Alex Jones using hypnosis, subliminals, and NLP on audience

Many listen to the Alex Jones show for news and information, but many of us sense that “something is rotten in the state of Denmark”. Some have discerned what some of these things are while others remain affected by his boisterous mocking continuing psychodrama, while others proclaim his many virtues in outing the globalists and the machinations of the NWO. He leads everyone to believe that the NWO globalist agenda  is a humungous Jewish conspiracy centuries in the making. Is that stopping short at naming the true conspirators throughout millennia?

This article helps to clarify what Jones’ true purpose in the media is and by what methods he uses to accomplish his role. It gives examples of those methods and how they affect individuals and the populous at large; thereby, making him a valuable media programmer.

Fitzpatrick Informer

Alex Jones the hypnotist Alex Jones the hypnotist

By Timothy Fitzpatrick
June 23, 2014 Anno Domini

In Is Alex Jones externalizing the hierarchy?, I discussed how Alex Jones serves as cathartic relief for those resisting the New World Order and how he helps to get the masses comfortable with the NWO, thereby diffusing their opposition to it, making for a smoother transition to the one-world government.

To expand on that, I will break down some of the more technical methods Jones uses to psychologically traumatize his audience into accepting the New World Order, including his use of subliminal messages and neuro-linguistic programming (NLP), which is basically the manipulation of communication to provoke at the subconcious level (here is a good video example of how powerful NLP can be). NLP is most prominently used by salesman and mind programmers.

Suggestive Programming (NLP), Affirmations, and double meaning

The most obvious and ubiquitous programming Jones…

View original post 2,051 more words

Advertisements

Lesson on FBI, CIA, Informants, Activists, Provocateurs, Infiltrators, Deceivers & Disinformation Agents

This is an excellent video describing the techniques that disinformation agents, informants, shills, double agents and all paid infiltrators and perpetrators use to discredit, subvert, obfuscate and undermine the truth, legitimate targeted individuals and organizations.

This is a must watch for targeted individuals as they are most likely being manipulated and undermined in this way–either personally or through an organization that they belong to or have reached out to for help. All real targets experience this because it is part of what Linda Lesker–a known CoIntelPro operative and disinformation agent–calls “The Operation”.

Lesson on FBI, CIA, Informants, Activists, Provocateurs, Infiltrators, Deceivers & Disinformation Agents

STOP THE TARGETING!

InformantIn this video, thepostnihilist describes how Disinformation Agents, Perpetrators, Informants and Provocateurs infiltrate into organizations and into individual lives.

 

View original post

14 Methodologies Of Mind Control Used On The Unsuspecting Masses

Methods of Manipulation

1)    Obfuscation:   Just basic confusion of one thing for another–a smoke and mirrors game.

 

2)   World View Poisoning:   Conditioning the way people view human nature and their own self-value.

 

3)   Conditioning of Primal Fear:   The exploitation of primal fears.

 

4)   Divide and Conquer Strategy:   Highlight any perceived differences between people and then exploit those differences to create infighting so they  are easier to control and conquer.

 

5)    Indoctrination of Education System:   A left brain form; the Nazis called it mastery learning. Grade School, High School and University, Trivium and Quadrivium education could counteract this.

 

6)    Controlled Opposition:   Basic dialectics – dialectical mechanics or Hegelianism Creating conflict that you already have an outcome management system for.  Create the conflict and wait for a type of reaction to the conflict (usually chaotic that demands a resolution) and then you step in and resolve it.  Artificial conflict resolution.

 

7)   Monetary System of Control:  Debt based fiat currency fractional reserve banking; a system of illusion that we call money yet people believe in it like its a religion or god. People seem to be the most powerless to come out.  It exists purely in the mind.

 

8)   Control of Mass Media:   If you can control the info that people get to see hear and read, you control their perception of reality.  If you limit the scope of what they can take into their minds and awareness, you limit their possibilities of solutions.  Human perception management.

 

9)   Food and Medicine:   Attack on the physical aspects of the body; relates to our brain development.  You affect thought and consciousness you are what you eat.  Use techniques that are damaging to consciousness through the modern medical system.

 

10)   Illusion of Time:   Very important for people to grasp.  Play on people’s seeming inability to live in true present moment awareness–getting people to live in regret over the past or anxiety over the future.  Its a fear based technique.  Takes us out of true present awareness.  Being fully present now to take on what is happening now.  If our consciousness can be manipulated into always looking into what has happened, it takes away effectiveness of dealing with the current situation.

 

11)   The DHR Factor: Denial, Hassle, Ridicule:   What other people perceive about you.  Things are fine the way they are; I don’t want to rock the boat because I may have to deal with hassle of other people.  The hassle free zone–I don’t want all the uncomfortable aspects of life that come with standing up for truth.  These are all fear based.  Heightening those three forms of mental instability. Trap of inactivity and not really doing anything to make things better.

 

12)   Religion:   We need to understand these last three the best.  Religion is a form of binding.  To tie back–Re-Ligare tying back.  Forms of modern religion are mind control and are based on astrotheology.  Giving people an exoteric version of something that was once esoteric or internal. Government is the binding of the left brain; religion is the binding of the right brain.

 

13)   Use of Subversive Symbolism:   Based on ancient sacred symbolism.  Based on symbols that have been with us from antiquity.  Solar symbolism, life force symbols, energy, blood, or anything we need for existence and life.  They use these in modern institutions–banks, police, media, stores. We’re drenched in it.  Basic symbols have a powerful psychic influence.  They can speak to us without words.  A wordless form of communication. Connects to occultism.

 

14)   Problem-Reaction-Solution (Chaos Sorcery):   A mass demonstration or a public display of the dark aspects of the Hegelian dialectic.  Hegelian dialectic can be used in a positive or negative sense.  Chaos sorcery or false flag terrorism.  This is ritual magic being used openly in the light of day. You are creating a chaotic situation in the light of day and you know it will elicit an extreme reaction of fear and chaos that demands order be brought as soon as possible.  You are manipulating the fear in the limbic system–people are not in a state that they can reason.  They are demanding solutions purely out of emotions.  They are in a reactive mode of consciousness.  They want the outcome of the game known before the game is played.  Interject chaos, you know the reaction its going to cause.  A leap in consciousness will subvert this technique.  This technique works over and over again. Humanity won’t wake up.  9-11 was chaos sorcery.

Source:   http://www.knowledgeoftoday.org/2012/02/illuminati-secret-hidden-from-masses.html

The Art of Deception: Training for Online Covert Operations

I found this information on prayerwarriorpsychicnot’s blog that can be found at http://taknbsorbemwon5.wordpress.com.

I consider it a very good find as it is the playbook for online psyops.

Featured photo - How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

A page from a GCHQ top secret document prepared by its secretive JTRIG unit

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:

Then there are the tactics used to destroy companies the agency targets:

GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.

The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:

No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.

The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:

Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:

The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:

We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?

As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”

These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.

Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.

Original article:  https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/