Monday, February 7, 2011

Internet cognitive infiltration -- it exists and Soros/CIA fund it....

February , 2011 -- Internet cognitive infiltration -- it exists and Soros/CIA fund it....

No “global awakening” if Soros, Gates and other creeps who tag along with them can do anything about it…

As if on cue and as America’s past program of commandeering and steering popular rebellions and revolutions to bring about pro-American governments is failing on a grand scale, we have learned from reliable sources that there has been an increase in the disruption of blogs and comments sections on web sites in the United States, especially those that take on an anti-Obama and anti-globalist, anti-USA/Israel stance from the left side of the political spectrum…

Professional agents provocateurs and amateurs from the “netizen” community have been busy posting comments on various web sites to distract and steer post threads away from subjects that are critical of the Obama administration. In addition, We have learned that international financier George Soros has stepped up his program to act as a “gate keeper” of the left by contributing more money and staff paid through his various non-profit contrivances to increase his political influence on the left side of the blogosphere….

Various wealthy tycoons on the right, including the Koch brothers, have carried out the same manipulative efforts on the right side of the blogosphere for some time but Soros’s efforts, which seek to mirror the Israel Lobby’s “Give Israel Your United Support” (GIYUS) and its Megaphone desktop computer article and commentary monitoring tool, are the current focus of White House political propaganda operatives, including White House Office of Information Regulatory Affairs chief Cass Sunstein, the mastermind of the program of “cognitive infiltration” of Internet sites by federal government agents and operatives….

The paid operatives who disrupt web sites take a number of tacks. Options include the use of profanity, especially toward the original poster of an item. But more often, the infiltration takes the form of posting extraneous information to detour the commentary thread away from uncomfortable subjects…. For example, if one is participating in a back-and-forth exchange dealing with U.S. Middle East policy, a comment on a great recipe for chili for a Super Bowl party may appear, followed by similar disruptive chili recipes, all from the same originator or group of originators who seek to divert and eventually kill the thread.

In more bold cases, Soros-paid operatives will simply ban individuals from certain sites that are amply funded by the multi-billionaire “disaster capitalist,” thus censoring their future comments temporarily or permanently. There are a number of so-called “progressive” web sites that conduct such operations on a routine basis.

Currently, with the release of certain documents of dubious origin, including pre-selected State Department cables and papers from Israeli-Palestinian peace negotiations, the Internet is experiencing the first major salvo in a global information war, one that, like the so-called “war on terrorism,” appears to be permanent. And as with any war, the truth is the first casualty….

With the Federal Communications Commission (FCC) working on new regulations that may corrupt traditional “net neutrality” on the web in favor of more corporate control over access and bandwidth, the word is that Soros’s plans are to further expand his influence on left and center-left websites that deal with politics and social issues — a plan that may forestall the need for an Internet “kill switch.” The Egyptian situation has shown that there are ways around “kill switch” technology for the Internet and cell phone networks. Therefore, as the elites, who recently adjourned form their annual conclave in Davos, Switzerland, where they huddled together over the loss of “stability” [ the term equates to the elites' control of the world ] from Cairo to Athens and London to Reykjavik, information manipulators like George Soros/CIA and Bill Gates realize that only Sunstein’s “cognitive infiltration” will ensure that Zbigniew Brzezinski’s heralded “global awakening” will remain in a deep coma….

GOP, Obama, and Senate Democrats are trying to fast-track Patriot Act renewal....

MEMRI Shenanigans....similar to "Site" and many other ...Mossad/CIA/FDDC operations wall to wall....

The USRaeli ZOG Governments Manipulate Social Media and the MSM with PsyOps.....

The U.S. government long ago announced its intention to "fight the net".

As revealed by an official Pentagon report signed by Rumsfeld called "Information Operations Roadmap":

The roadmap [contains an] acknowledgement that information put out as part of the military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans.

"Information intended for foreign audiences, including public diplomacy and Psyops, is increasingly consumed by our domestic audience," it reads.

"Psyops messages will often be replayed by the news media for much larger audiences, including the American public," it goes on.


"Strategy should be based on the premise that the Department [of Defense] will 'fight the net' as it would an enemy weapons system".
Indeed, the Pentagon publicly announced years ago that it was considering using "black propaganda" - in other words, knowing lies.

CENTCOM announced in 2008 that a team of employees would be "[engaging] bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information."

The Air Force is now also engaging bloggers. Indeed, an Air Force spokesman said:

"We obviously have many more concerns regarding cyberspace than a typical Social Media user," Capt. Faggard says. "I am concerned with how insurgents or potential enemies can use Social Media to their advantage. It's our role to provide a clear and accurate, completely truthful and transparent picture for any audience."

In other words, the government is targeting "social media", including popular user-ranked news sites.

In addition, when you look at what the Israeli lobby has done with Megaphone software to automatically vote stories questioning Israel down and to send pro-Israel letters to politicians and media (see this, this and this), you can start to see how the U.S. military - an even larger and better-funded organization - could substantially influence voting on social news sites with very little effort.

Moreover,the military has outsourced many projects to private contractors. For example, in Iraq, much of the fighting has been outsourced to Blackwater. And governmental intelligence functions have largely been outsourced to private companies.

It is therefore not impossible that the government is hiring cheap labor to downvote stories on the social media sites which question the government, and to post pro-government comments.
(other governments and large companies "astroturf" online as well. See this, this and this.)

I pointed out the same month:

Government propagandists, their hired private contractors and useful idiots are creating "downvote bots" or scripts to bury stories which question the government.


One free, simple scripting program to create automatic downvotes of certain topics or news posters is called "Greasemonkey", which is commonly used on large social news sites such as Reddit.

For example, there are some 2,480 hits [now past 9,000] for the Google search greasemonkey downvote. This is some 2,480 times that Reddit users are publicly admitting to using greasemonkey (see also this).

Propaganda agents obviously aren't going to publicly brag about what they are doing, and you can bet that their use of downvote bots is much greater. Moreover, they probably have more sophisticated software than Greasemonkey.

Today, Raw Story reports that the Air Force ordered software to manage army of fake virtual people:
Internet users would be well advised to ask another question entirely: Are my "friends" even real people?

In the continuing saga of data security firm HBGary, a new caveat has come to light: not only did they plot to help destroy secrets outlet WikiLeaks and discredit progressive bloggers, they also crafted detailed proposals for software that manages online "personas," allowing a single human to assume the identities of as many fake people as they'd like.

The revelation was among those contained in the company's emails, which were dumped onto bittorrent networks after hackers with cyber protest group "Anonymous" broke into their systems.

In another document unearthed by "Anonymous," one of HBGary's employees also mentioned gaming geolocation services to make it appear as though selected fake persons were at actual events.

"There are a variety of social media tricks we can use to add a level of realness to all fictitious personas," it said.

Government involvement

Eerie as that may be, more perplexing, however, is a federal contract from the 6th Contracting Squadron at MacDill Air Force Base, located south of Tampa, Florida, that solicits providers of "persona management software."

While there are certainly legitimate applications for such software, such as managing multiple "official" social media accounts from a single input, the more nefarious potential is clear.

Unfortunately, the Air Force's contract description doesn't help dispel their suspicions either. As the text explains, the software would require licenses for 50 users with 10 personas each, for a total of 500. These personas would have to be "replete with background , history, supporting details, and cyber presences that are technically, culturally and geographically consistent."

It continues, noting the need for secure virtual private networks that randomize the operator's Internet protocol (IP) address, making it impossible to detect that it's a single person orchestrating all these posts. Another entry calls for static IP address management for each persona, making it appear as though each fake person was consistently accessing from the same computer each time.

The contract also sought methods to anonymously establish virtual private servers with private hosting firms in specific geographic locations. This would allow that server's "geosite" to be integrated with their social media profiles, effectively gaming geolocation services.

The Air Force added that the "place of performance" for the contract would be at MacDill Air Force Base, along with Kabul, Afghanistan and Baghdad. The contract was offered on June 22, 2010.

It was not clear exactly what the Air Force was doing with this software, or even if it had been procured.

Manufacturing consent

Though many questions remain about how the military would apply such technology, the reasonable fear should be perfectly clear. "Persona management software" can be used to manipulate public opinion on key information, such as news reports. An unlimited number of virtual "people" could be marshaled by only a few real individuals, empowering them to create the illusion of consensus.


That's precisely what got DailyKos blogger Happy Rockefeller in a snit: the potential for military-run armies of fake people manipulating and, in some cases, even manufacturing the appearance of public opinion.

"I don't know about you, but it matters to me what fellow progressives think," the blogger wrote. "I consider all views. And if there appears to be a consensus that some reporter isn't credible, for example, or some candidate for congress in another state can't be trusted, I won't base my entire judgment on it, but it carries some weight.

"That's me. I believe there are many people though who will base their judgment on rumors and mob attacks. And for those people, a fake mob can be really effective."


"Team Themis" [tasked by the Chamber of Commerce to come up with strategies for responding to progressive bloggers and others] also included a proposal to use malware hacks against progressive organizations, and the submission of fake documents in an effort to discredit established groups.

HBGary was also behind a plot by Bank of America to destroy WikiLeaks' technology platform, other emails revealed. The company was humiliated by members of "Anonymous" after CEO Aaron Barr bragged that he'd "infiltrated" the group.

Gaming social media is only one propaganda technique employed by the government:

  • The New York Times discusses in a matter-of-fact way the use of mainstream writers by the CIA to spread messages
  • A 4-part BBC documentary called the "Century of the Self" shows that an American - Freud's nephew, Edward Bernays - created the modern field of manipulation of public perceptions, and the U.S. government has extensively used his techniques
  • The Independent discusses allegations of American propaganda
  • And one of the premier writers on journalism says the U.S. has used widespread propaganda....

Cognitive infiltration and controversies.....

Aside from Judy Wood's theories, perhaps the most controversial ideas on the 9/11 WTC demolitions are those of nuclear explosions. Although not new, Ed Ward has been writing on this for several years, the latest to get all the attention is Dimitri Khalezov.

Khalezov was virtually unknown until about a year ago when a 26 part video of his nuclear demolition theories was posted on youtube and then very quickly taken down. Two ideas come to mind. One is that someone didn't want these theories to be known, maybe they are too close to the truth. The other is that taking them down gave credibility to what could be a disinformation campaign. The videos are now available at youtube and Khalezov gives a number of interviews and has become a staff writer at Veterans Today where he gets an extensive audience. Some will point their finger at VT as contributing to disinfo but that's another story for another time and each individual will have to decide that for themselves.

Others besides Khalezov also see evidence of nuclear explosives.

Via wtcdemolition (with perhaps a caveat) ...
Dust by Jeff Prager

It is my considered opinion that all of the people that use the “thermite/thermate” theory are frauds working for the US government producing what we call a “Limited Hangout.” As such, it is their objective to conceal the thermonuclear demolition of the Twin Towers. It is their job to conceal the nuclear component at all costs. This does not mean that the “thermite/thermate” theory is in error, just that it’s being used to obfuscate the truth. This is the classic definition of a Limited Hangout. {more - pdf}

The bottom line is that with all of the competing theories on the mechanics of the 9/11 demolitions, everyone can't be right. People can be sincere in their theories and still make mistakes and be just plain wrong. People can also be part of the infiltrated 9/11 truth movement and spread disinformation to keep us all going in different directions and try to discredit everyone who gives a damn.

Cass Sunstein is probably somewhere smiling and saying "See, I told you this cognitive infiltration would work. They are fighting among themselves at every turn." Actually some of this disinfo, as with current version of 911 Blogger, is fairly easy to see through. It's the best of the propaganda that still can get to us and that's why we have to be vigilant and willing to speak out even in the face of ridicule and the prevailing concepts.

Some of us are very interested in the hows of the obvious inside Job of 9/11. It's just our nature. It's been pointed out to me that it's the whos that are most important and that bringing those responsible to justice will reveal the hows. I won't argue with that.

Speaking of controversy and cognitive infiltration and what's disinfo and what's not, the UFO/alien issue is getting a lot of mainstream media coverage so that makes it very suspect to being a psyop of concern. I would guess that Cass Sunstein learned much of what he proposes from the long term disinformation games of the UFO 'community.'

Via Media Monarchy comes the latest from Clyde Lewis at groundzeromedia. Worth a look if you're interested in alternative viewpoints to what may or may not be happening concerning 'UFO' and 'alien' phenomena.

Uforia's Secret - The Undercover Story
Ufology has now become a complicated soap opera of tall tales in short order and short tempers for those who want serious disclosure. There are professional skeptics in bed with the government, some UFO researchers in bed with them as well. The government is also in bed with the Military industrial complex which is allegedly in bed with aliens and it is all there to obfuscate and confuse people into writing it off as some undercover tabloid ruse. {more}

Project Blue Beam and the Rise and Fall of-the-Neo Skeptic
In the original “Watchmen” comic (set in an alternate reality 1985), one of the “heroes” commits what can be considered a villainous act for the “good of all mankind.” He contrives an “alien invasion” so that the United States, the Soviet Union, and the rest of the world will join together in peace and harmony to protect themselves against the outside “alien threat.”
If the story rings familiar to some of you, it is because it is based on speeches given by Ronald Reagan in the real world, in which he said an “alien threat” would be the solution to uniting a hostile world.

Numerous “conspiracy theorists”, most notably former naval officer William Cooper, the author of the famed underground book Behold a Pale Horse, speculated that Reagan’s speech was an expositional public “debriefing” to prepare the public to accept a global government as a necessary response to an alien invasion scenario. {more}

Good advice .....
"read everything, believe nothing, unless you can prove it to YOURSELF with YOUR OWN research"
Bill Cooper

The Legacy of William Cooper

Behold a Pale Horse - pdf download


Post a Comment

Copyright 2009 echkelon-Boston-Globe. Powered by Blogger
Blogger Templates created by Deluxe Templates
Wordpress by Wpthemescreator