Techniques Used to Disrupt 9/11 Questioning

In 2008, Harvard professors Cass Sunstein and Adrian Vermeule proposed that the government should engage in “cognitive infiltration” of citizen groups that seek the truth about 9/11. The proposal was that government operatives, whether anonymous or otherwise, should infiltrate and disrupt the groups. They wrote, “Government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action. “

The following year, this anti-Constitutional stance was rewarded when Sunstein was made director of the White House Office of Information and Regulatory Affairs. Members of the 9/11 Truth Movement responded with detailed criticism.

Of course, the idea of infiltrating a grassroots action group, to disrupt and defame its members, was not new. The FBI program called COINTELPRO was a widely reported example after it was revealed in the early 1970s to have infiltrated citizen groups seeking civil rights and peace. After being revealed, COINTELPRO techniques continued at the FBI and elsewhere in government.

Since 9/11, journalists have noted that government infiltration of political groups is no longer a rare exception but is the norm. The goals of such infiltration are to destabilize and prevent citizen dissent by creating a negative public image for the target group and conflict within the group. Infiltration is easy when it comes to a grassroots movement like 9/11 Truth. That is, you cannot just claim to be a 9/11 Commission member or an employee of a government agency but anyone can say they are a truth seeker. The beauty of this for government operatives is that they can control both sides of the conversation.

To make a significant impact, however, an infiltrator needs to quickly move into a position as a leading voice for the movement. One way in which this was done, even before Sunstein’s proposal, was through a social variant of the physical principle called the “gravitational assist.” The physical principle leverages the movement and gravitational pull of a moon or planet to slingshot a spacecraft into a higher velocity trajectory by moving the path of the spacecraft near the larger body. The social variant is when a brief association with a leading voice in a group lends someone credibility that they would otherwise not have.

Examples of the gravitational assist occurred when physicist Steven Jones made news in September 2005 for challenging the official account of the World Trade Center destruction. People wanted their photo taken with him and he was invited to speak at many events. Soon afterward, Jim Fetzer, previously unknown to 9/11 investigators, dramatically announced that he and Jones were starting a new “scholars” group to challenge the official account of 9/11. That association led to Fetzer discrediting Jones and others through association with absurd concepts like Star Wars beams and holograms at the WTC.

It was later learned that Fetzer was an expert on the use of disinformation yet he and his colleagues Morgan Reynolds and Judy Wood went on to link 9/11 questioning with many preposterous ideas. They created nonsensical hypotheses and promoted them through mass emails targeting media representatives and others in order to present the 9/11 Truth Movement as a ludicrous spectacle.

When recently asked to help reveal more of what happened during that time, it occurred to me that people could benefit from learning the general techniques used to disrupt grassroots movements. Examined more closely, the techniques used by infiltrators or disruptors can be seen as expressions of commonly known rules of debate. Specifically, the rules are reflected in philosopher Arthur Schopenhauer’s sarcastic publication, The Art of Being Right: 38 Ways to Win an Argument. Here are a few examples of how these techniques were used to disrupt 9/11 questioning.

The Extension” takes a proposal beyond its intended limits so that the extended proposal can be refuted and thereby make the original statement sound weaker. A 9/11 example took the question about whether an aircraft had actually hit the Pentagon and extended it to all other aspects of 9/11. Therefore if there was no plane at the Pentagon then there were no planes at all, and no alleged hijackers, and so on.

The Homonymy” is a misuse of a proposition through use of similar words. The government agency NIST utilized this method effectively by replacing words in its reports with weaker homonyms, making it easier for the unprecedented destruction of the WTC to sound more plausible. Therefore fireproofing became “insulation” and joists became “trusses.”

Using the “Postulate What Has to Be Proved” rule, 9/11 disruptors presented and then destroyed their own straw man arguments. That is, they first framed the questions in simplified, diverting ways and then refuted those “straw man” frames. This was the go to technique of the “debunkers” at Popular Mechanics.

The method of “Make Your Opponent Angry” was frequently used. Through the years, infiltrators often resorted to baseless accusations, threats, and absurd insinuations. Luckily, this could be easily spotted.

In the “Agree to Reject the Counter-Proposition” technique, the disruptor frames the issue as two very distinct options. This is the “split screen” method that FOX News used so well over many years to move national discussions toward extreme views. With 9/11, it was again most well demonstrated by arguments over the Pentagon in which everyone was either a “planer” or a “no-planer.” All other questioning about the Pentagon event was forsaken as a result of this mindless dichotomy.

Using “Arguments Ad Hominem,” Schopenhauer described how the opponent could be shown to be inconsistent and therefore untrustworthy. With 9/11 questioning, disruptors often attacked the person (ad hominem) rather than the argument itself.

Fetzer helped the government deflect questions by using the “Make Him Exaggerate His Statement” technique in which “when you refute this exaggerated form of it, you look as though you had also refuted his original statement.” In the short time that he was in the 9/11 limelight, Fetzer would begin every interview with the claim that my former company UL had “certified the steel used in the World Trade center to 2000 degrees for six hours.” Despite being an incorrect exaggeration, Fetzer continued to use it even after that fact was made clear to him. Ultimately this allowed the government agency NIST to refute Fetzer’s exaggerated claim, quoting it word for word, rather than address true questions about UL’s certification of the WTC steel components.

In the “Find One Instance to the Contrary” method, the disruptor simply finds one example of when a proposition was not met. For example, a disruptor would argue that because the WTC towers were destroyed from the top down, they could not be demolitions because all demolitions occur from the bottom up. This was the argument from “skeptic” Michael Shermer when I debated him on Air America radio in 2007. In order to support his contention, Shermer casually claimed to have watched thousands of demolition videos during the 2-minute radio break. Unfortunately for him, a top-down demolition was posted on a leading 9/11 truth website which I referred to at the time.

With the “Put His Thesis into Some Odious Category” technique, 9/11 questioning was frequently conflated with positions that were seen as hateful or stupid. This led to some members of the media lumping “truthers” in with “birthers,” holocaust deniers, and those who question the moon landings.

In retrospect, it is comforting to know that so much effort at disruption was needed to prevent 9/11 questions from taking over the national discussion. It means that many people were informed to some degree and that citizen groups working for the truth were seen as a threat to a corrupt system. Many people are now aware that terrorism events are not as simple as the government and mainstream media portray them.

People need to be able to recognize infiltration of grassroots movements because the system will not change on its own. It’s likely that only a catastrophic and catalyzing realization on the part of a large segment of society will lead to any real change and recognizing the techniques of disruption could help achieve that realization.

This entry was posted in 9/11, Terrorism and tagged , , . Bookmark the permalink.

12 Responses to Techniques Used to Disrupt 9/11 Questioning

  1. Since belief in the 9/11 lie is still foundational to the policy of globalization, disruptive techniques will continued to be employed as global digital governance is foisted upon all of us and any idea of privacy and representation of the concerns of the public evaporates.

  2. Lew Welge says:

    Thanks for contributing significantly to our #RevolutionofAwareness.

  3. Kevin Hammond says:

    Excellent piece Kevin. Thank you.

  4. geeyp says:

    Sunstein and his wife Samantha Powers were quite the power couple weren’t they? Oh yes, they are what we all strive for in our own lives here in America. Perfect fit for the last president’s adminis tration. The CIA runs us all ragged and we suffer and pay hard times for it, pay our inheritance towards them, and feel guilty for not having more success in our own lives. I know that twinge hits me a little now and then. J. F. does give good talk and spins a good tale, although slightly unfocused. Not as dangerous as a Cass Sunstein, though. Punishment for the corruption of the previous two (16 years, though 1st one never officially elected, got in ’cause otherwise would hurt his feelings ) administrations could not happen soon enough.

  5. geeyp says:

    I want to add to my post that this piece is a great reminder, Kevin, of these characters from our recent past. Never forget the ongoing COINTELPRO operation wherever you find yourselves, people. Just like with the CIA’s “conspiracy theory” JFK coverups, these people hand it down to the next generation of paid disinformation agents. I have spent my life explaining to anyone and their children the truths of JFK, MLK, RFK, 9/11 situations, and will until the day I die. Thanks again, Kevin, you do great work!

  6. So brilliant, so important and with points so obvious…once the great mind of a great man, Kevin Ryan, makes it so clear. Thank you.

  7. Ken Gerasimos says:

    How about BASIC PHYSICS? Jet fuel burns up at what temp? And steel becomes molten at about 1000 degrees hotter? Nano Thermite found at the site? And to go right along with that . . . the news broadcasts for a year that it was still too hot to get near it – at ground zero. Yeah . . . Okay. .live in fear now and remove freedoms. I think we got the jist of this game.

  8. tmspell says:

    Yes Kevin Thanks for working. “Dust” is what they called it and still call it today in the museum BUT it was and is all that powder ie 40,000 cubic yards of concrete broken and much of it pulverized (along with lots of other stuff) all in less than 15 seconds. Peace Tom

  9. Brian Murphy says:

    It has to be assumed that the 9/11 truth movement is heavily infiltrated by those who did 9/11. This article seems to take it as a given that Fetzer and Wood are among those working for those who did 9/11. I’d be curious to know how that was arrived at, if it was just inferred or if there is some hard evidence for it. Nothing would surprise me. I would not be surprised if some leaders of 9/11 truth that are regarded as totally trustworthy and beyond reproach are wrapped up in it. There are many dollars to be spread around.

  10. marley engvall says:

    looks like the wheels are falling off the wagon of the terror state.
    which is fine, except that it leaves a vacuum, an absence of new vision.

    where do we want to go from here? please, keep in touch. we like to hear from you.

  11. Gracie says:

    I just found your blog. Please do some more writing.

  12. wardropper says:

    Thank you for this excellent collection of relevant evidence, all in an easily-assimilated package.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s