Taking Back Our Stolen History
Wikileaks
Wikileaks

Wikileaks

In its own words: “WikiLeaks is a multi-jurisdictional public service designed to protect whistleblowers, journalists and activists who have sensitive materials to communicate to the public. Since July 2007, we have worked across the globe to obtain, publish and defend such materials, and, also, to fight in the legal and political spheres for the broader principles on which our work is based: the integrity of our common historical record and the rights of all peoples to create new history.” Since the dramatic release of a US military film of a US airborne shooting of unarmed journalists in Iraq, Wiki-Leaks gained global notoriety and credibility as a daring website that releases sensitive material to the public from whistleblowers within various governments. But are they what they purport to b? How could its founder and Editor in Chief, Julian Assange, deny 9/11 is a conspiracy when surely he would have received documentation to those facts among the millions of document his organization has benefited from?

William Engdahl said in 2010 that, “Wikileaks founder and “Editor-in-chief”, Julian Assange, is a …mysterious Australian about whom little is known. He suddenly became a prominent public figure offering to mediate with the White House over the leaks. Yet a closer examination of the public position of Assange on one of the most controversial issues of recent decades, the forces behind the September 11, 2001 attacks on the Pentagon and World Trade Center shows him to be curiously establishment. When the Belfast Telegraph interviewed him on July 19, he stated,

“Any time people with power plan in secret, they are conducting a conspiracy. So there are conspiracies everywhere. There are also crazed conspiracy theories. It’s important not to confuse these two….” What about 9/11?: “I’m constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud.” What about the Bilderberg Conference?: “That is vaguely conspiratorial, in a networking sense. We have published their meeting notes.”

Evidence suggests that many whistleblower ‘leaks’ were actually calculated disinformation such as the Afghan documents in 2010. Back in January 2011, historian Webster Tarpley put a big hole in the well-crafted mythos of WikiLeaks, writing, “Assange’s various document dumps tell us nothing of importance about 9/11, the Rabin assassination, Iran-contra, the 1999 bombing of Serbia, the Kursk incident, the various CIA color revolutions, or many of the other truly big covert operations of the past decades.” Also, read Tarpley’s article,“Wikileaks helps West to justify attack on Syria,” that was written last month.

Were these CIA fed disinformation leaks to discredit Wikileaks and try to add a new spin to the establishment propaganda? Was Wikileaks always meant to be a disinfo outlet, was it an attempted hijack by the deep state while Assange started out a conspiracy denier, thus the 9/11 and other conspiracy denials? It’s not easy to say for sure, but the last several years of releases (2016 DNC leaks by Seth Rich, have been more significant and would suggest Assange is perhaps not establishment, and that he was likely a target like many NGO’s that might prove harmful if not controlled or that might prove rather useful if controlled.

WikiLeaks serves as a scapegoat for Hillary Clinton’s $1.2 billion election loss. Despite the fact WikiLeaks published information damaging to the Bush administration and Trump administration, media has unfairly labeled Julian Assange as a partisan actor working against Clinton and the Democratic Party. Ultimately, WikiLeaks and Assange aren’t hackers; they’re publishers. The United Kingdom has deemed WikiLeaks a “media organization” and WikiLeaks emails as evidence admissible in court. Yes, even Russia, and countries like Saudi Arabia and France have had their elite politicians and spy agencies exposed by Wikileaks.

https://www.youtube.com/watch?v=AV5N_2nuYzY

Chronological History of Events Related to Wikileaks

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Proposed Drone Strike on Julian Assange

Under Intense Pressure to Silence Wikileaks, Secretary of State Hillary Clinton Proposed Drone Strike on Julian Assange

To Silence Wikileaks, #HillaryClinton Proposed Drone Strike on Julian Assange -- report https://t.co/S7tPrl2QCZ — WikiLeaks (@wikileaks) October 3, 2016 Julian Assange and his free-speech brainchild Wikileaks were once lauded as global heroes of public service among United States politicians and policy makers. But by 2010, four years after its inception during the President George W. Bush administration, Assange and his organization were no longer considered lovable ...
Wikileaks: INDECT to Build Automatic Dossiers on Individuals and Organizations from Web, Mobile, & Social Networking Data

Wikileaks: INDECT to Build Automatic Dossiers on Individuals and Organizations from Web, Mobile, & Social Networking Data

Wikileaks published a document by the INDECT , the Intelligence Information System Supporting Observation, Searching and Detection for Security of Citizens in Urban Environments of Europe. According to Wikileaks, INDECT's "Work package 4" is designed "to comb web blogs, chat sites, news reports, and social-networking sites in order to build up automatic dossiers on individuals, organizations and their relationships." Mind Your Tweets: The CIA Social Networking ...
The C.I.A. Internally Published NightSkies v1.2 User Guide for Exploiting Apple iPhone 3G v2.1 Granting Remote CIA Command and Control

The C.I.A. Internally Published NightSkies v1.2 User Guide for Exploiting Apple iPhone 3G v2.1 Granting Remote CIA Command and Control

Dec. 01, 2008, the C.I.A. internally published NightSkies v1.2 User Guide for exploiting Apple iPhone 3G v2.1. Whistleblower Source: WikiLeaks Vault 7 DARK MATTER. This program "Grants full remove command and control" ... "The tool operates in the background providing upload, download and execution capability ... will wait for user activity before beaconing. When user activity is detected, NS will attempt to beacon to a preconfigured ...
The C.I.A. internally Published SeaPea v2.0 - User Guide for Exploiting Apple Mac OSX 10.4.X through 10.5.X

The C.I.A. internally Published SeaPea v2.0 – User Guide for Exploiting Apple Mac OSX 10.4.X through 10.5.X

On Nov. 6, 2008, the C.I.A. internally published SeaPea v2.0 - User Guide for exploiting Apple Mac OSX 10.4.X through 10.5.X. Whistleblower Source: WikiLeaks Vault 7 DARK MATTER Released in 2017. SeaPea hijacks Apple Macintosh computers undetectably, below the operating system, so that it continues to operate even when the infected target computer is rebooted. SeaPea even includes a stealth feature that deletes itself if it ...
Wikileaks Releases State Department Cable that Reveals Plan To Use Terror, Intrigue, Kurds To Destabilize Syria, Weaken Assad

Wikileaks Releases State Department Cable that Reveals Plan To Use Terror, Intrigue, Kurds To Destabilize Syria, Weaken Assad

Despite the bulk of the attempted destruction of Syria having taken place during the Obama administration, the fact is that the agenda began marching years before Obama took office and it is continuing to do so today. Ample evidence has been provided demonstrating that a plan to destroy the Syrian government goes back at least to the Bush Jr. administration and the desire to do so ...