Scoop has an Ethical Paywall
Licence needed for work use Learn More
Top Scoops

Book Reviews | Gordon Campbell | Scoop News | Wellington Scoop | Community Scoop | Search

 

Wikileaks' Julian Assange and Conspiracy Theories

Wikileaks' Julian Assange and Conspiracy Theories


By Michael Collins



"I'm constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud." Julian Asange, Wikileaks, July 19 (Image right)

John Young was one of the co-founders of Wikileaks. He quickly left the organization in disagreement with some of its policies (CNET). Young was a natural choice for Wikileaks since he has operated a leak website, CRYPTOME, since 1996. His site just released two articles on July 31 attributed to Wikileaks' Julian Assange (me@i.1.org). The announcement read:

"These essays on conspiracies by Julian Assange (me@iq.org) were retrieved today from his website iq.org. The first from the currently active site, dated November 10, 2006, and the second atarchive.org, dated December 3, 2006." CRYPTOME - 31 July 2010 (author's emphasis)

Advertisement - scroll to continue reading

The essay titles indicate an entirely different take on conspiracies than that indicated by Assange in his 9/11 comments. In fact, in these two essays from 2006, Assange defines conspiracies as the critical state function to maintain power. The titles are:

State and Terrorist Conspiracies me @ iq.org November 10, 2006

Conspiracy as Governance me @ iq.org December 3, 2006

In the second essay, Conspiracy as Governance, Assange outlines the centrality of conspiracies to maintaining elites.

"Conspiracy as governance in authoritarian regimes

"Where details are known as to the inner workings of authoritarian regimes, we see conspiratorial interactions among the political elite, not merely for preferment or favor within the regime, but as the primary planning methodology behind maintaining or strengthening authoritarian power.

"Authoritarian regimes create forces which oppose them by pushing against a people’s will to truth, love and self-realization. Plans which assist authoritarian rule, once discovered, induce further resistance. Hence such schemes are concealed by successful authoritarian powers until resistance is futile or outweighed by the efficiencies of naked power. This collaborative secrecy, working to the detriment of a population, is enough to define their behavior as conspiratorial." Julian Assange, Dec. 3, 2006

Assange proceeds to define conspiracies as "cognitive devices" that are able to "out think the same group of individuals acting alone." He argues that "deceiving conspiracies" operate by distorting reality to achieve some specific goal. The outcome is of these conspiracies is likely to be "misplaced. Programmers call this effect garbage in, garbage out."

After defining the dangers and centrality of government conspiracies in the first and second essay, Assange proposes the following:

"Attacks on conspiratorial cognitive ability.

"A man in chains knows he should have acted sooner for his ability to influence the actions of the state is near its end. To deal with powerful conspiratorial actions we must think ahead and attack the process that leads to them since the actions themselves can not be dealt with. We can deceive or blind a conspiracy by distorting or restricting the information available to it." Julian Assange, Dec. 3, 2006

"Distorting or restricting the information available" to conspiracies is the justification for dis-intermediating the flow of information, as Wikileaks has done in the past. Gather raw data and simply post it. The strategy most recently with the Afghanistan leaks involved choosing three mainstream media news organizations as intermediaries - The New York Times, the Guardian, and Der Spiegel.

Assange closes by suggesting turning the tables on conspiracies as a means of forming public opinion and policies by the governing elites.

"We can reduce total conspiratorial power via unstructured attacks on links or through throttling and separating.

"A conspiracy sufficiently engaged in this manner is no longer able to comprehend its environment and plan robust action.

"Usually the effect runs the other way; it is conspiracy that is the agent of deception and information restriction. In the US, the programmer’s aphorism is sometimes called “the Fox News effect”. Julian Assange, Dec. 3, 2006

Despite his remarks about 9/11 conspiracy theories, in 2006 Assange clearly outlined how conspiracies are used to shift government policy through justifications based on deliberate deception. False flag operations like those exposed in Turkey in just the past two years are perfect examples. His theory elaborates how deception was used in the Gulf of Tonkin incident.


Claiming an attack on United States Navy vessels by North Vietnam's navy, President Lyndon B. Johnson got all the justification he needed start the Vietnam War that brought so much pain and loss. After the false flag incident, the U.S. Senate approved massive troop build ups and aggressive war making for years.

The government finally admitted that the 1964 Gulf of Tonkin incident was a fraud in 2005. Will we have to wait 41 years after each suspected "deliberate deception" to find out that major policy changes and war making efforts were formed by false flag attacks?

END

This article may be reproduced in part or whole with attribution of authorship and a link to this article.


© Scoop Media

Advertisement - scroll to continue reading
 
 
 
Top Scoops Headlines

 
 
 
 
 
 
 
 
 
 
 
 

Join Our Free Newsletter

Subscribe to Scoop’s 'The Catch Up' our free weekly newsletter sent to your inbox every Monday with stories from across our network.