the planes.UBL: (…inaudible…) then he said: Those who were trained to fly didn’t know the others.”

Bin Ladin, America’s most wanted terrorist was killed by United States Special Forces in a compound in Pakistan on May 2, 2011. The CIA had been involved in investigating Bin Ladin for years.      

Continue Reading

Latest

Trending

Copyright © 2019 Modern Diplomacy