"The methods used to make "learning" and confession palatable and workable are borrowed freely from three sources. These are evangelism, psychiatry and science. The language and ideals of each of these fields were taken over and given new meanings and new interpretations in accord- ance with communist needs. Brainwashing is a combination of this fake evangelism and quack psychiatry in a setting of false science." "The entire mechanism of brainwashing, so as to condition the patient and to indoctrinate him, particularly to accom- plish the latter, is geared to putting his mind into a fog. That is the purpose of all the sly and harrowing pressures used."
~ Edward Hunter - "Brainwashing and the men who defied it.", 1956.
The formula for the interdependent tactical relationship within an informational stratagem.
The single most important resource in the world, past, present, or even future, is information. The people who control information, undoubtedly will control society, whether it is a nation, kingdom, state, tribe or any other form of society. The control over information is so detrimental to every society, that no one can escape it's grasp. It is important to note that the information that is most significant is the factual based data. Every other form of information, fictional or non scientific, can also be controlled with the control over factual information. Disinformation, however, is design specific, and oriented at creating confusion.
The disinformation campaign utilized by an intelligence agency, may have a wide range of varying scenarios that are changed to fit a specific need, though the absolute truth that any disinformation campaign is designed to hide, is the takeover and control of factual information, primarily it's sources, and even to go so far as to create unnecessary forms of factual based information and a need for that information type. Many different types of disinformation are utilized with the purpose of creating confusion, although the confusion is meant to draw you into conclusions of aggression against you by your own government, and leading you into action against your own government, even to the point of attacking your own government physically. This tactic may utilize implantation of foreign agent or ideology into one or more of your government agencies, that is then used against you in an aggressive manner, making the aggressive agency look guilty of harming it's citizenry, and thus provoking response. No matter what else happens during a disinformation campaign, intelligence using such a tactic will stop at nothing to throw you off from discovering the true nature of what they are up to. This makes exposure of this tactic very simple if you know the above information.
I have chosen to educate you in some of the tactics used against a psychological warfare operation, especially an ideological subversion campaign, in advance to teaching you the complexity of the informational stratagem for a very good reason. I cannot emphasize enough about how important it is to be able to identify a foreign agent or ideology, so I chose this medium as a form of institutional instruction.
Even as I am teaching you this, foreign agents will attempt to utilize this information and change tactics accordingly, however, there are some constant truths that cannot change, and thus become the identifiers. An enemy agent will always try to implicate entire agencies within your current government in attempt to discredit both you and the agency at the same time. This sounds impractical when you are first exposed to this truth, but this tactic effectively distances you from your government, as well as your government from you. Creating this distancing is key to your overall confusion as it effectually occupies your cognitive abilities, keeping you focused on an intense objective, distracted from the reality as it occurs around you. Now that you understand this simple fact, I can explain how to expose an agent using this information.
Continually supporting the government agency that is coming under direct attack of reputation, given enough time, will eventually unnerve an enemy intelligence agent, aware or unaware of their enemy involvement, causing them to first attempt to “convince” you of their side of events. Next, if that fails, they will try to attack your character as unsophisticated and therefore your side of events are childish. This requires you to act “dumb” while you are in support of your government agency. Be aware also, that an enemy agent is not afraid to hurt you, or a loved one, emotionally, mentally, or even physically in order to convince you that it is your government agency that has hurt you. If for instance a police officer hurts you in some way, remember that it is not the entire police force that is criminal, but the officer or officers involved, and they may not be aware of foreign involvement around themselves either, that is causing them to hurt you. As your character is being attacked as unsophisticated, you must leak certain information, just enough, that might implicate a foreign infiltration. Remember to leave out most of the fact that backs your information as this will allow you to revise and reveal later. At this point it is almost inevitable that an actual PSYOPS agent will become involved and their tactic will change slightly. The new option will be to try to insert their version of events into your own information and try to seem as your ally. If you have prepared in advance well enough, this will expose their position because you can revise your information with facts you purposefully left out, after they have attempted insertion into your information, exposing that their version is indeed a fake.
Most actual PSYOPS agents will try to hide their involvement a swell as possible. The only sure way to reveal an agent of a foreign intelligence group is to follow the slaves back to the master so to speak. So, if you suspect someone is being used by a foreign agent, follow their monetary trail right back to the source, and eventually this will lead to the group or groups responsible for their monetary compensations. Leave out no monetary source as suspect. As you learn to utilize the enemy PSYOPS agents trigger responses to your advantage this tactic will become considerably easier and provide for countless hours of useful observations that you can later examine using the eugenics technique known as deductive reasoning, or deductive logic, in order to surmise of the agency involved.
Now that we have an understanding of provocation, how to detect it, and how to find the source of provocation, we can concentrate on eliminating noise interference. The theory of noise interference within a disinformation strategy is key to creating confusion, and confusion is key to directing dissent, and hiding the truth of the disinformation strategy.
Definition of detection theory ~ source - http://en.wikipedia.org/wiki/Detection_theory
~Detection theory, or signal detection theory, is a means to quantify the ability to discern between information-bearing energy patterns (called stimulus in humans, signal in machines) and random energy patterns that distract from the information (called noise, consisting of background stimuli and random activity of the detection machine and of the nervous system of the operator). In the field of electronics, the separation of such patterns from a disguising background is referred to as signal recovery.~
The realization that dissent can be controlled for a purpose is now understood, as well as the conscious recognition of purposefully distributed disinformation, we can now also recognize as interference, called “noise”, in order to create confusion in perceptual ability. Controlled dissent is appropriately used to accomplish the simple goal of creating division between you and your own government. You can now see why the above method of revealing a provocateur is so simple to understand and accomplish, for any uncontrolled dissent must be brought back into order, and anyone who might be able to educate people about what is really taking place must be stopped at all costs.
Now to the truth, which is the ability to gain control within a society by merely gaining control of informational sources, and even by creating new forms of factual based information in order to eventually gain control of intergovernmental sectors previously unoccupied by any other source information than actual discovery or investigation.
The absolute fact that all information is intertwined with, and interconnected to all other information, is the the founding basis of the informational control theory, when coupled with the understanding that information can be altered, created, dictated, or in any way manipulated, into whatever form you would like as long as the information continues to be factual. The model for controlled informational takeover can vary widely depending upon individual society, although it is constrained to the given societal ideology. Ideological subversion can be done slowly over a great period of time and in stages, in order to gain control of, or to create new forms of information as well.
Information distribution is how a society is controlled, though remember, that the ultimate goal is to control different sections of a society through controlled informational distribution, which in turn gives you the ability to control the information that is distributed. Confused? It's not as difficult as it seems. Every society has some form of ruling government and that government must obtain information from some source or sources. The government in turn dictates which information is distributed into it's society. That's the basic fundamentals of the information control theory. To control information being purposefully fed into a government, to control the government with that information, and eventually gaining complete control over the entire government, being able to dictate and control information distributed to society as a whole.
While slowly gaining control over information, you begin to dictate what information is being distributed into society through it's government, even before the smallest gain in control over government is accomplished. This is cyclic in theory and through this technique you will eventually gain complete control. Even the school child's ideology can be subverted into a form of submission to the new leaderships ideology, and hierarchical functions.
Time for an example of how information control works. Once someone controls information, the information must be tactically disseminated. The method most often I have witnessed for the tactical dissemination of information works as follows: First, take a piece of factual information and disseminate only what you want people to focus on within that information. Create a “discussion” and disallow any interpretation that draws legitimate conclusions against your side of the debate. Of course, you have carefully selected your opponent for this “discussion”, so as to the fact that you control the “discussion”. You must create the illusion of “unsophistication” of your intellectual opponent during “discussion”. In order to accomplish this, you must create an atmosphere of tension and aggression, whilst at all costs avoiding any heated arguments coming from your side, and at the same time, causing the opponent side to become aggressive by consistently creating tension within the argumentative phase. It is imperative that people be made to think that aggression and anger are abnormal and counterproductive to the “discussion” process. Eventually, using semantics within your argument over and over again, to turn the argument back into your favor, focusing on some inconsequential point to do so, you will find some thing that your opponent has either lied about, misled people on, or is otherwise un-knowledgeable about, and you maintain focus on this point, always drawing the debate back to this point. Your opponent must eventually concede to their wrong doing, whatever it may be. This is all important, and is the point known as “confession”. Of course you never let yourself be drawn into “confession”, always taking focus off of yourself by putting the focus back onto your intellectual opponent. When you force your opponent into “confession”, you concentrate all focus onto the “confession” and take away focus from all other aspects of the debate. This creates the illusion of your “superiority”, your opponents “weakness”, and your side of the “discussion” will undoubtedly be favored, and later accepted, as you continue, even after “discussion”, to focus on the “confession” of your opponent.
Please keep in mind that “discussion”, or the entire point of “discussion” is to create a trade off of freedom, for security. Choose your opponent carefully, so as to the point of their argument favors the same trade off of freedom for security in some fashion, in case they win popularity. Now we understand that both sides of the argument will lead to the same conclusion, more security, which you will provide.
Informants are key to local, state, and federal government law enforcement investigations. They are used in every single investigation, if one can be acquired, and the range of information they provide varies greatly depending on investigation type and strategy. All the information they provide can be easily referenced or called upon for later usage as well, and eventually will help statistically generate the tactics the law enforcement strategist will later create. While this sounds great for law enforcement, in reality, the possibility to control law enforcement practices and strategies through the control of this information type is far too easy and practical to be ignored.
It is safe to say, that with the informant strategy, a law enforcement agency might be fooled into creating a fictional crime in the name of national security, in the hopes of catching a would be criminal. This strategy of entrapment would eventually lead law enforcement strategists into using their collegiate educated tactics when creating new crimes in order to entrap suspects, and inadvertently or purposefully create a new model for would be criminals to follow. This strategy could also be used to beguile the public opinion, after creating new types of crime, that would lead to wide ranging calls for more law enforcement being used to stop these new more terrible crimes.
Information reliability is not typically within the overall investigators control, and more and more, as this type of information is used, the credibility of a typical informant seems to matter less than the amount of convictions that are acquired. Throughout time the investigation reliability itself becomes dependent on the informant strategy, even though the individual informant may be a part of a foreign intelligence group, as well as law enforcement officials embedded into the agencies, and the statistical information provided being so controlled, would allow for a foreign agency to completely control law enforcement to such a degree, that even the weapon types and manufacturers used would become a tightly controlled inner organization. If a foreign agency created crimes, criminal organizations, and terrorist cells in advance to this planning, the overall public opinion could be easily beguiled into acceptance of such an informational tactic. Eventually, as the informants credibility increases the information credibility could be further degraded through a control of informant procedures and corroboration.
Credit Bureaus are a data collection service type, providing key infrastructure information throughout the entire world. The information they store is imperative to the legislation of every nation. Credit bureaus have become synonymous with strategic planning commissions, both Governmental and civilian. Even the United States Military relies heavily on these new agencies.
The data within the agency varies greatly depending on the individual for which the data is stored. A typical report however, mainly consists of two data sets, one for the positive credit, and one for the negative debt. No other agency in the history of the world has been able to achieve such a data type outside of communist regime policy.
This data creates a new vulnerability within society, that allows for strategic foreign operational stratagem. Through the purposeful manipulations, or creation of negative debt inside of a target nation, new types of legislation can be created and passed onto the judicial systems. This may sound impractical, but in reality levies a great power over how courts view individual habitual criminal behavior, and in fact may lead to creating new legislation targeting individuals whom fail to pay debt on a regular basis. Eventually, the popular judicial opinion may be altered into favoring increasingly harsh penalties upon the less fortunate.
Credit bureaus hold power over peoples lives to such a degree today, that if someone that owned a credit reporting agency, or that worked inside, wanted you as a slave, they could easily recruit people to purposefully cause you debt, which on the street they call “keeping you down”, and you would have no way out from under their power. The credit bureaus hold such power that you could even be kept from acquiring housing, and if you didn't do what you were “supposed to”, you could be kept homeless forever. Creating negative debt purposefully is a new form of slavery within the United States that is worse than any form of communism that has ever existed before it, and wouldn't be possible without the credit bureaus. Credit bureaus also allow for extensive control over the wage acceptance level, due to the desperation of the people trying to eliminate negative debt from their individual reports.
Privatized insurance is the practice of providing post incident expense coverage through a system of pre payment options, which are kept under safeguard for the individual investor as a measure of securities. This system of securities is strictly marketed as a an economic stabilization trend mechanism. While there are many forms this mechanism might take, the most popular, and by far the most lucrative, is the medicinal exemplar.
The current model by which the entire privatized medical industrial complex is derived, relies solely on a persons inability to afford health care. This is largely due to a purposefully created deficit which relies heavily on the control over the low standard of living. Of course, all the information types I am writing about depend greatly upon this same factor, as well as dependence on all other information types, and no information could be objectively used without the controlled low standard of living, the use of this tactic in medicine is especially disturbing.
When taken into account, that all people will need some form of health care throughout their lifetimes, and in fact are reliant to some degree on the ability to acquire coverage, the use of privatized insurance inside of this sector provides for a most sinister motif. Obviously the creation of a caste based system becomes apparent throughout society. The two caste system, caste A, whom can afford health care insurance, and the caste B, whom cannot afford coverage. Eventually this will lead to a degrading social view of those who are in the caste B, and will continue to subvert a societies ideology, until finally the entire system becomes caste reliant.
Control over this information is most imperative and in fact integral, when creating a negative persona of the lower caste. Care decisions and directives can be altered slowly over time to fit the new ideology, even as the ideology is being fostered within the targeted society.
We must also be aware of current market trend, which upon examination of fact based analysis, reveals a short term gain strategy. The current market fails in entirety to conceptualize in reality, the long term ramifications of their current activity. One should not go after that which does not profit, and though short term gain may seem profitable on the surface, at least for the investor, one must also think about how that short term gain is acquired.
Research data is amongst the most highly sought after information in the world. Data which can be included in this category is unlimited, as well, the types of data are limitless. There are no specific operations that must be performed in order for data to be considered for research, though, the way the data is compiled may greatly effect the ability to interpret. Most, if not all, research that is based upon historical data sets, depend greatly upon the former opinions of past researchers when interpreting data, as usually the data collected is biased to some degree.
The general idea through out most societies is to collect data upon the opinion of the overall mindset of the ruling government. Governmental consensus dictates directly through funding, thus the collective study results are peremptory. The outset of data is also commonly effected when the end result is consistent, and therefore becomes accredited. The accredited data sets and subsequent research affiliations are of essence to the internal growth association within the burgeoning mentality.
The effectiveness to control data sets, of that which all research relies, is of utmost importance to the consistency of the societal ideology and continual growth pattern of development. Criteria if altered could result in a loss of psychological control and resultant corruption within the data collection process would inevitably occur. Such corruption would eventually lead to a purposefully fatigued inner sanctum, deteriorating the process of capitol selection. Once a breakdown within the monetary accumulative process occurs, imperial affiliation conversion appears. Individual psychological ramifications are then typical.
An entire societies cumulative judgments, also known as social psychology, rely entirely upon which researches are explored, and of course research is data intensive. Eventually, the individual psychology is effected and even manipulated into the new collective opinion, transcending previous mental interpretation. This could easily be used in order to create purposeful confusion, which would allow for the subconscious trade of freedom for security.
Collections is a loose term for the many different strategies and companies, usually attached to the banking sector, in which an individual or group debt can be recouped through aggressive policy, using an intermediary source. Adjustments to the amount owed are generally made when a debt enters into the collections process, and an excessive levy is applied in order to maintain a profitable margin, allowing for the company or persons who are actively pursuing debt, a substantial monetary gain for services rendered.
Most if not all people will experience a hardship in their lifetimes, also within that hardship a persons debt is likely to be sent into collections. There is a reasonable probability that the debt owed might be substantial, and thus the collections process will likely add to this debt, creating a worsened negative monetary situation. Even if the debt owed is very small, the collections process will add substantially to an individual debt. While this process seems to only harm individual incomes, it has a greater impact than one can imagine on the overall economic status of a nation.
Let's take for example a mathematical interpretation. For every debt sent into collections an average amount of two hundred American dollars is added. This may seem insubstantial, however, in reality it adds up fast. If we take one hundred thousand debts sent into collections, times this by the amount a collections agency adds for their fee, we end up with an additional twenty million in debt as a nation. Over an extended period of time, say twenty years or so, even if there are only one hundred thousand debts sent into collections a year, that equals four hundred million dollars in additional economic national debt. In reality, the numbers are far higher and can be used to explain an overall foreign strategy of economic espionage.
When a societies debt can be purposefully inflated through individual personal economic injury, creating a cyclic perpetuation, which relies on personal greed and a short term gain strategy, a controlled low standard of living can be achieved. Through a controlled low standard of living, a continual degradation of society is eminent. Not only physical elements of society will degrade, but also social, as well as psychological deficiency will occur. This brings me to my ultimate point of observation on this type of data, that it is used to control the economy through a policy of subversive means.
A society which you are attempting to take over using subversion is said to have have been successfully divided and conquered, when within the civilian infrastructure, every single person, can be made to abandon each and every other single person when in their time of need.
Journalism is the act of collecting data in an ordered fashion and presenting it to an individual or target group. The data is comprised of many forms and provides for a wide array of intellectual uses. Usually, if not always the data is organized in a political fashion, and maintained through fiscal relations within a government entity. A stereotyped distancing from administration is required to maintain the aspect of impartiality, more for the overall social psychological benefits than for the monetary compensations. Success in journalism is not unlike success in politics, both depend entirely on popularity, and both heavily rely on one another in order to extend controls, allowing both outlets to remain constant, cooperatively.
Without journalism politicking cannot exist within the modern governmental infrastructures. It has become so detrimental to the campaigning process, that every single facet of politically active individuals lives are covered. This coverage maintains for as long as a politician remains operative, and in some special cases, long afterward. Remember that a journalistic interpretation does not control political assessments made by individual voters, rather a journalist is a creation of his academic authority. Academia also dictates the average opinion, therefore the mindset is carefully selected for popular opinion, long before a journalist becomes admired.
The information that is provided by journalists is distributed through a media outlet. The media outlet functions as a moderator, distributing the collective data acquired through journalism, allowing or rejecting data based upon it's controlled objective.
Media influence, the act of controlled informational distribution is commonly referred to as propaganda. The most popular media outlet is the most influential, therefore it has become more typical through out time to create circumstance in advance, in order to propagate a demotic necessity for the information provided. This allows for foreign intervention and interpretation of what might later be known as a fact, and in truth may be false propaganda base information.
Rarely, if ever, is journalism investigated, much less the media outlet providing the information to the target audience. Once embedded into a media affiliation, a foreign agent posing as a journalist might be able to sabotage a media outlet or further influence a media outlet to include subversion propaganda into it's distributed medium. Control over journalism, would at any rate, allow a foreign government eventual full control over media outlets, authorizing a total subversion of fact, corrupting academia, and directing control of influence in their favor.
A school is a place of data collectivity coupled with instructional forum, highly organized, into an institutional learning facility, utilizing scrutinized curriculum and highly trained professional intelligence distributors. Almost every nation in the world has adopted some form of forced educational practices. Inside of the United States, as well as most other nations, there are many policies governing the educational procedures that every child of a certain age is subjugated to. Refusal to participate in the educational process is in itself considered a criminal offense that is punishable through overly harsh penalties, considered by some to be collective political torture, even to include incarceration, a form of political imprisonment. These new collective penalties have only been practiced inside of the United States since around the beginning of the cold war era. I leave you with your own moral standards to provide for why this is such a negative ideology. Obviously one can see the advantage a subversive program targeting youth might gain from such forced exposure to whatever medium the current government forced into the minds of the vulnerable psyche of the youth. Not to mention the theory of forced education in subversion and the effect that has on the degrading moral standards of a nation. Through forced educational practices, an entire society can be made to submit to new policies of forced practice. Even forced labor becomes a realistic future development.
Educational facilities, by far, collect more data than any other institution within the modern world. The data is then processed by instructors, using a rigid guide, prepared for them by government, into an “acceptable” form for distribution into society through “education”. This data eventually leads the individual student intellect into a collective conclusion. Since the data is prepared in advance and follows directly a political agenda, is forced to be ingested into the psyche through repetitive procedural techniques that are inescapable, and also for which there is considerable fear of harsh punishment for attempted escape, the obvious conclusion of the intellectual mindset, is that of control over future political election through the educational process.
The control over the flow of information distributed through out an educational facility creates the possibility to influence the minds of an entire society. The forced educational system allows for the insertion of political techniques later utilized when coercing the individual voter, even to such extent, that the journalists themselves covering political campaign are carefully selected by educators while within their facilities, and are graded upon their acceptance of behavioral policy. This technique also allows for the control over whom will enter politics, based on their popular influence, which is derived mainly of the general overall consensus that has carefully been inserted into each and every “educated” individual, and for the ability of the future politician to create approval of subversive policy in mass.
Defense contracting is the act of acquiring governmental funding for provision of military equipment, personnel, intelligence, or any other conceivable supply that is useful in the protection of a given society. Military and defense contracting are one in the same, one depends so completely on the other that there is almost no division line between. This seamless dependency, or codependency, is an efficient tool for strategic interjection of ideology. Everything in a democracy, or any other form of government, so heavily relies on defense, that inclusion of this data type, is imperative to every single aspect of daily human existence. Relationships, even up into the hierarchic structure of a kingdom are effected to such a degree by defense contracting, that it was common practice in the past to pre arrange marriage, depending solely upon defensive military alliance. It is easy to see how the relationships between defense contractors and politicians within democracy evolved over time, even to the point of shaping future military alliances between nations.
Collective control over the data of this type allows for the ability to create conclusion based on analysis, that would lead to the use of newly developed supplies, that could then be delivered by pre selected contractors. Developmental strategies such as this would be typically deployed after a need for said supply was purposefully created. This allows for interjection by developers who might have a subverted ideology, which leads eventually into relational changes within government, and finally policy diversion and corruption of integrity. Greed being used as a required tool of the newly elected official, in accordance with the monetary avidity of the defense contractor. Military achievement, being largely based on successful strategic usage of defensive equipment, provides for the overall control base, that will be supplied by defense contract data.
In order to achieve collective control over defense contract data, an agency need only privilege of information. Once privilege is gained, a further reliance can be easily accomplished through identification with successes in defensive abilities that are largely due to the overall performance of supplied equipments. Eventually, after carefully accumulating defense contract data in mass over a large period of time, while maintaining a positive relationship with the interior defense mechanism, takeover from within is feasible. Once takeover is accomplished, certain data could be deliberately disclosed using an unawares individual selected for privilege of data in advance and coerced into divulging classified information. New security mechanisms developed by the infiltration then would be easily employed, permitting the infiltration to maintain the control. Effectively used data security gives the infiltration the ability to monitor for any new takeover attempt, efficiently overseeing every person viewing classified material, sealing the very gaps they used to acquire control themselves.
Perhaps the most diversified data infrastructure in the world, depending upon more independent informational sources than any other form, is the collection of intelligence. The act of gathering intelligence derives from a military defensive strategy, ultimately used in the organizational creation of defensive buildup for possible future conflict. The sheer amount of data an intelligence agency has to interpret creates openings for insertion of tactical information. Obviously, formation of organization intended to undermine intelligence, and the defense of national security, preemptively, establishes ability to cause need for such an inserted data type.
When attempting to understand intelligence tactics, one must also study, not only defensive, as well as offensive strategy, but the enemies possible motivation as well. Comprehension of the “Pavlovian conditioned reflex theory” is here necessary due to the overall complexity of the issue at hand. A purposefully created controlled low standard of living, coupled with the state capitalist mindset, allows for the subversion of ideology on a national level. This of course could not be accomplished without the controlled cooperation of information sources, and in fact, the purposeful creation of informational gathering that would typically be deemed unnecessary. For instance, information such as credit reporting, collections data, private insurance, the buildup and usage of the communist informant mindset, and the acceptance of all of these.
Government, as a whole entity, is directly influenced by intelligence data to such a degree, that the entire infrastructure is derived from this source. The accumulation of all other data, even the carefully created unnecessary data, is used when producing intelligence reports, so one can see how vital the control over all other information is to the informational control tactic.
Insertion of a foreign agent or security measure would be most easily accomplished during the “chemical response”, known in Pavlovian theory as the point at which ideology is subverted, or “survival instinct”, phase. Within the intelligence subversion cycle, the “chemical response” utilized, is called the “feel good response”, which is usually the result of catching a criminal before the criminal commits a crime, one that has been created in advance. A criminal, or group of criminals, created in advance, and unaware of the true nature of their activity is called a sleeper cell. The “chemical response” is the moment at which a person lets down their guard and becomes more acceptant of a person, place, thing, or altered ideology, especially one that has, or will in the future, in the case of intelligence, help in national defense. We can see now more clearly how and why the control of this type of information is accomplished and the end result.