TIME Magazine & The Mass Manipulation and Programming of the World

TIME Magazine Covers for September 16, 2013.

TIME Magazine Covers for Sept. 16, 3013

United States:  “ITS TIME TO PAY COLLEGE ATHLETES”

The REST of the WORLD:  “AMERICA’S WEAK AND WAFFLING, RUSSIA’S RICH AND RESURGENT–AND ITS LEADER DOESN’T CARE WHAT ANYBODY THINKS OF HIM”

“THE WORLD ACCORDING TO VLADIMIR PUTIN”

What is wrong with this picture?

Notice how Putin’s huge head covers the word TIME, however, here in America, there is nothing but TIME as is implied by the word TIME being unobscured. Also note that the colors Black & Red have occult significance, which in a drastic contrast to the occult significance of the color Blue. Typically, they use the Red color for the word time, but since Americans were being programmed to distraction and entertainment, even the word “TIME” is in blue.

Media = Programming & Mind Control.

Welcome to the Brave New World of 1984!

Linda4444 CoIntelPro Increases–My Online Presence & Identity is Now Being Hacked Daily By BigBro

There is new evidence of more government online hacking as a result of me exposing Linda4444’s CoIntelPro Operation on Talkshoe.  This morning I found my private Youtube account had an new additional account added to my other 2  under the name,  “Linda4444-2468@pa….”.  It will only show me a few characters of the email address, but I have no idea what email addresses have a “pa” prefix.  How was this added to my account when I don’t have access to confirm that it as mine; yet its linked to my account?  I will report all targeting of me, my person, my property, or my online presence during this increased CoIntelPro attack.

Screen Shot 2014-06-14 at 11.26.35 AMThis is CoIntelPro.  What Linda has done to me over the last 9 months is a total CoIntelPro Damage Control campaign.  I knew what Linda was going to do to me for coming forward because I have watched and heard her do it to many other brave T.I.’s that trusted her with their private information  who called her out or dared question her lies, contradictions or disturbing practices on Talkshoe.   She can be sued for Slander, Libel and Defamation of Character because there is proof that she KNEW all along and was PURPOSELY DECEIVING AND TARGETING CERTAIN GROUPS SPECIFICALLY–THE CHRISTIANS.  Linda dedicated 16 hours of Live Talkshoe call time to do this to me and recorded 5 hours for the public to continue to access.   After I called her out on her whole act and sent her an inspirational post that I reposted to my blog on Thursday, Linda444 has now taken down the 5 hour recording of me that was all  OUTRIGHT LIES AND THE MANIPULATION OF ANYTHING AND ALL THINGS FACTUAL.  This is what she did with all of the other CoIntelPro attacks that she waged and recorded on others–POOF–GONE IN AN INSTANT.  PROOF OF GUILT AND NEEDING TO HIDE SELF-INCRIMINATING SLANDER, LIBEL, CHARACTER DEFAMATION AND A TOTAL WHITEWASH OF EVERYTHING TRUTHFUL.

Since she was not allowed to put me under her spell or manipulate me away from sharing the truths that I know and have proof of, I have witnessed the most egregious slander campaign where Linda has appealed to everyone emotionally and played and manipulated them and the truth.  She has totally changed Talkshoe by her infiltration and CoIntelPro tactics and attacks where she gains peoples’ trust and they tell her all their deep secrets and stories and then she does one of these attacks on them when they question her or stand up for what they know to be the truth.

I will not stop reporting the truth about Linda4444 from the Talkshoe T.I. Callls.

I will not stop reporting any and all harassment, slander or torture that I endure outside of the usual levels during Linda’s accelerated CoIntelPro attack on me.

I will stand by the truth until the day I die and know that I will be called to die for what I believe in.  I am good with that and thank all those who are dedicated to the truth and who suffer for it and to all those who have been killed for the truth already.

Tupac on Death

 

UPDATE TO MY UPDATE ON LINDA4444–SHE REMOVED HER 5 HOUR SLANDER CAMPAIGN & IS STILL IN DAMAGE CONTROL MODE

Today Linda4444 removed her Live Talkshoe Update where she slandered, lied, twisted facts and just made “facts” up about me for hours.  This was a classic CoIntelPro attack using all of the various methods that are employed.  Thankfully I downloaded it and I know of a few people who have downloaded several other similar attacks that she has waged since suddenly arriving on Talkshoe T.I. calls in October 2012.  Linda has lots to hide and anybody that was a party to the malicious and completely contrived slanderous, erroneous lies was programmed for hours to believe utter rubbish as a CoIntelPro attack on a credible and consistent witness and victim of Linda’s manipulations for months–ME!

I challenge Linda to put the recording back up for all to hear her program targets for hours with CoIntelPro lies and absolutely contrived slander.  Then they can know who she really is and what she really does when they find out the truth.  Targets and the general public are smart enough if presented the truth.  You can see why nobody wants to expose Linda and the truth.  Its CoIntelPro attack 101–by the book–and she’s done this many times.

I am going to work on organizing the evidence of what I have accused Linda of and working on a presentation for everyone to analyze in real life the tactics that are used to subvert and take over others.  Although I will prove that she is lying about me and my character, I will not allow her CoIntelPro attack to dissuade from the actual subject is her very real lies, real manipulations, real attempts to lead others away from the truth either all or in part.

This week this blog had everything removed from it but the posts and I had to put it back together.  I will not be bullied into silence nor into speaking prematurely about what is happening.  Everything that is currently happening, however, I will feel free to blog about because Linda is doing to me and my character the very things that I have discovered her doing all along.

The fact that Linda4444 took the hours long slander and defamation of character campaign live Talkshoe call down points to one thing–GUILT!!!!

SHE KNOWS THAT I COULD SUE HER FOR WHAT SHE WROTE AND I BET SHE WON’T PUT IT UP JUST BECAUSE OF THAT!!!

IF SHE DOESN’T  PUT IT BACK UP, I WILL!

 

Better a Brief Warfare and Eternal Rest, than False Peace and Everlasting Torment.

The Enemy Within

African Proverb-No Enemy Within

“I came not to send peace on earth, but a sword.”
–Matthew 10:34

The Christian will be sure to make enemies. It will be one of his objects to make none; but if to do the right, and to believe the true, should cause him to lose every earthly friend, he will count it but a small loss, since his great Friend in heaven will be yet more friendly, and reveal Himself to him more graciously than ever. O ye who have taken up His cross, know ye not what your Master said? “I am come to set a man at variance against his father, and the daughter against her mother; and a man’s foes shall be they of his own household.” Christ is the great Peacemaker; but before peace, He brings war. Where the light cometh, the darkness must retire. Where truth is, the lie must flee; or, if it abideth, there must be a stern conflict, for the truth cannot and will not lower its standard, and the lie must be trodden under foot. If you follow Christ, you shall have all the dogs of the world yelping at your heels. If you would live so as to stand the test of the last tribunal, depend upon it the world will not speak well of you. He who has the friendship of the world is an enemy to God; but if you are true and faithful to the Most High, men will resent your unflinching fidelity, since it is a testimony against their iniquities. Fearless of all consequences, you must do the right. You will need the courage of a lion unhesitatingly to pursue a course which shall turn your best friend into your fiercest foe; but for the love of Jesus you must thus be courageous. For the truth’s sake to hazard reputation and affection, is such a deed that to do it constantly you will need a degree of moral principle which only the Spirit of God can work in you; yet turn not your back like a coward, but play the man. Follow right manfully in your Master’s steps, for He has traversed this rough way before you. Better a brief warfare and eternal rest, than false peace and everlasting torment.

Charles Spurgeon, Evening Devotional, Dec. 28

The Late William Cooper on Psychological Operations

According to the late William Cooper in this 1992 CNN interview, the purpose of PSYCHOLOGICAL OPERATIONS against the public is:

  • INDOCTRINATE THE PUBLIC on what the government wants the public TO PERCEIVE what’s happening,  OR
  • SCARE the researchers AWAY FROM THE TRUTH,  or both.

Regarding  FRAUDULENT INTENT:

I decided that I had to tell the public and get people on the right track.  The right track is, DON’T BELIEVE ANYBODY.  You gotta go out and         GET PROOF in your hand before you can believe anything.  And to do otherwise today, is the BIGGEST MISTAKE ANYONE COULD EVER MAKE.  You begin believing in people–putting your trust in them that they’re telling you the truth and I guarantee you that you’re going to            take a ride on a roller coaster that you don’t want to be on.

Now my attitude is, I just don’t want this to happen anymore.  I am very reluctant to believe what anybody tells me anymore.  Someone who’s really good at it can snow you.  That’s what makes a con man a good con man is that you get the perception that they’re telling you the truth.

K-rino, Grand Deception–Comprehensive Video About the History & Purpose of the Luciferian Grand Deception

CENSORSHIP & BIG BROTHER COWARDLY TORTURE, OPPRESSION & PERSECUTION

I started my blog in January 2012 after perpetrators continued to harm my animal and smear his blood all over the inside of my apartment and the outside doorknob and lock.  When I started posting about my experiences and the white collar and governmental involvement, I started getting hits to my blog from this written as the search terms:   cia; tavistock institute, for, rockefeller.  As of yesterday, this search term had 464 hits, more than 300 hits more than the 2nd most popular search term, gang stalking.

In the past few months, whoever is accessing my blog with this particular search term, has tapered off and quit doing it. However, after exposing Linda4444’s lies, manipulations, bullying, mind control and disinformation tactics, yesterday, this governmental troll/hack came back and eliminated half of my blog.

There is no greater confirmation as to the validity of my assertions, than the desperate acts of this governmental hack censoring my website and the pitiful, bad actress and EXPOSED government agent/troll Linda4444.

Thank you for reading and may the truth prevail!

Look who trolls my blog: cia; tavistock institute, for, rockefeller

Look who trolls my blog: cia; tavistock institute, for, rockefeller

CENSORSHIP, SLANDER AND MY BLOG HAS BEEN EDITED!

For the record, my blog has been tampered with, the names of the posts, categories and tags removed.

*Edit 6/12/14, 9:00 pm, I spent the day putting this blog back together and am just now finishing. Someone came through and removed everything but the posts.  It is now nearly restored to its pre-censored condition–I hope.

I am exposing Linda4444 on Talkshoe Targeted Individual Calls as a disinformation agent and as a lying mind controlling manipulator.

Linda has been on a disinformation, slander and attack campaign against me ever since I began exposing her.  She has threatened me verbally and in all caps in a  chatroom telling me that I messed with the wrong person.

If I am killed because of exposing Linda4444, make sure that you read all of my blog and research all of the information that I am putting out there about DISINFORMATION AGENTS and LINDA.

The last time that I exposed Linda on the “newsguy2005″ show on 9/23/13,  7 days later I had a severe chemical poisoning attack.  COINCIDENCE OR PUNISHMENT for putting this link into newsguy2005’s chatroom: http://www.theedgeam.com/interviews/Linda_Guinness_04.02.11.mp3.

Linda is a government info gathering disinformation agent that is on all of Talkshoe Targeted Individual calls and in every chatroom.  She has done everything within her power to bully me, lie about me, discredit me, threaten me, and then some as you can see.

Please spread the word and know that I  have never lied and can prove all of my accusations against Linda.  Also, Linda KNOWS that I am NOT those people who are writing disgusting things on Talkshoe chats.  This I can prove when I do a show exposing the truth of this situation.

Although I told Linda and wrote in her chatroom that I would never divulge her personal information in exposing her, she has waged a fierce PsyOp disinformation campaign against me, with desperate lies and slander . Please connect the dots, do the research and KNOW that if I disappear or am further harmed and poisoned and censored, it is indeed the Big Brother connections of Linda4444.

IMG_1354 IMG_1512 IMG_1455IMG_1406 IMG_1622 IMG_1478 IMG_1520

14 Psychopathic Tactics

Unwitting Experimentee:

A brief and concise description of perp and governmental agent tactics.

Originally posted on Psychopath Resistance:

Learn to identify their tactics

wolf_in_sheep_clothing_1_-400x253In Sheep’s Clothing

Dr. George Simon, author of In Sheep’s Clothing—Understanding and Dealing with Manipulative People, presents this list of 14 tactics that manipulators use to get you to do what they want. He points out the importance of recognizing that these tactics are offensive moves employed by the covert-aggressive to either maintain a position of power, gain power, or remove an obstacle from getting what he wants. You’ll be better equipped to deal with manipulators if you are familiar with this list of tactics, and can identify them when you encounter them:

  1. Denial – playing innocent, refusing to admit they have done something harmful.
  2. Selective inattention – playing dumb, or acting oblivious; refusing to pay attention to anything that might divert them from achieving their goal.
  3. Rationalization– making excuses or justifying their behavior, often in very convincing ways.
  4. Diversion – changing the subject, dodging the…

View original 196 more words

The Art of Deception: Training for Online Covert Operations

I found this information on prayerwarriorpsychicnot’s blog that can be found at http://taknbsorbemwon5.wordpress.com.
I consider it a very good find as it is the playbook for online psyops.
Featured photo - How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations A page from a GCHQ top secret document prepared by its secretive JTRIG unit

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

Original article:  https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/