Archives

Tagged ‘Gene Sharp‘

Fighting US Psychological Operations (PSYOPS) in Cyber Warfare & Winning

Tortilla Con Sal

August 9, 2018

By Lauren Smith

 

The CIA, NSA, FBI and DOD are your “friends” on Facebook

Social media and Google serve three strategic purposes for the United States government. First, they allow Washington to conduct espionage; second, they facilitate the spread of disinformation campaigns, and third, they serve as conduits for the transmission of social contagions. In deploying thought control against the users of social media and Google, the US government regulates civil unrest both domestic and abroad. As such, social media and Google can best be understood as unconventional weapons (UW). In this capacity, they can be used in proxy wars against the governments of non-compliant Non-Aligned Movement (NAM) nations to accomplish regime change.

Through geopolitical manipulations that eliminate opposition, the United States government can actualize the ruling elites’ vision of a corporate controlled global economy without the deployment of troops. This model of “non-violence” or “soft-coup” as a method of unconventional warfare can be traced to Gene Sharp and the Albert Einstein Institution. It is organized through the efforts of the NGOs it oversees such as Freedom House and the National Endowment for Democracy (NED). And, it can be observed in the various Color Revolutions that occurred in Eastern European countries, the Middle East and now Latin America.

The NED is the coordinating Washington agency for regime destabilization and change. It is active from Tibet to Ukraine, from Venezuela to Tunisia, from Kuwait to Morocco in reshaping the world after the collapse of the Soviet Union into what George H.W. Bush in a 1991 speech to Congress proclaimed triumphantly as the dawn of a New World Order.”

Within this context, activists and the NAM must consider Facebook, Twitter, YouTube and Google hostile territory that is ultimately controlled by the United States Intelligence Community (IC) and the Department of Defense (DoD). Despite user-friendly packaging and attractive advertisements, social media and Google remain militarized programs. As such, activists and NAM users must enter with caution, prepared to do battle to win at PSYOPS in cyber warfare.

Using the US DoD model, cyber warfare can be upgraded to a department on par with the NAM armed forces. In this regard, Polytechnic universities are strategic and can be controlled by NAM governments and their operatives, as they are in the US by the IC and DoD. NAM military institutions can recruit cyber warfare teachers/activists, develop educational curriculum, set career paths and train cyber soldiers to counter US engagements. Useful information can be taken directly from any of the US military’s cyberspace recruitment sites, which promise to develop capabilities to defend national security as well as to create effects in cyberspace to achieve national objectives.

The first step for the NAM is to create public awareness of the threat that social media possesses to protect users and the NAM governments against its influence. In doing so, a cadre of civilian cyber PSYOP content monitors can be created. Additionally, software is now commercially available that can search, monitor, analyze and manage social media content. Presently, large corporations as well at the IC and DoD are using this social media software – since it is useful in business marketing strategies. NAM governments can deploy this software in their communication offices. Through vigilance, PSYOP efforts against NAM governments by social media and Google can be thwarted.

Concurrently, it is critical to guard against cyber invasion through the passing of cyber laws with strong penalties, as done by Germany with its groundbreaking Network Enforcement Act (NetzDG). Also, it is key to ensure through news media communications that workers in the IT industry understand the ramifications of the work in which they engage as well the nefarious intent of their respective employers. The “Never Again Pledge” taken by US tech workers in 2017 is promising.

Germany’s Network Enforcement Act (NetzDG)

Germany has blazed a trail for the NAM against PSYOPS in social media with its Network Enforcement Act (NetzDG) and it’s setting of fines of up to $50 million euros.ii The NAM must immediately follow suit with the setting of robust laws and fines against: the dissemination of propaganda; the encouragement of violent offences endangering the state; treasonous forgery; public incitement to crime; breaching of the public peace by threatening to commit offences; the forming of criminal or terrorist organizations.

Never Again Pledge

As reported by the New Yorker in its March 14, 2017 article titled: Why Protesters Gathered Outside Peter Thiel’s Mansion This Weekend, a group of about fifty tech workers, attorneys and anti-surveillance activists stood outside the home of Peter Thiel. Thiel is co-founded of Palantir Technologies, a Trump advisor, and was Facebook’s first investor. He remains a board member of Facebook as well as a member of the Bilderberg Steering Committee. The protest was organized to bring attention to software developed by Plantir called Investigative Case Management that is used by Immigration and Customs Enforcement (ICE) for mass deportation. Amongst other data sources to identify and track a given target, it uses social media content.

Since the presidential election, nearly three thousand tech workers signed the Never Again Pledge, promising to not work on databases that the Trump Administration might use to target vulnerable groups. The name is a nod to I.B.M.’s alleged role, during the Second World War, in systematizing Nazi genocide by providing punch-card technology.

The banality of evil today is the person sitting in a cubicle in San Francisco, or in Silicon Valley, building the tools of digital fascism that are being used by those in Washington,”

To understand the US governments offensive against unfavorable NAM regimes, it is important to understand two things: first, the origin of Facebook and Google; and second, the influence they collectively wield over human motivation through coercion and the spread of social contagions through distorted reality. Within this context, it is of primary concern that activists become adept at the stealth guerilla tactic of hit-and-run, as flexibility and anonymity become key to survival. With the stakes of financial ruin, imprisonment and death so high under the USA Patriot Act, no dissident remains safe.

USA Patriot Act

As dissent and protest both international and domestic becomes increasingly illegal in the United States, and the governmental powers to investigate “terrorism” expand and morph under the USA Patriot Act, activists and the NAM must develop and foster skill sets that protect sympathetic Internet hosts, contributors and content against attack wherever they reside. According to the American Civil Liberties Union (ACLU), the Patriot Act increases the government’s surveillance powers in four areas:

  1. Records searches. It expands the government’s ability to look at records on an individual’s activity being held by a third party. (Section 215)

  1. Secret searches. It expands the government’s ability to search private property without notice to the owner. (Section 213)

  1. Intelligence searches. It expands a narrow exception to the Fourth Amendment that had been created for the collection of foreign intelligence information (Section 218).

  1. “Trap and trace” searches. It expands another Fourth Amendment exception for spying that collects “addressing” information about the origin and destination of communications, as opposed to the content (Section 214).

Accordingly, as described by the ACLU:

  • The government no longer has to show evidence that the subjects of search orders are an “agent of a foreign power,” a requirement that previously protected Americans against abuse of this authority.

  • The FBI does not even have to show a reasonable suspicion that the records are related to criminal activity, much less the requirement for “probable cause” that is listed in the Fourth Amendment to the Constitution. All the government needs to do is make the broad assertion that the request is related to an ongoing terrorism or foreign intelligence investigation.

  • Judicial oversight of these new powers is essentially non-existent. The government must only certify to a judge – with no need for evidence or proof – that such a search meets the statute’s broad criteria, and the judge does not even have the authority to reject the application.

  • Surveillance orders can be based in part on a person’s First Amendment activities, such as the books they read, the Web sites they visit, or a letter to the editor they have written.

  • A person or organization forced to turn over records is prohibited from disclosing the search to anyone. As a result of this gag order, the subjects of surveillance never even find out that their personal records have been examined by the government. That undercuts an important check and balance on this power: the ability of individuals to challenge illegitimate searches.

The ACLU also describes non-surveillance provisions in the Act, which remain the most serious as they enable the indefinite detention of non-citizens without trial. The provisions:

  • Give the Director of Central Intelligence the power to identify domestic intelligence requirements. As the director is appointed by the president, this extraordinary unchecked executive power opens the door to the same abuses that took place in the 1970s and before, when the CIA engaged in widespread spying on protest groups and other Americans.

  • Create a new crime of “domestic terrorism.” The Patriot Act transforms protesters into terrorists if they engage in conduct that “involves acts dangerous to human life” to “influence the policy of a government by intimidation or coercion.” The words “influence” and “coercion” have a wide range of meanings and allow for unbridled discretion. Furthermore, the law gives the attorney general and the secretary of state the power to detain or deport any non-citizen who belongs to or donates money to a broadly defined “domestic terrorist” group.

  • Allow for the indefinite detention of non-citizens. The attorney general can order detention based on a certification that he or she has “reasonable grounds to believe” a non-citizen endangers national security. Tangible proof is not a requirement, only a “reasonable belief”. Worse yet, if the foreigner does not have a country that will accept them, they can be detained indefinitely without trial.

 

US News Media: Counterpunch, Alice Donovan & the FBI

On December 25, 2017, a troubling article appeared in Counterpunch, a US media news outlet, regarding the writing of an alleged journalist/Russian troll, Alice Donovan.  Links to an additional article appeared on Counterpunch’s Facebook page on July 27, 2018. Overall, the articles allege Donavan is either an unimaginative writer that committed plagiarism as a sport, or that she is a Russian troll. However, Donavan’s transgressions and intent are irrevelant, what the story revealed in all its gory horror is how the US government concocts justifications to learn the identity and location of a given dissident, and how easily it scared an independent and alternative US news media outlet into become its slobbering accomplice.

In this case, the FBI alleged Donovan was a Russian agent that spread disinformation in the Clinton/Trump presidential campaign with the intent of effecting the national election, despite the fact that she did not submit articles specifically on Clinton or Trump. What the US government’s fishing expedition also revealed is that all US news media can’t be trusted, even ones with cute sounding reactionary names, such as Counterpunch. As Counterpunch not only admitted to bending over backwards to cooperate with the FBI, it also proudly declared its decision to up-the-ante and conduct its own investigation and exposé. Counterpunch analyzed the transmission times and IP address of Donovan’s submission emails; it included photos of the alleged Alice Donovan from other media sources in its articles about her; it interviewed other news media that hosted Donovan’s articles, and most outrageously actually asked Donovan to call them by phone and send a photo of her utility bill disclosing her physical location. Without surprise, Donovan declined both requests stating: “security reasons.” If there was ever a reason to give up US hosted media, write under a nom de plume, use a Virtual Private Network (VPN), and accept payment only in crypto currency, this is it!

As anyone honestly committed to telling the truth will explain, it’s not about the messenger; it’s about the message. Under the Patriot Act, writers are safer in anonymity. But as anyone committed to telling the truth will also explain, when you eliminate one activist, ten are energized to take their respective place. Contrary to what PSYOPS wants the 99 percent to believe, there is strength in numbers. While imperialist greed through big payoffs may make for fast friendships, the shared love of truth and justice is priceless. It engenders a loyalty so strong it overcomes setbacks and hardship.

Origin of Facebook & Google

While the development of the Internet, data collection, surveillance and the global positioning system (GPS) can be attributed to the Department of Defense (DoD), Facebook and Google are also inexplicably linked to the CIA’s non-profit venture capital corporation, In-Q-Tel (IQT).

Within this context, Facebook can best be understood as the “friendly” replacement of DoD’s unpopular Information Awareness Office (IAO) which was created by its Defense Advanced Research Projects Agency (DARPA) in 2002 and defunded shortly thereafter in February 2003 by congress, due to public criticism that the development and deployment of its technology could potentially lead to an Orwellian styled mass surveillance system. The timing of Facebook’s development from the standpoint of DoD can at minimum be understood in regard to continuity as fortuitous if not planned – since Zuckerberg is credited with having launched Facebook on February 4, 2004 (within one year of IAO’s defunding).

Information Awareness Office (IAO) the Precursor to Facebook

As the precursor to Facebook, the Information Awareness Office (IAO) brought together several DARPA projects focused on applying surveillance with information technology by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.

This information was then analyzed to look for suspicious activities, connections between individuals, and threats with the goal to increase the probability that authorized agencies of the United States could preempt adverse actions. It is important to note that adverse actions within this context are nebulous and thereby include any action that is perceived to counter US corporate short-term interests and security. Adverse actions as defined can include protests on both international and domestic issues by groups or individuals in thought, word or deed. Thus, internationally, those seeking to defend NAM countries against destabilization, invasion and occupation are engaged in adverse actions; and domestically, those seeking to protect human rights, constitutional rights and the environment are involved in adverse actions.

Just like IAO, Facebook invades and collects the email and telephone numbers of its users’ contacts in its Messenger component. Additionally, Facebook logs all photos and communications. Through its facial recognition component, Facebook links physical identities with names, locations, dates and times for easy surveillance. It also has a payment option, which allows Facebook to gain access to the financial institutions of its users. Groups centered on medical topics are densely populated on Facebook, and they encourage users to share their medical issues upon joining.

Facebook encourages its users to “complete their online profile” and list highly personal information such as: birthdate, gender, family members, school, workplace, intimate relationship, interests, religious and political views, hometown, current city as well as group affiliations. Through the recording of “likes” a granular sense of its users’ values and interests is also made known. This information, when taken in aggregate, allows for a profile so detailed and comprehensive that it amounts to a DoD agent’s wet dream.

According to Dave Chaffey in the Global Social Media Research summary, the number of social media users worldwide in 2018 is 3.196 billion. Statista claims Facebook has 2.2 billion active monthly user accounts; YouTube has 1.9 billion; Instagram has 1 billion; and Twitter has 336 thousand. Within this context, social media’s sphere of influence is enormous, as the earth’s population is estimated to be 7.6 billion in 2018, according to Worldometers.

Cutting Edge Social Media Metadata Scanning, Analysis and Management Software

Realizing anything written on this topic is already expired and anything truly mind-bending is classified and beyond reach, there is still a nifty development worth mentioning regarding social media data scanning, analysis and management software. Clearly NAM can benefit by utilizing social media software of this ilk to transmit communications to constituents, gauge reactions to proposed initiatives, and most importantly in the context of this article, quickly identify and stave off destabilizing social media surprise attacks by imperialist powers and their agents. This technology can be considered a 2018 anti ballistic missile (ABM) to social media attacks.

According to Wired media, in its 2009 article titled U.S. Spies Buy Stake in Firm that Monitors Blogs & Tweets, the CIA’s venture capital nonprofit, IQT wanted Visible Technologies, a software firm that specializes in monitoring social media, to keep track of foreign social media, and provide early-warning detection on how issues are playing internationally. With this technology it is also possible for intelligence agencies to compile information on political figures, critics, journalists or others, and to exploit such information for political advantage. Visible’s foreign languages capabilities include Arabic, French, Spanish and nine other languages.

According to G2 Crowd, a Software & Services marketing firm, the latest 2018 must-have in business software is a Social Media Suite. The suite has the capability to manage, monitor, and analyze information related to one or multiple social media accounts through a single product. As such, it can:

  • Plan and publish digital content via social media

  • Engage with communities via social media

  • Report on effectiveness of social media practices

  • Track regions and demographics of audience

  • Analyze performance of posts and campaigns

  • Monitor for related mentions and trends

Facebook and the Cambridge Analytica Scandal

Through third parties, Facebook, alike its forerunner IAO, permitted the analysis of its users data. In the Cambridge Analytica (CA) scandal it was revealed that Facebook exposed the personal data of 87 million users to a political consulting firm in which Trump advisor, Steve Bannon, was its vice president and founder. The intent was to use personal data against users to influence their respective vote in the 2016 US presidential election in favor of Trump. The work of CA was done by the SCL Group, its parent company. SCL describes its capabilities as Vox’s Andrew Prokop writes:

“SCL tends to describe its capabilities in grandiose and somewhat unsettling language – the company has touted its expertise at ”psychological warfare” and “influence operations.” It’s long claimed that its sophisticated understanding of human psychology helps it target and persuade people of its clients’ preferred message.”

It is important to note that SCL’s main client is NATO and the defense department of its member states. Another company that was involved in this scandal is Palantir. Peter Thiel, is Palantir’s chairman and founder, as well as a major contributor in the Trump campaign. Palantir not only has numerous contracts with the US Intelligence Community and Department of Defense like the SCL Group, but Thiel was Facebook’s primary investor, and he remains on its board of directors.

CA whistleblower Chris Wylie told British Members of Parliament that senior Palantir employees worked with the firm on the Facebook data to help it build models off of the dataset to use for political ad targeting purposes.

Facebook’s Social Contagion Study Scandal

Another known scandal involving Facebook is the Social Contagion Study, which was undertaken in 2012 by researchers from Facebook, Cornell University, and the University of California.

In the study, the posts of approximately 700,000 unsuspecting users of Facebook were secretly manipulated, for a week, to determine how emotional states were transmitted over the platform. In the experiment, Facebook altered the news feed content of users to control the number of posts that contained words with positive or negative charged emotions to spy on the users’ reactions. They found negative feeds resulted in the user making negative posts, where as positive feeds resulted in the user making positive posts.

The team concluded its study by saying that emotions are spread via contagion through social networks.

The study appeared in the June edition of the journal Proceedings of the National Academy of Scientists (PNAS) under the title: Experimental evidence of massive-scale emotional contagion through social networks. According to the researchers:

Emotional states can be transferred to others via emotional contagion, leading people to experience the same emotions without their awareness. We provide experimental evidence that emotional contagion occurs without direct interaction between people (exposure to a friend expressing an emotion is sufficient), and in the complete absence of nonverbal cues.”

Facebook was publicly condemned when it became known that it conducted this Orwellian thought policing on unsuspecting users. The attack against Facebook worsened when it was discovered that one of the researchers of Facebook’s mind control study, Jeffrey T. Hancock of Cornell University, also received funding from the DoD’s Minerva Research Initiative to conduct a similar study entitled “Modeling Discourse and Social Dynamics in Authoritarian Regimes”.

Additionally, Cornell University was engaged with the Minerva Initiative and had a study funded through 2017 managed by the US Air Force Office of Scientific Research, which aimed to develop an empirical model “of the dynamics of social movement mobilization and contagions”.

The project aimed to determine the “critical mass” (tipping point) of social contagions by studying their “digital traces” in the cases of “the 2011 Egyptian revolution, the 2011 Russian Duma elections, the 2012 Nigerian fuel subsidy crisis and the 2013 Gazi park protests in Turkey.”

Facebook’s social contagion scandal also illustrates the disturbing ease that US educational facilities have in cooperating with the US military in experiments on human subjects without their knowledge or permission, in violation of ethical standards and protections.

DoD & the Minerva Initiative

The stated goal of the Minerva Initiative is to improve DoD’s basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the U.S. The program seeks to achieve this by sponsoring research designed to bring together universities, research institutions, and individual scholars. In 2008, the project was provided $50 million by the United States Department of Defense. The journalist Nafeez Ahmed has expressed concern that Minerva research, in its effort to understand mass mobilization, may be targeting peaceful activists, NGOs and protest movements.

Social Network Analysis (SNA) & Unconventional Warfare (UW)

According to LTC Glenn Johnson, CW4 Maurice Duclos, Mr. Dan LeRoy in their article tittled: Mapping the Human Terrain: Applying Social Network Analysis (SNA) to an Unconventional Warfare (UW) Framework:

“Without a detailed understanding of the human terrain the Unconventional Warfare (UW) planner is uninformed about key aspects of the operating environment. SNA can provide the human terrain map needed to plan and execute UW operations. By developing a map of the human domain, SNA helps provide a description and picture of the resistance, opposition, or neutral entities, and can uncover how the population is segmented and how members interact with one another. SNA focuses on people’s behavior and how it is profoundly affected by their ties to other people and the social networks in which they are embedded.

Using SNA provides visualizations of people within their social spaces and assists in ranking their potential ability to influence those social spaces. This provides an understanding of the organizational dynamics of a resistance, insurgency, or counterinsurgency and highlights how to best influence, coerce, support, attack or exploit them. Collecting human terrain data to support SNA must be driven by commanders through focused efforts and should be conducted during every engagement with a foreign country.”

Examples of Social Network Analysis (SNA) & Unconventional Warfare (UW)

The US funded National Endowment for Democracy (NED), which is credited for numerous destabilization efforts in NAM nation states under the guise of “democracy” or imperialist subjugation as it is better known and practiced, has some great information in its numerous articles discussing the tactical use of social media to fight proxy wars. Only in the examples it provides and resources it cites, just the Chinese and Russians and NAM nation states utilize this technology. NED remains absolutely silent on its US sponsor’s activities.

According to a brief prepared by Dean Jackson for NED through the International Forum for Democratic Studies: The velocity and volume of disinformation in the contemporary information space has amplified its effectiveness and left many members of the public increasingly angry, fearful, or disoriented. This leaves the public even more vulnerable to future manipulation, resulting in a cycle of declining public trust in objective sources of information which some analysts call truth decay.

According to NED, effective ways to use social media as an unconventional weapon in proxy wars is to:

  • React or create crisis by flooding information space and drowning out discussion via online trolling, harassment, and distraction, especially with highly active automated accounts. These techniques push independent voices out of public spaces and are can be considered a new form of political censorship.

  • Falsify evidence, push misleading narratives, and spread falsehoods. Use media and diplomatic resources concurrently to promote false stories at times of rising anti-government sentiment.

  • Create accounts that are partially automated and partially controlled by human users to avoid detection. These are often referred to as cyborg or sock puppet accounts.

  • Use preexisting divides within target societies to produce content for which there is societal demand. Disinformation is more effective when it’s amplifying existing political beliefs and divisions, as opposed to introducing new narratives into the public sphere. 

  • Use proactive disinformation campaigns to achieve real-world impact by influencing the actions of consumers.

  • Use disinformation around elections to influence citizens’ decisions to vote or to abstain from voting.

  • Use disinformation to promote a larger narrative over time or to degrade civic discourse by promoting division or cynicism.

 

Role of Social Media in Arab Uprisings

In an article by Heather Brown, Emily Guskin and Amy Mitchell titled: the Role of Social Media in the Arab Uprisings they state that the Arab uprisings could be deemed

Facebook or Twitter revolutions” as the news media focused heavily on young political opposition protesters mobilizing in the streets, armed with smartphones.

As almost immediately after the Arab uprisings began, there was debate over the role and influence of social media in the ouster of Tunisian president Zine El Abidine Ben Ali and the overthrow of Mubarak. “Social media indeed played a part in the Arab uprisings. Networks formed online were crucial in organizing a core group of activists, specifically in Egypt. Civil society leaders in Arab countries emphasized the role of the internet, mobile phones, and social media in the protests.”

Reality becomes distorted when all social media reference points endlessly repeat the same message concurrently. Within this context, civil unrest is born out of social contagion frenzy. An Egyptian man, who was a student protestor against Mubarak in 2011, confided in me that a crescendo of social media chatter goaded him into taking part in the protests. While he had been beaten by Mubarak’s police in an earlier incident and had personal reasons to protest, he still believes he was driven and manipulated through social media – especially since the locations to which he and his friends were led were followed by film crews and riot police too quickly after their arrival to have been un-staged.

Looking back, he now regrets taking part in the protests, as the removal of Mubarak created a power vacuum that led to greater economic and social struggle, and allowed imperial powers to take advantage of Egypt’s resources.

Personal Account of Facebook’s use of Unconventional Warfare (UW)

On April 18, 2018, I witnessed the Facebook Nicaragua expatriate groups I belong to transform its sleepy pages, that focused on advertising the best music and drink specials in town, to revolutionary pages seeking to overthrow the democratically elected sovereign government of Nicaragua.

Having just returned from Nicaragua two weeks earlier, after spending two peaceful months in San Juan Del Sur, I was shocked at the sudden and widespread vitriol controlling my newsfeed. First, I read how the government was corrupt in making changes to their social security system, and then I read how the government was murdering protestors. I knew from my understanding of Nicaragua’s history; President Ortega’s longstanding commitment to the country; its highly successful model of community policing; and the international context Nicaragua is forced to operate in due to repressive IMF loans and trade agreements, that there was more to this story.

Yet, there was no analysis anywhere to be found, only baseless accusations from predominantly white men and an occasional white woman living in Miami, Texas and Costa Rica. A number of Latinos from various locations in the United States later joined in the chatter claiming they were born in Nicaragua and thus justified in posting hostilities, when engaged in debate.

Property owners I personally knew also spoke against the government and joined in with inflammatory remarks. It is important to understand that President Ortega and the FSLN did not conduct purging campaigns to remove its bitter rightwing enemies/Somozistas. Under President Ortega’s compassionate and practical leadership, Nicaragua even forgave the Contras that its FSLN fought against once they agreed to lay down their arms.

Everywhere I looked the message of hate was the same, be it Facebook, Twitter or mainstream news media from the mouths of rightwing senators Marco Rubio and Ileana Ross-Lehtinen who staged meetings with protestors as well as alternative media such as Democracy Now and the Guardian. The understated president, Daniel Ortega, went from being an astute and beloved aged revolutionary hero to a merciless dictator in social media and the press within a few hours. The news feed was so similar, overwhelming, relentless and well packaged, that it seemed immediately like an expertly orchestrated massive disinformation campaign set by the imperial United States to remove President Ortega and the FSLN from office yet again.

Anytime I questioned the prevailing narrative on the Facebook expatriate groups, 10 to 15 users, with questionable profiles, ganged up on me. I was personally insulted, told to remove my posts, and threatened. They feared my comments. Additionally, my Facebook friends were contacted and insulted and told to “make me remove my posts”. I received phone calls on Facebook Messenger despite the fact that my friend’s list is hidden.

The questionable profiles that contacted me often listed present employment with an obscure non governmental organization (NGO), and/or prior employment with the US State Department, US military, or in one case a user listed his job as a “private investigator” that just returned from “doing security in Venezuela.”

Yet, what was most troubling to me was that people I knew from San Juan Del Sur were brainwashed by the massive and unrelenting wave of disinformation. PSYOPS temporarily worked. They began repeating hostile catch phrases against the government as if it was Holy Scripture. They would not read or watch anything in favor of the government, despite my best efforts through verbal and written communication. They made up their minds, based on social media and Google’s distorted reality, that revolution was what the majority of people in Nicaragua wanted. This distortion couldn’t be farther from the truth, as President Daniel Ortega was elected with over 70 percent of the vote. However, the barrage of repeating fake propaganda videos resulted in social contagion frenzy, similar to that experienced by the Arab students in Egypt.

As it turned out, many of the photos and videos posted and used to incite violence were actually taken in Mexico and Honduras years earlier and many of the “dead” were found resurrected in other parts of Nicaragua alive and well. However, armed criminal mercenaries called “peaceful student protestors” by the news and social media did murder police and civilians. Fortunately, distorted reality can only last a short time.

In Nicaragua, the government had control over the county within three months, as the news and social media lies became apparent to citizens and foreigners. Essentially, the criminal mercenaries that infiltrated the protests were not content to restrict their activities to the ones dictated by their US government employers. To supplement their wages, they robbed, raped and pillaged the communities to which they held hostage, and were systematically removed by local residents as well as the police.

Facebook’s Biased Reaction

Facebook automatically flagged and blocked my posts on Nicaragua’s expatriate groups, and group administrators removed the ones that slipped through. My posts merely explained the US government’s longstanding disinformation campaigns against Nicaragua. Then, Facebook and/or group administrators removed my access to the pages. Eventually, due to threats, I deleted my Facebook profile. However, PSYOPS did not succeed in silencing me; instead, it encouraged me to write for a larger audience.

Control over Dissent Using Facebook

In late July 2018, I created a new Facebook profile and began again to monitor Nicaragua expatriate news groups and post articles that support its sovereign government against slanderous untruths. On July 29th, Facebook removed and considered spam two articles that I posted: “The Case Against Daniel Ortega” by Chuck Kaufman hosted on the Libya360.Worldpress.com website and “Opposition Beyond the Violence in Nicaragua” by John Perry hosted on The Guardian website. Both articles non-violently support the sovereign government of Nicaragua. Fortunately, I was able in both instances to get the posts restored after clicking a few buttons. Yet I still remain unable to get Facebook or group administrators to remove articles that promote violence against the government. Despite my flagging of these fake articles for deletion under the Facebook categories: terrorism, violence, harassment, and hate speech, Facebook allows this vitriol to remain.

After posting a third article titled: “After the Failed Coup, After All the Lies, Nicaragua Rebuilds” by Tortilla Con Sal, hosted on the Telesur website, Facebook locked me out of my user account. The article I posted promoted peace and reconstruction. For the record, none of the articles I posted were ever in violation of Facebook’s community standards.

To unlock my user account, Facebook required me to upload a close-up photo of my face. Facebook’s clear bias against the content of my posts coupled with its desire to invade my physical privacy proved intimidating. Facebook, a corporate behemoth, had me vulnerable and exposed, as I could not access my account to delete it without first revealing my personal identity. Facebook is like the mighty Wizard of Oz in that its master is concealed behind a curtain and unreachable. Facebook lists no email address or phone number for “customer service”.

Did Facebook’s version of Orwell’s Thought Police flag my account? After a few deep breaths, I took a chance that Facebook would use its facial recognition software to confirm my physical identity against an Internet search. So, I found a close-up photo online that corresponded with the fake name I used to open my Facebook account, and uploaded it hoping for the best. It worked. I had access to my profile by the next morning. However, I continue to wonder if Facebook was fooled or if I am merely being given more opportunity to violate the Patriot Act in thought and word? Are my CIA, NSA, FBI and DoD “friends” continuing their surveillance of my personal communications on Facebook’s Messenger and WhatsApp applications just more closely? Under the Patriot Act, Facebook is mostly prohibited from disclosing law enforcement surveillance. According to Facebook, in its summary of its 2017 transparency report, it states:

“The US government requests for account data remained roughly even at 32,742, of which 62% included a non-disclosure order prohibiting Facebook from notifying the user, which is up from 57% during the first half of 2017.”

Other transparency report findings of note for Google, Verizon and AT&T are as follow:

“Google received 48,941 government data requests affecting 83,345 user accounts in the first six months of 2017.” And, “In the reporting period between 2016 and 2017, local, state and federal government authorities seeking information related to national security, counter-terrorism or criminal concerns issued more than 260,000 subpoenas, court orders, warrants, and other legal requests to Verizon and more than 250,000 such requests to AT&T.”

On May 24, 2018, the ACLU filed a Freedom of Information Act request to find out how agencies like the FBI and the Department of Homeland Security are collecting and analyzing content from Facebook, Twitter, and other social media sites.

Government surveillance of social media can have serious consequences, whether you’re a U.S. citizen, a lawful resident, or are seeking to immigrate to or visit the United States. The FBI appears to be using social media as a basis for deciding who to interview, investigate, or target with informants or undercover agents. A single Facebook post or tweet may be all it takes to place someone on a watch list, with effects that can range from repeated, invasive screening at airports to detention and questioning in the United States or abroad.”

With the proliferation of US government non-discloser surveillance, the use of facial recognition software, and the requirement to upload close-up photos to gain access to existing profiles, the velvet gloves are completely off Facebook as an iron fisted US government spy tool. The justification that this intrusive level of policing is merely to remove “fake profiles” doesn’t fly. There are alternate methods that do not compromise our constitutional and civil rights. This is a ruse, engineered by the NSA. Be warned.

Facebook Facial Recognition Software and the US National Security Agency (NSA)

As discussed by James Risen and Laura Poitras in their May 31, 2014 article titled: N.S.A. Collecting Millions of Faces From Web Images, the National Security Agency (NSA) is actively harvesting massive amounts of images of people from communications that it intercepts through its global surveillance efforts for use in sophisticated facial recognition programs, according to top-secret documents.

The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. The agency intercepts millions of images per day including about 55,000 facial recognition quality images which translate into tremendous untapped potential, according to 2011 documents obtained from the former agency contractor Edward J. Snowden.”

In-Q-Tel (IQT)

In early 1999, with funding directed by the US Central Intelligence Agency (CIA), input from Silicon Valley consultants and Norman Augustine, a former CEO of Lockheed-Martin, In-Q-It, a non-profit corporation was formed. Its core mission to improve the data collection and analysis capabilities of the CIA through access and control over emerging Information Technology (IT) remains intact to date. By March of 1999, the corporation received its first contract. In 2000, its name was changed to In-Q-Tel (IQT).

IQT invests in areas where there is both a CIA need and private sector interest. Examples of commercial applications that also support intelligence functions are: data warehousing and mining, knowledge management, profiling search agents, geographic information systems, imagery analysis and pattern recognition, statistical data analysis tools, language translation, targeted information systems, mobile computing, and secure computing.

Though IQT, the CIA has the option of purchasing products directly from the vendor or launching Research & Development (R&D) projects. While IQT’s present budget remains secret, its first year budget was $28 million. According to a 2013 Fox Business News report, IQT claims that for every dollar it invests in a company, the venture community invests over $9. Further, it claimed that it had leveraged more than $3.9 billion in private-sector funds.

R&D remains the core of its activities. Sometimes IQT assembles teams of companies to create the solution it seeks; other times it is a co-investor in a fledgling company with additional business partners. IQT also uses request for proposal. Essentially, IQT is empowered to use whatever model meets its objective.

In the area of R&D, the CIA’s agreement with IQT allows it and/or its partners to retain title to the innovations created, and to freely negotiate the allocation of Intellectual Property (IP) derived revenues. The only major stipulation is that the CIA retain traditional “government purpose rights” to the innovations. This agreement has allowed IQT to amass considerable financial resources secretly over the last nineteen years since its inception. Also, this agreement has permitted collaborating and beholden individuals to become extremely wealthy and powerful.

To restrict contracting to specific entities, and to achieve privacy from oversight authorities, IQT uses DARPA’s contract model called “Other Transactions” (OT). OT contracts enable IQT to bypass Federal Acquisition Regulations (FAR), which requires competition in federal contracting.

Because of the clandestine nature of IQT’s work and its key relationship to the CIA, both entities remain extremely vulnerable to security risks during solution transfer.

Origin of Facebook

While no record of the CIA directly funding Facebook through IQT is apparent, members of IQT’s top management are founding members and/or board members of Facebook. Some of Facebook’s allure to users is that Mark Zuckerberg and his friends started the company from a Harvard dorm room and that he remains the chairman and chief operating officer. If he didn’t exist, he would need to be invented by Facebook’s marketing department. Primarily, the legend and image of a fresh faced Zuckerberg provides a palatable context that entices young people to voluntarily part with their constitutional right to privacy for social acceptance. Though subtle coercion, young people come to believe that in order to be “liked” by their peers, they need to be part of the Facebook brand.

A few months after Facebook was formed in 2004, it received its first capital injection from Peter Thiel, a member of the Steering Committee of the exclusive Bilderberg Group, the drivers of globalization. Members include political leaders, key members from the intelligence community, and experts from industry, finance, academia and the media. According to Global Research’s Stephen Lendman, in his May 2014 article titled: The True Story of the Bilderberg Group and What they May Be Planning Now:

“Bilderbergers want to supplant individual nation-state sovereignty with an all-powerful global government, corporate controlled, that’s check-mated by militarized enforcement.”

In August of 2004, Thiel acquired a 10.2% stake in Facebook for $500,000. The next two capital injections were $12.7 million from Thiel and Accel Partners in May 2005 and then $27.5 million from an Accel-led round of financing that included Thiel, Accel and Greylock Partners in April 2006. In 2012, Thiel sold the majority of his shares for over $1 billion, but remains on the board of directors.

Essentially, IQT is linked to Facebook through Thiel, and Thiel is linked to IQT through his firm Palantir. So, to understand Facebook it is first necessary to understand Palantir, then Thiel.

Palantir

According to Wikipedia, Palantir was started in 2004. Its only outside backer was the CIA’s nonprofit venture capital firm, IQT. Through pilots facilitated by IQT with computer scientists and analysts from intelligence agencies, Palantir’s technology was developed over a three-year period. A document leaked to TechCrunch revealed that Palantir’s clients as of 2013 included at least twelve groups within the U.S. government, including the CIA, DHS, FBI, CDC, the Marine Corps, the Air Force, Special Operations Command, West Point, the Joint Improvised-Threat Defeat Organization and Allies, the Recovery Accountability and Transparency Board and the National Center for Missing and Exploited Children.

Peter Thiel

According to Wikipedia, Peter Thiel was born in Germany and holds German, American and New Zealand citizenship. Besides being a member of the Bilderberg Group’s Steering Committee as referred to earlier, Thiel is the co-author of an anti-multicultural book titled “The Diversity Myth: Multiculturalism and Political Intolerance on Campus”, where his racist and misogynist bias is apparent in his argument that multiculturalism in colleges is hurting education and that some cases of alleged date rape are actually seductions that are later regretted.

Despite his apology, issued 20 years after the book was published, he gave $1.2 million to the campaign of then Republican presidential nominee Donald Trump, who ran on a white nationalist campaign. Thiel is also is a member of the super PAC called: Make America Number 1. The super PAC is credited with donating funds to Steve Bannon, via a shell company he heads named Glittering Steel. Bannon is widely considered a racist, anti-Semite and white nationalist. The supper PAC also donated funds to rightwing Senator Ted Cruz. With Thiel’s clear intent and bias, it should be no surprise that the Facebook Cambridge Analytica scandal favored Trump in the election, and that the violent prevailing narrative against Nicaragua, supported by Ted Cruz, is impossible to remove from Facebook’s expatriate group pages.

Accel Partners: In 2004, Accel partner James Breyer sat on the board of directors of military defense contractor Bolt, Beranek and Newman (BBN) with IQT’s CEO Gilman Louie. BBN is known for essentially helping to create email and the Internet for the DoD. Breyer is a member of the Council on Foreign Relations.

Greylock Partners: Howard Cox, the head of Greylock, served on IQT’s board of directors. Before Greylock, Cox served two years in the Office of the Secretary of Defense.

Origin of Google

Launched in 1998, Google is one of the world’s largest media companies. While the Department of Defense (DoD), CIA, NSA and Google’s marketing department would like users to believe that its founders, Stanford University students, Larry Page and Sergey Brin developed software independent of the DoD, the truth is they didn’t. They were both on the payroll of the National Science Foundation (NSF) while working on its Stanford Digital Library Project (SDLP). This library project is similar to Google in that it involved the creation of search algorithms to scan large quantities of data to find relationships.

The NSF is funded by the US federal government and expresses in its mission statement its intention to “secure the national defense”. NSF has a longstanding relationship with the DoD’s Defense Advanced Research Projects Agency (DARPA). Nothing requiring serious funding and real paychecks involving Information Technology and US Universities is done without DARPA knowledge as detailed below:

“In the 1970s, the agency responsible for developing emerging technologies for military, intelligence, and national security purposes the Defense Advanced Research Projects Agency (DARPA) linked four supercomputers to handle massive data transfers. It handed the operations off to the National Science Foundation (NSF) a decade or so later, which proliferated the network across thousands of universities and, eventually, the public, thus creating the architecture and scaffolding of the World Wide Web.”

Not only was Google’s development nurtured by NSF/DARPA, but Google was also was aided by the secretive Massive Digital Data Systems (MDDS) program which was administered by private contractors for the CIA and NSA. The MDDS program sought to identify the digital fingerprints of users inside the World Wide Web so information requests could be tracked, sorted and aggregated to reveal individual proclivities and that of like-minded others with the intention of assembling target groups for easy surveillance so as to predict and counter their plans. The MDDS project was named Birds of a Feather with the thinking that like-minded individuals will engage in coordinated action together, just as birds fly in predictable V-formations. Predictability is key to the CIA in its efforts to weaponize social unrest. MDDS is considered to have helped create the design breakthrough that Google was built upon

Google has been an obvious partner with the CIA since 2004 when the company bought Keyhole from IQT, the CIA’s venture capital nonprofit. EarthViewer, Keyhole’s mapping technology software, became Google Earth.

Google and Social Media’s Influence

Besides geographic and locational tracking, Google assists the government in its efforts to write, and rewrite, history. According to its Google’s transparency report, the US government has named 79,901 items for removal since 2009. To add perspective to this number, consider that for this same period in time, Venezuela has named 10 items for removal, and Nicaragua has named 1 item for removal.

Content Placement in Social Media and Google

Olivia Solon and Sam Levin detail, in their December 16, 2016 article for The Guardian, How Google’s Search Algorithm Spreads False Information with a Rightwing Bias. According to the authors, search and autocomplete algorithms prioritize sites with rightwing bias, and far-right groups trick it to boost propaganda and misinformation in search rankings. As described below, the authors uncovered this bias in environmental as well as social and political examples:

“Following a recent investigation by the Observer, which found that Google’s search engine prominently suggests neo-Nazi websites and anti-Semitic writing, the Guardian has uncovered a dozen additional examples of biased search results. Google’s search algorithm and its autocomplete function prioritize websites that, for example, declare that climate change is a hoax, being gay is a sin, and the Sandy Hook mass shooting never happened.”

To test this allegation out, I entered the following text: “Socialism is…” Autocomplete added: “…is for figs.” The full sentence with autocomplete then read: “Socialism is for figs.” Photos of a red t-shirt appeared. On the t-shirt is a drawing of Che Guevara, a limp wrist, and text. Upon review, I found that an extreme rightwing group is marketing this t-shirt. The word “figs” in the text is written with a missing “I” that is replaced with the drawing of a fig hanging from a tree branch. Because of drawing of a limp wrist, this text can be interpreted by the reader to mean that socialism is for “fags.” In the US, the word “fag” is a derogatory name for homosexuals, and a limp wrist is a derogatory symbol. This supports the Guardian’s observation of Google’s bias against homosexuals as well its bias against socialists. Additionally, the fig fruit represents the name of the village in Bolivia where Che Guevara was captured and murdered. Thus, the fig represents a death threat against socialists. Hopefully, a socialist cyber activist can remove this blight against a beloved revolutionary hero.

Google’s Influence in Elections

As explained by Robert Epstein, from the American Institute for Behavioral Research and Technology, Google has the power to rig elections through something he calls the search engine manipulation effect (SEME). Based on his four years trying to reverse engineer Google’s search algorithms, he concludes that:

“We know that if there’s a negative autocomplete suggestion in the list, it will draw somewhere between 5 and 15 times as many clicks as a neutral suggestion,” Epstein said. “If you omit negatives for one perspective, one hotel chain or one candidate, you have a heck of a lot of people who are going to see only positive things for whatever the perspective you are supporting. Even changing the order in which certain search terms appear in the autocompleted list can make a huge impact, with the first result drawing the most clicks, he said.”

Appearing on the first page of Google search results can give websites undue authority and traffic.

These platforms are structured in such a way that they are allowing and enabling, consciously or unconsciously, more extreme views to dominate,” said Martin Moore from Kings College London’s Centre for the Study of Media, Communication and Power.”

Epstein believes these two manipulations work together and have a profound impact on people, since they are unaware it is being done. He believes this is compounded by Google’s personalization of search results. This means users see different results based on their interests.

According to politico.com, the problem is that more than 75 percent of all online searches in the United States are conducted on Google. Thus, if Google’s CEO, a rogue employee or the search algorithm favors one candidate, there is no way to counteract that influence. Politico’s research shows that even when people do notice they are seeing biased search rankings, their voting preferences still shift in the desired directions toward the bias. It’s as if the bias is serving as a form of social proof. The thinking is that if the search engine prefers one candidate, that candidate must be the best. Biased rankings are hard for individuals, regulators and election watchdogs to detect as SEME is easy to hide through customized search results.

In Wired’s 2010 article titled: Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring, it discusses the company Recorded Future, that is funded by both the CIA’s IQT non-profit and Google. Both IQT and Google Ventures have seats on Recorded Future’s board. Not only does the software, Recorded Future, scour websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents in the present, but also in the future. In looking at the invisible links between documents that mention similar or related entities and events, it can figure out the participants, the location, and predict when it might occur. According to Recoded Future, the software can assemble actual real-time dossiers on people. Recoded Future maintains an index with more than 100 million events.

“The cool thing is, you can actually predict the curve, in many cases,” says company CEO Christopher Ahlberg, a former Swedish Army Ranger with a PhD in computer science.”

Content Placement in Social Media and Google

Besides taking proactive security measures, activists and the NAM can benefit by controlling the technology that decides the placement of supportive material on social media and Google. As most involved in the drafting and dissemination of content already know, everything that departs from the prevailing imperialist narrative is automatically considered subversive and blocked. While quality content continues to exist, locating it on the Internet is like finding a needle in a haystack, even when one already knows what is being sought, by whom, and from where.

The latest trick is for a news item of interest to be blocked by a message warning of an “expired security certificate” and threatening “a virus upon opening”. This was found on an article titled: Cyber warfare: Challenge of Tomorrow, by none other than Counterpunch’s plagiarist spy Alice Donovan.

The Cost of US Cyber Warfare

The United States 2019 proposed intelligence budget at $73 billion has nearly doubled since 2005. This figure includes the National Intelligence Program (NIP) budget at $54.6 billion and Military Intelligence Program (MIP) budget at $18.4 billion. Back in 2005, there was no MIP budget. The total NIP Budget was $39.8 billion, which is still an exorbitant amount of money.

The NIP funds Intelligence Community (IC) activities in six Federal Departments and two independent agencies: the Department of Defense, the Department of Justice, the Department of Homeland Security, the Department of State, the Department of Energy, the Department of Treasury, the Central Intelligence Agency, and the Office of the Director of National Intelligence.

As described in by the Washington Post in its article titled: “The Black Budget”, the CIA, NSA and National Reconnaissance Office (NRO) received more than 68 percent of the 2013 black budget. The CIA received $14.7 billion, the NSA $10.8 billion, and NRO $10.3 billion. Within its funding mission categories, $20.3 billion was for Warning U.S. leaders about critical events and $17.2 billion was for Combating Terrorism.

In looking at the new 2019 MIP budget, one can better understand how new initiatives and training in cyber warfare are being funded. Take for example the US Air Force Cyberspace Defense Operations (IB4X1) Summary description:

“Personnel in the Cyber Warfare Operations specialty perform duties to develop, sustain, and enhance cyberspace capabilities. These capabilities are used to defend national interests from attack and to create effects in cyberspace to achieve national objectives.” “They conduct both offensive and defensive cyberspace operations. They act to protect cyberspace systems from adversarial access and attack. They execute command and control (C2) of assigned cyberspace forces and de-conflict cyberspace operations. They will partner with Department of Defense, interagency, and Coalition Forces.”

While the US government clearly takes the lead in unconventional warfare technology, due to its massive resources and funding, it leaves in its wake tons of technological opportunities ripe to be exploited. What can’t be appropriated can be protested. Just don’t post anything tactical on the Internet or use smart phones, because your “friends” in the US government are watching. Take heart, this elaborate surveillance system was devised because the ruling elite is outnumbered. Knowledge is power.

[Lauren Smith, author of historical fiction, has a BA in Politics, Economics and Society from SUNY at Old Westbury and an MPA in International Development Administration from New York University. Her novel on Nicaragua’s 1979 revolution is due out in 2019.]

Is It Time to Critically Interrogate Nonviolence & Nonviolent Direct Action?

Black Agenda Report

March 15, 2018

By Doug Henwood

time to question nonviolence

Time to question nonviolent direct action as the path to change.

Activism. Democracy. Change through nonviolent direct action. These, Doug Henwood points out, have been fetishes for much of the US left for quite some time, especially that portion of the US left that takes its marching orders from corporate funders. Gene Sharp, the founder of the Albert Einstein Institute who passed away at the end of January was regarded as the father of American nonviolent direct action.

I usually write a weekly piece for Black Agenda Report, but this time I’m going to use that space to republish somebody else’s work, easily the most important thing I’ve heard so far this month. It’s an hour long Doug Henwood interview for the weekly radio show Behind The News on KPFA radio. Doug talks with Marcie Smith, who is writing a book on Sharp’s long and problematic career in the service of the US national security apparatus. Smith is an adjunct econ professor at John Jay College. She reveals how Gene Sharp and the Albert Einstein Institute which he founded weaponized and deployed nonviolent direct action in the service of successful and unsuccessful US attempts to overthrow the governments of the Soviet Union, Ukraine, China, Myannmar, Iran, Egypt during the Arab Spring, Venezuela, the former Yugoslavia and the Baltic States.

Besides deploying nonviolent direct action to topple governments standing in the way of Uncle Sam’s global empire, Gene Sharp and his funders have mentored a good deal of what some regard as the US left – at least those parts of it under the influence of one-percenter philanthropy – in the tactics and what passes for the philosophy of nonviolent direct action. According to Sharp’s and the Albert Einstein Institute’s peculiar philosophy, property destruction is violence, while the ravages of poverty and deprivation, of economic blockades and lack of medical care just to name a few phenomena, are not. Sharp’s views on the methods and importance of nonviolent direct action are highly influential in such quarters as Moral Monday and the so-called New Poor Peoples Campaign, parts of the environmental movement, and other places. Whether or not we embrace or espouse nonviolent direct action as an occasional tactic or a bedrock and fundamental strategy we owe it to ourselves to understand the origin of this idea, why the national security state promotes it, how and for whom it works and does not work, and why.

It’s time to critically interrogate the fetishes of nonviolence and nonviolent direct action as a path to the world we need to build. This great interview is a good start to that conversation. Here is the link. Click to listen or download it.

 

[You can find Doug Henwood’s Behind the News shows archived for the last several years at http://leftbusinessobserver.com .]

Bloodless Lies

The New Inquiry

November 2, 2016

By Lorenzo Raymond

56bloodless-social

This is an Uprising, a widely celebrated new book about how social movements change history, distorts their histories to celebrate non-violence

The black revolt of 2014 was a turning point in how Americans discussed the use of force in social movements. In the pages of the Atlantic, Ta-Nehisi Coates acknowledged that “violence works.” Rolling Stone and the Huffington Post echoed much the same sentiment. Laci Green–a YouTube star and one of the “30 most influential people on the Internet,” according to Time–posted a popular video drawing favorable comparisons between the Ferguson riots and the revolution depicted in The Hunger Games. This sea change was led by the movement itself as African American youth in Ferguson rejected Al Sharpton and other older leaders, partly due to disagreement on strict nonviolence.

this-is-an-uprising
Mark Engler and Paul Engler, This Is an Uprising. Nation Books. 2016. 368 pages.
The notable exceptions to this trend were those who spoke for the state. These parties advocated for nonviolent action in a most conspicuous way. On the eve on the announcement of the non-indictment of Officer Darren Wilson, the killer of Mike Brown, Attorney General Eric Holder solemnly intoned that “history has shown us that the most successful and enduring movements for change are those that adhere to non-aggression and nonviolence.” In an ABC interview on the same day, President Obama urged that the “first and foremost” responsibility for Americans reacting to the verdict was to “keep protests peaceful.”

It shouldn’t be necessary to remind people of major public discussions from two years ago, but America is a notoriously forgetful nation. And when it comes to matters of protest, politics, reform, and revolt, many people are invested in this kind of forgetting. The stated purpose of Mark and Paul Engler’s new book This Is an Uprising (2015) is to work against this historical amnesia. The Engler brothers profess to build “a healthy movement ecology [which] preserves the memory of how past transformations in society have been achieved.” This is a worthy goal, and the brothers appear well-placed to realize it: one is a professional community organizer while the other is a fixture of progressive publications including Dissent and Yes! Magazine. The book has been praised effusively by lefty celebrities, including Bill McKibben and Naomi Klein, as the new authoritative text for mass civil disobedience. Yet rather than building on the nuanced understanding of street tactics that developed in the wake of Ferguson, the Englers selectively distort social movement history in a blind commitment to a particular kind of direct action.

The opening chapters are an introduction to the modern history of tactical pacifism as embodied in the practice of Martin Luther King’s Birmingham campaign and, later in the 1960s, by the theories of political scientist Gene Sharp. The authors contend that both these figures abandoned religious nonviolence to develop a rational, realist praxis known as “civil resistance,” not “pacifism.” The principle reason for this name change is that Gene Sharp rejected the P-word, arguing that the term only applied to private individuals operating from spiritual inspiration. The Englers affirm that Sharp’s “politics of nonviolent action” are distinct from pacifism because the latter is essentially apolitical.

What the Englers fail to acknowledge, however, is that virtually all the 20th century activists whom Sharp and his school hold up as role models did call themselves pacifists. A.J. Muste, Bayard Rustin, Martin Luther King, and even Daniel Berrigan (who for a time defied strict Gandhism by fleeing imprisonment after an act of property destruction) all called themselves pacifists. When scrutinized, the switch from “pacifism” to “nonviolent action” appears to be a case of re-branding in response to the poor reputation pacifism had among young people by the end of the 1960s. This was hardly the first time pacifism was renamed rather than critically challenged: Leo Tolstoy referred to the use of civil disobedience without violence as “non-resistance.” Gandhi rejected that name, but employed essentially the same strategy; Tolstoy and Gandhi exchanged correspondence and agreed on practically all points.

In the 21st century, the term du jour is “civil resistance” and sometimes “people power,” yet the method’s founding father is still considered to be Gandhi. It also seems significant that in spite of “breaking from the earlier traditions of moral pacifism,” as the Englers put it, many of the major proponents of civil resistance, from Gene Sharp to George Lakey to Bill Moyer to Chris Hedges, come from highly religious backgrounds.

In addition to a re-branding, “civil resistance” is also a misbranding. The term is adopted from Thoreau’s 1849 essay “On Resistance to Civil Government,” but his use of “civil” referred to the type of domestic government being resisted, not to the method of civility deployed. Thoreau himself later said that John Brown’s violent lack of civility was the best thing that ever happened to the abolitionist movement.

These contradictions aside, the Englers trace how “civil resistance” has become increasingly accepted in mainstream political science. To demonstrate this, they introduce us to Erica Chenoweth, now one of the most celebrated social movement theorists working in the field. Chenoweth got her start producing the widely cited study Why Civil Resistance Works (2011) in collaboration with Maria J. Stephan of the U.S. State Department. According to the Englers, the study proved that “nonviolent movements worldwide were twice as likely to succeed as violent ones.” But the sample size of the study is far too narrow to prove such a sweeping claim. There are no civil rights or labor struggles included in the Chenoweth data set, which is focused exclusively on regime change. And, as Peter Gelderloos pointed out in his book The Failure of Nonviolence (2013), the outcomes of the nonviolent revolutions cited by Chenoweth have little to do with social justice or liberation. At best they replace one oligarchy with another, with no radical change in social relations or even net gains in quality of life.

At one point, the Englers note that the same political science prize that Chenoweth won–the Woodrow Wilson Foundation Award–was previously bestowed on Henry Kissinger. This, for them, is the height of irony: Chenoweth is, after all, the opposite of the Kissingers of the world. But while they may represent different sides of the aisle in terms of American political divisions, Chenoweth’s work is, in many ways, just as useful to the U.S. empire.

At the height of the Cold War, the government used Kissinger’s work to justify the “hard power” of the arms race and violent intervention against communist regimes. Today Chenoweth’s work helps to justify–and in this case, mystify–Obama’s “soft power” agenda of “democracy promotion” exercised through seemingly benign agencies like the United States Agency for International Development (USAID) and the United States Institute of Peace (USIP)–the former organization was recently caught covertly organizing against the Castro government in Cuba. And while direct U.S. government involvement with pacifist academics is a relatively new development–emerging in the mid-2000s, around the same time that Gelderloos first observed that “nonviolence protects the state”–their financial relationship goes back at least to Gene Sharp’s first doctoral work in the late 1960s, which was funded by the Department of Defense.

But if the American empire promotes strictly nonviolent movement-building to overthrow its enemies, wouldn’t that demonstrate that it’s as powerful a method as its proponents say it is? The short answer is no. When civil resistance works–and when the U.S. government deploys it abroad–it’s almost always in combination with more violent forms of pressure. To illustrate this, one need look no further than the Yugoslav movement to unseat President Slobodan Miloševi?, which figures prominently in Chenoweth’s famous study and takes up more than thirty pages in This Is an Uprising. In the Englers’ version, this regime change is primarily attributable to Otpor, a “leaderless” student group from Serbia. Otpor promoted nonviolence in the Sharpian model, with an official policy to submit to arrest and abjure any kind of self-defense, even when the police physically abused them. In this way, they won the sympathy of the public and even the Serbian establishment.

But Otpor didn’t operate in a vacuum. Not only did they overthrow Miloševi? in the period when he had just lost a war with NATO, but also, in the midst of Otpor’s campaign, Miloševi? was being challenged by the armed insurgency of the UÇPMB (successor group to the Kosovo Liberation Army). On top of this, militant groups in Montenegro threatened to secede if he was re-elected. The Englers quote Otpor veterans’ claims that the NATO raids undermined the opposition and strengthened the regime, but the record shows that Otpor prospered in the aftermath of the bombing. One prominent civil resistance study acknowledges that “a number of middle and higher-ranking police and army officers made secret pacts with the democratic opposition and helped the movement forward.” Furthermore, Otpor’s victory was not strictly nonviolent: Anti-Miloševi? protesters rioted in October 2000 when the president refused to concede the election. The Englers admit, in passing, that things “got a little out of hand,” but they fail to describe the full extent of the insurrection: not only was there arson and other property destruction in Belgrade, but also the fact that an Otpor supporter killed a civilian by driving over him with a bulldozer.

This cherry-picked example of civil resistance winning its demands occurred in a context where both NATO and an armed guerilla group simultaneously made the same demand. And yet, under today’s political science taxonomy, this is what’s considered a nonviolent victory. Such dubious classification is common in the civil resistance world: Peter Ackerman, the venture capitalist who has funded much of Gene Sharp’s work, once claimed that Ukraine’s Euromaidan movement should be considered nonviolent because only a minority of the protesters threw firebombs and brandished guns.

A good faith argument for pacifist success in such cases would credit the intervening factors as a diversity of tactics supporting a nonviolent core, or attribute it to what is known in social movement theory as the “radical flank effect,” which argues that the presence of radical militants in a social movement helps make the less militant actors seem reasonable and worthy of having their demands met. Yet not only do the Englers undervalue such phenomena, they actively denounce them.

In spite of primarily advocating for nonviolent direct action, the Englers express support for electioneering, stating that while it is a separate tactic, it can complement civil resistance. If they are genuinely non-ideological strategists, they should take the same position towards guerilla activity. But, while the Englers repeatedly speak of the need for movements to “escalate,” they jerk back from any overlap with property destruction. This flinching is excused with a fable of the radical environmental advocacy movement Earth First! in the 1990s. The Englers paint the picture of a movement with a macho fetish for violence that was set right by the influence of the more moderate feminist Judi Bari, who enforced nonviolence and built the populist Redwood Summer campaign of 1990, winning political victories against logging in the Pacific Northwest. This success, the Englers claim, was in marked contrast with the Earth Liberation Front (ELF), the monkeywrenching eco-saboteurs who left defected from Earth First! after the rise of Bari.

The ELF is portrayed as a gang of clowns who accomplished nothing besides getting themselves imprisoned. Yet the Englers also tell us that “in the end, Redwood Summer did not produce immediate legislative gains.” The best they can claim for the nonviolent campaign is “a 78 percent drop in logging in national forests.” The ELF began carrying out its arson and sabotage attacks on the logging and tourism industries in the Pacific Northwest in 1996; these years of victory were among ELF’s peak years of activity, when it was clearly functioning as the radical flank of Earth First! But the Englers’ attitude towards militants is eliminationist, not just separatist: the ELF shouldn’t have just left Earth First!, they should have ceased to exist at all. Such absolutism is completely contrary to Bari’s actual policy: “Earth First!, the public group, has a nonviolence code,” she wrote in 1994, “monkeywrenching is done by [the] Earth Liberation Front […] Civil disobedience and sabotage are both powerful tactics in our movement.”

The double standards that the authors apply between violent and nonviolent actors undermine their claims of unbiased pragmatism. When pacifist organizers provoke violent repression, the Englers regard it as a necessary cost of the campaign–“leading proponents of civil resistance emphasize that strategic nonviolent action […] may result in serious injuries and even casualties”–but when black blocs draw repression, it’s completely unacceptable. ACT UP are praised as “desperate, aggressive, and often exceptional young men,” who had the courage to risk “potentially alienating the very people that advocates want to win over.” The ELF, on the other hand, are pictured as fanatics with no strategy. When the civil rights movement employed “often unpopular” tactics, generating “overwhelmingly negative” reaction in public opinion polls, this was admirable; when the Weather Underground and other Vietnam-era militants defied public opinion, they were simply out-of-touch adventurists (even though the latter’s action led to massive troop withdrawals and a constitutional amendment to lower the voting age).

The Englers, it must be noted, have attempted to apply their precepts, not merely theorize them. In the wake of Occupy Wall Street, they helped organize the 99% Spring campaign, a coalition dominated by Moveon.org that aimed to put “hundreds of thousands” of people in the streets to change foreclosure policy. Coalition spokesman and Service Employees International Union (SEIU) executive Stephen Lerner promised to “engage the millions of people we need to do [sic] to build the kind of movement we need at this time in history.” According to him, this was a job that Occupy was not capable of doing without their guidance. In the end, the 99% Spring mobilized a few thousand people–far less than Occupy did nationwide–and had no impact on banking foreclosure policies, which remained abysmal. More recently, the brothers were involved with a nearly identical coalition–Democracy Spring/Democracy Awakening–based around campaign-finance reform. Initially, Democracy Spring seemed more tactically ambitious with a program of organizing mass civil disobedience at the Capitol Building. However, press coverage of the arrests turned out to be so meager that most of the campaign’s supporters were left distraught.

As historians and theorists of social movement, the Englers might have been able to see this failure coming, since they actually describe a precedent for their ineffectual campaigns in This Is an Uprising. In his 1962 project in Albany, Georgia, Martin Luther King and his Southern Christian Leadership Conference (SCLC) left a yearlong campaign with no tangible civil rights advances achieved. King had been thwarted by Chief of Police Laurie Pritchett, who capitalized on SCLC’s nonviolent strategy by avoiding any appearance of brutality and de-escalating conflict between police and protesters, thereby pre-empting any dramatic scenes that could draw national attention. King’s reputation within the movement declined until the spectacular victory of the following year’s Birmingham campaign. The Englers spend over twenty pages on Birmingham, promising to demonstrate just why it succeeded while Albany failed, but they never do.

In truth, the Birmingham campaign benefitted from having both a police force and a protest movement that was markedly less peaceful than in Albany. King wasn’t able to get consistent media coverage until after protests became, as Taylor Branch put it, “a duel of rocks and fire hoses.” One of King’s aides, Vincent Harding, later acknowledged that the black youth who came to dominate the campaign’s street action were “the children of Malcom X” and that their escalation to “a burning, car-smashing, police-battling response” marked Birmingham as “the first of the period’s urban rebellions.” Historian Glenn Eskew wrote that “the aftermath of national protest, international pressure, and inner-city riot convinced a reluctant Kennedy administration to propose sweeping legislation that, once passed as the Civil Rights Act of 1964, marked a watershed in race relations.”

Yet these events of the Birmingham campaign are never mentioned in the Englers’ book in any form. It is here that the brothers step into outright dishonesty: they know very well that the scholarly consensus on Birmingham is that the violent protesters made an invaluable contribution (Eskew’s book is one of their sources). Yet in spite of spending a tenth of their book’s text on Birmingham, they refuse to even acknowledge the violent protesters’ existence.

Such historical censorship rationalizes the choreographed civil disobedience that the Englers help organize today, which quarantines “good protesters” from “bad protesters.” This, in turn, enables the same counter-strategy that Laurie Pritchett employed so effectively against King in Albany. What the Englers call “discipline” is actually de-escalation that facilitates police crowd control. Indeed, there is now a fully developed police doctrine known as “negotiated management” based on the avoidance of direct conflict with protesters. The National Lawyers’ Guild official, Traci Yoder, has written that negotiated management “is in many ways more effective […] in neutralizing social justice movements” than overt state repression.

But while the brothers focus on the SCLC at length, they fail to discuss the Student Nonviolent Coordinating Committee (SNCC) who, the brothers passingly admit, pushed SCLC into its most productively confrontational actions. This is not only because the history of SNCC began with Gandhian practice, but also because it rapidly progressed beyond it. Although its militancy is sometimes attributed to Black Power-era missteps, SNCC’s commitment to a genuinely grassroots politics led it to work with openly armed African Americans as early as 1961 in Monroe, North Carolina, as well as with more discreetly armed black peoples all over the South. By spring 1964, SNCC associates in Cambridge, Maryland were having gunfights with the National Guard and one of the group’s advisers, Howard Zinn, noted that the movement had reached “the limits of nonviolence.” But it was crucial that those limits were reached, or there wouldn’t have been a Civil Rights Act.

In spite of its name, SNCC’s principles always had less to do with nonviolence than with organizing from the bottom-up. The group’s guiding light was Ella Baker, arguably the most important African American leader of the 20th century. As many have noted, Baker preached neither strategic nonviolence nor strategic violence. Drawing from her decades of experience, Baker counseled SNCC organizers to distance themselves from institutional power; they might maintain dialogue with the establishment left–trade unions and NGOs tied into what she called “the foundation complex”–but they should be wary of entering into partnerships with them. Instead they should follow the lead of working-class communities on the ground. This repeatedly led SNCC organizers away from nonviolence. Then as now, serious movements make serious enemies (think of the shootings last year in Charleston and Minneapolis) and self-defense quickly becomes paramount for frontline activists. Baker’s longtime friend and biographer Joanne Grant recounted that as pacifism faded away in SNCC, Baker “turned a blind eye to the prevalence of weapons. While she herself would rely on her fists […] she had no qualms about target practice.” At the same time, the failure of peaceful reform logically led oppressed communities towards insurrection.

It is often said that without the guidance of an anti-authoritarian and non-ideological figure like Ella Baker, the Black Power militants of SNCC began to lose perspective. Yet it can equally be said that the pacifists lost their way as well. The cause of social justice in America has been suffering from believing the former but not reckoning with the latter for the past forty years.

 

[Lorenzo Raymond is an independent historian and educator living in New York City. Lorenzo blogs at Diversityoftactics.org]

 

Conspiracy Theories and Nonviolence

The Real News

January 6, 2014

by Michael Barker

otpor-srdjan-popovic-canvas-occupy-movement

 

In his December 2013 article published by The Real News as “Analysis of STRATFOR leaks misrepresents nonviolent movements,” professor Stephen Zunes correctly acknowledges the “inexcusable collaboration with the global intelligence company STRATFOR” undertaken by his former colleague, the Serbian activist Srdja Popovic. In retrospect Zunes observed, that: “Even prior to the recent revelations, Popovic’s activities were being increasingly recognized as problematic within the network of proponents of strategic nonviolent action, including many of us who had worked with him in the past.” Here Zunes might have been referring to my 2011 article “CANVAS[ing] for the nonviolent propaganda offensive,” but this seems unlikely, especially given the fact that in his latest article he chooses to falsely label me as being “notorious” for “conspiracy-mongering.”

Either way if criticism of Srdja Popovic were taken seriously amongst progressive circles committed to non-violence, I would imagine that it would have been a good idea for some of Zunes’ colleagues to publicly distance themselves from Popovic — a man that Zunes describes as a “left-of-center Serbian nationalist” who “believes more in himself more than any ideology…” I  make this recommendation because Popovic is still included upon the advisory board of Waging Nonviolence, a web-based project (for which Zunes is a regular contributor) where our problematic friend Mr Popovic sits alongside a number of Zunes’ colleagues from the International Center on Nonviolent Conflict (ICNC).

Unfortunately, in spite of my ongoing dialogue with Zunes and his co-workers which go back to 2007, Zunes continues to misrepresent my carefully laid arguments. Thus vis-a-vis the ouster of Slobodan Milosevic in 2000, he says that my work downplays the Serbian uprisings indigenous roots. This simply is not true, as can be demonstrated by a quick perusal of the article he is referring to which I published through ZNet in 2006 as “Promoting polyarchy in Serbia.” Here Zunes repeats the tired refrain of accusing me of being “notorious” for “conspiracy-mongering”; an accusation I rebutted at-length in 2008.

Re-appropriating Zunes’ own mis-analysis of imperial interventions into the peace community: “It is unfortunate, therefore,” that his own contributions to the theorizing of nonviolence have been “so compromised by [his] lack of understanding of this phenomenon.” For a detailed outline of the resulting problems resulting from such a compromised analysis, see “Blinded by people power: Stephen Zunes on the ousting of dictators.”

None of this implies that Peter Ackerman’s nonviolent activism is part of any sinister conspiracy. On the contrary he is quite open about it all; although it is rare that anyone draws attention to his shadowy hobbies.All this is quite ironic given the well-established imperial connections of the International Center on Nonviolent Conflict (ICNC) whose academic advisory board Zunes has headed since 2006. We are after-all talking about a Center which is led and funded by a member of the ruling-class named Peter Ackerman, whose more anti-democratic activism I examined last year for Counterpunch; whose commitments to breaking unions in New York are ongoing, as are his efforts to escalate counterinsurgency operations in Iraq and Afghanistan. None of this implies that Peter Ackerman’s nonviolent activism is part of any sinister conspiracy. On the contrary he is quite open about it all; although it is rare that anyone draws attention to his shadowy hobbies.

Although it is perhaps pedantic, I would also like to add that my 2008 article about “democracy promotion” in Serbia was not self-published on the ZNet bloggers’ space as Zunes argues. In fact, this bloggers space did not even exist during the years in which I regularly submitted articles to ZNet, therefore all work was posted online with the support of one of ZNet’s editors. That said, major Z Magazine and Znet stalwart Edward S. Herman did post a detailed criticism of Zunes’ defence of imperial interests in his ZNet bloggers space in 2010: this must-read piece was simply titled “Reply to Stephen Zunes.”

Zunes concludes his article by drawing attention to an online petition he initiated in 2008 to address “a spate of bizarre conspiracy theories regarding nonviolent action theorist Gene Sharp…” At the time I was considered to be one of the primary instigators of such conspiracies, so in response I published “Sharp reflection warranted: nonviolence in the service of imperialism”; which in turn was followed by related criticisms from George Cicariello-Maher and Eva Golinger outlined in their excellent article “Debate on the Albert Einstein Institution and its involvement in Venezuela.” Sadly such reflections upon the troublesome relationship between imperialists and many well-meaning advocates of nonviolence has not been an issue that has been engaged with any vigour among many on the Liberal left — which is problematic to say the least. Nevertheless it is perfectly understandable why the ruling-class should seek to manipulate and intervene within progressive social movements, which makes it all the important that we discuss what actions we can take to protect our movements from such unwanted interventions.

 

 

 

Correction: the above-mentioned article “Reply to Stephen Zunes” was coauthored by Edward Herman and David Peterson.

WHAT IS THE “NON-PROFIT INDUSTRIAL COMPLEX”?

ceres-sachs-mckibben

Photo: May, 2013: “CalSTRS CEO Jack Ehnes, Generation Investment Management Co-Founder David Blood and 350.org’s Bill McKibben have a lively conversation about how investors can influence the transition to a low-carbon economy.” Ehnes also serves on the Ceres board of directors. McKibben opens his Ceres presentation with some welcome honesty, speaking of his long-standing friendships/relationships with many Wall Street darlings. Prior to co-founding Generation Investment Management, David Blood, speaking with McKibben, served as the co-CEO and CEO of Goldman Sachs Asset Management. Prior to this position Blood served in various positions at Goldman Sachs Group, Inc., including “Head of European Asset Management, Head of International Operations, Technology and Finance, Treasurer of the Goldman Sachs Group, L.P. and Head of Global Private Capital Markets. Mr. Blood was the first recipient of the John L. Weinberg Award in 1990, an award given to a professional in the investment banking division who best typifies Goldman Sachs’ core values.” [Source]

Center for Syncretic Studies

March 19, 2013

by Elliot Gabriel

(This is an excellent outline to understand a phenomenon within the US which is the internal component of the Gene Sharp/NGO model of ‘Human Rights’ Imperialism abroad, as discussed in our article Gene Sharp: From Berlin Wall to Arab Spring or The Politics of Counter-Revolution – JV Capone)

WHAT IS THE “NON-PROFIT INDUSTRIAL COMPLEX”?

The non-profit industrial complex (or the NPIC) is a system of relationships between:

• the State (or local and federal governments)

• the owning classes

• foundations

• and non-profit/NGO social service & social justice organizations

This results in the surveillance, control, derailment, and everyday management of political movements.

The state uses non-profits to:

• Monitor and control social justice movements;
• Divert public monies into private hands through foundations;
• Manage and control dissent in order to make the world safe for capitalism;
• Redirect activist energies into career-based modes of organizing instead of mass-based organizing capable of actually transforming society;
• Allow corporations to mask their exploitative and colonial work practices through “philanthropic” work;
• Encourage social movements to model themselves after capitalist structures rather than to challenge them

Terrorism franchise: The Gene Sharp Method

VenezuelaOtpor

Printed in the Bolivarian Republic of Venezuela

April, 2014

Gene Sharp is a former American military who nowadays teaches political sciences at the University of Massachusetts. He founded the Albert Einstein Institute and is the author of an essay entitled From dictatorship to democracy, which is the result of a pragmatic and political analysis of supposedly non-violent actions as a means to undermine the stability of the constituted power. The work, translated in more than 30 languages, describes methods to overthrow governments; these methods are divided into three big stages: the protest, the non-cooperation, and the intervention, which are always carried out after electoral processes. These three stages are subdivided into five stages that, as it will be seen, have been rigorously applied in Venezuela after the lack of acknowledgment from the opposition of the results obtained during the presidential elections on April 14, 2013.

1. SOFTENING (by means of 4th Generation War): development of opinion matrix focused on real o potential deficit; promotion of conflicts and dissatisfaction; promotion of uneasiness factors, mainly: shortage, criminality, citizens’ safety, dollar manipulation, lockout strikes, corruption complaints; promotion of sectarian intrigues, and unity fracture.

2. DELEGITIMISING: manipulation on anticommunist or antipopulist prejudices; propel of advertising campaigns to defend freedom of press, human rights, and public freedom; accusations of totalitarianism and single systems of values; ethical-politic fracture.

3. STREETS WARMUPS: promote of street mobilization; creation of a fighting platform that globalizes political and social demands; generalization of all kind of protests, propel of government failures and mistakes; coordination of protests, blockage, and take of public institutions (disrespect towards institutions) that turn the confrontation into radical.

4. COMBINATION OF DIFFERENT WAYS OF FIGHTING: organization of loutishes and take of emblematic institutions, with the aim to turn them into advertising platforms; development of operations of psychological war and armed actions in order to justify repressive measures and create an atmosphere of ungovernability; propel of rumors campaigns among military forces and try to demoralize the security bodies; promotion of international isolation and economic siege.

5. institutional fracture : based on street actions, take of institutions, and military uprising, the President is forced to quit. In the case of failure, the pressure on the streets is maintained and armed resistance is assumed, preparing the stage for a military intervention or a prolonged civil war.

This coup protocol has been applied several times around the world against governments that oppose Washington’s rulings with different levels of success. It is clear that in Venezuela this plan is currently in its fourth stage, the most powerful of all since it includes violence by means of armed actions and permanent provocation towards the police forces in order to promote repression.

The main protagonists of this subversive script in Venezuela are the members of a varied group of students referred to as manitas blancas (white hands), made up of youth of the extreme right wing, mainly of private universities.

The students of public universities in Venezuela, which surpass the private universities in enrolments, have had little or none participation in the violent actions, despite their traditions of fight and historical sense of their communities.

The visible heads of the movement known as manitas blancas (their hands are painted white according to the soft coup handbook) are supposedly young people (some of them older than 40 years) who have made student representation in the universities their way of living and have studied endlessly in their institutions, as are the cases of Gaby Arellano and Vilcar Fernández; these two are experts in destabilization thanks to the advices received in training sessions on the soft coup designed by Gene Sharp.

Those are the “students” that, by late January 2014, began a series of so called aggressive actions simultaneously in different regions of the country, which lead to violent actions near the universities chosen to activate the street warm-ups stage of the coup plot. The white hands had received the express order of mobilize from the right-winged leaders Leopoldo

López and María Corina Machado in a bizarre press conference that took place on January 23, and that, at that moment, was seen by distracted analysts as an untimely, politically incompressible act. “The streets must be set on fire”, Machado said to her supporters, while López urged them to keep the protest actions until Nicolás Maduro would leave the Presidency; it happened in a moment of quietness after the widely positive results for the Government during the “plebiscite” that had taken place on December 8.

Download the full document: respect_venezuela1-2

Respect Venezuela

Nicolás Maduro Moros

President of the Bolivarian Republic of Venezuela

Delcy Rodríguez

Minister of People’s Power for Communication and Information

Rolando Corao

Vice-Minister for Communication and Information

William Castillo

Vice-Minister for Television

Francisco Pérez Santana

Vice-Minister for Radio

Felipe Saldivia

Vice-Minister for Printed Media

José Miguel España

Vice-Minister for Social Networking

Greenbacks for Blue Buckets: USAID Support for Instability in Russia

Strategic Culture Foundation

January 13, 2014

By Wayne Madsen

One «themed revolution», for which the U.S. Agency for International Development (USAID) and its allied operatives of the National Endowment for Democracy (NED) and the George Soros Open Society Institute have become so infamous, went virtually unnoticed in the English language Western media.

In 2010, anti-Russian government provocateurs, financed by Western non-governmental organizations (NGOs), staged a number of protests featuring plastic blue buckets. The buckets were meant to symbolize the portable flashing blue lights, known in Russian as migalki, used atop many vehicles for Russian VIPs, including government officials and private businessmen.

The themed blue bucket protests were directly linked to the «pro-democracy» activities of USAID in Russia. American-backed provocateurs began placing blue buckets on top of their cars to mock the use of blue lights by officials. In response, three parties represented in the State Duma, United Russia, A Just Russia, and the Liberal Democratic Party, proposed a bill to crack down on the use of the blue buckets by protesters who were intent on causing traffic problems, sometimes resulting in vehicle accidents.

U.S. NGO support for the «blue bucket» revolution preceded by a year the nomination by President Barack Obama of anti-Russian activist Michael McFaul as the U.S. ambassador to Russia. McFaul began his tenure in Moscow by opening up the U.S. embassy to all sorts of anti-Russian political activists, provocateurs, and troublemakers.

Capitalising On Nonviolence

Capitalising On Nonviolence

OtporMarch32013

Above image: March 3, 2013: Otpor/Canvas (fist symbol) rears its ugly head in Venezuela. Today’s youth are the oligarchy’s sacrificial lambs.

Massive displays of nonviolent resistance have always been an essential component to challenging oppression successfully. One can only hope that Western citizens will learn from contemporary history and rise up to overthrow the ultra-violent warmongers who manage their countries too, mindful of the fact that nonviolent liberal institutions are routinely complicit in the brutality of the systems they ostensibly criticize. – Michael Barker

Swans Commentary

June 20, 2011

By Michael Barker

Berel Rodal is the founding vice chair of the International Center on Nonviolent Conflict (ICNC) — a center that was formed in 2006, ostensibly “as a catalyst to stimulate interest in nonviolent conflict…” Like many peace reformers, members of the ICNC’s cadre of intellectuals are happy to work with a wide variety of institutions, organizations, and groups. This includes peace groups, resistance movements, and — strangely — war academies and intelligence agencies. While their engagement with the latter groups may seem contradictory, teaching peace to leading members of the military-industrial complex is critical to peace advocacy efforts at the ICNC. This is because they aim to change the views of people they disagree with, not just confirm the ideas of those who are already close to their views. Therefore, in this respect, it is fitting that at the peak of his former career Berel Rodal served as the director general of the policy secretariat for Canada’s Department of National Defence and continues to maintain close connections to leading hawks in the US foreign policymaking circles, like, for example, long-time cold warrior Richard Perle (see later). This should not be taken as a demonstration of a massive conspiracy, but is simply evidence that imperial elites are interested in co-opting critical voices.

FLASHBACK | The Velvet Slipper And The Military-Peace Nonprofit Complex

The following excerpts are from the article The Velvet Slipper And The Military-Peace Nonprofit Complex written by Michael Barker. The article in its entirety can be read at Swans Commentary where it was published February 18, 2011.

The political clout of the military-peace nonprofit complex is growing apace, and too many people at home and abroad are in danger of being lulled and then crushed by an oligarchy capable of wearing both the velvet slipper and the iron heel. Such anti-democratic developments hold no surprises to opponents of the oligarchy, but apologists for the velvet slipper who seek to teach anti-democratic intelligence agencies about the power of nonviolent activism must be identified and excluded from further involvement with progressive social movements. A good example that springs to mind is Lester Kurtz, who — in addition to residing on the advisory board of the International Center on Nonviolent Conflict — recently responded to an article that challenged the fact that he had given a lecture to the CIA, by “arguing”: “I spoke as an independent academic and in no way as a representative of the ICNC when my government asked me to dialogue with members of its intelligence community. I feel that it is my duty as a citizen to educate others…” and “was glad to give my modest input…” (17)

In his timeless novel The Iron Heel (1907), Jack London was all too aware of John D. Rockefeller and his plutocratic ilk’s desire to crush humanity “under the iron heel of a despotism as relentless and terrible as any despotism that has blackened the pages of the history of man.” Yet London recognized the other dangers that capital posed to an increasingly powerful revolutionary movement, as he warned how the oligarchy complemented their violence against organized labor by providing selective subsidies to conservative unions much as the Rockefeller Foundation went on to do in the wake of the Ludlow Massacre of 1914. (1) But in 1907, when London first published his book, the art of capitalist philanthropy was not fine-tuned, and so if he were writing today, London might well have authored a second book titled The Velvet Slipper.