Counter Intellegience Tricks and Techniques
Twenty-Five Ways To Suppress Truth: The Rules of Disinformation
by H. Michael Sweeney firstname.lastname@example.org copyright (c) 1997 All rights reserved
Permission to reprint/distribute hereby granted for any non commercial use provided information reproduced in its entirety and with author information in tact. For more Intel/Shadow government related info, visit the Light vs. Shadow home page: http://www.teleport.com/~sweenfam/lightshadow.html (no longer available)
Built upon Thirteen Techniques for Truth Suppression by David Martin, the following may be useful to the initiate in the world of dealing with truth, lies, and suppression of truth when serious crimes are studied in public forums. Where the crime involves a conspiracy, or a conspiracy to cover up the crime, there will invariably be a disinformation campaign launched against those seeking to uncover and expose the conspiracy.
There are specific tactics which disinfo artists tend to apply, as revealed here. Also included with this material are seven common traits of the disinfo artist which may also prove useful in identifying players and motives. The more a particular party fits the traits and is guilty of following the rules, the more likely they are a professional disinfo artist with a vested motive.
Understand that when those seeking resolution of such crimes proceed in attempting to uncover truth, they try their best to present factual information constructed as an argument for a particular chain of evidence towards a particular solution to the crime. This can be a largely experimental process via trial and error, with a theory developed over time to perfection or defeated by the process. This is their most vulnerable time, the time when a good disinfo artist can do the greatest harm to the process.
A rational person participating as one interested in the truth will evaluate that chain of evidence and conclude either that the links are solid and conclusive, that one or more links are weak and need further development before conclusion can be arrived at, or that one or more links can be broken, usually invalidating (but not necessarily so, if parallel links already exist or can be found, or if a particular link was merely supportive, but not in itself key) the argument. The game is played by raising issues which either strengthen or weaken (preferably to the point of breaking) these links. It is the job of a disinfo artist to at least make people think the links are weak or broken when, in truth, they are not.
It would seem true in almost every instance, that if one cannot break the chain of evidence, revelation of truth has won out. If the chain is broken either a new link must be forged, or a whole new chain developed, or the basis is lost, but truth still wins out. There is no shame in being the creator or supporter of a failed chain if done with honesty in search of the truth. This is the rational approach. While it is understandable that a person can become emotionally involved with a particular side of a given issue, it is really unimportant who wins, as long as truth wins. But the disinfo artist will seek to emotionalise and chastise any failure (real or false claims thereof), and will seek to prevent new links from being forged by a kind of intimidation.
It is the disinfo artist and those who may pull his strings who stand to suffer should the crime be solved, and therefore, who stand to benefit should it be the opposite outcome. In ANY such case, they MUST seek to prevent rational and complete examination of any chain of evidence which would hang them. Since fact and truth seldom fall on their own, they must be overcome with lies and deceit. Those who are professional in the art of lies and deceit, such as the intelligence community and the professional criminal (often the same people or at least working together), tend to apply fairly well defined and observable tools in this process. However, the public at large is not well armed against such weapons, and is often easily led astray by these time-proven tactics.
The overall aim is to avoid discussing links in the chain of evidence which cannot be broken by truth, but at all times, to use clever deceptions or lies to make the links seem weaker than they are, or better still, cause any who are considering the chain to be distracted in any number of ways, including the method of questioning the credentials of the presenter.
Please understand that fact is fact, regardless of the source. Truth is truth, regardless of the source. This is why criminals are allowed to testify against other criminals. Where a motive to lie may truly exist, only actual evidence that the testimony itself IS a lie renders it completely invalid. Were a known "liar's" testimony to stand on its own without supporting fact, it might certainly be of questionable value, but if the testimony (argument) is based on verifiable or otherwise demonstrable facts, it matters not who does the presenting or what their motives are, or if they have lied in the past or even if motivated to lie in this instance -- the facts or links would and should stand or fall on their own merit and their part in the matter will merely be supportive.
Moreover, particularly with respects to public forums such as newspaper letters to the editor, and Internet chat and news groups, the disinfo type has a very important role. In these forums, the principle topics of discussion are generally attempts by individuals to cause other persons to become interested in their own particular problem, position, or idea -- usually ideas, postulations, or theories which are in development at the time. People often use such mediums as a sounding board and in hopes of pollination to better form their ideas. Where such ideas are critical of government or powerful, vested groups (especially if their criminality is the topic), the disinfo artist has yet another role -- the role of nipping it in the bud. They also seek to stage the concept, the presenter, and any supporters as less than credible should any possible future confrontation in more public forums result due to successes in seeking a final truth. You can often spot the disinfo types at work here by the unique application of "higher standards" of discussion than necessarily warranted. They will demand that those presenting arguments or concepts back everything up with the same level of expertise as a professor, researcher, or investigative writer. Anything less renders any discussion meaningless and unworthy in their opinion, and anyone who disagrees is obviously stupid.
So, as you read here in the NGs the various discussions on various matters, decide for yourself when a rational argument is being applied and when disinformation, psyops (psychological warfare operations) or trickery is the tool. Accuse those guilty of the later freely. They (both those deliberately seeking to lead you astray, and those who are simply foolish or misguided thinkers) generally run for cover when thus illuminated, or -- put in other terms, they put up or shut up (a perfectly acceptable outcome either way, since truth is the goal). Here are the twenty-five methods and six traits, some of which don't apply directly to NG application. Each contains a simple example in the form of actual paraphrases form NG comments or commonly known historical events, and a proper response. Accusations should not be overused -- reserve for repeat offenders and those who use multiple tactics. Responses should avoid falling into emotional traps or informational side-tracks, unless it is feared that some observers will be easily dissuaded by the trickery. Consider quoting the complete rule rather than simply citing it, as others will not have reference. Offer to provide a complete copy of the rule set upon request (see permissions statement at end):
Twenty-Five Rules of Disinformation
Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.
1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don't discuss it -- especially if you are a public figure, news anchor, etc. If it's not reported, it didn't happen, and you never have to deal with the issues.
Example: Media was present in the courtroom when in Hunt vs. Liberty Lobby when CIA agent Marita Lorenz "confession" testimony regarding CIA direct participation in the planning and assassination of John Kennedy was revealed. All media reported is that E. Howard Hunt lost his liable case against Liberty Lobby (Spotlight had reported he was in Dallas that day and were sued for the story). See Mark Lane's Plausible Denial for the full confessional transcript.
Proper response: There is no possible response unless you are aware of the material and can make it public yourself. In any such attempt, be certain to target any known silent party as likely complicit in a cover up.
2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the "How dare you!" gambit.
Example: "How dare you suggest that the Branch Davidians were murdered! the FBI and BATF are made up of America's finest and best trained law enforcement, operate under the strictest of legal requirements, and are under the finest leadership the President could want to appoint."
Proper response: You are avoiding the Waco issue with disinformation tactics. Your high opinion of FBI is not founded in fact. All you need do is examine Ruby Ridge and any number of other examples, and you will see a pattern that demands attention to charges against FBI/BATF at Waco. Why do you refuse to address the issues with disinformation tactics (rule 2 - become incredulous and indignant)?
3. Create rumour mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumours and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such "arguable rumours". If you can associate the material with the Internet, use this fact to certify it a "wild rumour" which can have no basis in fact.
"You can't prove his material was legitimately from French Intelligence. Pierre Salinger had a chance to show his 'proof' that flight 800 was brought down by friendly fire, and he didn't. All he really had was the same old baseless rumour that's been floating around the Internet for months."
Proper response: You are avoiding the issue with disinformation tactics. The Internet charge reported widely is based on a single FBI interview statement to media and a supportive statement by a Congressman who has not actually seen Pierre's document. As the FBI is being accused in participating in a cover up of this matter and Pierre claims his material is not Internet sourced, it is natural that FBI would have reason to paint his material in a negative light. For you to assume the FBI to have no bias in the face of Salinger's credentials and unchanged stance suggests you are biased. At the best you can say the matter is in question. Further, to imply that material found on Internet is worthless is not founded. At best you may say it must be considered carefully before accepting it, which will require addressing the actual issues. Why do you refuse to address these issues with disinformation tactics (rule 3 - create rumour mongers)?
4. Use a straw man. Find or create a seeming element of your opponent's argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.
Example: When trying to defeat reports by the Times of London that spy-sat images reveal an object racing towards and striking flight 800, a straw man is used. "If these exist, the public has not seen them."
Proper response: You are avoiding the issue with disinformation tactics. You imply deceit and deliberately establish an impossible and unwarranted test. It is perfectly natural that the public has not seen them, nor will they for some considerable time, if ever. To produce them would violate national security with respect to intelligence gathering capabilities and limitations, and you should know this. Why do you refuse to address the issues with such disinformation tactics (rule 4 - use a straw man)?
5. Side-track opponents with name calling and ridicule. This is also known as the primary attack the messenger ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as "kooks", "right-wing", "liberal", "left-wing", "terrorists", "conspiracy buffs", "radicals", "militia", "racists", "religious fanatics", "sexual deviates", and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.
Example: "You believe what you read in the Spotlight? The Publisher, Willis DeCarto, is a well-known right-wing racist. I guess we know your politics -- does your Bible have a swastika on it? That certainly explains why you support this wild-eyed, right-wing conspiracy theory."
Proper response: You are avoiding the issue with disinformation tactics. Your imply guilt by association and attack truth on the basis of the messenger. The Spotlight is well known Populist media source responsible for releasing facts and stories well before mainstream media will discuss the issues through their veil of silence. Why do you refuse to address the issues by use of such disinformation tactics (rule 5 - side-track opponents with name calling and ridicule)?
6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning -- simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent's viewpoint. Example: "This stuff is garbage. Where do you conspiracy lunatics come up with this crap? I hope you all get run over by black helicopters." Notice it even has a farewell sound to it, so it won't seem curious if the author is never heard from again.
Proper response: You are avoiding the issue with disinformation tactics. Your comments or opinions fail to offer any meaningful dialogue or information, and are worthless except to pander to emotionalism, and in fact, reveal you to be emotionally insecure with these matters. Why do you refuse to address the issues by use of such disinformation tactics (rule 6 - hit and run)?
7. Question motives. Twist or amplify any fact which could so taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.
Example: "With the talk-show circuit and the book deal, it looks like you can make a pretty good living spreading lies."
Proper response: You are avoiding the issue with disinformation tactics. Your imply guilt as a means of attacking the messenger or his credentials, but cowardly fail to offer any concrete evidence that this is so. Why do you refuse to address the issues by use of such disinformation tactics (rule 6 - question motives)?
8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough "jargon" and "minutia" to illustrate you are "one who knows", and simply say it isn't so without discussing issues or demonstrating concretely why or citing sources.
"You obviously know nothing about either the politics or strategic considerations, much less the technicals of the SR-71. Incidentally, for those who might care, that sleek plane is started with a pair of souped up big-block V-8's (originally, Buick 454 C. I. D. with dual 450 CFM Holly Carbs and a full-race Isky cams -- for 850 combined BHP @ 6,500 RPM) using a dragster-style clutch with direct-drive shaft. Anyway, I can tell you with confidence that no Blackbird has ever been flown by Korean nationals have ever been trained to fly it, and have certainly never overflown the Republic of China in a SR or even launched a drone from it that flew over China. I'm not authorised to discuss if there have been over flights by American pilots."
Proper response: You are avoiding the issue with disinformation tactics. Your imply your own authority and expertise but fail to provide credentials, and you also fail to address issues and cite sources. Why do you refuse to address the issues by use of such disinformation tactics (rule 8 - invoke authority)?
9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues with denial they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.
Example: "Nothing you say makes any sense. Your logic is idiotic. Your facts non-existent. Better go back to the drawing board and try again."
Proper response: You are avoiding the issue with disinformation tactics. Your evade the issues with your own form of nonsense while others, perhaps more intelligent than you pretend to be, have no trouble with the material. Why do you refuse to address the issues by use of such disinformation tactics (rule 9 - play dumb)?
10. Associate opponent charges with old news. A derivative of the straw man -- usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with. Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually them be associated with the original charge and dismissed as simply being a rehash without need to address current issues -- so much the better where the opponent is or was involved with the original source.
Example: "Flight 553's crash was pilot error, according to the NTSB findings. Digging up new witnesses who say the CIA brought it down at a selected spot and were waiting for it with 50 agents won't revive that old dead horse buried by NTSB more than twenty years ago."
Proper response: You are avoiding the issue with disinformation tactics. Your ignore the issues and imply they are old charges as if new information is irrelevant. Why do you refuse to address the issues by use of such disinformation tactics (rule 10 - associate charges with old news)?
11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the "high road" and "confess" with candour that some innocent mistake, in hindsight, was made -- but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, "just isn't so." Others can reinforce this on your behalf, later. Done properly, this can garner sympathy and respect for "coming clean" and "owning up" to your mistakes without addressing more serious issues.
Example: "Reno admitted in hindsight she should have taken more time to question the data provided by subordinates on the deadliness of CS-4 and the likely Davidian response to its use, but she was so concerned about the children that she elected, in what she now believes was a sad and terrible mistake, to order the tear gas be used."
Proper response: You are avoiding the issue with disinformation tactics. Your evade the true issue by focusing on a side issue in an attempt to evoke sympathy. Perhaps you did not know that CIA Public Relations expert Mark Richards was called in to help Janet Reno with the Waco aftermath response? How warm and fuzzy feeling it makes us, so much so that we are to ignore more important matters? Why do you refuse to address the issues by use of such disinformation tactics (rule 11 - establish and rely upon fall-back positions)?
12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to loose interest more quickly without having to address the actual issues.
Example: "I don't see how you can claim Vince Foster was murdered since you can't prove a motive. Before you could do that, you would have to completely solve the whole controversy over everything that went on in the White House and Arkansas, and even then, you would have to know a heck of a lot more about what went on within the NSA, the Travel Office, and on, and on, and on. It's hopeless. Give it up."
Proper response: You are avoiding the issue with disinformation tactics. Your completely evade issues and attempt others from daring to attempt it by making it a much bigger mountain than necessary. Why do you refuse to address the issues by use of such disinformation tactics (rule 12 - enigmas have no solution)?
13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards with an apparent deductive logic in a way that forbears any actual material fact.
Example: "The news media operates in a fiercely competitive market where stories are gold. This means they dig, dig, dig for the story -- often doing a better job than law enforcement. If there was any evidence that BATF had prior knowledge of the Oklahoma City bombing, they would surely have uncovered it and reported it. They haven't reported it, so there can't have been any prior knowledge. Put up or shut up."
Proper response: You are avoiding the issue with disinformation tactics. Your backwards logic does not work here. Has media reported CIA killed Kennedy when they knew it? No, despite their presence at a courtroom testimony "confession" by CIA operative Marita Lornez in a liable trial between E. Howard Hunt and Liberty Lobby, they only told us the trial verdict. Why do you refuse to address the issues by use of such disinformation tactics (rule 13 - Alice in Wonderland logic)?
14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best items qualifying for rule 10.
Example: "Since you know so much, if James Earl Ray is innocent as you claim, who really killed Martin Luther King, how was it planned and executed, how did they frame Ray and fool the FBI, and why?"
Proper response: You are avoiding the issue with disinformation tactics. It is not necessary to completely resolve any full matter in order to examine any relative attached issue. Why do you refuse to address the issues by use of such disinformation tactics (rule 14 - demand complete solutions)?
15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.
Example: The best definitive example of avoiding issues by this technique is, perhaps, Arlan Specter's Magic Bullet from the Warren Report.
Proper response: You are avoiding the issue with disinformation tactics. Your imaginative twisting of facts rivals that of Arlan Specter's Magic Bullet in the Warren Report. We all know why the magic bullet was invented. Why do you refuse to address the issues by use of such disinformation tactics (rule 15 - invoke authority)?
16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won't have to address the issue.
Example: "You can't say Paisley is still alive... that his death was faked and the list of CIA agents found on his boat deliberately placed there to support a purge at CIA. You have no proof. Why can't you accept the Police reports?" True, since the dental records and autopsy report showing his body was two inches two long and the teeth weren't his were lost right after his wife demanded inquiry, and since his body was cremated before she could view it -- all that remains are the Police Reports. Handy.
Proper response: There is no suitable response to actual vanished materials or persons, unless you can shed light on the matter, particularly if you can tie the event to a cover up or other criminality. However, with respect to dialogue where it is used against the discussion, you can respond... You are avoiding the issue with disinformation tactics. The best you can say is that the matter is in contention based on highly suspicious matters which themselves tend to support the primary allegation. Why do you refuse to address the remaining issues by use of such disinformation tactics (rule 16 - vanish evidence and witnesses)?
17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can "argue" with you over the new topic and polarise the discussion arena in order to avoid discussing more key issues.
Example: "There were no CIA drugs and was no drug money laundering through Mena, Arkansas, and certainly, there was no Bill Clinton knowledge of it because it simply didn't happen. This is merely an attempt by his opponents to put Clinton off balance and at a disadvantage in the election because Dole is such a weak candidate with nothing to offer that they are desperate to come up with something to swing the polls. Dole simply has no real platform." Response. "You idiot! Dole has the clearest vision of what's wrong with Government since McGovern. Clinton is only interested in raping the economy, the environment, and every woman he can get his hands on..." One naturally feels compelled, regardless of party of choice, to jump in defensively on that one...
Proper response: You are avoiding the issue with disinformation tactics. Your evade discussion of the issues by attempting to side-track us with an emotional response -- a trap which we will not fall into willingly. If you truly believe such political rhetoric, please drop out of this discussion, as it is not germane unless you can provide concrete facts to support your contentions of relevance. Why do you refuse to address the issues by use of such disinformation tactics (rule 17- change the subject)?
18. Emotionalise, Antagonise, and Goad Opponents. If you can't do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how "sensitive they are to criticism".
Example: "You are such an idiot to think that possible -- or are you such a paranoid conspiracy buff that you think the 'gubment' is cooking your pea-brained skull with microwaves, which is the only justification you might have for dreaming up this drivel." After a drawing an emotional response: "Ohhh... I do seemed to have touched a sensitive nerve. Tsk, tsk. What's the matter? The truth too hot for you to handle? Perhaps you should stop relying on the Psychic Friends Network and see a psychiatrist for some real professional help..."
Proper response: "You are avoiding the issue with disinformation tactics. You attempt to draw me into emotional response without discussion of the issues. If you have something useful to contribute which defeats my argument, let's hear it -- preferably without snide and unwarranted personal attacks, if you can manage to avoid sinking so low. Your useless rhetoric serves no purpose here if that is all you can manage. Why do you refuse to address the issues by use of such disinformation tactics (rule 18 - emotionalise, antagonise, and goad opponents)?
19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the "play dumb" rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
Example: "All he's done is to quote the liberal media and a bunch of witnesses who aren't qualified. Where's his proof? Show me wreckage from flight 800 that shows a missile hit it!"
Proper response: You are avoiding the issue with disinformation tactics. You presume for us not to accept Don Phillips, reporter for the Washington Post, Al Baker, Craig Gordon or Liam Pleven, reporters for Newsday, Matthew Purdy or Matthew L. Wald, Don Van Natta Jr., reporters for the New York Times, or Pat Milton, wire reporter for the Associated Press -- as being able to tell us anything useful about the facts in this matter. Neither would you allow us to accept Robert E. Francis, Vice Chairman of the NTSB, Joseph Cantamessa Jr., Special Agent In Charge of the New York Office of the F. B. I., Dr. Charles Wetli, Suffolk County Medical Examiner, the Pathologist examining the bodies, nor unnamed Navy divers, crash investigators, or other cited officials, including Boeing Aircraft representatives a part of the crash investigative team -- as a qualified party in this matter, and thus, dismisses this material out of hand. Good logic, -- about as good as saying 150 eye witnesses aren't qualified. Only YOU are qualified to tell us what to believe? Witnesses be damned? Radar tracks be damned? Satellite tracks be damned? Reporters be damned? Photographs be damned? Government statements be damned? Is there a pattern here?. Why do you refuse to address the issues by use of such disinformation tactics (rule 19 - ignore proof presented, demand impossible proofs)?
20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralise sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.
Example: Jack Ruby warned the Warren Commission that the white Russian separatists, the Solidarists, were involved in the assassination. This was a handy "confession", since Jack and Earl were both on the same team in terms of the cover up, and since it is now known that Jack worked directly with CIA in the assassination.
Proper response: This one can be difficult to respond to unless you see it clearly, such as in the following example, where more is known today than earlier in time... You are avoiding the issue with disinformation tactics. Your information is known to have been designed to side track this issue. As revealed by CIA operative Marita Lorenz under oath offered in court in E. Howard Hunt vs. Liberty Lobby, CIA operatives met with Jack Ruby in Dallas the night before the assassination of JFK to distribute guns and money. Clearly, Ruby was a co-conspirator whose "Solidarist confession" was meant to side-track any serious investigation of the murder. Why do you refuse to address the issues by use of such disinformation tactics (rule 20 - false evidence)?
21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralise all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favourable verdict (usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim) is achieved, the matter can be considered officially closed.
Example: According to one OK bombing Grand Juror who violated the law to speak the truth, jurors were, contrary to law, denied the power of subpoena of witness of their choosing, denied the power of asking witnesses questions of their choosing, and relegated to hearing only evidence prosecution wished them to hear, evidence which clearly seemed fraudulent and intended to paint conclusions other than facts actually suggested.
Proper response: There is usually no adequate response to this tactic except to complain loudly at any sign of its application, particularly with respect to any possible cover up.
22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favourably. In this way, if you must actually address issues, you can do so authoritatively.
Example: The False Memory Syndrome Foundation and American Family Foundation and American and Canadian Psychiatric Associations fall into this category, as their founding members and/or leadership include key persons associated with CIA Mind Control research. Not so curious, then, that (in a perhaps oversimplified explanation here) these organisations focus on, by means of their own "research findings", that there is no such thing as Mind Control.
Proper response: Unless you are in a position to be well versed in the topic and know of the background and relationships involved in the opponent organisation, you are well equipped to fight this tactic.
23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.
Example: To distract the public over the progress of a WTC bombing trial that seems to be uncovering nasty ties to the intelligence community, have an endless discussion of skaters whacking other skaters on the knee. To distract the public over the progress of the Waco trials that have the potential to reveal government sponsored murder, have an O. J. summer. To distract the public over an ever disintegrating McVeigh trial situation and the danger of exposing government involvements, come up with something else (any day now) to talk about -- keeping in the sports theme, how about sports fans shooting referees and players during a game and the whole gun control thing?
Proper response: The best you can do is attempt to keep public debate and interest in the true issues alive and point out that the "news flap" or other evasive tactic serves the interests of your opponents.
24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by proper intimidation with blackmail or other threats.
Example: As experienced by certain proponents of friendly fire theories with respect to flight 800 -- send in FBI agents to intimidate and threaten that if they persisted further they would be subject to charges of aiding and abetting Iranian terrorists, of failing to register as foreign agents, or any other trumped up charges. If this doesn't work, you can always plant drugs and bust them.
Proper response: You have three defensive alternatives if you think yourself potential victim of this ploy. One is to stand and fight regardless. Another is to create for yourself an insurance policy which will point to your opponents in the event of any unpleasantness, a matter which requires superior intelligence information on your opponents and great care in execution to avoid dangerous pitfalls (see The Professional Paranoid by this author for suggestions on how this might be done). The last alternative is to cave in or run (same thing).
25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.
Example: Do a Robert Vesco and retire to the Caribbean. If you don't, somebody in your organisation may choose to vanish you the way of Vince Foster or Ron Brown.
Proper response: You will likely not have a means to attack this method, except to focus on the vanishing in hopes of uncovering it was by foul play as part of a deliberate cover up.
Note: There are other ways to attack truth, but these listed are the most common, and others are likely derivatives of these. In the end, you can usually spot the professional disinfo players by one or more of seven distinct traits:
1) They never actually discuss issues head on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.
2) They tend to pick and choose their opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.
3) They tend to surface suddenly and somewhat coincidentally with a controversial topic with no clear prior record of participation in general discussion in the particular public arena. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.
4) They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.
5) Their disdain for "conspiracy theorists" and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain. Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.
6) An odd kind of "artificial" emotionalism and an unusually thick skin -- an ability to persevere and persist even in the face of overwhelming criticism and non-acceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial. Most people, if responding in anger, for instance, will express their animosity throughout their presentation. But disinfo types usually have trouble maintaining the "image" and are hot and cold with respect to emotions they pretend to have and the more calm or normal communications which are not emotional. It's just a job, and they often seem unable to "act their role in type" as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later -- an emotional yo-yo. With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game -- where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth.
7) There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat 'freudian', so to speak, in that perhaps they really root for the side of truth deep within. I have noted that often, they will simply cite contradictory information which neutralises itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I'm not aware of too many Navy pilots who don't have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.
I close with the first paragraph of the introduction to my book, Fatal Rebirth:
Truth cannot live on a diet of secrets, withering within entangled lies. Freedom cannot live on a diet of lies, surrendering to the veil of oppression. The human spirit cannot live on a diet of oppression, becoming subservient in the end to the will of evil. God, as truth incarnate, will not long let stand a world devoted to such evil. Therefore, let us have the truth and freedom our spirits require... or let us die seeking these things, for without them, we shall surely and justly perish in an evil world.
"Three defensive mechanisms are typical of octopuses: ink sacs, camouflage, and autonomising limbs. Most octopuses can eject a thick blackish ink in a large cloud to aid in escaping from predators. They also have specialized skin cells both for color changing (chromatophores) and light reflection and refraction (iridophores and leucophores). They use this ability to blend into the environment to hide, as communication with other octopuses, or as a warning: the very poisonous Blue-ringed Octopus becomes bright yellow with blue rings when it is provoked. When under attack, some octopuses can detach and autonomise their limbs, in a similar manner to skinks and other lizards. The crawling arm serves as a distraction to would-be predators; this ability is also used in mating. A few species have a fourth defense mechanism, in that they can combine their highly flexible bodies with their color changing ability to accurately mimic other, more dangerous animals such as lionfish and eels."
Eight Traits of the Disinformationalist by H. Michael Sweeney
1) Avoidance. They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.
2) Selectivity. They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.
3) Coincidental. They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.
4) Teamwork. They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.
5) Anti-conspiratorial. They almost always have disdain for 'conspiracy theorists' and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain.Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.
6) Artificial Emotions. An odd kind of 'artificial' emotionalism and an unusually thick skin -- an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial. Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal. But disinfo types usually have trouble maintaining the 'image' and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It's just a job, and they often seem unable to 'act their role in character' as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later -- an emotional yo-yo. With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game -- where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.
7) Inconsistent. There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat 'freudian', so to speak, in that perhaps they really root for the side of truth deep within.
I have noted that often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I'm not aware of too many Navy pilots who don't have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.
8 ) BONUS TRAIT: Time Constant. Recently discovered, with respect to News Groups, is the response time factor. There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:
1) ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NG ONLY WORKS IF THE READER SEES IT - FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.
2) When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR - there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to 'get permission' or instruction from a formal chain of command.
3) In the NG example 1) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay - the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.
Information Warfare on the Internet
[I posted this to alt.mindcontrol in early December, 1997. The group had been flooded with posts for sex-related web sites, and included graphic jpeg images. While this post is mostly about Usenet news groups, much of it applies to email and web sites too. The term information warfare is, in many respects, just a new word for what used to be called propaganda.]
The recent porn posts in alt.mindcontrol fit in as one of a variety of techniques for disrupting internet news groups. If you read about the basic cointelpro techniques, most such disruptions are variations on those themes. They are also deniable, and this uncertainty is cultivated and prized by harassers because it can lead to (justified) paranoia and false accusations that discredit the victim.
Distraction with irrelevant posts. What better example than the recent porn posts? Discussion is lost in the noise. (In this case, the posts may make the group "appealing" to a new audience, so a small silver lining is that new people can be informed about mind control.)
Distraction by voluminous postings with no information by blowhards and empty name-callers. (Can be hard to distinguish from genuine blowhards.) People who wallow in the mud do not need to outdebate you; they only need to drag you down there with them. Kill files can help if your newsreader has them.
Planting of provocateurs (and sleeper agents, etc.). These people will vary from the posters who suddenly show up one day under an alias attacking regular posters, to people who seem like regular posters themselves. They may work in teams, supporting each other and giving the illusion of popular support on the net. (Remember, net IDs are basically free, and one person can have many.) As cointelpro showed, there is little that is more poisonous to an organization than to have it tear itself apart from the inside with accusations of moles. (The CIA knows all about this from its own mole hunts.) Moles love to accuse others of being moles; then again, there are real moles. You have to judge for yourself who to listen to or what to believe.
Spoofing. Forgeries and modified content. Does not need to be global over the whole internet, for example just your local news server can be modified. If they control your regular communication line like your phone line there is no end to the illusions that can be created. There is a danger that some forms of spoofing will be detected, though, and it is harder to do, so I think these techniques are used less widely than the others.
Canceling posts. Posts disappear or only propagate in a limited region. This has deniability as just network problems, since sometimes there really are network problems. One technique is to secretly "localize" posts that are not approved by some censor or gatekeeper. Most people will not notice if their post only appears on their local news server, and will assume it has propagated worldwide. They will just think no one has replied (though spoof replies can be posted locally, too). I check to see that my posts show up at DejaNews. Hardly foolproof, but at least then I know people can read them there (at least until more sophisticated spoofing is available, perhaps tailored to domain names or user names).
Delaying posts. By controlling when posts show up, the flow of the debate can be controlled. A heads-up warning can be given to the plants on the group to counter arguments ahead of time. They can also make the same arguments or statements themselves ahead of time to build their own "credibility" or to steal thunder.
Controlling search engines. If no one can find it, it is not there. I do not have any evidence that this has happened. The real danger is the possibility of "voluntary" self-censorship like we have seen, for example, in the newspapers with regard to radiation experiments.
Combined hardware/information techniques
Feedback pathways. An important aspect of psychological warfare is to have a feedback path to the victim. (This is like a control signal in dynamical systems theory.) The feedback path may be used covertly to manipulate the victim, the victim may become aware of it on his or her own, or the victim may be purposely made aware of it.
Harassers often want victims think their harassers have control over them. To know they are being watched. This can help induce psychological trauma and regression in the victim. [According to the KUBARK interrogation manual, "All coercive techniques are designed to induce regression."] A feedback path can alert the victim that he is being manipulated. This can be done by telephones ringing or fax machines. It can be done with sophisticated mind control methods. It could even be done in newspapers if some person or agency knew the newspapers the victim reads and could influence their content (e.g. the final cointelpro link below).
But the internet is a fairly new medium that fits this bill perfectly if the subject reads newsgroups. In a simple example, you cancel a person's post and then post your own article hinting that you have done it. (Incidentally, psychological torturers can pretend to have caused anything they are aware of having happened.) The person gets angry, but they may not be sure, and if they accuse the tormentor they are ridiculed. (Always try to goad the victims into doing things in public that will discredit them.)
When the hardware is expanded to include home surveillance and mind control techniques, the effects can be magnified immensely.
Can anyone truly doubt that these techniques have been extensively studied and documented by our government? The stonewall of denial fights for every inch of ground, no matter how trivial. People will still deny obvious, documented (cointelpro) things like this to delay having to deny the next step of the chain ("Yes, maybe they studied it but they would never test it on Americans [they did], and they surely are not still doing it today [they are].")
Secret agencies are still arms of the federal government.
COINTELPRO -- White Hate Groups (1964-1968)
Effective immediately, the Bureau is instituting a coordinated Counterintelligence Program (Cointelpro) directed against Klan-type and hate organizations. The purpose of this program is to expose, disrupt, and otherwise neutralize the activities of the various Klans and hate organizations, their leadership and adherents. The activities of these groups must be followed on a continuous basis so we may take advantage of all opportunities for counterintelligence and also inspire action in instances where circumstances warrant. The devious maneuvers and duplicity of these groups must be exposed to public scrutiny through the cooperation of reliable news media sources, both locally and at the Seat of Government. We must frustrate any effort of the groups to consolidate their forces or to recruit new or youthful adherents. In every instance, consideration should be given to disrupting the organized activity of these groups and no opportunity should be missed to capitalize upon organizational and personal conflicts of their leadership. If an enthusiastic approach is made to this new endeavor, there is no reason why the results achieved under this program will not equal or surpass our achievements in similar-type programs directed against subversives.
MASS MEDIA PROGRAM
In the past several months we have disseminated various public source items to [ ]. Those items pertain to the National States Rights Party (NSRP) which is a notorious anti-Semitic, anti-Negro, right-wing hate group which continuously attacks the Director and the Bureau through its publications. This counterintelligence project resulted in a 30-minute television special which turned into an "expose" of the NSRP which completely closed three Florida chapters of this group. [ ] is now working on a follow-up show which will expose the UKA. We have already furnished him with some public source information concerning the UKA.
The Black Klan
This is to recommend the attached treatise entitled "The Black Klan" be approved and forwarded to the Crime Records Division for referral to appropriate news media representatives. The caption "The Black Klan" is descriptive of the contents and compares the white Ku Klux Klan with the Black Panther Party. The article compares the militancy of both groups and their penchant for weapons. It is pointed out that both the Black Panthers and the white Klan use uniformed guards to harass and frighten. The article points out that the one big difference between the two is the fact that the Black Panthers look to the communists for at least moral support while the Klan looks to local citizenry.
DR. MARTIN LUTHER KING, JR., CASE STUDY
From December 1963 until his death in 1968, Martin Luther King, Jr. was the target of an intensive campaign by the Federal Bureau of Investigation to "neutralize" him as an effective civil rights leader. In the words of the man in charge of the FBI's "war" against Dr. King:
No holds were barred. We have used [similar] techniques against Soviet agents. [The same methods were] brought home against any organization against which we were targeted. We did not differentiate. This is a rough, tough business. 1
The FBI collected information about Dr. King's plans and activities through an extensive surveillance program, employing nearly every intelligence-gathering technique at the Bureau's disposal. Wiretaps, which were initially approved by Attorney General Robert F. Kennedy, were maintained on Dr. King's home telephone from October 1963 until mid-1965; the SCLC headquarter's telephones were covered by wiretaps for an even longer period. Phones in the homes and offices of some of Dr. King's close advisers were also wiretapped. The FBI has acknowledged 16 occasions on which microphones were hidden in Dr. King's hotel and motel rooms in an "attempt" to obtain information about the "private activities of King and his advisers" for use to "completely discredit" them. 2
COINTELPRO -- Communist Party, USA 1956-1968
The purpose of this memorandum is to recommend a long-range counterintelligence program designed to provoke a dispute between the Communist Party, USA, and La Cosa Nostra under the code name of Hoodwink. La Cosa Nostra has no sympathy for the communists. The Communist Party, USA, and La Cosa Nostra come in contact with each other in the labor field where hoodlums operate businesses under "sweatshop" conditions. By making it appear that the Party is attacking hoodlum labor practices, over a period of time we could provoke a bitter dispute between the two organizations. F.J. Baumgardner to W.C. Sullivan, Oct. 4, 1966
The Party has been the subject of recent bombings, a typical hoodlum technique. Consider a spurious Party statement blaming the LCN for the bombings because of Party efforts on behalf of the workers. This statement could be aimed at specific LCN members if appropriate. In developing this program, thought should also be given to initiating spurious LCN attacks on the CPUSA, so that each group would think the other was mounting a campaign against it. Director to SAC, NY, Oct. 5, 1966
Counterintelligence and Special Operations
establishment of local intelligence cover organizations, falsification of photos and documents, CIA Chaos program, Revolutionary Union.
ReBulet, 4/17/70. Detroit concurs that it is desirable to organize and operate a cover organization intelligence operation in the Detroit Division, and suggests that such an organization (committee) in Detroit be set up to be portrayed as an anti-war, anti-capitalistic organization, sympathetic to the oppressed and exploited people, not only in the U.S., but in other non-Socialist countries. This image would appeal not only to the "New Left" and the militants, but also to "peace" groups. SAC, Detroit to Director, May 18, 1970
Xerox copies of true documents, documents subtly incorporating false information, and entirely fabricated documents would be periodically anonymously mailed to the residence of a key Panther leader. These documents would be on the stationery and in the form used by the police department or by the FBI in disseminating information to the police. FBI documents, when used, would contain police routing or date received notations, clearly indicating they had been pilfered from police files. An attempt would be made to give the Panther recipient the impression the documents were stolen from police files by a disgruntled police employee sympathetic to the Panthers. Director to SAC, San Francisco, May 11, 1970
This is to secure authority to proceed to develop a unique operation whereby we place a South Vietnam national in clandestine contact with selected leaders of the New Left and militant black nationalist movement for the purpose of misdirecting the activities of these groups, gathering intelligence, and possibly disrupting the groups. R.D. Cotter to W.C. Sullivan, April 15, 1969
COINTELPRO: THE FBI'S COVERT ACTION PROGRAMS AGAINST AMERICAN CITIZENS
COINTELPRO is the FBI acronym for a series of covert action programs directed against domestic groups. In these programs, the Bureau went beyond the collection of intelligence to secret action defined to "disrupt" and "neutralize" target groups and individuals. The techniques were adopted wholesale from wartime counterintelligence, and ranged from the trivial (mailing reprints of Reader's Digest articles to college administrators) to the degrading (sending anonymous poison-pen letters intended to break up marriages) and the dangerous (encouraging gang warfare and falsely labeling members of a violent group as police informers).
This report is based on a staff study of more than 20,000 pages of Bureau documents, depositions of many of the Bureau agents involved in the programs, and interviews of several COINTELPRO targets. The examples selected for discussion necessarily represent a small percentage of the more than 2,000 approved COINTELPRO actions. Nevertheless, the cases demonstrate the consequences of a Government agency's decision to take the law into its own hands for the "greater good" of the country.
COINTELPRO began in 1956, in part because of frustration with Supreme Court rulings limiting the Government's power to proceed overtly against dissident groups; it ended in 1971 with the threat of public exposure. 1 In the intervening 15 years, the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence. 2
Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that. The unexpressed major premise of the programs was that a law enforcement agency has the duty to do whatever is necessary to combat perceived threats to the existing social and political order.
How To Spot a Spy
One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?
1) The message doesn't get out. 2) A lot of time is wasted 3) The activist is frustrated and discouraged 4) Nothing good is acco
Re: Counter Intellegience Tricks and Techniques
How To Spot a Spy
One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?
1) The message doesn't get out. 2) A lot of time is wasted 3) The activist is frustrated and discouraged 4) Nothing good is accomplished.
FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established.
Their purpose is to prevent any real movement for justice or eco-peace from developing in this country.
Agents come in small, medium or large. They can be of any ethnic background. They can be male or female.
The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs.
This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists.
It is the agent's job to keep the activist from quitting such a group, thus keeping him/her under control.
In some situations, to get control, the agent will tell the activist:
"You're dividing the movement."
Re: Counter Intellegience Tricks and Techniques
17 TECHNIQUES FOR TRUTH SUPPRESSION
by David Martin, author of America's Dreyfus Affair
Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.
1. Dummy up. If it's not reported, if it's not news, it didn't happen.
2.Wax indignant. This is also known as the "how dare you?" gambit.
3.Characterize the charges as "rumors" or, better yet, "wild rumors." If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through "rumors." (If they tend to believe the "rumors" it must be because they are simply "paranoid" or "hysterical.")
4. Knock down straw men. Deal only with the weakest aspect of the weakest charges. Even better, create your own straw men. Make up wild rumors and give them lead play when you appear to debunk all the charges, real and fanciful alike.
5. Call the skeptics names like "conspiracy theorist," "nut," "ranter," "kook," "crackpot," and of course, "rumor monger." Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the "more reasonable" government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own "skeptics" to shoot down.
6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).
7. Invoke authority. Here the controlled press and the sham opposition can be very useful.
8. Dismiss the charges as "old news."
9. Come half-clean. This is also known as "confession and avoidance" or "taking the limited hangout route." This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal "mistakes." This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.
10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.
11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. For example: We have a completely free press. If they know of evidence that the Bureau of Alcohol, Tobacco, and Firearms (BATF) had prior knowledge of the Oklahoma City bombing they would have reported it. They haven't reported it, so there was no prior knowledge by the BATF. Another variation on this theme involves the likelihood of a conspiracy leaker and a press that would report the leak.
12. Require the skeptics to solve the crime completely. For example: If Vince Foster was murdered, who did it and why?
13. Change the subject. This technique includes creating and/or publicizing distractions.
14. Scantly report incriminating facts, and then make nothing of them. This is sometimes referred to as "bump and run" reporting.
15. Baldly and brazenly lie. A favorite way of doing this is to attribute the "facts" furnished the public to a plausible-sounding, but anonymous, source.
16. Expanding further on numbers 4 and 5, have your own stooges "expose" scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.
17. Flood the Internet with agents. This is the answer to the question, "What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?" Don't the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.
Re: Counter Intellegience Tricks and Techniques
And the truth is???? :-o
Re: Counter Intellegience Tricks and Techniques
I've often wondered this of Art Bell (no offense Art!), Rense, Jones, etc. The reason the "Roswell Incident" went the way that it did was so that those who managed to witness the test aircraft became unnaccountable for explaining their ongong classified projects.
Alex Jones claimed not long ago that the most recent "Bohemian Grove" protest was conducted by the military (government masquerading as protestors).
Re: Counter Intellegience Tricks and Techniques
"And the truth is????"
Re: Counter Intellegience Tricks and Techniques
Spectre, you surprise me, everyone knows that the entire 'Roswell' incident was fabricated from a mishap from a simple 'test ballon,' this the CIA used to CREATE the entire 'UFOLOGY' movement. :-)
Re: Counter Intellegience Tricks and Techniques
Re: Counter Intellegience Tricks and Techniques
Truth is each individual's unique understanding of the subject/situation at the time presented.
A better question would be is there absolute truth?
Ironically that question just answer itself. :-D
What we all hate is half truth and therefore the reason why we are here to discuss this subject.
Re: Counter Intellegience Tricks and Techniques
Part of the goal of a disinformist I believe is to get the poeple to attack the government,person,thing etc for the wrong reasons and thus creating a fales accusation. If both sides lie then, nobody wins the case.
|All times are GMT -6. The time now is 12:44 PM.|
Powered by vBulletin® Version 3.6.12
Copyright ©2000 - 2015, Jelsoft Enterprises Ltd.