Taeter

23
Jan
2007

16
Oct
2006

25
Sep
2006

7
Aug
2006

Federal tactics for Information Warfare

http://groups.yahoo.com/group/FreedomOfSpeechNow/message/43

Invasive Federal tactics for Information Warfare on the Internet (only a fed disinformer could object to this post. Pass this around a bit and see who squeals). This message triggers the CAPCHA censorship window, and might be diverted to thew bulk mail folder.

It is very simple: We learn who the most effective human rights activists are, by seeing who the government shills attack. We learn who the government shills are, by seeing who attacks the most effective human rights activists.

http://www.cs.virginia.edu/~alb/misc/infowarDistraction.html

Information Warfare on the Internet [I posted this to alt.mindcontrol in early December, 1997. The group had been flooded with posts for sex-related web sites, and included graphic jpeg images. While this post is mostly about Usenet news groups, much of it applies to email and web sites too. The term information warfare is, in many respects, just a new word for what used to be called propaganda.]

The recent porn posts in alt.mindcontrol fit in as one of a variety of techniques for disrupting internet news groups. If you read about the basic cointelpro techniques, most such disruptions are variations on those themes. They are also deniable, and this uncertainty is cultivated and prized by harassers because it can lead to (justified) paranoia and false accusations that discredit the victim.

Information techniques distraction with irrelevant posts. What better example than the recent porn posts? Discussion is lost in the noise. (In this case, the posts may make the group "appealing" to a new audience, so a small silver lining is that new people can be informed about mind control.) Distraction by voluminous postings with no information by blowhards and empty name-callers. (Can be hard to distinguish from genuine blowhards.) People who wallow in the mud do not need to outdebate you; they only need to drag you down there with them. Kill files can help if your newsreader has them. Planting of provocateurs (and sleeper agents, etc.). These people will vary from the posters who suddenly show up one day under an alias attacking regular posters, to people who seem like regular posters themselves. They may work in teams, supporting each other and giving the illusion of popular support on the net. (Remember, net IDs are basically free, and one person can have many.) As cointelpro showed, there is little that is more poisonous to an organization than to have it tear itself apart from the inside with accusations of moles. (The CIA knows all about this from its own mole hunts.) Moles love to accuse others of being moles; then again, there are real moles. You have to judge for yourself who to listen to or what to believe. Hardware techniques Spoofing. Forgeries and modified content. Does not need to be global over the whole internet, for example just your local news server can be modified. If they control your regular communication line like your phone line there is no end to the illusions that can be created. There is a danger that some forms of spoofing will be detected, though, and it is harder to do, so I think these techniques are used less widely than the others. Canceling posts. Posts disappear or only propagate in a limited region. This has deniability as just network problems, since sometimes there really are network problems. One technique is to secretly "localize" posts that are not approved by some censor or gatekeeper. Most people will not notice if their post only appears on their local news server, and will assume it has propagated worldwide. They will just think no one has replied (though spoof replies can be posted locally, too). I check to see that my posts show up at DejaNews. Hardly foolproof, but at least then I know people can read them there (at least until more sophisticated spoofing is available, perhaps tailored to domain names or user names). Delaying posts. By controlling when posts show up, the flow of the debate can be controlled. A heads-up warning can be given to the plants on the group to counter arguments ahead of time. They can also make the same arguments or statements themselves ahead of time to build their own "credibility" or to steal thunder. Controlling search engines. If no one can find it, it is not there. I do not have any evidence that this has happened. The real danger is the possibility of "voluntary" self-censorship like we have seen, for example, in the newspapers with regard to radiation experiments. Combined hardware/information techniques Feedback pathways. An important aspect of psychological warfare is to have a feedback path to the victim. (This is like a control signal in dynamical systems theory.) The feedback path may be used covertly to manipulate the victim, the victim may become aware of it on his or her own, or the victim may be purposely made aware of it. Harassers often want victims think their harassers have control over them. To know they are being watched. This can help induce psychological trauma and regression in the victim. [According to the KUBARK interrogation manual, "All coercive techniques are designed to induce regression."] A feedback path can alert the victim that he is being manipulated. This can be done by telephones ringing or fax machines. It can be done with sophisticated mind control methods. It could even be done in newspapers if some person or agency knew the newspapers the victim reads and could influence their content (e.g. the final cointelpro link below).

But the internet is a fairly new medium that fits this bill perfectly if the subject reads newsgroups. In a simple example, you cancel a person's post and then post your own article hinting that you have done it. (Incidentally, psychological torturers can pretend to have caused anything they are aware of having happened.) The person gets angry, but they may not be sure, and if they accuse the tormentor they are ridiculed. (Always try to goad the victims into doing things in public that will discredit them.)

When the hardware is expanded to include home surveillance and mind control techniques, the effects can be magnified immensely.

Can anyone truly doubt that these techniques have been extensively studied and documented by our government? The stonewall of denial fights for every inch of ground, no matter how trivial. People will still deny obvious, documented (cointelpro) things like this to delay having to deny the next step of the chain ("Yes, maybe they studied it but they would never test it on Americans [they did], and they surely are not still doing it today [they are].")

Secret agencies are still arms of the federal government.

cointelpro:

http://mediafilter.org/MFF/USDCO.idx.html http://dickshovel.netgate.net/coin.html http://www.webcom.com/~pinknoiz/covert/cointelpro.html

and at the last site, especially

http://www.webcom.com/~pinknoiz/covert/seberg.html

If a simple request for evidence gives rise to a vitriolic personal attack, or an attempt to censor, rather than the addressing of the issue, then one can only assume that the attacker has no other way to respond. Any time that a simple request for evidence gives rise to a vitriolic personal attack, you can be assured that you are dealing with a hoax.


Informant: savefreedom2005

12
May
2006

Gangstalking and Electronic Harrassment

Four excellent audio interviews (Beth, McKinney, Kuango, Naylor) - edited and sans ads - covering gangstalking and electronic harrassment (running time: 197mins):

Torrent download (45 MB, mp3) here:
http://www.torrentspy.com/torrent/729297/Gangstalking_Super_Primer_197mins


Informant: Bond

10
Jan
2006

8
Nov
2005

Meet the fascists behind the perps

So what is the fascist strategy, and are the perps part of an attempted fascist coup?

Until recently they intended to have established fascism everywhere on the planet by 2030. All those who are, or might stand in their way are put on the various lists for:-

-occasional monitoring
-intensive monitoring
-intensive monitoring and covertly disabling
-covertly, or overtly, eliminate

They are even scanning the children for those who show signs that they might challenge their authority. They are generally disciplined and only eliminate people as a last resort. They prefer to temporarily covertly disable people, just enough to keep them down. This is the most efficient and least obvious strategy. On the whole they take pride in only using the level of violence required to achieve the result. They are a wise ruling class and know that unnecessary and overt violence will backfire on them in developed countries.

Their deadline was brought forward to 2014. This is because they underestimated the ability of the masses to communicate and react to their moves, and also to get organised and mobilised. They fear the masses will unite and rise up in an attempt to overthrow them. Also, while fundamentalist Islamic terrorism is not their doing, it is making it easier for them to advance their coup plan. This is not a "do or die" plan. It is just what they will do if they feel threatened enough, that they deem it necessary. They have been feeling quite threatened, thus bringing the deadline closer. They would prefer not to do it at all. Fear is their primary motivation. Corporate efficiency and progress, without being fettered by unstable democratic governments, is also a motivation, but of secondary importance.

It is the wealthy families, who own the large corporations that are primarily behind this. They have significant differences amongst themselves though. One is age related. The older generation are coming from fear of communism taking over and eliminating their wealth and privilege. This is a fear bread in WW2 and the cold war. It is no longer relevant. The younger generations know this and do not have this fear. They will be much more likely to accept other futures than fascism, as long as they can continue with their wealthy lifestyle. They are also not that attached to possessing ludicrously massive amounts of wealth. They are more self indulgent and less interested in controlling the future of humanity.

If they have to establish fascism, they will deal with rebelliousness openly, using the advanced political control technology that they now use covertly on TI's, groups and nations. They did not expect today's covert targets to become as aware of their methods, as has already happened. They now expect considerable exposure to occur and that it will be fully out in the open in around 7 years, ie early 2012. Their strategy then will be to admit that some of their people have been committing these crimes. They will accept trials and imprisonment for some who are caught. It will be made to seem like these perps are just "aberrant individuals" rather than part of an overall coordinated strategy.

Jed Stuart
Australia


Informant: Jedwings

--------

An Enemy of The State

Three thousand people were murdered that day and they were busy taking notes on you??? Damn, they sure have their priorities correct, haven't they? Not to mention a certain bizarre level of paranoia which might be more readily controlled with a psychotropic. These guys need doctors.

Rory Winter wrote:
http://www.capitolhillblue.com/artman/publish/article_7624.shtml


Informant: Iam dilligas

24
Oct
2005

21
Oct
2005

28
Sep
2005

logo

Mind Control

Bewusstseinskontrolle

Users Status

You are not logged in.

Navigation

Mind Control

twoday.net

Search

 

Archive

April 2024
Sun
Mon
Tue
Wed
Thu
Fri
Sat
 
 1 
 2 
 3 
 4 
 5 
 6 
 7 
 8 
 9 
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
 
 
 
 
 
 
 

Recent Updates

BKA und andere Polizeidiensstellen
Minister Schily, Innenministerium und BKA: http://www.findefux.d e/forum/read.php4?f=84&i=5 04&t=497 -------- Ruth.. .
Omega - 12. Mar, 22:44
Parlamentarische Kontrollkommission
Bundestagsdrucksache 14/8464 http://tinyurl.com /67sud -------- Schreibe n...
Omega - 12. Mar, 22:42
Plötzlich bricht das...
„Polizei aktuell: Plötzlich bricht das Auto aus“ Ksl....
Omega - 12. Mar, 22:41
Rechtsstaat Deutschland...
An alle Betroffenen, anbei ein Schreiben zur Information...
Omega - 12. Mar, 22:39
An alle Menschen, die...
An alle Menschen, die guten Willens sind und denen...
Omega - 12. Mar, 22:38

Status

Online for 7319 days
Last update: 12. Mar, 22:44

Credits


Weltherrschaft - NWO - New World Order - Verschwoerungstheorien
Adressen
Aktionen - Actions
Allgemeines
Beitraege von John Mecca
Beitraege von Alan Van Arsdale
Beitraege von Anna Fubini
Beitraege von anonymous
Beitraege von Axel Brueggemann
Beitraege von Bob Rose
Beitraege von Bob S
Beitraege von Brigitte Althof
Beitraege von Carla
Beitraege von Clare Louise Wehrle
Beitraege von Claus-Peter Gerber
Beitraege von Corey
... more
Profil
Logout
Subscribe Weblog