Wiki "leaks"= INSIDE JOB intended to provoke hatred for justification for war!
Lee Harvey Oswald/Bradley Manning Patsy used to divert attn from anti-war demos
Assange Under MK Ultra From Intel Connected New Age Cult
AJ on C2C: Cass Sunstein Owns Soros Funded Wikileaks; Assange the Fall Guy
Who is Cass Sunstein and what is his relation to Wikileaks?Wikileaks.org, founded by dissidents in China and other nations, plans to post secret government documents and to protect them from censorship with coded software.
First time it was ever mentioned according to Webster Tarpley. When you are talking about a group of "dissidents in China and other nations" then you are talking George Soros' "Green Revolution" bullshit we saw climax in Iran when he executed that Iranian doctor in cold blood using black ops and 24/7 saturated news coverage. It backfired and pointed the finger at the CIA and the green revolutionary patsies were turned into Soros cannon fodder left to fend for themselves in Iran. Soros cleverly sneaked away to continue hedge funding America to auto-genocide.
Look what else Cass Sunstein said in 2007:
But wikis are merely one way to assemble dispersed knowledge. The number of prediction markets has also climbed over the past decade. These markets aggregate information by inviting people to "bet" on future events --
the outcome of elections,
changes in gross domestic product,
the likelihood of a natural disaster or
an outbreak of avian flu.
Cass Sunstein has a plan for all of us, and he is placing bets in his predictive analysis system that we never find out!
Now back to the original story...when we think of "Dissidents from China and other countries" who are enemies to the US and require dissident cyber activism supported by agenda driven US interests who deny any possibility of true freedom for the dissenters, we must pay attention to the meeting 6 months ago...
Get ready for your head to spin more than Linda Blair in The Exorcist at the brazen admissions among sub-elites on how they openly recruit, support, and glorify controlled opposition to prove to their elite puppet masters that they are deserving a seat at the future "Information Age" private dinner table...
Guess where the Largest Conference on Cyber Dissent against government power was held?
Neocon/Soros supported Cyber Dissidents describe how they engaged in state sponsored acts against against PNAC/neocon targeted sovereign nations
Global Successes and Challenges
George W. Bush Institute
Extending the reach of freedom “is the urgent need of our nation’s security and the calling of our time.”
– President George W. Bush, Second Inaugural Address
The first of the Bush Institute’s Human Freedom events, co-Sponsored by Freedom House Institute in Action
– A Report on the Bush Institute’s Conference on Cyber Dissidents
Press and blog coverage:
Boston Globe Wall Street Journal USAToday The Economist Ethan Zuckerman’s Blog I. II, III Commentary, II
Voices of Freedom Online Ahed Al Hendi, Syria www.twitter.com/Ahedalhendi www.cyberDissidents.org
Rodrigo Diamanti, Venezuela
Un Mundo Sin Mordaza – A World Without Censorship www.sinmordazaorg.blogspot.com/
Ernesto Hernández Busto, Cuba www.penultimosdias.com
Arash Kamangir, Iran
Oleg Kozlovsky, Russia
Oborona Youth Movement www.olegkozlovsky.wordpress.com/
Isaac Mao, China www.isaacmao.com www.blog.cnblog.org
Mohsen Sazegara, Iran
(Visiting Fellow, George W. Bush Institute) www.sazegara.net/english/
Oscar Morales Guevara, Colombia (Visiting Fellow, George W. Bush Institute) www.twitter.com/oscarmoralesg
Yoani Sánchez, Cuba www.twitter.com/yoanisanchez www.desdecuba.com/generationy
The Conference on Cyber Dissidents highlighted the work, methods, courage and achievements of its eight dissident guest speakers, from seven nations. Five of these nations are places where freedom has been extinguished (all rated “not free” by Freedom House): China, Cuba, Iran, Syria, and Russia
. Two others are places where freedom is in peril (both rated “partly free” by Freedom House) because of an authoritarian government accumulating more power, as in Venezuela
, or because of the threat of internal terrorist groups, as in Colombia.
All of the dissidents who were able to join the Conference are key leaders; several must live in exile; two have served extensive time as political prisoners. And all of them have made use of new online, Internet and mobile technologies in their non-violent struggle against state oppression, lack of press freedom and official and unofficial terror and violence. The Conference is the inaugural event of the The George W. Bush Institute’s Area of Focus on Human Freedom, and includes the Institute’s first two Visiting Fellows in Human Freedom: Oscar Morales, from Colombia, and Mohsen Sazegara, from Iran
. The co-sponsor of the event was Freedom House, the non-partisan organization founded by Eleanor Roosevelt and Wendell Willkie in 1941. The Conference honored the work and the courage of the dissidents who spoke and the aspirations for freedom in each of their countries they represent.
As James K. Glassman told the attendees, the Bush Institute and Freedom House hope their work “will become a beacon to others, who can be both inspired and educated. At few times in history, has work like theirs been more important.” And when the “voices of freedom and tolerance face serious challenges,” as Laura W. Bush said, President Bush “and I believe it is vital that they know that the people of the United States stand behind them.” [Is Ashton Kutchner about to come out and say "You got punked!"]
But the Institute’s mission is not merely to appreciate the great ideas and (in this case) the courage of people who stand up for them, but to take action that engages and enables these ideas to work in the practical world. Accordingly, the Conference’s work focused on two challenges:
>How best to make use of the new tools that Internet and wireless technology have placed in the hands of contemporary dissidents and citizen freedom movements on four continents
>How to overcome the use of the same tools in the hands of the enemies of freedom, in the specific countries where our speakers work and elsewhere.
Today’s dissidents have more ways than ever to exchange information, organize resistance, and share their message with the outside world. At the same time, the same advances in technology also enable repressive governments not only to meet these efforts, but themselves to become more efficient at censorship, identifying dissenters and quashing expressions of dissent in the press, on the Internet or in the streets. The Conference’s two goals were to bring dissidents together to share best practices and learn from one another, and to learn ourselves what we in America and other democracies can do to aid the work of dissidents – in particular, to help them protect and enhance their high-tech tools and counter the technological counter-assaults from government and terror groups.
The fascinating practical discussions among the dissidents were framed by presentations from many U.S. experts which put their struggle in context, and reported on the use of cyber tools by repressive regimes. Christopher Walker and Robert Guerra from Freedom House presented their new research, just released today, about how authoritarian governments such as those in China, Iran and Russia are pursuing media and information strategies that are increasingly sophisticated – and are in the habit of sharing their expertise with one another. China, for example, has been at the forefront of a growing trend toward “outsourcing” censorship and surveillance to private companies – ISPs, cybercafés, and mobile phone providers. These governments are at the forefront of a kind of globalization of authoritarianism.
The Berkman Center’s Ethan Zuckerman and Hal Roberts discussed their work on how “circumvention technology” can work to evade online censorship. David Keyes, the director of the private organization CyberDissidents.org contributed his insights to the problem as well. Several speakers from past and present U.S. Administrations and from the U.S. State Department, all of whom had or still have direct responsibility for supporting democracy and good governance abroad. The luncheon keynote was Dr. Jeffrey Gedmin, who is President and CEO of Radio Free Europe/Radio Liberty. We also heard from Daniel Baer, Deputy Assistant Secretary of the State Department’s Bureau of Democracy, Human Rights and Labor; Jennifer L. Windsor, Executive Director of Freedom House, who worked at USAID as Director of the Center for Democracy and Governance during both Clinton Administrations; Steve Hadley, who served in the Administrations of George H.W. Bush and George W. Bush (as National Security Advisor to the President); and three others who served in President Bush’s Administration: Goli Ameri, now a member of Freedom House’s board who was Assistant Secretary of State; Kristen Silverberg, who was U.S. Ambassador to the E.U., and of course Jim Glassman, who was Under Secretary of State for Public Diplomacy. The message was clear – Americans and American Administrations from before the fall of the Berlin Wall to today have made a difference to those who are struggling for human freedom. This support must and will continue – but we need to be aware of changing circumstances.
While the desire for human freedom in the face of oppression is an absolute, the means to achieve freedom and how those who desire it join hands with others is constantly changing and developing. The desire for freedom can be also described as an intellectual and political discipline, as Dr. Peter Ackerman spoke of it at the conference: a technique that can be learned, improved and perfected. [Yes, he is actually saying that for freedom to be effective, it must not be free...IT MUST BE "DISCIPLINED!" This reminds me of one of the most ominous statements by anyone to ever hold office in the USA...Allen Dulles: "A free people will never remain free"]
But like any discipline that can be learned, its practitioners need to keep abreast of new developments and new tools that change the techniques and methods. The Conference on Cyber Dissidents was a first step, an investigation, toward the ultimate goal of developing a plan of action that can be used by many – nonviolent dissidents themselves, of course, but also by those in our government, in non-profits, and even by such companies with technological prowess and a sense of human citizenship as Google and Facebook, to ensure that the cyber tools that empower freedom of expression and communication are kept free of interference from the enemies of freedom.
So now we can see the progression of the new RED TEAM fake terrorists to replace the fake al-CIA-duh. It has gone in 3 years from a mysterious group of Soros/Sunstein controlled guys from "China and other countries" to 'LEADERS' presenting at the George W. Bush Institute where they get special acknowledgement by Laura Bush. They are setting up their expanding "cyber dissent" RED TEAM LEADERS... a new crop of BS digital Osama bin Ladens [Trademark Zbigniew Brzezinski 1979] to assist Hayden, Chertoff, Brzezinski, Wolfowitz, Rockefeller, Rothschild bridging the gap "Between Two Ages"...
“Throughout history, warfare has assumed the
characteristics of its age and the technology of its
age. Today we see this trend continuing as we move
from the Industrial Age warfare with its emphasis
on mass to Information Age warfare, which
highlights the power of networked distributed
forces and shared situational awareness.”
- U.S. Deputy Secretary of Defense Paul Wolfowitz, July 2001
Please first review the following from BTT:
Anti_Illuminati for dummies. The ultimate study guide for the layman.
Then notice a New World Order of Network Centric Solutions complete with biometric authentication, identity dominance, bluetooth enabled implantable RFID, retina scanners, heat displacement identity tracking systems, billions of cameras with interoperability, joint VIPR civilian/military task forces, heirarchy of information accessability, autonomous sense and response, continued cataloging of stasi type multimedia HUMINT files and real time surveillance of all humans on the planet, behavioral modification, social network infiltration and "game theory" saturation used to alienate/demonize/gang stalk potential threats to the new order governed by a literal STAR CHAMBER in control of backdoor enterprise architecture such as Ptech, GoAgile, etc. The following is just one of hundreds of "Solution Briefs" which create a problem and then explain how to manage the problem.