« America's "Dog in the Fight" Will Hezbollah leash ‘Nabi’?Is the Republican Victory Plan Another Great Depression? »

Wikileaks’ Julian Assange and Conspiracy Theories

August 1st, 2010

By Michael Collins

"I'm constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud." Julian Asange, Wikileaks, July 19 (Image left)

John Young was one of the co-founders of Wikileaks. He quickly left the organization in disagreement with some of its policies (CNET). Young was a natural choice for Wikileaks since he has operated a leak website, CRYPTOME, since 1996. His site just released two articles on July 31 attributed to Wikileaks' Julian Assange (me@i.1.org). The announcement read:

"These essays on conspiracies by Julian Assange (me@iq.org) were retrieved today from his website iq.org. The first from the currently active site, dated November 10, 2006, and the second at archive.org, dated December 3, 2006." CRYPTOME - 31 July 2010 (author's emphasis)

The essay titles indicate an entirely different take on conspiracies than that indicated by Assange in his 9/11 comments. In fact, in these two essays from 2006, Assange defines conspiracies as the critical state function to maintain power. The titles are:

State and Terrorist Conspiracies me @ iq.org November 10, 2006

Conspiracy as Governance me @ iq.org December 3, 2006

In the second essay, Conspiracy as Governance, Assange outlines the centrality of conspiracies to maintaining elites.

"Conspiracy as governance in authoritarian regimes

"Where details are known as to the inner workings of authoritarian regimes, we see conspiratorial interactions among the political elite, not merely for preferment or favor within the regime, but as the primary planning methodology behind maintaining or strengthening authoritarian power.

"Authoritarian regimes create forces which oppose them by pushing against a people’s will to truth, love and self-realization. Plans which assist authoritarian rule, once discovered, induce further resistance. Hence such schemes are concealed by successful authoritarian powers until resistance is futile or outweighed by the efficiencies of naked power. This collaborative secrecy, working to the detriment of a population, is enough to define their behavior as conspiratorial." Julian Assange, Dec. 3, 2006

Assange proceeds to define conspiracies as "cognitive devices" that are able to "out think the same group of individuals acting alone." He argues that "deceiving conspiracies" operate by distorting reality to achieve some specific goal. The outcome is of these conspiracies is likely to be "misplaced. Programmers call this effect garbage in, garbage out."

After defining the dangers and centrality of government conspiracies in the first and second essay, Assange proposes the following:

"Attacks on conspiratorial cognitive ability.

"A man in chains knows he should have acted sooner for his ability to influence the actions of the state is near its end. To deal with powerful conspiratorial actions we must think ahead and attack the process that leads to them since the actions themselves can not be dealt with. We can deceive or blind a conspiracy by distorting or restricting the information available to it." Julian Assange, Dec. 3, 2006

"Distorting or restricting the information available" to conspiracies is the justification for dis-intermediating the flow of information, as Wikileaks has done in the past. Gather raw data and simply post it. The strategy most recently with the Afghanistan leaks involved choosing three mainstream media news organizations as intermediaries - The New York Times, the Guardian, and Der Spiegel.

Assange closes by suggesting turning the tables on conspiracies as a means of forming public opinion and policies by the governing elites.

"We can reduce total conspiratorial power via unstructured attacks on links or through throttling and separating.

"A conspiracy sufficiently engaged in this manner is no longer able to comprehend its environment and plan robust action.

"Usually the effect runs the other way; it is conspiracy that is the agent of deception and information restriction. In the US, the programmer’s aphorism is sometimes called “the Fox News effect”. Julian Assange, Dec. 3, 2006

Despite his remarks about 9/11 conspiracy theories, in 2006 Assange clearly outlined how conspiracies are used to shift government policy through justifications based on deliberate deception. False flag operations like those exposed in Turkey in just the past two years are perfect examples. His theory elaborates how deception was used in the Gulf of Tonkin incident.

Claiming an attack on United States Navy vessels by North Vietnam's navy, President Lyndon B. Johnson got all the justification he needed start the Vietnam War that brought so much pain and loss. After the false flag incident, the U.S. Senate approved massive troop build ups and aggressive war making for years.

The government finally admitted that the 1964 Gulf of Tonkin incident was a fraud in 2005. Will we have to wait 41 years after each suspected "deliberate deception" to find out that major policy changes and war making efforts were formed by false flag attacks?

END

This article may be reproduced in part or whole with attribution of authorship and a link to this article.

No feedback yet

Voices

Voices

  • Robert David At first glance, the figures hit with the weight of a statistical catastrophe—64,260 lives lost due to violent injury in just a few months, a number 40% greater than official counts. But these numbers represent more than just a…
  • Fred Gransville The world has seen an unparalleled slaughter of journalists following Israel's military attack on Gaza in October 2023. At least 103 journalists have been killed during the war within the first 150 days alone. The fatality toll is the…
  • Tracy Turner The DMCA Weaponized: The Dark Face of Web Censorship discusses how the Digital Millennium Copyright Act (DMCA), originally written to protect intellectual property, has increasingly been weaponized to silence dissent, stifle opposition, and…
  • By Tracy Turner In the shadowy lanes of global intelligence, wars are no longer fought with bullets and bombs but with backdoors and algorithms. Israel's Mossad, with its unmatched skills, has transformed the battlefield into an invisible war zone where…
  • Tracy Turner Netanyahu addresses AIPAC, underscoring Israel's outsized influence on U.S. foreign policy. Critics argue America's 'special relationship' with Israel resembles a tail wagging the dog—where Zionist lobbies dictate Washington's decisions.…
  • Police and Prisons Belong in Museums North America, What to do, Why End War, World By David Swanson, World BEYOND War, March 25, 2025 https://worldbeyondwar.org/police-and-prisons-belong-in-museums/ I want to recommend three new books about abolishing…
  • Robert David DarkBERT & DarkBART: The AI That Hunts Criminals in the Dark Web’s Shadows—Before They Strike. Artificial intelligence (AI) has revolutionized many sectors, ranging from enhancing customer service to maximizing medical diagnoses. Maybe one…
  • by Brian Shilhavy [1] The words of Jesus Christ, as recorded in the last book of the Bible in the prophetic book of Revelation, state: I know your afflictions and your poverty—yet you are rich! I know the slander of those who say they are Jews and are…
  • Cathy Smith Zionist propaganda and proponents of pro-Zionist ideology have intervened in global politics, which is referred to as Crypto-Zionism. Proponents of this movement have employed technology, media, and international alliances to achieve their…
  • By Mark Aurelius Has there ever been a word more super-charged, politicized, and over-bloated with frothing and rabid connotation, in our modernity, than terms as hate, hatred, hate speech or acts of hate? Perhaps there are some, but one’s noggin can be…
March 2025
Sun Mon Tue Wed Thu Fri Sat
 << <   > >>
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          

  XML Feeds

CMS + forums
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, democratic, scientific, and social justice issues, etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law. Thepeoplesvoice.org is a non-advocacy internet web site, edited by non-affiliated U.S. citizens. editor
ozlu Sozler GereksizGercek Hava Durumu Firma Rehberi Hava Durumu Firma Rehberi E-okul Veli Firma Rehberi