infolink

Saturday, 26 December 2015

5 simple rules of propaganda

  • The rule of simplification: reducing all data to a simple confrontation between ‘Good and Bad’, ‘Friend and Foe’.
  • The rule of disfiguration: discrediting the opposition by crude smears and parodies.
  • The rule of transfusion: manipulating the consensus values of the target audience for one’s own ends.
  • The rule of unanimity: presenting one’s viewpoint as if it were the unanimous opinion of all right-thinking people: draining the doubting individual into agreement by the appeal of star-performers, by social pressure, and by ‘psychological contagion’.
  • The rule of orchestration: endlessly repeating the same messages in different variations and combinations.

Thursday, 3 December 2015

Rupert Murdoch and The Financial Elite behind the Syrian Conflict

A study for a global oil services company backed by the French government and linked to Britain’s Tory-led administration, published during the height of the Arab Spring, hailed the significant “hydrocarbon potential” of Syria’s offshore resources. 

The 2011 study was printed in GeoArabia, a petroleum industry journal published by a Bahrain-based consultancy, GulfPetroLink, which is sponsored by some of the world’s biggest oil companies, including Chevron, ExxonMobil, Saudi Aramco, Shell, Total, and BP.

One of the key potential conflicts flagged up by the report is between Syria and Israel, over oil exploration licenses granted by the Israeli government to search for oil in the Golan Heights.
The Golan was captured by Israel from Syria in 1967, and unilaterally annexed in 1981 with the introduction of Israeli law to the territory.

The report recognised the risk of “another armed conflict between the two parties should substantial hydrocarbon resources be discovered.”

The company that has been granted exploration rights in the Golan Heights is a major American firm, Genie Oil and Gas. Data from exploratory wells explored by Genie’s Israeli subsidiary, Afek Oil and Gas, confirmed “significant” quantities of oil and gas after drilling into a column of reserves 1,150 feet thick, “about 10 times larger than the global average.”
Yuval Bartov, Afek’s chief geologist, recently told the Economist his firm had discovered an oil reservoir “with the potential of billions of barrels.”
Equity-holding board members of Afek’s parent company, Genie Oil and Gas, include global media baron Rupert Murdoch.



In late 2010, Murdoch teamed up with Lord Jacob Rothschild to buy a 5.5% stake in Genie, worth around $11 million. Lord Rothschild is chairman of RIT (Rothschild Investment Trust) Capital Partners, a $3.4 billion investment trust fund formerly associated with the Rothschild investment bank.

RIT Capital invests primarily in public equity, debt markets, real estate equities, gold and oil, including “sectors that we have a deep knowledge of” such as “energy, resources, financial services, TMT [technology, media and telecommunications] and consumer-related.”
Murdoch is the owner of News Corporation, the world’s second largest media conglomerate before it split in 2013 into News Corp, where he is executive chairman, and 21st Century Fox, where he is co-executive chairman, running the corporation with his two sons, Lachlan and James.

As such, Murdoch is a dominant force over newspapers, publishers and TV networks in the English-language media, encompassing BSkyB, The Times and The Sun in the UK; the FOX cable network including FOX News, Dow Jones, The Wall Street Journal, New York Post and National Geographic in the US; The Australian, The Daily Telegraph, and Herald Sun in Australia — to name just a few.

“I believe Genie Energy’s technologies and vast shale oil licenses have real potential to spur a global, geo-political paradigm shift by moving a major portion of new oil production to America, Israel, and other western-oriented democracies,” said Murdoch explaining his reasons for investing in the firm.

During the Leveson inquiry, it emerged that the global media baron had numerous undisclosed meetings with Prime Minister David Cameron, who appeared to have close relationships with Murdoch and other senior News Corp. officials.
Murdoch and Rothschild also serve on Genie’s strategic advisory board. Joining them on the board are Larry Summers, former Director of President Obama’s National Economic Council; ex-CIA Director James Woolsey, a former Vice-President of NSA contractor Booz Allen Hamilton, Director of the neoconservative Foundation for Defense of Democracies, advisory board member of anti-Muslim hate group the Gatestone Institute, international patron to the Henry Jackson Society; Dick Cheney, former Vice-President under George W. Bush; and Bill Richardson, former Secretary of Energy under Clinton, Governor of New Mexico and Obama nominee for Secretary of Commerce.

Source: http://www.mintpressnews.com/western-firms-plan-to-cash-in-on-syrias-oil-and-gas-frontier/211703/

Friday, 14 February 2014

14 Characteristics that Define a Facist State

Dr. Lawrence Britt has examined the fascist regimes of Hitler (Germany), Mussolini (Italy), Franco (Spain), Suharto (Indonesia) and several Latin American regimes. Britt found 14 defining characteristics common to each:

1. Powerful and Continuing Nationalism - Fascist regimes tend to make constant use of patriotic mottos, slogans, symbols, songs, and other paraphernalia. Flags are seen everywhere, as are flag symbols on clothing and in public displays.

2. Disdain for the Recognition of Human Rights - Because of fear of enemies and the need for security, the people in fascist regimes are persuaded that human rights can be ignored in certain cases because of "need." The people tend to look the other way or even approve of torture, summary executions, assassinations, long incarcerations of prisoners, etc.

3. Identification of Enemies/Scapegoats as a Unifying Cause - The people are rallied into a unifying patriotic frenzy over the need to eliminate a perceived common threat or foe: racial , ethnic or religious minorities; liberals; communists; socialists, terrorists, etc.

4. Supremacy of the Military - Even when there are widespread
domestic problems, the military is given a disproportionate amount of government funding, and the domestic agenda is neglected. Soldiers and military service are glamorized.

5. Rampant Sexism - The governments of fascist nations tend to be almost exclusively male-dominated. Under fascist regimes, traditional gender roles are made more rigid. Divorce, abortion and homosexuality are suppressed and the state is represented as the ultimate guardian of the family institution.

6. Controlled Mass Media - Sometimes to media is directly controlled by the government, but in other cases, the media is indirectly controlled by government regulation, or sympathetic media spokespeople and executives. Censorship, especially in war time, is very common.

7. Obsession with National Security - Fear is used as a motivational tool by the government over the masses.

8. Religion and Government are Intertwined - Governments in fascist nations tend to use the most common religion in the nation as a tool to manipulate public opinion. Religious rhetoric and terminology is common from government leaders, even when the major tenets of the religion are diametrically opposed to the government's policies or actions.

9. Corporate Power is Protected - The industrial and business aristocracy of a fascist nation often are the ones who put the government leaders into power, creating a mutually beneficial business/government relationship and power elite.

10. Labor Power is Suppressed - Because the organizing power of labor is the only real threat to a fascist government, labor unions are either eliminated entirely, or are severely suppressed.

11. Disdain for Intellectuals and the Arts - Fascist nations tend to promote and tolerate open hostility to higher education, and academia. It is not uncommon for professors and other academics to be censored or even arrested. Free expression in the arts and letters is openly attacked.

12. Obsession with Crime and Punishment - Under fascist regimes, the police are given almost limitless power to enforce laws. The people are often willing to overlook police abuses and even forego civil liberties in the name of patriotism. There is often a national police force with virtually unlimited power in fascist nations.

13. Rampant Cronyism and Corruption - Fascist regimes almost always are governed by groups of friends and associates who appoint each other to government positions and use governmental power and authority to protect their friends from accountability. It is not uncommon in fascist regimes for national resources and even treasures to be appropriated or even outright stolen by government leaders.

14. Fraudulent Elections - Sometimes elections in fascist nations are a complete sham. Other times elections are manipulated by smear campaigns against or even assassination of opposition candidates, use of legislation to control voting numbers or political district boundaries, and manipulation of the media. Fascist nations also typically use their judiciaries to manipulate or control elections.

From Liberty Forum
http://www.libertyforum.org/showflat.php?Cat=&Board=news_constitution&Number=642
109&page=&view=&sb=&o=&vc=1&t=-1

Saturday, 14 December 2013

Seventeen Techniques for Truth Suppression

Seventeen Techniques for Truth Suppression
 
Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.
 
1. Dummy up. If it's not reported, if it's not news, it didn't happen.
 
2. Wax indignant. This is also known as the "How dare you?" gambit.
 
3. Characterize the charges as "rumors" or, better yet, "wild rumors." If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through "rumors." (If they tend to believe the "rumors" it must be because they are simply "paranoid" or "hysterical.")
 
4. Knock down straw men. Deal only with the weakest aspects of the weakest charges. Even better, create your own straw men. Make up wild rumors (or plant false stories) and give them lead play when you appear to debunk all the charges, real and fanciful alike.
 
5. Call the skeptics names like "conspiracy theorist," "nutcase," "ranter," "kook," "crackpot," and, of course, "rumor monger." Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the "more reasonable" government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own "skeptics" to shoot down.
 
6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).
 
7. Invoke authority. Here the controlled press and the sham opposition can be very useful.
 
8. Dismiss the charges as "old news."
 
9. Come half-clean. This is also known as "confession and avoidance" or "taking the limited hangout route." This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal "mistakes." This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.
 
10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.
 
11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely free press. If evidence exists that the Vince Foster "suicide" note was forged, they would have reported it. They haven't reported it so there is no such evidence. Another variation on this theme involves the likelihood of a conspiracy leaker and a press who would report the leak.
 
12. Require the skeptics to solve the crime completely. E.g. If Foster was murdered, who did it and why?
 
13. Change the subject. This technique includes creating and/or publicizing distractions.
 
14. Lightly report incriminating facts, and then make nothing of them. This is sometimes referred to as "bump and run" reporting.
 
15. Baldly and brazenly lie. A favorite way of doing this is to attribute the "facts" furnished the public to a plausible-sounding, but anonymous, source.
 
16. Expanding further on numbers 4 and 5, have your own stooges "expose" scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.
 
17. Flood the Internet with agents. This is the answer to the question, "What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?" Don t the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.

Friday, 13 December 2013

Eight Traits of the Disinformationalist

Eight Traits of the Disinformationalist
 
1) Avoidance. They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.
 
2) Selectivity. They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.
 
3) Coincidental. They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with the reason.
 
4) Teamwork. They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.
 
5) Anti-conspiratorial. They almost always have disdain for 'conspiracy theorists' and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a NG focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain.Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.
 
6) Artificial Emotions. An odd kind of 'artificial' emotionalism and an unusually thick skin -- an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial.
 
Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal. But disinfo types usually have trouble maintaining the 'image' and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It's just a job, and they often seem unable to 'act their role in character' as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later -- an emotional yo-yo.
 
With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game -- where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.
 
7) Inconsistent. There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat 'freudian', so to speak, in that perhaps they really root for the side of truth deep within.
 
I have noted that often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I'm not aware of too many Navy pilots who don't have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.
 
8) Time Constant. Recently discovered, with respect to News Groups, is the response time factor. There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:
 
a) ANY NG posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NG ONLY WORKS IF THE READER SEES IT - FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.
 
b) When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR - there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to 'get permission' or instruction from a formal chain of command.
 
c) In the NG example 1) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay - the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.

Twenty-Five Rules of Disinformation

 
Twenty-Five Rules of Disinformation
 
Note: The first rule and last five (or six, depending on situation) rules are generally not directly within the ability of the traditional disinfo artist to apply. These rules are generally used more directly by those at the leadership, key players, or planning level of the criminal conspiracy or conspiracy to cover up.
 
1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don't discuss it -- especially if you are a public figure, news anchor, etc. If it's not reported, it didn't happen, and you never have to deal with the issues.
 
2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the 'How dare you!' gambit.
 
3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method which works especially well with a silent press, because the only way the public can learn of the facts are through such 'arguable rumors'. If you can associate the material with the Internet, use this fact to certify it a 'wild rumor' from a 'bunch of kids on the Internet' which can have no basis in fact.
 
4. Use a straw man. Find or create a seeming element of your opponent's argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.
 
5. Sidetrack opponents with name calling and ridicule. This is also known as the primary 'attack the messenger' ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as 'kooks', 'right-wing', 'liberal', 'left-wing', 'terrorists', 'conspiracy buffs', 'radicals', 'militia', 'racists', 'religious fanatics', 'sexual deviates', and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.
 
6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism, reasoning -- simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent's viewpoint.
 
7. Question motives. Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.
 
8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough 'jargon' and 'minutia' to illustrate you are 'one who knows', and simply say it isn't so without discussing issues or demonstrating concretely why or citing sources.
 
9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.
 
10. Associate opponent charges with old news. A derivative of the straw man -- usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with - a kind of investment for the future should the matter not be so easily contained.) Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues -- so much the better where the opponent is or was involved with the original source.
 
11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the 'high road' and 'confess' with candor that some innocent mistake, in hindsight, was made -- but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, 'just isn't so.' Others can reinforce this on your behalf, later, and even publicly 'call for an end to the nonsense' because you have already 'done the right thing.' Done properly, this can garner sympathy and respect for 'coming clean' and 'owning up' to your mistakes without addressing more serious issues.
 
12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues.
 
13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards or with an apparent deductive logic which forbears any actual material fact.
 
14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best with issues qualifying for rule 10.
 
15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.
 
16. Vanish evidence and witnesses. If it does not exist, it is not fact, and you won't have to address the issue.
 
17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can 'argue' with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.
 
18. Emotionalize, Antagonize, and Goad Opponents. If you can't do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how 'sensitive they are to criticism.'
 
19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the 'play dumb' rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon.) In order to completely avoid discussing issues, it may be required that you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
 
20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations -- as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.
 
21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict is achieved, the matter can be considered officially closed. Usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim.
 
22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.
 
23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.
 
24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by destroying them financially, emotionally, or severely damaging their health.
 
25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

Techniques for dilution, misdirection and control of an internet forum

Techniques for dilution, misdirection and control of an internet forum.
There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a 'uncontrolled forum.'

Contents
1 Forum Sliding
2 Consensus Cracking
3 Topic Dilution
4 Information Collection
5 Anger Trolling
6 Gaining Full Control
7 Breaking the Banhammer

Technique #1 - 'FORUM SLIDING'

If a very sensitive posting of a critical nature has been posted on a forum - it can be quickly removed from public view by 'forum sliding.' In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to 'age.' Each of these misdirectional forum postings can then be called upon at will to trigger a 'forum slide.' The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a 'forum slide' and 'flush' the critical post out of public view it is simply a matter of logging into each account both real and fake and then 'replying' to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting 'slides' down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and unuseful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.

Technique #2 - 'CONSENSUS CRACKING'

A second highly effective technique (which you can see in operation all the time at www.abovetopsecret.com) is 'consensus cracking.' To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger 'evidence' or disinformation in your favour is slowly 'seeded in.' Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then 'abort' the consensus cracking by initiating a 'forum slide.'

Technique #3 - 'TOPIC DILUTION'

Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a 'RESOURCE BURN.' By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a 'gossip mode.' In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to 'drive in the wedge.' By being too far off topic too quickly it may trigger censorship by a forum moderator.

Technique #4 - 'INFORMATION COLLECTION'

Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a 'show you mine so me yours' posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your 'favourite weapon' and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favourite 'technique of operation.' From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.

Technique #5 - 'ANGER TROLLING'

Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes - without the requirement to 'stage' a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to 'lead' the forum by replying to your own posting with your own statement of violent intent, and that you 'do not care what the authorities think!!' inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.

Technique #6 - 'GAINING FULL CONTROL'

It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings - and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the 'ultimate victory' as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a 'honey pot' gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.

Technique #7 Breaking the Banhammer
An agent may come to the forum in question with an anti-authoritarian, anarchist tone. This seems legitimate enough at first glance, as any research or activist forum is certain to be aware of the corruption of "The System", and those in charge of it. However, by directing this anti-authoritarian attitude towards the very moderation team who are there to ensure that research and activism can take place, they attempt to undermine the authority of and respect for the moderation team. "You mean you're banning people? Aren't you about free speech, the constitution?" Etc. This is a technique known as "Occupatio", and presents the moderator with a catch-22; either ban the troublemaker and lend credence to the claim that the moderation team is hypocritical, or don't ban him and continue listening to him complain about how the site's staff is hypocritical.
If there are other agents on the forum, and the moderators ban the troublemaker, they may begin hurling accusations of "witch hunts" and "McCarthyism" at the moderators, attempting to rile the userbase into a shitstorm against the moderators. Divide and conquer.


CONCLUSION

Remember these techniques are only effective if the forum participants DO NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation can completely fail, and the forum can become uncontrolled. At this point other avenues must be considered such as initiating a false legal precidence to simply have the forum shut down and taken offline. This is not desirable as it then leaves the enforcement agencies unable to track the percentage of those in the population who always resist attempts for control against them. Many other techniques can be utilized and developed by the individual and as you develop further techniques of infiltration and control it is imperative to share then with HQ.

How to Spot an Agent, Troll, Shill, Mole.

How to Spot an Agent, Troll, Shill, Mole.
 
One way to neutralize a potential activist is to get them to be in a group that does all the wrong things. Why?
 
1) The message doesn't get out.
2) A lot of time is wasted
3) The activist is frustrated and discouraged
4) Nothing good is accomplished.
 
FBI and Police Informers and Infiltrators will infest any group and they have phoney activist organizations established.
 
Their purpose is to prevent any real movement for justice or eco-peace from developing in this country.
 
Agents come in small, medium or large. They can be of any ethnic background. They can be male or female.
 
The actual size of the group or movement being infiltrated is irrelevant. It is the potential the movement has for becoming large which brings on the spies and saboteurs.
 
This booklet lists tactics agents use to slow things down, foul things up, destroy the movement and keep tabs on activists.
 
It is the agent's job to keep the activist from quitting such a group, thus keeping him/her under control.
 
In some situations, to get control, the agent will tell the activist:
 
"You're dividing the movement."
 
[Here, I have added the psychological reasons as to WHY this maneuver works to control people]
 
This invites guilty feelings. Many people can be controlled by guilt. The agents begin relationships with activists behind a well-developed mask of "dedication to the cause." Because of their often declared dedication, (and actions designed to prove this), when they criticize the activist, he or she - being truly dedicated to the movement - becomes convinced that somehow, any issues are THEIR fault. This is because a truly dedicated person tends to believe that everyone has a conscience and that nobody would dissimulate and lie like that "on purpose." It's amazing how far agents can go in manipulating an activist because the activist will constantly make excuses for the agent who regularly declares their dedication to the cause. Even if they do, occasionally, suspect the agent, they will pull the wool over their own eyes by rationalizing: "they did that unconsciously... they didn't really mean it... I can help them by being forgiving and accepting " and so on and so forth.
 
The agent will tell the activist:
 
"You're a leader!"
 
This is designed to enhance the activist's self-esteem. His or her narcissistic admiration of his/her own activist/altruistic intentions increase as he or she identifies with and consciously admires the altruistic declarations of the agent which are deliberately set up to mirror those of the activist.
 
This is "malignant pseudoidentification." It is the process by which the agent consciously imitates or simulates a certain behavior to foster the activist's identification with him/her, thus increasing the activist's vulnerability to exploitation. The agent will simulate the more subtle self-concepts of the activist.
 
Activists and those who have altruistic self-concepts are most vulnerable to malignant pseudoidentification especially during work with the agent when the interaction includes matter relating to their competency, autonomy, or knowledge.
 
The goal of the agent is to increase the activist's general empathy for the agent through pseudo-identification with the activist's self-concepts.
 
The most common example of this is the agent who will compliment the activist for his competency or knowledge or value to the movement. On a more subtle level, the agent will simulate affects and mannerisms of the activist which promotes identification via mirroring and feelings of "twinship". It is not unheard of for activists, enamored by the perceived helpfulness and competence of a good agent, to find themselves considering ethical violations and perhaps, even illegal behavior, in the service of their agent/handler.
 
The activist's "felt quality of perfection" [self-concept] is enhanced, and a strong empathic bond is developed with the agent through his/her imitation and simulation of the victim's own narcissistic investments. [self-concepts] That is, if the activist knows, deep inside, their own dedication to the cause, they will project that onto the agent who is "mirroring" them.
 
The activist will be deluded into thinking that the agent shares this feeling of identification and bonding. In an activist/social movement setting, the adversarial roles that activists naturally play vis a vis the establishment/government, fosters ongoing processes of intrapsychic splitting so that "twinship alliances" between activist and agent may render whole sectors or reality testing unavailable to the activist. They literally "lose touch with reality."
 
Activists who deny their own narcissistic investments [do not have a good idea of their own self-concepts and that they ARE concepts] and consciously perceive themselves (accurately, as it were) to be "helpers" endowed with a special amount of altruism are exceedingly vulnerable to the affective (emotional) simulation of the accomplished agent.
 
Empathy is fostered in the activist through the expression of quite visible affects. The presentation of tearfulness, sadness, longing, fear, remorse, and guilt, may induce in the helper-oriented activist a strong sense of compassion, while unconsciously enhancing the activist's narcissistic investment in self as the embodiment of goodness.
 
The agent's expresssion of such simulated affects may be quite compelling to the observer and difficult to distinguish from deep emotion.
 
It can usually be identified by two events, however:
 
First, the activist who has analyzed his/her own narcissistic roots and is aware of his/her own potential for being "emotionally hooked," will be able to remain cool and unaffected by such emotional outpourings by the agent.
 
As a result of this unaffected, cool, attitude, the Second event will occur: The agent will recompensate much too quickly following such an affective expression leaving the activist with the impression that "the play has ended, the curtain has fallen," and the imposture, for the moment, has finished. The agent will then move quickly to another activist/victim.
 
The fact is, the movement doesn't need leaders, it needs MOVERS. "Follow the leader" is a waste of time.
 
A good agent will want to meet as often as possible. He or she will talk a lot and say little. One can expect an onslaught of long, unresolved discussions.
 
Some agents take on a pushy, arrogant, or defensive manner:
 
1) To disrupt the agenda
2) To side-track the discussion
3) To interrupt repeatedly
4) To feign ignorance
5) To make an unfounded accusation against a person.
 
Calling someone a racist, for example. This tactic is used to discredit a person in the eyes of all other group members.
 
Saboteurs
 
Some saboteurs pretend to be activists. She or he will ....
 
1) Write encyclopedic flyers (in the present day, websites)
2) Print flyers in English only.
3) Have demonstrations in places where no one cares.
4) Solicit funding from rich people instead of grass roots support
5) Display banners with too many words that are confusing.
6) Confuse issues.
7) Make the wrong demands.
Cool Compromise the goal.
9) Have endless discussions that waste everyone's time. The agent may accompany the endless discussions with drinking, pot smoking or other amusement to slow down the activist's work.
 
Provocateurs
 
1) Want to establish "leaders" to set them up for a fall in order to stop the movement.
2) Suggest doing foolish, illegal things to get the activists in trouble.
3) Encourage militancy.
4) Want to taunt the authorities.
5) Attempt to make the activist compromise their values.
6) Attempt to instigate violence. Activisim ought to always be non-violent.
7) Attempt to provoke revolt among people who are ill-prepared to deal with the reaction of the authorities to such violence.
 
Informants
 
1) Want everyone to sign up and sing in and sign everything.
2) Ask a lot of questions (gathering data).
3) Want to know what events the activist is planning to attend.
4) Attempt to make the activist defend him or herself to identify his or her beliefs, goals, and level of committment.
 
Recruiting
 
Legitimate activists do not subject people to hours of persuasive dialog. Their actions, beliefs, and goals speak for themselves.
 
Groups that DO recruit are missionaries, military, and fake political parties or movements set up by agents.
 
Surveillance
 
ALWAYS assume that you are under surveillance.
 
At this point, if you are NOT under surveillance, you are not a very good activist!
 
Scare Tactics
 
They use them.
 
Such tactics include slander, defamation, threats, getting close to disaffected or minimally committed fellow activists to persuade them (via psychological tactics described above) to turn against the movement and give false testimony against their former compatriots. They will plant illegal substances on the activist and set up an arrest; they will plant false information and set up "exposure," they will send incriminating letters [emails] in the name of the activist; and more; they will do whatever society will allow.
 
This booklet in no way covers all the ways agents use to sabotage the lives of sincere an dedicated activists.
 
If an agent is "exposed," he or she will be transferred or replaced.
 
COINTELPRO is still in operation today under a different code name. It is no longer placed on paper where it can be discovered through the freedom of information act.
 
The FBI counterintelligence program's stated purpose: To expose, disrupt, misdirect, discredit, and otherwise neutralize individuals who the FBI categorize as opposed to the National Interests. "National Security" means the FBI's security from the people ever finding out the vicious things it does in violation of people's civil liberties.
 

Friday, 23 January 2009

Steps to Peace Consciousness

Steps to Peace Consciousness
by Deepak Chopra
chopra. com
_______________________________

1. Change doesn't start on the surface. It's generated from consciousness. This has been true throughout history. If both Buddhism and Christianity could begin with one person, let us not think in terms of numbers and odds. It may sound grandiose to compare ourselves to great spiritual guides, but we act collectively, as an alliance. Our strength comes from critical mass.


2. We aren't here to make the world evolve. We are here to evolve as individuals and then to spread that influence. In the wisdom tradition of Vedanta, the stream of evolution is known in Sanskrit as Dharma, from a root verb that means 'to uphold.' This gives us a clue how to live: the easiest way for us to grow is to align ourselves with Dharma. We don't have to struggle to grow--that would be unproductive, in fact. The Dharma has always favored non-violence. If we can bring ourselves to a state of non-violence, and connect with others who are doing the same thing, we have done a huge thing to reinforce Dharma.


3. Societies get into the grip of their own self-created story. It's helpful to realize that we can choose not to participate in that story. Realize that national and tribal stories are limited, self-serving, based on the past, reinforced by orthodoxy, and therefore opposed to real change. Stories are incredibly persuasive. Wars are fueled by victimization that runs deep, for example. So let us not try to change anyone's story. Let us only notice and observe ourselves when we buy into it and then let us back away from participating in it.


4. Let us not demand of ourselves that we alone must be the agent of change. In a fire brigade everyone passes along a bucket, but only the last person puts out the fire. None of us know where we stand in line. We may be here simply to pass a bucket; we may be called on to play a major role. In either case, all we can do is think, act, and say. Let us direct our thoughts, words, and actions to peace. That is all we can do. Let the results be what they will be.


5. Let us realize that engagement and detachment aren't opposite—the more engaged we become, the more detached we will have to be. Otherwise, we will lose ourselves in conflict, obsessiveness, anxiety over the future, and feelings of guilt and inadequacy. Keep in mind that we are pioneers into the unknown, and uncertainty is our ally. When our minds want closure, certainty, and finality, let us remind ourselves that these are fictions. Our joyous moments will come from riding the wave, not asking to get off at the next station.


6. Since most misery is born of failed expectations let us learn to minimize expectations so that we will feel far less guilt and disappointment.


7. We aren't here to be good or perfect. We are here as the antennas for signals from the future. We are here to be midwives to something that wants to be born. Good people have preceded us. They solved some problems and created others. As one wise teacher said, "You aren't here to be as good as possible. You are here to be as real as possible.
"

8. I know this sounds difficult, but let us try to be tolerant of intolerance. This is a hard one at times, but if you try the opposite—showing a hard heart against those with hard hearts of their own—all we've done is expand the problem. It's helpful (but often difficult) to remember that everyone is doing the best they can form their own level of consciousness. Trying to talk a terrorist out of his beliefs is like trying to persuade a lion to be a vegetarian. All we can realistically do is seek openings for higher awareness.


9. Let us resist the lure of dualities. These include us versus them, civilized versus barbarians, good versus evil. The good, civilized people of Europe managed to kill millions of themselves, along with millions of "them." In reality we are all in the same boat of human conflict and confusion. Sometimes it helps to admit that the doctor is not far from being a patient.


10. Let's create an atmosphere of peace around ourselves. Imagine that we are like a mother whose children come home crying about fights at school. Would it be her job to soothe their wounds or to arm them for fighting back tomorrow? Simplistic as it may sound, the male principle of aggression can only be healed by the feminine principle of nurturing and love.

Thursday, 22 January 2009

rejection cause of aggression

Visit the psychology forum for discussion sbout any topic here

Rejection Can Trigger Aggression

Rejection Can Trigger AggressionPeople who feel socially rejected are more likely to see others’ actions as hostile and are more likely to behave in hurtful ways toward people they have never even met.

The findings stem from a new study that may help explain why social exclusion is often linked to aggression – which sometimes boils over dramatically, as in the case of school shootings, for example.

“Prior case studies show the majority of school shooters have experienced chronic peer rejection,” said the study’s lead author, C. Nathan DeWall, Ph.D., from the University of Kentucky.

“And while not everyone who feels rejected reacts violently, we found they tend to act out aggressively in other ways. We wanted to help explain psychologically why this happens.”

A full report of the study appears in the January issue of the Journal of Personality and Social Psychology, published by the American Psychological Association.

DeWall conducted four separate experiments with 190 participants, all college students.

In one experiment, 30 participants completed a personality test and were given bogus feedback about the results. A third of the participants, the excluded group, were told their personalities would mean they would probably end up alone later in life. The rest of the participants, the control group, were either told they would have many lasting and meaningful relationships or were given no feedback at all.

All participants were then instructed to read a personal essay supposedly written by another participant, whom they did not know. The essay was about an event in which the author’s actions could be perceived as either assertive or hostile and the participants rated their impression of the author’s actions.

They were also told that the author was up for a research assistant position and were asked whether they thought the author would be a good candidate, based on what they had read.

Participants who were told they were going to have a lonely life perceived the author’s actions as significantly more hostile and gave a much more negative evaluation than those in the control groups.

The authors also note that the participants’ moods did not seem to differ among the different groups, which led them to conclude that the participants’ emotional response to their personality results did not play a role in how they performed in the experiments.

In another experiment, 32 students underwent the same bogus personality evaluation and rated the same essay from the previous experiment. Again, some were told they would lead a lonely life while others were assigned to the control groups.

This time, participants were led to believe they were playing a reaction-time computer game with another person in the lab whom they could not see and had never met. During the game, the loser of each trial was forced to listen to a blast of white noise through headphones. The participants could set the noise’s intensity level and duration.

Those who were told they were going to have a lonely life blasted a higher level of the painful noise than those in the control groups. “Across all experiments, the participants who experienced some form of social rejection acted in similar ways,” said DeWall.

“This suggests these people feel betrayed by others. In turn, they see otherwise neutral actions as hostile and behave badly towards others.”

Prior research has examined whether emotions play a role in this type of aggression, but this study’s researchers say their findings do not support this idea.

“Excluded people see the world through blood-colored glasses and it is our hope that this research can lead to a better understanding of why rejection causes aggression and what we can do to prevent such unwanted and harmful behavior,” said DeWall.

Wednesday, 7 January 2009

tolerance

Please visit http://psychologyforum.us for discussion about any topic here.



You have the power


to tolerate anyone and any situation.



But tolerance is not just suffering in silence.



It means going beyond


any personal discomfort you may feel,


and giving a gift to whomever


you would tolerate.





Give your time, attention,


understanding, compassion, care -


all are gifts, which paradoxically,


you also receive


in the process of giving.



And, as you do,


you will experience


your own self esteem and inner strength grow.





In this way


you can turn tolerance


into strength.

a knot of light



Imagine twisting a beam of light into a knot, as if it were a piece of a string. Now grab another light beam and tie it around the first, forming its own loop. Tie on another and another, until all of space is filled up with loops of light.


Sounds preposterous, but a pair of physicists has shown that light can do just this — at least in theory. Visible light, along with all other forms of electromagnetic radiation, is governed by Maxwell’s equations, and the researchers have found a new solution to these equations in which light forms linked knots. The team is now working to create light in this form experimentally.


It’s too soon to know what the applications of knotted light will be if they succeed, but possibilities include solving one of the problems that make it difficult to produce power from nuclear fusion and manipulating flows in an exotic state of matter called a Bose-Einstein condensate.





Hopf Fibration
The Hopf fibration fills all of space with circles.



“This is very exciting,” says Antti Niemi of Uppsala University in Sweden, who is unaffiliated with the research. “If an observation is made where one sees stable knots in light, that would also tell us a lot about the mysteries of fundamental forces that we still do not understand.


The story begins with a mathematical discovery in 1931. Heinz Hopf found a way of filling up all of space with circles. (More precisely, he made a map from the analogue of a sphere in four dimensions to the circle.) He started with a donut shape, which mathematicians call a torus. He imagined taking a piece of string and wrapping it smoothly around the torus so that the string passes through the “donut hole” once and around the outside once as well. Enough pieces of string placed alongside this first one could cover the entire surface of the torus.


Now he just had to fill all of space with tori. He packed them like Russian dolls, extending forever both inward and outward from the starting torus. The smallest torus would be so skinny that it would simply be a circle. The biggest torus would be so fat that the “donut hole” on the torus wouldn’t be a hole at all — it would form a line extending up so far that its two ends would meet only “at infinity.” By filling space with tori and covering tori with circles, Hopf put every point in space on some circle.





Another VIew
A different view of the Hopf fibration.



Mathematicians were excited about Hopf’s discovery (called the “Hopf fibration”) because it showed that high-dimensional spheres were more complex than imagined. But it wasn’t until 20 years ago that physicists realized the Hopf fibration had implications for electromagnetism: Antonio Fernández-Rañada of Complutense University in Madrid used the Hopf fibration to create a new solution to Maxwell’s equations, and thus an example of how electromagnetism can work. He was in search of a way to build a quantum theory for light without using quantum mechanics. He used the Hopf fibration, but did not consider whether, in an experiment, light could actually be forced to follow the circular paths.


William Irvine of New York University and Dirk Bouwmeester of the University of California, Santa Barbara stumbled across Rañada’s work around 10 years ago and realized that it might describe a form light could actually take. “The main thing we did is that we took this solution seriously,” Irvine says. The pair figured out how to turn Rañada’s solution into something that might conceivably be produced in the laboratory.


Irvine and Bouwmeester show theoretically that the shape the light rays formed would distort over time, with the individual torus shapes becoming twisted and misshapen. The individual loops the light would follow would also grow larger over time.


In special situations, however, the loops might be stable, such as if light travels through plasma instead of through free space. One of the problems that has plagued experimental nuclear fusion reactors is that the plasma at the heart of them moves faster and faster and tends to escape. That motion can be controlled with magnetic fields, but current methods to generate those fields still don’t do the job. If Irvine and Bouwmeester’s discovery could be used to generate fields that would send the plasma in closed, non-expanding loops and help contain it, “that would be extremely spectacular,” Bouwmeester says.


Rañada, whose work Bouwmeester and Irvine expanded upon, is excited about their discovery. “They’ve done outstanding work,” he says, “which most probably will have some surprising consequences.