A recurring pattern of whistleblower suppression, refined to align with the McGreevy case, unfolds through targeted stages of entrapment, internal division, and attempted erasure.
It should be noted that anyone studying whistleblowers, including myself, faces an implicit threat, and they operate with the threat in mind at all times.
Step-by-Step Pattern
- Deep Involvement and Whistleblowing: The individual embeds deeply in a covert operation, gaining insider knowledge of systemic abuses, then defects to publicly disclose the misconduct.
- Legal Entrapment: Authorities orchestrate legal setups (e.g., fabricated charges), resulting in jail time, torture, or punishment.
- Elevation and Initial Discrediting: After release, they rise prominently in whistleblower networks, gaining influence, but are simultaneously discredited by mainstream media leveraging the legal charges.
- Secondary Attacks Within Networks: The whistleblower faces attacks, discrediting, and reputational harm from within whistleblower circles (e.g., controlled opposition and engineered polarization).
- Informant Exploitation: Discredited and without income, the whistleblower is offered an undercover informant position exploiting a vulnerability like child protection.
- Confidant Betrayal and False Arrest: They confide naturally in an “ally,” who reports it “in good faith”; the whistleblower is then arrested on a false charge (e.g., McGreevy’s case closed without guilt).
- Media and Law Enforcement Blitz: Media, in tandem with corrupt law enforcement, launches a full-court press publicizing the charges.
- Supporter Intimidation: Key allies face threats to isolate the target.
- Whistleblower Intimidation: Whistleblower signs “apology” for false statement that doesn’t match his normal signature; may have been coerced due to threat against self or loved ones.
- Poisoning then Elimination: The whistleblower is poisoned then found dead from blunt force injuries, often ruled suicide despite inconsistencies.
- Evidence Seizure: Computers and devices are immediately seized by authorities.
- Narrative Subversion and Internal Attacks: A close supporter receives the devices, initially deeming them intact, but later declares the whistleblower wasn’t perfect (we do not know if the device was tampered with or not, despite the vehemend denials)—-mirroring the whistleblower’s warnings about subtle device alterations to incriminate and coerce.
- Gatekeeping: The device-holding supporter selectively releases information and attacks other individuals who were in contact with the whistleblower claiming they did not do enough for him.
- Suspicious Behavior: Device-holding supporter attempts private conversations with other whistleblower allies, attacking them upon refusal; offers to sell devices to the highest bidder.
- Weakened Credibility: This supporter (Dr. Blumenthal) attacked by other “truthers” for insufficient research; these other individuals may have an agenda of their own to coopt or erase the whistleblower’s work.
I do not assert that Jon McGreevy was perfect or always accurate, or even consistent. I do find his words to be credible, and I think it is worth studying how the effort to discredit him and erase his memory goes far beyond normal journalistic or truth-telling endeavors.
Finally, I called for McGreevy to be placed in witness protection during his life, and I believe that he may actually be alive, and not dead as the coroner’s report claims. If I am correct, this would be for his protection.
Learn More
McGreevy Files at the Internet Archive: https://archive.org/details/@jon_mcgreevy_archive_files