« America's "Dog in the Fight" Will Hezbollah leash ‘Nabi’?Is the Republican Victory Plan Another Great Depression? »

Wikileaks’ Julian Assange and Conspiracy Theories

August 1st, 2010

By Michael Collins

"I'm constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud." Julian Asange, Wikileaks, July 19 (Image left)

John Young was one of the co-founders of Wikileaks. He quickly left the organization in disagreement with some of its policies (CNET). Young was a natural choice for Wikileaks since he has operated a leak website, CRYPTOME, since 1996. His site just released two articles on July 31 attributed to Wikileaks' Julian Assange (me@i.1.org). The announcement read:

"These essays on conspiracies by Julian Assange (me@iq.org) were retrieved today from his website iq.org. The first from the currently active site, dated November 10, 2006, and the second at archive.org, dated December 3, 2006." CRYPTOME - 31 July 2010 (author's emphasis)

The essay titles indicate an entirely different take on conspiracies than that indicated by Assange in his 9/11 comments. In fact, in these two essays from 2006, Assange defines conspiracies as the critical state function to maintain power. The titles are:

State and Terrorist Conspiracies me @ iq.org November 10, 2006

Conspiracy as Governance me @ iq.org December 3, 2006

In the second essay, Conspiracy as Governance, Assange outlines the centrality of conspiracies to maintaining elites.

"Conspiracy as governance in authoritarian regimes

"Where details are known as to the inner workings of authoritarian regimes, we see conspiratorial interactions among the political elite, not merely for preferment or favor within the regime, but as the primary planning methodology behind maintaining or strengthening authoritarian power.

"Authoritarian regimes create forces which oppose them by pushing against a people’s will to truth, love and self-realization. Plans which assist authoritarian rule, once discovered, induce further resistance. Hence such schemes are concealed by successful authoritarian powers until resistance is futile or outweighed by the efficiencies of naked power. This collaborative secrecy, working to the detriment of a population, is enough to define their behavior as conspiratorial." Julian Assange, Dec. 3, 2006

Assange proceeds to define conspiracies as "cognitive devices" that are able to "out think the same group of individuals acting alone." He argues that "deceiving conspiracies" operate by distorting reality to achieve some specific goal. The outcome is of these conspiracies is likely to be "misplaced. Programmers call this effect garbage in, garbage out."

After defining the dangers and centrality of government conspiracies in the first and second essay, Assange proposes the following:

"Attacks on conspiratorial cognitive ability.

"A man in chains knows he should have acted sooner for his ability to influence the actions of the state is near its end. To deal with powerful conspiratorial actions we must think ahead and attack the process that leads to them since the actions themselves can not be dealt with. We can deceive or blind a conspiracy by distorting or restricting the information available to it." Julian Assange, Dec. 3, 2006

"Distorting or restricting the information available" to conspiracies is the justification for dis-intermediating the flow of information, as Wikileaks has done in the past. Gather raw data and simply post it. The strategy most recently with the Afghanistan leaks involved choosing three mainstream media news organizations as intermediaries - The New York Times, the Guardian, and Der Spiegel.

Assange closes by suggesting turning the tables on conspiracies as a means of forming public opinion and policies by the governing elites.

"We can reduce total conspiratorial power via unstructured attacks on links or through throttling and separating.

"A conspiracy sufficiently engaged in this manner is no longer able to comprehend its environment and plan robust action.

"Usually the effect runs the other way; it is conspiracy that is the agent of deception and information restriction. In the US, the programmer’s aphorism is sometimes called “the Fox News effect”. Julian Assange, Dec. 3, 2006

Despite his remarks about 9/11 conspiracy theories, in 2006 Assange clearly outlined how conspiracies are used to shift government policy through justifications based on deliberate deception. False flag operations like those exposed in Turkey in just the past two years are perfect examples. His theory elaborates how deception was used in the Gulf of Tonkin incident.

Claiming an attack on United States Navy vessels by North Vietnam's navy, President Lyndon B. Johnson got all the justification he needed start the Vietnam War that brought so much pain and loss. After the false flag incident, the U.S. Senate approved massive troop build ups and aggressive war making for years.

The government finally admitted that the 1964 Gulf of Tonkin incident was a fraud in 2005. Will we have to wait 41 years after each suspected "deliberate deception" to find out that major policy changes and war making efforts were formed by false flag attacks?

END

This article may be reproduced in part or whole with attribution of authorship and a link to this article.

No feedback yet

Voices

Voices

  • Ned Lud Parade, Protest & Projectile We are urgently called—by custom, media, or the relentless churn of the day—to witness. Witness the parade. Witness the war. Witness the ticker inching past news of missiles, of cities ravaged, of another speech…
  • Ned Lud Israel has an unusual pastime. He likes to provoke fights in bars—specifically with bouncers. Not with patrons in general, not with pool sharks or irate drunks, but full-time bouncers, men carved out of concrete and protein powder, schooled in…
  • Paul Craig Roberts "The most significant fact of our time is that the entire Western World is a dead man walking..." Democrats for many long years have imposed race and gender privileges, which violate the 14th Amendment’s requirement of equal…
  • Fred Gransville The climb of fascism in the United States was not born from a single event, nor was it the result of some sudden, dramatic cultural shift. Rather, it emerged through a slow, relentless erosion of democratic institutions, camouflaged…
  • By David Swanson I recommend reading Charlottesville: An American Story by Deborah Baker. Itʼs an account, of course, not of all aspects of the city of Charlottesville, but principally of the Nazi-KKK-White Supremacist riot of 2017 that has taken on the…
  • By Ned Lud They don’t need jackboots when they have behavioral analytics. The war on speech has gone stealth. Once, repression was crude—clubs, tear gas, blacklists. Now, a fusion of military-grade surveillance and corporate-state platforms executes the…
  • by Tracy Turner In the besieged killing field territories of Gaza, survival has become a nightmare. The siege blockade, far from being mere policy, has morphed into an insidious engine of deliberate starvation-its mechanism fine-tuned to crush the will…
  • Paul Craig Roberts Belaya air base Russia The attack on Russian strategic forces by Ukraine, with or without President Trump’s knowledge and with or without help from Washington and the British, could have been the most dangerous event in East-West…
  • By Chris Spencer The architecture of censorship in the 21st century is not built of iron bars or smoldering books. It is invisible by design—engineered into the digital substrate of everyday life, encoded in autocomplete predictions, invisible filters,…
  • META/Facebook Shadow Protocols: Web Weaponized Against Palestinian Genocide Discourse Ned Lud Spoiler alert: Not Muslim. Not affiliated with Hamas. And definitely not an Islamophobe. Like Zuckerberg.  This information is backed by reports from…
June 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          

  XML Feeds

CMS + forums
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi