The Rigged Election Strategy
How Fomenting Dissent Has Become a Tool of War
By: Global Psyop Team
“The Election is Rigged and it’s a conspiracy against the people.” - Trump
Three weeks until the election even happens, and Trump has openly stated in the final debate that he won’t ‘necessarily’ accept the results of the election. Clearly he has shifted from trying to ‘win’ the election, to strategically laying the groundwork for inciting ‘revolution’ after the election. Using a methodology that has been developed over the last ten years, this “Rigged Election” narrative (backed and propagated by a highly developed Twitter and Social Media delivery system,[i] and an automated Artificial Social Media population) has been implemented to cause destabilization and remote-control overthrow of numerous Middle Eastern countries, as well as others. Time and again, the methodical sequence of 1) false claims of “Rigged Election” are used to elicit rage in the dissatisfied segments in a given society, 2) Nationwide, instantaneous, and methodically coordinated “Peaceful Protests” erupt to mobilize the forces, 3) Civil Disobedience, destabilization, and anarchy operations are launched under the cover of “Peaceful Protest,” 4) Destabilization and Anarchy operations turn into violent government overthrow.
Both American Media and International Media have failed to understand, investigate, and report on the significant development of this evident and obvious “regime change” operation that has changed the face of the Middle East (and seeks to do the same with the rest of the world), but it has worked quite effectively. This ‘remote control coup’ strategy is now being applied to the United States. The only way to conceivably avoid the same sliding disaster so many other countries are currently suffering is to finally – understand and explain to the American people, how they are being used against their own self-interest – and to what end. If media doesn’t pay attention now, after watching a dozen countries fall to this imitation “grassroots uprising” methodology in this precise sequence, they risk having the same thing happening – to the United States.
Manufacturing “Grass roots” support
“How have we come to this point?” – Andrea Mitchell
Donald Trump has fomented and capitalized on every racist, sexist, and divisive meme in American society, and has used disinformation, deflection, and misdirection with precision. Without any campaign strategy of any kind, he has run his campaign quite literally from his Twitter account, yet has ‘somehow’ amassed this extremely vocal and influential “virtual” following. No matter what facts are presented proving his claims false, and regardless of the depth of offense, this ‘virtual’ support not only never wavers, it methodically increases its fervor.
There is a very logical explanation for this “phenomenon.” In fact, it has been methodically repeated so many times, there’s nothing phenomenal about it. The formula is very simple: The average person on Social Media, who gets bombarded with a particular sentiment in their stream, is likely to 1) Fight back against the negative sentiment, 2) retreat from and feel defeated by negative sentiment, thus emotionally hurting them and damaging their beliefs, or 2) find ‘comradery’ in the negative sentiment, thus empowering them with feeling ‘part of the group’ (i.e. groupthink). All of these responses serves to foment division (and the impression of division) in a society. If you then continue to fuel both sides of the division, you can destabilize that society. It’s not theory… we can watch it repeated every day.
What people and media obviously don’t understand, is how easy it is to ‘simulate’ that groupthink impression, since the advent of social media. In fact, it has only gotten easier as the publicly available apps (and private automation systems) have evolved over the last decade, and it’s a very simple concept to understand. If you’re one person with one Twitter account, then that is the limit of your influence. Certainly that is the case the most people, and they never give it another thought.
However, if you are one person controlling ten accounts, you have slightly more influence. If you are one person controlling 1,000 accounts, you have significantly more influence. If you are a group of a dozen people controlling 1,000 accounts each, you have considerably more influence, and so on. What people don’t understand, is that when they are engaged out of the blue by the combative ‘people,’ more often than not it is this ‘artificial population’ they are encountering.
Origin of Rigged Election
Everyone has heard of the first series of operations to implement this tactic. It’s called “Arab Spring.” In order for anyone to actually see and understand the origin and development of this methodology (which allows one to see the direct pattern in all other similar “Peaceful Protest” movements), one has to understand the very first prototype of the operation. Tunisia is marketed as the first of “Arab Spring,” but the very first test event, was an obscure election in Iran, in 2009. Understanding this first event is the easiest (and crucial), because all of the tactics were in their crudest and rawest form.
Marketed by the operators (and subsequently picked up and parroted by mainstream media) as “Spontaneous Grassroots Uprising,” this Social Media based strategy of feeding and fomenting dissent, and then using that dissent to get people to topple their own governments, has proved infinitely more effective at remote control “regime change” than the false-flag full scale wars in the Middle East have. While the Iraq and Afghanistan wars basically still go on a decade and half later, Arab Spring managed to topple a half a dozen countries in a couple of years. Obviously the fact that these operations were started, developed, and launched in the Middle East first, is of course – notable.
The goal then is to use this huge Artificial Social Media population to create the ‘impression’ of popular opinion or interest in a particular issue. This was clearly evidenced during the prototype operation - #IranElection. In 2009, shortly after the United States elected its first Black President, the last thing in the Universe Americans were focused on, was an election in Iran between Ahmadinejad and Mousauvi. Nevertheless, ‘suddenly’ social media (Twitter in particular) erupted with tweets giving the ‘impression’ of massive global interest and concern for a group of “Iranian students,” who were “Protesting a Rigged Election.”
This was marketed as “spontaneous grassroots uprising” but it was nothing of the kind. It is well documented that this ‘social media impression’ of massive support, was manufactured in the manner described above, by a handful of people with a clear agenda in destabilizing Iran.[ii] In this first and most (relatively) simplistic operations, the meme they generated was simple and without any backstory. They just announced that the election was rigged, from an account named “@IranRiggedElection,” on the day of the election, and without any proof whatsoever.
This Twitter account, on the day of the election, suddenly materialized with a slew of other similar accounts, and began systematically propagating this misinformation, and attempted to draw attention and support to their manufactured cause.
This small group of accounts was generating tremendous amounts of tweets and disinformation in an evident and obvious attempt to alter the outcome of the election. However, this remote control coup operation went much further than simply trying to ‘influence’ the outcome. This elaborate operation was intended to create and foment manufactured ‘outrage’ based on the false “Rigged Election” meme, and to use that outrage to fuel the pre-planned remote control coup, and disguise it as “grass roots uprising” or “revolution.”
This “impression” of a large and extremely active group of supporters, then drew the attention of ‘actual’ people, who though the cause and people backing this ‘movement’ were ‘genuine.’ To further create the ‘illusion’ of a much larger support group than their actually was, the handlers employed tactics like having ‘actual’ followers change their time zones to Iran and to change their Icons green… in order to further obfuscate the identity of the actual operation handlers and to confound Iranian government investigators who were trying to track down handlers and participants in this obvious State-sponsored remote control coup operation.
Portraying the events as “Peaceful Protests,” this small group of handlers was able to mobilize groups of Iranian people (via the Twitter Social Media Operation) and lead them to march, which then turned into civil disobedience and ultimately attempted government overthrow. Each step of the operation was meticulously managed and developed, including influencing and manipulating media reporting. In what would become a very characteristic pattern, while the operators sold this as “Peaceful Protest,” which the media and the world wanted to believe it, the reality of what was actually going on was exactly the opposite. They weren’t “Peaceful Protests”[iii] at all, they were violent destabilization efforts, and the media as a whole failed to report on this blatant contradiction.
This laid the foundation, for all the other “peaceful Protest” operations that toppled or destabilized numerous governments. Americans will be quite familiar with another version of this operation closer to home: #BLackLivesMatter[iv], which like all major protest issues has been coopted and repurposed (capitalizing the justified anger) as another excuse for ‘revolution” and destabilization of their own country.
Ultimately this first Twitter Revolution operation failed to install their ‘candidate’ Mousavi as the new leader of Iran. The Iranian government eventually identified the coup participants within Iran, and surely they were punished.
However, Iran certainly couldn’t identify or prosecute the architects of this incredibly sophisticated cutting edge technological coup operation, because they weren’t in Iran to begin with. In this prototype operation, they developed all of the tactics that we see now rampant in every so called “Peaceful Protest” around the world that ultimately ends up as attempted government overthrow, they developed the cyberterrorism tactics[v] that they have used to attack governments, intelligence agencies, industries, and individuals all over the planet, and began developing the IP proxy and encryption methodologies that have kept the core group of original handlers hidden.
Immediately following the #IranElection prototype operation, they began the #ArabSpring operations. This was a much more ambitious, multi-front operation that anyone can see from their own organizational map, had quite deliberate purpose and intent. Regime change in the whole of the Middle East was the obvious objective.
#Yemen #Feb03, #Syria #Feb05, #Algeria #Feb12, #Bahrain #Feb14, #Libya #Feb17, #Morocco #Feb20, #Cameroon #Feb23, #Iran #Feb22, #Kuwait #Mar8
All of the resources and tactics for this elaborate operation were located on one main website. From this page you could ‘turn your avatar green’ in ‘support’ of the cause (operation), and could find an unimaginable list of resources that – simply from the contents – Identifies itself as being collected and distributed by a ‘state sponsored intelligence agency.’
The cover story propagated claiming these events are “spontaneous, leaderless uprisings” is exposed as a diversion and a lie. A large portion of the ‘activist’ training material links directly to declassified U.S. Military training manuals and include items like CIA World Factbook – Iran, Public Affairs Tactics, Techniques & Procedures, Tactical Employment of Non-Lethal Weapons, Command and Control of Army Forces, Civil Disturbances, Staff Organization and Operations, Training the force, and Urban Operations Manual. Technology resources include extensive and detailed information on internet identity protection and detection avoidance. Topics include: How to setup a web proxy server, How to set up a Tor relay, Tactical LAN Management, Communication in Repressive Environments, and Communications in a ’Come As You Are’ War. It also makes perfectly clear that the #iranelection tag is the central location for operation information. Don’t assume that because this is U.S. Military information being distributed (along with a host of other internet resources), that they are also the source of the distribution… particularly since this operation is now being waged against the United States, which clearly remains oblivious to it.
After developing the operation in the Middle East, the “Occupy” version (or brand name) of Arab Spring was implemented. All Arab Spring operations started off with and generally included several “Day of Rage” events. These operations took whatever the relative meme they were fomenting and capitalizing on (i.e. OccupyWallStreet to ‘overthrow the evil elites’), and used them to motivate people to attack and destabilize their own governments.
The first U.S. Occupy version, was USDOR (U.S. Day of Rage). Again, it’s all the same operation with a different brand name, and the tactics and methodologies incorporate and advance on those of the previous operations. This is illustrated by the resource lists, and their similarity.
The #OccupyWallStreet tag is included on this site as well. This was the first version, which evolved into OccupyWallStreet (and all of the “Occupy” variations). It is from this methodology that all protest operations and causes have been coopted and repurposed – not to ever actually address any of the legitimate causes and grievances themselves, but just to capitalize on the rage each issue targets, and use them all collectively – as cause for “revolution.” The hierarchy of this operation rollout, is easy to understand.
Tunisia, Algeria, Jordan, Oman, Egypt, Yemen, Djibouti, Somalia, Sudan, Iraq, Bahrain, Libya, Kuwait, Morocco, Mauritania, Lebanon, Saudi Arabia, Syria,
Armenia, Australia, Belgium, Brazil, Canada, Colombia, Czech Republic, Cyprus, Denmark, France, Germany, Hong Kong, Italy, Malaysia, Mexico, Mongolia, Nepal, Netherlands, New Zealand, Nigeria, Norway, Republic of Ireland, South Africa, South Korea, Spain, Switzerland, Taiwan, Turkey, United Kingdom
While all of these Arab Spring and “Peaceful Protest” operations have been advertised as being about ‘liberating’ people, the results have been exactly the opposite. While the media and population in general have been hoodwinked into supporting every one of these false-flag “grassroots uprisings” (and chastising anyone who doesn’t support these “humanitarian” causes), the results on the ground have been destruction and chaos. The media cheered for all of the Arab Spring orchestrated movements, but has never bothered to follow up. Just look at the results of this Middle East ‘freedom’ campaign.
“Peaceful Protest” didn’t bring liberation to Yemen. It brought insurgency, all-out war, and ISIS.
“Peaceful Protest” didn’t bring liberation to Syria. It brought insurgency, all-out war, and ISIS.
“Peaceful Protest” didn’t bring liberation to Iraq. It brought insurgency, all-out war, and ISIS.
“Peaceful Protest” didn’t bring liberation to Libya. It brought insurgency, all-out war, and ISIS.
Anyone, see a pattern? Not a single country attacked with the Arab Spring Regime Change Operation is thriving as we were told they would. In each case, the only thing that happened was the destruction of the country and infrastructure, which opened the door for ISIS to move right in. Convenient, considering ISIS was usually right next door, from the last “Peaceful Protest” that destroyed a country, allowing ISIS to move right in. “A system is what a system does” and what this remote control coup strategy (masquerading as “Peaceful Protest”) does, is destabilize and topple governments, and create a staging ground for terrorism rule. It’s not opinion… look at the evidence.
The resources to research every aspect of this documented reality are listed in the end notes. It may not seem like it, but I made considerable effort to keep this document short. However, I have to point to the final glaring example of SOP (Standard Operating Procedure) False-Flag Misdirection… that being blaming Russia, for the DNC hack.
It should be clear to all by now, that Anonymous (the core group in this supposed “leaderless” entity) is behind the development and implementation of this methodology. From the very first prototype operation (#IranElection), Anonymous was firmly in control (behind the scenes) and was responsible for all of the resources used in the coup attempt.
Since then, almost ten years ago, Anonymous has hacked almost every government and intelligence agency on the planet. They have hacked industry and individuals of every sort, violating and terrorizing the population at any available opportunity. The same people who championed (and still do) “Internet Privacy” (to protect themselves from being caught) have no regard for anyone else’s privacy at all. In fact, they use it as a weapon against the people[vi] of this planet.
The list of hacks by this group is far too long to include here. It’s probably impossible to compile an all-inclusive list in the first place, but Wikipedia has a list[vii] – of at least what they are admitting to.
No one has ever been caught, for any of these attacks on our government, or on anyone else. This ‘invisible’ entity essentially hacks whoever it wants, puts whatever false-flag on that is useful, and the original ‘source’ is never identified. Sure, there are ‘individual’ hackers out there, and (perhaps) there are groups that haven’t been assimilated or shut down by Anonymous intimidation, but no group (not even an imaginary one) has amassed a seemingly endless track record of hacks remotely comparable to that of Anonymous.
Remember – none of these people have ever been identified or caught for any of these sophisticated hacks. It goes without saying then, that this hacker ‘community’ has sophisticated capabilities to hide their actual identities and make tracking the real IP addresses or locations impossible. It’s hardly trade secret either. Anonymous openly trains all hackers in these methods, provides guides and resources for noob hackers, and has developed their ‘member base’ like this for years.
So, when the DNC servers were hacked as well as Leon Podesta’s email for the last 10 years, and they are released by the Anonymous affiliated WikiLeaks, who is the first suspect that would come to mind? Why, Russia of course (insert sarcasm here). Mind you, almost no actual evidence has been released by anyone to even remotely validate this claim, but what has been released is well beyond suspect. For instance, how in the world could and cyber security expert – say this, and expect to be taken seriously?
“CrowdStrike Services Inc., our Incident Response group, was called by the Democratic National Committee (DNC), the formal governing body for the US Democratic Party, to respond to a suspected breach. We deployed our IR team and technology and immediately identified two sophisticated adversaries on the network – COZY BEAR and FANCY BEAR. We’ve had lots of experience with both of these actors attempting to target our customers in the past and know them well. In fact, our team considers them some of the best adversaries out of all the numerous nation-state, criminal and hacktivist/terrorist groups we encounter on a daily basis. Their tradecraft is superb, operational security second to none and the extensive usage of ‘living-off-the-land’ techniques enables them to easily bypass many security solutions they encounter.” [viii]
Let’s see how many implausible statements there are, just in this one paragraph.
1. They immediately identified COZY BEAR and FANCY BEAR. Do these supposed ‘Russian hackers’ have some kind of trademark on those names? No one else – could possibly use those names?
2. “In fact, our team considers them some of the best adversaries out of all the numerous nation-state, criminal and hacktivist/terrorist groups we encounter on a daily basis.” What kind of preposterous statement is that? I’ve been watching the global Anonymous Hacking Conglomerate evolve exponentially – and I’ve never heard of these ‘Russian hackers’ before now.
3. Has Crowdstrike – heard of Anonymous? How can anyone claim these “Russians” are the best adversaries, and not even MENTION the group that has hacked every government, bragged about it, and none of them have ever been caught to date?
4. “Their tradecraft is superb, operational security second to none and the extensive usage of ‘living-off-the-land’ techniques enables them to easily bypass many security solutions they encounter.” What spectacular poppy-cock. How can they claim their ‘operational security’ is second to none, while 1) claiming to ‘know’ these hackers and their history, and 2) proceed to show ridiculously sloppy operational security that led to a French IP address, and then to a “Russian” server? Even a noob security analyst would at very least consider the possibility that such an obvious trail was INTENTIONALLY LEFT to be followed, and to falsely incriminate Russia for the hack (a tactic we have seen used a thousand times in the last ten years)?
The ‘evidence’ provided hinges on one single thing: The IP address of a Russian VPN service that was used for the hack. While the ridiculous and ‘impartial’ analysis offered by Crowdstrike (“Bears in our Midst”) provides nothing more than flowery language to make this accusation, ThreatConnect[ix] provided a little more usable information. Their examination of the IP addresses in question is as follows:
“We created an account on the Elite VPN Service and were able to see which VPN nodes are offered from within France. From here, we confirmed the SSH Fingerprint we identified from Guccifer 2.0’s email is unique to Elite VPN Service. All of the Elite VPN Service nodes offered in their web interface and the IP address used by Guccifer 2.0 to communicate via email returned the same SSH fingerprint.
It is important to note that the IP address seen in the Guccifer 2.0 AOL communications – 95.130.15[.]34 – is not listed as an option within Elite VPN Service. Although it has an identical SSH fingerprint and has the exact same port (1723, PPTP) open as the listed options. This demonstrates the server was cloned from the same server image as all the Elite VPN servers but may be a private or dedicated version of the service.”
This is about as clear evidence of false-flag misdirection, as you are likely to find. Anonymous uses and recommends Tor (as do presumably all hackers with some common sense). It’s free, has no ‘home servers’ or anything to worry about, and based on this government’s (or any government’s) inability to identify any hackers ever, it is evidently very solid.
So, why would a ‘state sponsored’ Russian hacker (supposedly working with the Russian Government), who supposedly has “operational security second to none,” use a paid VPN that can be traced back to a Russian server? What possible sense would that make? This ‘Russian’ hacker (presuming the goal was to hide their location as oppose to expose it), could have used a VPN service in ANY OTHER COUNTRY to perform this hack, or could have used Tor to be mixed in with every other hacker on the planet… but instead, used what I would imagine is one of the few Russian VPN services… right in his “own back yard.”
By the same token, exactly nothing would prevent any other hacker on the planet from getting an account with this service (just like ThreatConnect did for their testing), and using it to FALSE-FLAG incriminate Russia for the hack.
Finally, there is the fact that this server – is CLONED. Meaning it isn’t part of the actual VPN service anyway. This is a COPY of Elite VPN’s server, which could easily have been stolen (like the zillion other things Anonymous has stolen), and set up specifically – to leave this false-flag trail of breadcrumbs that quite evidently, any noob could follow and fall for.
So… what do you suppose is more likely? Russian hackers leaving the most pathetically obvious trail of breadcrumbs which would serve no purpose whatsoever, except to incriminate Russia and foment dissention between the two most powerful countries on Earth, or – that for the billionth time – Anonymous committed the hack and created the false-flag breadcrumb trail… as they have been doing systematically since #IranElection?
Perhaps, we can gain some insight on the answer to that question, from the DNC hack site itself.
One final point, illustrates this reality beyond question. On October 7th, 2016, the United States officially blamed Russia for the DNC hack. I won’t even get into what a huge and embarrassing intelligence failure that was. Nonetheless, On October 14th, it was announced that the CIA was being asked to provide counter strike options against the Russian Government. We can only hope that Obama will not authorize whatever options are offered by the CIA. Attacking the Russian government for a hack they did not do, is precisely what the puppeteers what Obama to do – to further increase dissention.
However, you know who doesn’t have to wait for options or authorization from the White House? The hackers responsible for the hack in the first place, and the ones who want to foment dissention, distrust, and ultimately war between the United States and Russia. It obviously didn’t make it to the ‘news’ in this country, but way back in July, these hackers already false-flag attacked Russia (using the excuse of the DNC hack), in the effort to make it look like the United States was counterstriking Russia – already.
A "professional" cyber attack has hit Russian government bodies, the country's intelligence service says.
A "cyber-spying virus" was found in the networks of about 20 organizations, the Federal Security Service (FSB) said.
The report comes as Russia stands accused over data breaches involving the Democratic Party in the US.
The Russian government has denied involvement and has denounced the "poisonous anti-Russian" rhetoric coming out of Washington.
The malware allowed those responsible to switch on cameras and microphones within the computer, take screenshots and track what was being typed by monitoring keyboard strokes, the FSB said.
The FSB did not say who it believed was responsible for hacking Russian networks, but said the latest hack resembled "much-spoken-about" cyber-spying, without elaborating.[x]
So, a full 4 months before the United States even came to the incorrect conclusion (based on false-flag breadcrumbs) that Russia was responsible for the DNC hack, a cyber attack was launched on Russia (to be blamed on the U.S.) that was more sophisticated than anything the CIA is going to present as an option, but that is perfectly in line with Anonymous Modus Operandi.
As I’m sure everyone has noticed, I haven’t actually stated – who is behind this operation to destabilize the Middle East, the United States, Europe, etc. It’s hardly rocket science. It’s the one tiny country on Earth (more precisely, in the Middle East), that – were this Islam / Muslim Uprising real – would have been the place all of these protest and actions would have been directed – instead of them all ‘conveniently’ destroying their own countries.
I deliberately haven’t said it, for a number of reasons. 1) All the evidence relentlessly points to one State actor… and the reader needs to be able to discern that for themselves. 2) In order for the disinfo operatives whose job it is to dispel, suppress, and redirect blame on everyone else on the planet (and away from this on State actor), to feign ‘outrage’ at the accusation… they will have to bring it up themselves – thus identifying themselves as what they are. And 3) Everyone on this planet needs to ask and understand this one simple question: “Cui Bono?” Who benefits? Who benefitted from a decade and a half of war in the Middle East? Who benefitted from half a dozen countries in the Middle East self-destructing and overthrowing their own governments? Who benefits and capitalizes from a world living in Islamophobia and terrorism fear? Only one country on Earth does… and that is crystal clear.
“I've never heard of somebody complaining about cheated before the game is over, before the score's even tallied.” [xi] – Barack Obama
Well Mr. President, I suppose you – and the rest of the world – should have been paying attention for the last eight years. There is a conspiracy alright… and it’s right in front of us all. If media doesn’t wake up to this charade, and wake the masses up to it as well, we can all ‘expect’ the same results, as every other Arab Spring and Occupy remote control destabilization and takeover.