And The Latest In Mind Manipulation Is…Ultrasonic


Source: GizaDeathStar.com
Dr. Joseph P. Farrell
April 19, 2019

Mind control technologies and techniques are all around us, and I suspect we saw the “application” of one such technique last Monday with the sad event in Paris. But imagine, being able to stage an event, and then be able to manipulate how one interprets and “feels” about it. Of course, that ability, too, has been part of the arsenal for some time, and it’s called “television.” Recall that on 9/11, before the twin towers in New York City even came down, that “interviews” were being conducted on the streets, and the talking heads in front of the green screens were all putting out the idea of the dangers of a “collapse” due to the “burning airplane fuel.”

But then imagine, in addition to this capability, the ability to use a television set not as a receiver receiving the “appropriate” interpretations, but also broadcasting base to beam signals directly into the mind of its viewer. I speculated on this idea in my book Microcosm and Medium because there is some basis in the patent literature to assume such a thing could be done, and it could be done relatively easily, using the television, the electrical power grid itself, and perhaps even those pesky 5G towers we keep hearing about, to broadcast a beat frequency, and the “message” is modulated into that beat frequency, thus allowing a convenient “cloak” to the activity as well, since the modulated information would not be discoverable in any one broadcast frequency.  And of course, the whole idea  of doing this requires one significant thing in the technology tree, an “electro-encephalogrpahic dictionary” of the brain wave patterns associated with specific words, emotions, and so on. That, as I also pointed out in Microcosm and Medium, they already have, the initial work on a 2000 “word” brainwave “dictionary” having been done in the 1970s.

Now, if that whole idea of modulated information on beat frequencies seems rather “iffy” and that I’ve gone off the end of my high octane speculation twig once again, consider this article discovered by K.M.:

Scientists change monkey minds using low-intensity ultrasound

Just consider the implications of the opening paragraphs of this article in conjunction with my “beat frequency” idea:

An incredible new study suggests that low-intensity ultrasound can be used to target very specific brain regions and alter an animal’s decision-making processes. The technique, demonstrated in macaques monkeys, prompts actual behavioral changes using non-invasive ultrasound waves.

It is only recently that researchers have begun exploring the effects of low-intensity ultrasound on the brain. Although it is commonly known for its imaging potential, ultrasonic waves can also be highly targeted to modulate brain activity. One exciting human trial is currently underway investigating targeted ultrasound as a potential treatment for Alzheimer’s and dementia, while a fascinating case study published in 2016 demonstrated the technology stimulating the neurons of a young coma patient, essentially “jump-starting” their brain.

And of course, this is all sold as being of wonderful health benefit. Indeed, I can imagine scenarios where having an “electro-encephalographic dictionary” sitting on the shelf would be appropriate from someone who for whatever reason cannot speak.

But if the implications of all of this do not give you pause, perhaps this will:

The research focused on a cognitive process called counterfactual thinking. This is a part of our decision making processes where we evaluate scenarios that are alternative to our current experience. The researchers give the example of imagining the alternative experience of spending time outside in the sun while working inside the confines of an office.

This specific cognitive process is vital in helping us assess all our available options and choosing the most positive future action. Some scientists hypothesize that psychiatric patients demonstrating repetitive dysfunctional behaviors suffer from irregular counterfactual cognitive processes. The new research set out to home in on where exactly in the brain this cognitive process occurs, and whether targeted low-intensity ultrasound can modulate the process. (All emphases added)

Let that sink in: the current ultrasonic neurostimulation research is focused on the region of the brain where counter-factual thinking and core decision-making processes occur.

Need a convenient false flag event to stage another bigger clamp down, and to justify the globaloney tyranny you’ve put into place in the UN buildings at Babylon-on-the-Hudson? Why, just turn on a few 5G towers and televisions in a particular region, even use the local power grid and modulate a little information into the power cables, do a little appropriate interferometry of all of the above and modulate “anger” and “rebellion” into the resulting beat frequency, ultrasonically neurostimulate the population in that region to revolt, then crush it unmercifully, and play and replay the videos on the ten o’clock news to reinforce the message.

And if you think for a moment that this has not been the objective from the beginning, then you need to go back and read the horrific vision of a psycho-stimulated society in Dr. Jose Delgaldo’s one – and thankfully only – book on the subject of mind control.

See you on the flip side…

Read More At: GizaDeathStar.com

___________________________________________________________

About Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

What the List of Most Banned Books Says About Our Society’s Fears

“A mind needs a book as a sword needs a whetstone if it is to keep its edge.”
– George R. R. Martin

“Real books disgust the totalitarian mind because they generate uncontrollable mental growth – and it cannot be monitored.”[Bold Emphasis Added]
– John Taylor Gatto, A Different Kind Of Teacher, p. 82.

Source: Time.com
Sarah Begley
September 25, 2016

Censors are increasingly focusing on books that represent diverse points of view

For as long as humans have printed books, censors have argued over their content and tried to limit some books’ distribution. But the reasons for challenging literature change over time, and as Banned Book Week begins on Sept. 25, it’s clear that public discomfort with particular ideas has evolved rapidly even in the last 20 years.

When the American Library Association started keeping a database of challenged books in the early ’90s, the reasons cited were fairly straightforward, according to James LaRue, director of the ALA Office for Intellectual Freedom. “‘Don’t like the language,’ or ‘There’s too much sex’—they’d tend to fall into those two categories,” he says. Some books are still challenged for those reasons—Fifty Shades of Grey is a common example. But there’s been a shift toward seeking to ban books “focused on issues of diversity—things that are by or about people of color, or LGBT, or disabilities, or religious and cultural minorities,” LaRue says. “It seems like that shift is very clear.”

The ALA’s list of the 10 most challenged books in 2015 bears this out: it includes I Am Jazz and Beyond Magenta, about young transgender people; Fun Home and Two Boys Kissing, which deal with homosexuality; Habibi and Nasreen’s Secret School, which feature Muslim characters; and The Curious Incident of the Dog in the Night-Time, by Mark Haddon, which was cited for “atheism.” In contrast, the top 10 most-challenged books of 2001 were more straightforwardly banned for strong language, sexual content and drugs, like The Chocolate War and Go Ask Alice.

The shift seems to be linked to demographic changes in the country—and the political fear-mongering that can accompany those changes, LaRue says. “There’s a sense that a previous majority of white Anglo-Saxon Protestants are kind of moving into a minority, and there’s this lashing out to say, ‘Can we just please make things the way that they used to be?’” LaRue says. “We don’t get many challenges by diverse people,” he adds. In recent years, book challenges have peaked while religious liberty bills were in the news, he says.

Here’s a look at how things have changed in the past 15 years:

Most-challenged books of 2001:

  1. Harry Potter, by J.K. Rowling
    Reasons: anti-family, occult/Satanism, religious viewpoint, violence
  2. Of Mice and Men, by John Steinbeck
    Reasons: offensive language, racism, unsuited to age group, violence
  3. The Chocolate War, by Robert Cormier
    Reasons: offensive language, sexually explicit, unsuited to age group, violence
  4. I Know Why the Caged Bird Sings, by Maya Angelou
    Reasons: offensive language, sexually explicit
  5. Summer of My German Soldier, by Bette Greene
    Reasons: offensive language, racism, sexually explicit
  6. The Catcher in the Rye, by J.D. Salinger
    Reasons: offensive language, unsuited to age group
  7. Alice (series), by Phyllis Reynolds Naylor
    Reasons: sexually explicit, unsuited to age group
  8. Go Ask Alice, by Anonymous
    Reasons: drugs, offensive language, sexually explicit
  9. Fallen Angels, by Walter Dean Myers
    Reason: offensive language
  10. Blood and Chocolate, by Annette Curtis Klause
    Reasons: sexually explicit, unsuited to age group

Most-challenged books of 2015:

  1. Looking for Alaska, by John Green
    Reasons: Offensive language, sexually explicit, and unsuited for age group.
  2. Fifty Shades of Grey, by E. L. James
    Reasons: Sexually explicit, unsuited to age group, and other (“poorly written,” “concerns that a group of teenagers will want to try it”).
  3. I Am Jazz, by Jessica Herthel and Jazz Jennings
    Reasons: Inaccurate, homosexuality, sex education, religious viewpoint, and unsuited for age group.
  4. Beyond Magenta: Transgender Teens Speak Out, by Susan Kuklin
    Reasons: Anti-family, offensive language, homosexuality, sex education, political viewpoint, religious viewpoint, unsuited for age group, and other (“wants to remove from collection to ward off complaints”).
  5. The Curious Incident of the Dog in the Night-Time, by Mark Haddon
    Reasons: Offensive language, religious viewpoint, unsuited for age group, and other (“profanity and atheism”).
  6. The Holy Bible
    Reasons: Religious viewpoint.
  7. Fun Home, by Alison Bechdel
    Reasons: Violence and other (“graphic images”).
  8. Habibi, by Craig Thompson
    Reasons: Nudity, sexually explicit, and unsuited for age group.
  9. Nasreen’s Secret School: A True Story from Afghanistan, by Jeanette Winter
    Reasons: Religious viewpoint, unsuited to age group, and violence.
  10. Two Boys Kissing, by David Levithan
    Reasons: Homosexuality and other (“condones public displays of affection”).

But the recent backlash challenges have not been limited to conservatives: the Bible is on the top 10 list for 2015, in part because of concerns about why a book that argues for the murder of homosexuals (as in Leviticus) would be in a public library. Opposition like this comes from “people that are just questioning in a larger sense what is the appropriate role of religion in our society,” LaRue says.

Over time, some books lose their opponents—the Harry Potter series, for instance, were the most-challenged books from 2000 to 2009, but have since fallen off the top 10 list. “There was a period there where Harry Potter was [considered] a Satanist and a cult, and people were doing book cuttings and book burnings,” LaRue says. “And now if you read people that are kind of on the right side of the religious spectrum, their kids love the Harry Potter books, so sometimes the things that we’re convinced are signs that the end is nigh are completely normalized in five years.”

The ALA usually learns that a book has been challenged either from librarians at schools or public or academic libraries calling in incidents, or from reports in local newspapers. In recent years there’s actually been a decline in reports—the ALA recorded 311 challenges in 2014 and only 275 in 2015. On the surface, that may seem like a good thing—but it probably indicates that fewer people are speaking up when a book is removed, meaning more banning is going on under the radar, LaRue says. “We have reason to believe that where censorship starts to succeed, there’s less reporting about it,” LaRue says. “So we can say it’s hard for us to know, we know that challenges are underreported, but we don’t know by how much.” It doesn’t help that school librarians are frequently the victims of school layoffs, meaning there are fewer professionals “trained to use this language of intellectual freedom.”

Still, one thing hasn’t changed since the dawn of censorship: having your book banned is very, very good for an author’s sales. “If what you’re trying to do is stop this book from getting into the hands of a minor,” LaRue says, “the surest way to [fail] is to declare it forbidden.”

Read More At: Time.com

 

Breakaway Guide To Censorship, Disinformation, Logical Fallacies & More – #Propaganda | #SocialEngineering | #Censorship | #Logic | #FakeNews

Logic
BreakawayIndividual.com
Zy Marquiez
April 10, 2019

As a preamble, the following information has been collated from a variety of sources.  A huge unending thanks of appreciation to all of those individuals who have contributed to the crucial information provided below and who have sought to make it available to everyone.

What follows is the lengthiest post that has been shared on this website.  That said, I implore every single one of you to take the time to learn this information and make it part of your repertoire given its significance.

Now, in order to learn how to navigate through the nefarious web of deception created these days within all types of media, there will be five distinct articles cited at length that outline information that’s quite vital for incisive individuals to know so they can become self-sufficient in their ability to discern the truth from veritable smoke screens.  It is suggested these are studied regularly until they are learned given how important and efficient they are.

Logical Fallacies will be the first tool addressed.  This is because logic is arguably one of the most important – if not the most important – tool an individual will have at their disposal in order to maneuver through their everyday life more efficiently, especially when dealing with the daily nonsense that the establishment and mainstream media espouses.  For those seeking additional information on Logic, please read 13 Great Reasons To Study Logic, and Socratic Logic V3.1 by Peter Kreeft Ph.D.

We will commence by citing a piece that was shared earlier this year.

In Logical Fallacies Employed In Every Day Life, we shared:

What is a logical fallacy?

A logical fallacy is a flaw in reasoning. Strong arguments are void of logical fallacies, whilst arguments that are weak tend to use logical fallacies to appear stronger than they are. They’re like tricks or illusions of thought, and they’re often very sneakily used by politicians, media, and others to fool people. Below follow some of the more common fallacies.

Strawman
Misrepresenting Someone’s Argument To Make It Easier To Attack
By exaggerating, misrepresenting, or just completely fabricating someone’s argument, it’s much easier to prevent your own position as being reasonable, but this is kind of dishonest and serves to undermine honest rational debate.
Example: After will said we should put more money into health and education, Warren responded by saying he was surprised that Will hates our country so much that he wants to leave it defenseless by cutting military spending.

Slippery Slope
Asserting That If We Allow A to happen, then Z will consequently happen too, therefore A should not happen.
The problem with this reasoning is that it avoids engaging with the issue at hand, and instead shifts attention to extreme hypotheticals. Because no proof is presented to show that such extreme hypotheticals will in fact occur, this fallacy has the form of an appeal to emotion fallacy by leveraging fear. In effect the argument at hand is unfairly tainted by unsubstantiated conjecture.
Example: Colin Closet asserts that if we allow same-sex couples to marry, then the next thing we know we’ll be allowing people to marry their parents, their cars and even monkeys.

False Cause
Presuming that a real or perceived relationship between things means that one is the cause of the other.
Example
: Pointing to a fancy chart, a Senator shows how temperatures have been rising over the past few centuries, whilst at the same time the numbers of terrorist attacks have been increasing; thus global warming causes terrorism. [Don’t believe me? Look it up – an actual senator that said this.]

Ad Hominem
Attacking your opponent’s character or personal traits in an attempt to undermine their argument.
Example: After Sally presents an eloquent and compelling case for a more equitable taxation system, Sam asks the audience whether we should believe anything from a woman who isn’t married, was once arrested, and smells a bit weird.

Special Pleading
Moving the goalposts to create exceptions when a claim is shown to be false.
Example: Edward Johns claimed to be psychic, but when his ‘abilities’ were tested under proper scientific conditions, they magically disappeared. Edward explained this saying that one had to have faith in his abilities for them to work.

Loaded Question
Asking a question that has an assumption built into it so that it can’t be answered without appearing guilty.
Example: Grace and Helen were both romantically interested in Brad. One day, with Brad sitting within earshot, Grace asked in an inquisitive tone whether Helen was having any problems with a fungal infection.

The Gambler’s Fallacy
Believing that ‘runs’ occur to statistically independent phenomena such as roulette wheel spins.
Example: Red had come up six times in a row on the roulette wheel, so Greg knew that it was close to certain that black would be next up. Suffering an economic form of natural selection with this thinking, he soon lost all of his savings.

Bandwagon
Appealing to popularity or the fact that many people do something as an attempted form of validation.
Example: Shamus pointed a drunken finger at Sean and asked him to explain how so many people could believe in leprechauns if they’re only a silly old superstition. Sean, however, had had a few too many Guinness himself and fell off his chair.

Black-Or-White
Where two alternative states are presented as the only possibilities, when in fact more possibilities exist.
Example: Whilst rallying support for his plan to fundamentally undermine citizens’ rights, the Supreme Leader told the people they were either on his side, or on the side of the enemy. [Note: George Bush did this by the way…]

Begging The Questions
A circular argument in which the conclusion is included in the premise.
Example: The word of Zorbo the Great is flawless and perfect. We know this because it says so in The Great and Infallible Book of Zorbo’s Best and Most Truest Things that are Definitely True and Should Not Ever Be Questioned.

Appeal To Authority
Using the opinion or position of an authority figure, or institution of authority, in place of an actual argument.
Example: When an individual states that vaccines are safe just because doctors say so, even though countless studies can be cited to eviscerate the ‘safety’ argument.

Appeal To Nature
Making the argument that because something is ‘natural’ it is therefore valid, justified, inevitable, good, or ideal.
Example: The medicine man rolled into town on his bandwagon offering various natural remedies, such as very special plain water. He said that it was only natural that people should be wary of ‘artificial’ medicines such as antibiotics. The converse is also true, which could be in a way called Appeal To Technology/Science.

Composition / Division
Assuming that what’s true about one part of something has to be applied to all, or other, parts of it.
Example: Daniel was a precocious child and had a liking for logic. He reasoned that atoms are invisible, and that he was made of atoms and therefore invisible too. Unfortunately, despite his thinky skills, he lost the game of hide and go seek.

Anecdotal
Using personal experience or an isolated example instead of a valid argument.
Example: Jason said that that was all cool and everything, but his grandfather smoked, like, 30 cigarettes a day and lived until 97 – so don’t believe everything you read about meta analyses of sound studies showing proven causal relationships.

Appeal To Emotion
Manipulating an emotional response in place of a valid or compelling argument.
Example: Luke didn’t want to eat his sheep’s brains with chopped liver and brussels sprouts, but his father told him to think about the poor, starving children in a third world country who weren’t fortunate enough to have any food at all.

The Fallacy Fallacy
Presuming that because a claim has been poorly argued, or a fallacy has been made, that it is necessarily wrong.
Example: Recognizing that Amanda had committed a fallacy in arguing that we should eat healthy food because a nutritionist said it was popular, Alyse said we should therefore eat bacon double cheeseburgers every day.

Tu Quoque
Avoiding having to engage with criticism by turning it back on the accuser – answering criticism with criticism.
Example: The blue candidate accused the red candidate of committing the tu quoque fallacy. The red candidate responded by accusing the blue candidate of the same, after which ensued an hour of back and forth criticism with not much progress.

Personal Incredulity
Saying that because one finds something difficult to understand that it’s therefore not true.
Example: Kirk drew a picture of a fish and a human and with effusive disdain asked Richard if he really thought we were stupid enough to believe that a fish somehow turned into a human through just, like, random things happening over time.

Burden Of Proof
Saying that the burden of proof lies not with the person making the claim, but with someone else to disprove.
Examples: Bertrand declares that a teapot is, at this very moment, in orbit around the Sun between the Earth and Mars, and that because no one can prove him wrong his claim is therefore a valid one.

Ambiguity
Using double meanings or ambiguities of language to mislead or misrepresent the truth.
Example: When the judge asked the defendant why he hadn’t paid his parking fines, he said that he shouldn’t have to pay them because the sign said ‘Fine for parking here’ and so he naturally presumed that it would be fine to park there.

No True Scotsman
Making what could be called an appeal to purity as a way to dismiss relevant criticisms or flaws of an argument.
Example: Angus declares that Scotsmen do not put sugar on their porridge, to which Lachlan points out that he is a Scotsman and puts sugar on his porridge. Furious, like atrue Scot, Angus yells that no true Scotsman sugars his porridge.

Genetic
Judging something good or bad on the basis of where it comes from, or from whom it comes.
Example: Accused on the 6 o’clock news of corruption and taking bribes, the senator said that we should all be very wary of the things we hear in the media, because we all know how very unreliable the media can be.

The Texas Sharpshooter
Cherry-picking data clusters to suit an argument, or finding a pattern to fit a presumption.
Example: The makers of Sugarette Candy Drinks point to research showing that of the five countries where Sugarette drinks sell the most units, three of them are in the top ten healthiest countries on Earth, therefore Sugarette drinks are healthy.

Middle Ground
Saying that a compromise, or middle point, between two extremes is the truth.
Example: Holly said that vaccinations are safe, but her scientifically well-read friend Caleb said that this claim was untrue because there were dozens of studies proving otherwise. Their friend Alice offered a compromise that vaccinations are sometimes safe.

__________________________________________________________________________________

Next we will proceed by citing various ways truth if often suppressed.  Many of these techniques are seen nigh daily, which is why its important to remain cognizant of them.

In Thirteen Techniques For Truth Suppression, David Martin of [BrassCheck.com] writes:

Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.

  1. Dummy up. If it’s not reported, if it’s not news, it didn’t happen.
  2. Wax indignant. This is also known as the “how dare you?” gambit.
  3. Characterize the charges as “rumors” or, better yet, “wild rumors.” If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through “rumors.”
  4. Knock down straw men. Deal only with the weakest aspect of the weakest charges. Even better, create your own straw men. Make up wild rumors and give them lead play when you appear to debunk all the charges, real and fanciful alike.
  5. Call the skeptics names like “conspiracy theorist,” “nut,” “ranter,” “kook,” “crackpot,” and of course, “rumor monger.” You must then carefully avoid fair and open debate with any of the people you have thus maligned.
  6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money.
  7. Invoke authority. Here the controlled press and the sham opposition can be very useful.
  8. Dismiss the charges as “old news.”
  9. Come half-clean. This is also known as “confession and avoidance” or “taking the limited hang-out route.” This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal “mistakes.” This stratagem often requires the embrace of a fall-back position quite different from the one originally taken.
  10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.
  11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. For example: We have a completely free press. If they know of evidence that the Bureau of Alcohol, Tobacco, and Firearms (BATF) had prior knowledge of the Oklahoma City bombing they would have reported it. They haven’t reported it, so there was no prior knowledge by the BATF. Another variation on this theme involves the likelihood of a conspiracy leaker and a press that would report it.
  12. Require the skeptics to solve the crime completely.
  13. Change the subject. This technique includes creating and/or reporting a distraction.

______________________________________________________________________________

Tackling the fundamentals in Disinformation – How It Works, Brandon Smith [Alt-Market.com] writes:

There was a time, not too long ago (relatively speaking), that governments and the groups of elites that controlled them did not find it necessary to conscript themselves into wars of disinformation.

Propaganda was relatively straightforward. The lies were much simpler. The control of information flow was easily directed. Rules were enforced with the threat of property confiscation and execution for anyone who strayed from the rigid socio-political structure. Those who had theological, metaphysical or scientific information outside of the conventional and scripted collective world view were tortured and slaughtered. The elites kept the information to themselves, and removed its remnants from mainstream recognition, sometimes for centuries before it was rediscovered.

With the advent of anti-feudalism, and most importantly the success of the American Revolution, elitists were no longer able to dominate information with the edge of a blade or the barrel of a gun. The establishment of Republics, with their philosophy of open government and rule by the people, compelled Aristocratic minorities to plot more subtle ways of obstructing the truth and thus maintaining their hold over the world without exposing themselves to retribution from the masses. Thus, the complex art of disinformation was born.

The technique, the “magic” of the lie, was refined and perfected. The mechanics of the human mind and the human soul became an endless obsession for the establishment.

The goal was malicious, but socially radical; instead of expending the impossible energy needed to dictate the very form and existence of the truth, they would allow it to drift, obscured in a fog of contrived data. They would wrap the truth in a Gordian Knot of misdirection and fabrication so elaborate that they felt certain the majority of people would surrender, giving up long before they ever finished unraveling the deceit. The goal was not to destroy the truth, but to hide it in plain sight.

In modern times, and with carefully engineered methods, this goal has for the most part been accomplished. However, these methods also have inherent weaknesses. Lies are fragile. They require constant attentiveness to keep them alive. The exposure of a single truth can rip through an ocean of lies, evaporating it instantly.

In this article, we will examine the methods used to fertilize and promote the growth of disinformation, as well as how to identify the roots of disinformation and effectively cut them, starving out the entire system of fallacies once and for all.

Media Disinformation Methods

The mainstream media, once tasked with the job of investigating government corruption and keeping elitists in line, has now become nothing more than a public relations firm for corrupt officials and their Globalist handlers. The days of the legitimate “investigative reporter” are long gone (if they ever existed at all), and journalism itself has deteriorated into a rancid pool of so called “TV Editorialists” who treat their own baseless opinions as supported fact.

The elitist co-opting of news has been going on in one form or another since the invention of the printing press. However, the first methods of media disinformation truly came to fruition under the supervision of newspaper magnate William Randolph Hearst, who believed the truth was “subjective” and open to his personal interpretation.

Some of the main tactics used by the mainstream media to mislead the masses are as follows:

Lie Big, Retract Quietly: Mainstream media sources (especially newspapers) are notorious for reporting flagrantly dishonest and unsupported news stories on the front page, then quietly retracting those stories on the very back page when they are caught. In this case, the point is to railroad the lie into the collective consciousness. Once the lie is finally exposed, it is already too late, and a large portion of the population will not notice or care when the truth comes out.

Unconfirmed Or Controlled Sources As Fact: Cable news venues often cite information from “unnamed” sources, government sources that have an obvious bias or agenda, or “expert” sources without providing an alternative “expert” view. The information provided by these sources is usually backed by nothing more than blind faith.

Calculated Omission: Otherwise known as “cherry picking” data. One simple piece of information or root item of truth can derail an entire disinfo news story, so instead of trying to gloss over it, they simply pretend as if it doesn’t exist. When the fact is omitted, the lie can appear entirely rational. This tactic is also used extensively when disinformation agents and crooked journalists engage in open debate.

Distraction, And The Manufacture Of Relevance: Sometimes the truth wells up into the public awareness regardless of what the media does to bury it. When this occurs their only recourse is to attempt to change the public’s focus and thereby distract them from the truth they were so close to grasping. The media accomplishes this by “over-reporting” on a subject that has nothing to do with the more important issues at hand. Ironically, the media can take an unimportant story, and by reporting on it ad nauseum, cause many Americans to assume that because the media won’t shut-up about it, it must be important!

Dishonest Debate Tactics: Sometimes, men who actually are concerned with the average American’s pursuit of honesty and legitimate fact-driven information break through and appear on T.V. However, rarely are they allowed to share their views or insights without having to fight through a wall of carefully crafted deceit and propaganda. Because the media know they will lose credibility if they do not allow guests with opposing viewpoints every once in a while, they set up and choreograph specialized T.V. debates in highly restrictive environments which put the guest on the defensive, and make it difficult for them to clearly convey their ideas or facts.

TV pundits are often trained in what are commonly called “Alinsky Tactics.” Saul Alinsky was a moral relativist, and champion of the lie as a tool for the “greater good”; essentially, a modern day Machiavelli. His “Rules for Radicals” were supposedly meant for grassroots activists who opposed the establishment and emphasized the use of any means necessary to defeat one’s political opposition. But is it truly possible to defeat an establishment built on lies, by use of even more elaborate lies, and by sacrificing one’s ethics? In reality, his strategies are the perfect format for corrupt institutions and governments to dissuade dissent from the masses. Today, Alinsky’s rules are used more often by the establishment than by its opposition.
Alinsky’s Strategy: Win At Any Cost, Even If You Have To Lie

Alinsky’s tactics have been adopted by governments and disinformation specialists across the world, but they are most visible in TV debate. While Alinsky sermonized about the need for confrontation in society, his debate tactics are actually designed to circumvent real and honest confrontation of opposing ideas with slippery tricks and diversions. Alinsky’s tactics, and their modern usage, can be summarized as follows:

1) Power is not only what you have, but what the enemy thinks you have.

We see this tactic in many forms. For example, projecting your own movement as mainstream, and your opponent’s as fringe. Convincing your opponent that his fight is a futile one. Your opposition may act differently, or even hesitate to act at all, based on their perception of your power. How often have we heard this line: “The government has predator drones. There is nothing the people can do now…” This is a projection of exaggerated invincibility designed to elicit apathy from the masses.

2) Never go outside the experience of your people, and whenever possible, go outside of the experience of the enemy.

Don’t get drawn into a debate about a subject you do not know as well as or better than your opposition. If possible, draw them into such a situation instead. Go off on tangents. Look for ways to increase insecurity, anxiety and uncertainty in your opposition. This is commonly used against unwitting interviewees on cable news shows whose positions are set up to be skewered. The target is blind-sided by seemingly irrelevant arguments that they are then forced to address. In television and radio, this also serves to waste broadcast time to prevent the target from expressing his own position.

3) Make the enemy live up to their own book of rules.

The objective is to target the opponent’s credibility and reputation by accusations of hypocrisy. If the tactician can catch his opponent in even the smallest misstep, it creates an opening for further attacks, and distracts away from the broader moral question.

4) Ridicule is man’s most potent weapon.

“Ron Paul is a crackpot.” “Gold bugs are crazy.” “Constitutionalists are fringe extremists.” Baseless ridicule is almost impossible to counter because it is meant to be irrational. It infuriates the opposition, which then reacts to your advantage. It also works as a pressure point to force the enemy into concessions.

5) A good tactic is one that your people enjoy.

The popularization of the term “Teabaggers” is a classic example; it caught on by itself because people seem to think it’s clever, and enjoy saying it. Keeping your talking points simple and fun helps your side stay motivated, and helps your tactics spread autonomously, without instruction or encouragement.

6) A tactic that drags on too long becomes a drag.

See rule No. 5. Don’t become old news. If you keep your tactics fresh, it’s easier to keep your people active. Not all disinformation agents are paid. The “useful idiots” have to be motivated by other means. Mainstream disinformation often changes gear from one method to the next and then back again.

7) Keep the pressure on with different tactics and actions, and utilize all events of the period for your purpose.

Keep trying new things to keep the opposition off balance. As the opposition masters one approach, hit them from the flank with something new. Never give the target a chance to rest, regroup, recover or re-strategize. Take advantage of current events and twist their implications to support your position. Never let a good crisis go to waste.

8) The threat is usually more terrifying than the thing itself.

This goes hand in hand with Rule No. 1. Perception is reality. Allow your opposition to expend all of its energy in expectation of an insurmountable scenario. The dire possibilities can easily poison the mind and result in demoralization.

9) The major premise for tactics is the development of operations that will maintain a constant pressure upon the opposition.

The objective of this pressure is to force the opposition to react and make the mistakes that are necessary for the ultimate success of the campaign.

10) If you push a negative hard and deep enough, it will break through into its counterside.

As grassroots activism tools, Alinsky tactics have historically been used (for example, by labor movements or covert operations specialists) to force the opposition to react with violence against activists, which leads to popular sympathy for the activists’ cause. Today, false (or co-opted) grassroots movements and revolutions use this technique in debate as well as in planned street actions and rebellions (look at Syria for a recent example).

11) The price of a successful attack is a constructive alternative.

Never let the enemy score points because you’re caught without a solution to the problem. Today, this is often used offensively against legitimate activists, such as the opponents of the Federal Reserve. Complain that your opponent is merely “pointing out the problems.” Demand that they offer not just “a solution”, but THE solution. Obviously, no one person has “the” solution. When he fails to produce the miracle you requested, dismiss his entire argument and all the facts he has presented as pointless.

12) Pick the target, freeze it, personalize it and polarize it.

Cut off the support network and isolate the target from sympathy. The target’s supporters will expose themselves. Go after individual people, not organizations or institutions. People hurt faster than institutions.

The next time you view an MSM debate, watch the pundits carefully, you will likely see many if not all of the strategies above used on some unsuspecting individual attempting to tell the truth.
Internet Disinformation Methods

Internet trolls, also known as “paid posters” or “paid bloggers,” are increasingly and openly being employed by private corporations as well governments, often for marketing purposes and for “public relations” (Obama is notorious for this practice). Internet “trolling” is indeed a fast growing industry.

Trolls use a wide variety of strategies, some of which are unique to the internet, here are just a few:

  1. Make outrageous comments designed to distract or frustrate: An Alinsky tactic used to make people emotional, although less effective because of the impersonal nature of the Web.
  2. Pose as a supporter of the truth, then make comments that discredit the movement: We have seen this even on our own forums — trolls pose as supporters of the Liberty Movement, then post long, incoherent diatribes so as to appear either racist or insane. The key to this tactic is to make references to common Liberty Movement arguments while at the same time babbling nonsense, so as to make those otherwise valid arguments seem ludicrous by association. In extreme cases, these “Trojan Horse Trolls” have been known to make posts which incite violence — a technique obviously intended to solidify the false assertions of the think tank propagandists like the SPLC, which purports that Constitutionalists should be feared as potential domestic terrorists.
  3. Dominate Discussions: Trolls often interject themselves into productive Web discussions in order to throw them off course and frustrate the people involved.
  4. Prewritten Responses: Many trolls are supplied with a list or database with pre-planned talking points designed as generalized and deceptive responses to honest arguments. When they post, their words feel strangely plastic and well rehearsed.
  5. False Association: This works hand in hand with item No. 2, by invoking the stereotypes established by the “Trojan Horse Troll.” For example: calling those against the Federal Reserve “conspiracy theorists” or “lunatics”; deliberately associating anti-globalist movements with racists and homegrown terrorists, because of the inherent negative connotations; and using false associations to provoke biases and dissuade people from examining the evidence objectively.
  6. False Moderation: Pretending to be the “voice of reason” in an argument with obvious and defined sides in an attempt to move people away from what is clearly true into a “grey area” where the truth becomes “relative.”
  7. Straw Man Arguments: A very common technique. The troll will accuse his opposition of subscribing to a certain point of view, even if he does not, and then attacks that point of view. Or, the troll will put words in the mouth of his opposition, and then rebut those specific words.

Sometimes, these strategies are used by average people with serious personality issues. However, if you see someone using these tactics often, or using many of them at the same time, you may be dealing with a paid internet troll.

Stopping Disinformation

The best way to disarm disinformation agents is to know their methods inside and out. This gives us the ability to point out exactly what they are doing in detail the moment they try to do it. Immediately exposing a disinformation tactic as it is being used is highly destructive to the person utilizing it. It makes them look foolish, dishonest and weak for even making the attempt. Internet trolls most especially do not know how to handle their methods being deconstructed right in front of their eyes and usually fold and run from debate when it occurs.

The truth is precious. It is sad that there are so many in our society who have lost respect for it; people who have traded in their conscience and their soul for temporary financial comfort while sacrificing the stability and balance of the rest of the country in the process.

The human psyche breathes on the air of truth. Without it, humanity cannot survive. Without it, the species will collapse, starving from lack of intellectual and emotional sustenance.

Disinformation does not only threaten our insight into the workings of our world; it makes us vulnerable to fear, misunderstanding, and doubt: all things that lead to destruction. It can drive good people to commit terrible atrocities against others, or even against themselves. Without a concerted and organized effort to diffuse mass-produced lies, the future will look bleak indeed.

__________________________________________________________________________________

Knowing how disinformation works, now we will take a gander at 25 Rules Of Disinformation that were written by H. Michael Sweeney, although we found them personally at WashingtonsBlog.com:

Preface: This handy set of rules covers most of the games which disinformation artists play on the Internet (and offline). When you know the tricks, you’ll be able to spot the games. Even if you’ve read this list before, you might be surprised at how useful it is to brush up on these tricks.

1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

  1. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit.
  2. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method works especially well with a silent press, because the only way the public can learn of the facts are through such “arguable rumors”. If you can associate the material with the Internet, use this fact to certify it a “wild rumor” which can have no basis in fact.
  3. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.
  4. Sidetrack opponents with name calling and ridicule. This is also known as the primary attack the messenger ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as “kooks”, “right-wing”, “liberal”, “left-wing”, “terrorists”, “conspiracy buffs”, “radicals”, “militia”, “racists”, “religious fanatics”, “sexual deviates”, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.
  5. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.
  6. Question motives. Twist or amplify any fact which could so taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.
  7. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough “jargon” and “minutiae” to illustrate you are “one who knows”, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.
  8. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues with denial they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.
  9. Associate opponent charges with old news. A derivative of the straw man usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with. Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually them be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.
  10. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the “high road” and “confess” with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, “just isn’t so.” Others can reinforce this on your behalf, later. Done properly, this can garner sympathy and respect for “coming clean” and “owning up” to your mistakes without addressing more serious issues.
  11. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to loose interest more quickly without having to address the actual issues.
  12. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards with an apparent deductive logic in a way that forbears any actual material fact.
  13. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best for items qualifying for rule 10.
  14. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.
  15. Vanishing evidence and witnesses. If it does not exist, it is not fact, and you won’t have to address the issue.
  16. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can “argue” with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.
  17. Emotionalize, Antagonize, and Goad Opponents. If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how “sensitive they are to criticism”.
  18. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
  19. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.
  20. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed an unavailable to subsequent investigators. Once a favorable verdict (usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim) is achieved, the matter can be considered officially closed.
  21. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.
  22. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.
  23. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by proper intimidation with blackmail or other threats.
  24. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.

_______________________________________________________________________________

Now to anchor all of the above information, we will cite How To Spot – And Defeat – Disruption On The Internet which comes from WashingtonsBlog.com:

We’ve seen a number of tactics come and go over the years.  Here are the ones we see a lot of currently.

  1. Start a partisan divide-and-conquer fight or otherwise push emotional buttons to sow discord and ensure that cooperation is thwarted.   Get people fighting against each other instead of the corrupt powers-that-be.  Use baseless caricatures to rile everyone up.  For example,  start a religious war whenever possible using stereotypes like “all Jews are selfish”, “all Christians are crazy” or “all Muslims are terrorists”.  Accuse the author of being a gay, pro-abortion limp-wristed wimp  or being a fundamentalist pro-war hick when the discussion has nothing to do with abortion, sexuality, religion, war or region.  Appeal to people’s basest prejudices and biases. And – as Sweeney explains – push the author into a defensive posture:

Sidetrack opponents with name calling and ridicule … Associate opponents with unpopular titles such as “kooks”, “right-wing”, “liberal”, “left-wing”, “terrorists”, “conspiracy buffs”, “radicals”, “militia”, “racists”, “religious fanatics”, “sexual deviates”, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

  1. Pretend it’s hopeless because we’ll be squashed if we try.  For example, every time a whistleblower leaks information, say “he’s going to be bumped off”.   If people talk about protesting, organizing, boycotting, shareholder activism, spreading the real facts, moving our money or taking other constructive action, write things to scare and discourage people, say something like  “we don’t have any chance because they have drones and they’ll just kill us if we try”,  or “Americans are too stupid, lazy and greedy, so they’ll never help out.”  Encourage people to be apathetic instead of trying to change things.
  2. Demand complete, fool-proof and guaranteed solutions to the problems being discussed.   For example, if a reporter breaks the story that the big banks conspired to rig a market, ask “given that people are selfish and that no regulation can close all possible loopholes … how are you going to change human nature?”, and pretend that it’s not worth talking about the details of the market manipulation.  This discourages people from reporting on and publicizing the corruption, fraud and other real problems.  And it ensures that not enough people will spread the facts so that the majority know what’s really going on.
  3. Suggest extreme, over-the-top, counter-productive solutions which will hurt more than help, or which are wholly disproportionate to what is being discussed.   For example, if the discussion is whether or not to break up the big banks or to go back on the gold standard, say that everyone over 30  should be killed because they are sell-outs and irredeemable, or that all of the banks should be bombed. This discredits the attempt to spread the facts and to organize, and is simply the web method of the provocateur.
  4. Pretend that alternative media – such as blogs written by the top experts in their fields, without any middleman – are untrustworthy or are motivated solely by money (for example, use the derogatory term “blogspam” for any blog posting, pretending that there is no original or insightful reporting, but that the person is simply doing it for ad revenue).
  5. Coordinate with a couple of others to “shout down” reasonable comments.  This is especially effective when the posters launch an avalanche of comments in quick succession … the original, reasonable comment gets lost or attacked so much that it is largely lost.
  6. Use an army of sock puppets.  You can either hire low-wage workers in India or other developing countries to “astroturf” or – if you work for the government – you can use hire military personnel and subcontractors to monitor social media and “correct” information which you don’t like (and see this), or use software which allows you to quickly create and alternate between numerous false identities, each with their own internet address.
  7. Censor social media, so that the hardest-hitting information is buried. If you can’t censor it, set up “free speech zones” to push dissent into dank, dark corners where no one will see it.
  8. When the powers-that-be cut corners and take criminally reckless gambles with our lives and our livelihoods, protect them by pretending that the inevitable result – nuclear accidents, financial crisesterrorist attacks or other disasters – were “unforeseeable” and that “no could have known”.
  9. Protect the rich and powerful by labeling any allegations of criminal activity as being a “conspiracy theory”.  For example, when Goldman gets caught rigging markets, label the accusations as mere conspiracies.

The following 4 tactics from Sweeney are also still commonly used …

  1. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit.
  2. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.
  3. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.
  4. Question motives. Twist or amplify any fact which could so taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.
  5. Associate opponent charges with old news. A derivative of the straw man usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with. Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually them be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.

Postscript:  Over a number of years, we’ve found that the most effective way to fight disruption and disinformation is to link to a post such as this one which rounds up disruption techniques, and then to cite the disinfo technique you think is being used.

Specifically, we’ve found the following format to be highly effective in educating people in a non-confrontational manner about what the disrupting person is doing:

Good Number 1!

Or:

Thanks for that textbook example of Number 7!

(include the link so people can see what you’re referring to.)

The reason this is effective is that other readers will learn about the specific disruption tactic being used … in context, like seeing wildlife while holding a wildlife guide, so that one learns what it looks like “in the field”.   At the same time, you come across as humorous and light-hearted instead of heavy-handed or overly-intense.

__________________________________________________________________________________

The above amalgamation of tools, techniques, tips, and data points should not only be able to help individuals ascertain the modus operandi used against them regarding censorship, disinformation, deception et al. but also assist in what to do in response to them where applicable.

Be it a newcomer, or an old timer, this information will serve as an excellent foundation for those looking to learn the ways that the establishment casts its nefarious webs, or perhaps serve as a review to those that have been doing this for a long time.

Make sure to review it from time to time in order to make sure it’s not forgotten.

___________________________________________________________
Suggested Reading & Viewing:

The Catastrophic Decline Of Public Schooling: 21 Facts About Why Public Schooling Performs So Poorly
Piercing Perspectives #3: The Divide & Conquer Left Right Paradigm
Logical Fallacies Employed In Every Day Life
13 Great Reasons To Study Logic
How A Generation Lost Its Culture – by Professor Patrick Deneen
How Our Public Schooling Cripples Our Kids By John Taylor Gatto
The Seven Lesson School Teacher
A Different Kind Of Teacher by John Taylor Gatto
Socratic Logic by Peter Kreeft Ph.D.
Philosophy 101 by Peter Kreeft Ph.D.
Brave New World & Brave New World Revisited by Aldous Huxley
What Is Education?  The Elite Curriculum – John Taylor Gatto
How To Read A Book by Mortimer J. Adler and Charles Van Doren
Social Engineering 101
Weapons Of Mass Instruction by John Taylor Gatto
The True Purpose Of Modern Schooling
Getting Things Done by David Allen
Open-Source Method: Genius Education – Examples | John Taylor Gatto
The Trivium – The Liberal Arts Of Logic, Grammar & Rhetoric by Sister Miriam Joseph Ph.D.
Dumbing Us Down by John Taylor Gatto
A Rulebook For Arguments by Anthony Weston
A Workbook For Arguments by David R. Morrow & Anthony Wesson
7 Phenomenal Books For Homeschooling, Self-Directed Learners & Autodidacts
Drilling Through The Core – Why Common Core Is Bad For American Education by Sandra Stotsky & Contributors
Rotten To The Common Core by Dr. Joseph P. Farrell & Gary Lawrence
The Secret History Of Western Education – Charlotte Iserbyt [Documentary]
The Vanishing American Adult by Ben Sasse

___________________________________________________________
If you find value in this information, feel free to share it.  This article is free and open source.  All individuals have permission to republish this article under a Creative Commons license with attribution to Zy Marquiez and  BreakawayIndividual.com

___________________________________________________________
About The Author:

Zy Marquiez is an avid book reviewer, inquirer, an open-minded skeptic, yogi, and freelance writer who aims at empowering individuals while also studying and regularly mirroring subjects like Consciousness, Education, Creativity, The Individual, Ancient History & Ancient Civilizations, Forbidden Archaeology, Big Pharma, Alternative Health, Space, Geoengineering, Social Engineering, Propaganda, and much more.

Mainstream Media Manipulation & Propaganda

All over the place, from the populace culture to the propaganda system, there is a constant pressure to make people feel that they are helpless, that they only role they can have is to ratify decision and consume.”
– Noam Chomsky

Today’s news consists of aggregates of fragments. Anyone who has taken part in any event that has subsequently appeared in the news is aware of the gross disparity between the actual and the reported events. … We also learn frequently of prefabricated and prevaricated events of a complex nature purportedly undertaken for the purposes either of suppressing or rigging the news, which in turn perverts humanity’s tactical information resources. All history becomes suspect. Probably our most polluted resource is the tactical information to which humanity spontaneously reflexes.”
– Buckminster Fuller


BreakawayIndividual.com
Zy Marquiez
April 6, 2019

From the very moment the printing press came to be, the course of history was instantly altered.

Information, and more importantly ideas, now had the capability to change the breath of the land at much faster speeds. This did not go unnoticed by those in power.

Shaping conscious thought – reality – now was possible in ways previous generations could only dream of.

Soon thereafter, propaganda would become an even more effective tool when used in conjunction with the printing press, and its latest extension – mass media.

This is why now, in our time, the CIA had its tentacles embedded deeply within the mainstream media structure, and probably still does. But this is not a recent event. Since at least the 1950s or so, the CIA had people working on their payroll influencing the American public:

Why is that of importance? Because a press that is run by a separate entity such as the CIA, or a press that has to seek approval due to censorship before publishing stories is not a free press. Censorship is antithetical to the truth. This lack of truth by all mainstream networks should eviscerate any credibility they might have with the population.

This shouldn’t be surprising, when former CIA Director himself, William Colby, stated once:

The CIA owns everyone of any significance in the major media.”

What is taking place resonates an incisive quote by H.G. Wells.  Wells, who at once wrote for the New York Times, best encapsulates the ramifications of modern media:

“Modern means of communications – the power afforded by print, telephone, wireless and so forth, of rapidly putting through directive strategic or technical conceptions to a great number of cooperating centers, of getting quick replies and effective discussion – have opened up a new world of political processes. Ideas and phrases can now be given an effectiveness greater than the effectiveness of any personality and stronger than any sectional interest.”[1][Bold Emphasis Added]

Like the kings and rulers of time past, this piercing effectiveness that communications can bring has quickly put to use by rulers and globalists of our era.

“Like Hitler, who sought to bring individuals alienated by the Industrial Revolution and Depression into a hive-like German Volk, or united people, the globalists who control America’s mass media have attempted to bring citizens into one common worldview by the unremitting dissemination of homogenous news and information. Networks and cable channels routinely accept reports from “pool reporters, which results in many channels presenting the same version of the news.”[2]

The aforementioned statement by the late author and renowned researcher Jim Marrs gravitates to the core of the matter succinctly.

An evolution of social control has taken place via a variety of modalities, spearheaded mainly by modern communications such as the television, the Internet, and to a lesser extent books and magazine et al. This grid of endless propaganda has locked a large portion of humanity in lockstep with the plans of the comptrollers.

This is a prime example why people must educate themselves and spend the time needed to not only learn how to think critically, but also sift through information carefully – much of it designed to distract you – in order to figure out what is pertinent and what is outright garbage. Being able to do accomplish this will mean the difference between knowing the truth or living a lie.

One facet that has simplified this information lockdown has been the monopolization of Corporations that control the media. With only six media giants running the show and exercising unprecedented control, it does not take a genius to see that such a monopoly in information distribution clearly facilitates the shaping of our opinions, and ultimately, our world.

In a society in which people do not bother to question anything, scripted stories become the daily dish du jour.

Some people seem to be waking up, based on how many people are detaching from networks such as CNBC, who not long ago had its viewership decline to 8-year lows.

A lot work remains to be done however. The propaganda is relentless, and the mind control and techniques employed by mass media have been ongoing for quite some time.

Only by continuously educating ourselves will we be able to figure out the lies told by the mainstream media.  A prime example of this was when the Associated Press was caught lying about water fluoridation or when the media was caught lying again about supplements. Keep in mind these are only but a smidgen of the vast and elaborate falsehoods put forth by mainstream.

To finalize:

One of our best-kept secrets is the degree to which a handful of huge corporations control the flow of information in the United States. Whether it is television, radio, newspapers, magazines, books, or the Internet, a few giant conglomerates are determining what we see, hear, and read. And the situation is likely to become much worse as a result of radical deregulation efforts by the Bush administration and some horrendous court decisions,” warned Congressman Bernie Sanders, adding, “This is an issue that Congress can no longer ignore.”[3]

Such an ominous warning should be taken to heart, because our very livelihoods – and those of future generations – depend on it.

What steps will YOU take to educate yourself and others?
________________________________________________________________________________

Sources:

[1] Propaganda, by Edward Bernays.  Pg. 40
[2] The Rise Of The Fourth Reich, by Jim Marrs. Pg. 353
[3] Ibid. Pg. 365

________________________________________________________________________________
Other Suggested Reading & Viewing:

Astroturfing & Manipulation Of Media Messages – Sharyl Attkison [Ted Talks]
Propaganda by Edward Bernays
The Tavistock Institute – Social Engineering The Masses by Daniel Estulin
Social Engineering 101
Mass Control – Engineering Human Consciousness by Jim Keith
Public Opinion by Walter Lippmann

___________________________________________________________
If you find value in this information, feel free to share it.  This article is free and open source.  All individuals have permission to republish this article under a Creative Commons license with attribution to Zy Marquiez and  BreakawayIndividual.com

___________________________________________________________
About The Author:

Zy Marquiez is an avid book reviewer, inquirer, an open-minded skeptic, yogi, and freelance writer who aims at empowering individuals while also studying and regularly mirroring subjects like Consciousness, Education, Creativity, The Individual, Ancient History & Ancient Civilizations, Forbidden Archaeology, Big Pharma, Alternative Health, Space, Geoengineering, Social Engineering, Propaganda, and much more.

#Book Review: Saucers, Swatstikas And Psyops – A History Of A Breakaway Civilization: Hidden Aerospace Technologies & Psychological Operations by Dr. Joseph P. Farrell | #SmartReads

SSPsyops

BreakawayIndividual.com
Zy Marquiez
March 26, 2019

Saucers, Swatstikas And Psyops – A History Of A Breakaway Civilization: Hidden Aerospace Technologies And Psychological Operations
 by Dr. Joseph P. Farrell is a phenomenal introduction into his analysis of the Breakaway Civilization hypothesis.

The Breakaway Civilization is a hypothesis borne out of historian and researcher Richard Dolan’s work called UFOs & The National Security State series, where he coined the term.

In this introductory book to his breakaway civilization trilogy, Dr. Farrell seeks to shed light into the murky and malicious mechanism that has brought about arguably the first modern breakaway civilization: The Nazis.

As Dr. Farrell himself notes, nigh nobody has taken a gander at the field of studying Breakaway Civilizations, except for a handful of individuals.  Those individuals are Carroll Quigley and Richard Dolan.  Be that as it may, Dr. Farrell’s point in creating this book is not to overthrow the works of those two prior authors, but to supplement them with a fresh new set of eyes that attempts to look at the broader picture (as well as implications) and ascertain what other threads of data might lie unknown but still remain crucial to this topic.

Moreover, Dr. Farrell intriguingly touches upon how the Nazi UFO mythos came to light, which is actually quite an illuminating examination since it ties into other nefarious dealings, considering who publically manifested the meme. Another significant component pondered at length is psychological operations (psy-ops), since they feature prominently in understanding the totality of the breakaway phenomenon and how UFO’s serve as a perfect cover for it.

Essentially what Dr. Farrell seeks to do and argues a prima facie case for the very existence of a Breakaway Civilization, its structure, how it came about and how its remained in power for so long.

Hearkening back to psychological operations, Dr. Farrell takes an intriguing route not oft-considered, and instead of analyzing the George Adamnski case for its extraterrestrial implications, he analyzes it for its implications as a psy-op.  This is crucial, because it helps lay the foundation for much of what takes place within UFOlogy and how the consideration of anything other than the ET-hypothesis for our advanced technologies is looked at askance, even though evidence keeps mounting that both hypothesis are plausible, and should be considered equally.  In respect to Adamski, Farrell also breaks down not only inconsistencies within the account, but also other overlooked data sets that could imply more nefarious components therein.

Perception management and social engineering are also given a keen glance, which is vital since by the very nature of the technologies, those behind some of the UFOs could employ the technology to manipulate the views of the populace on a mass scale.  This, of course would mean that very notion of UFOs could be used to carry out psychological operations of all types on an unsuspecting public.  The analysis is quite intriguing because it gives a new fresh set of eyes to view much of what has happened in the UFOlogy community and with contactees.

Another intriguing point in the book is Dr. Farrell’s analysis of the provocative and enduring statements made by former chief of Lockheed’s Skunk Work’s’ division, Ben Rich.  The implications of this part alone are rather staggering.  A fair glance is also given to the suppression of Tesla’s work, Project Skyvault, Project Winterhaven, Torsion Physics, and more.

The book also features a table of contents that is extremely informative, while also containing a rather useful bibliography for researchers that wish to follow up the information further.

Dr. Farrell rounds out the book with a salient gander at the financial, geographic and historical components of the breakaway civilization.  These areas of research serve as the cornerstone upon which to cement all previous commentaries and analysis throughout the book as it gives extensive evidence for the capability of such a civilization to exist, as well as the implications thereof.   The disturbing connections of the Nazis and radical Islam, and how those take part in psychological operations is also given a look, since it bears much importance in our current paradigm and that of radical Islam.  More importantly, Dr. Farrell also touches upon the disturbing Nazi plan to come back after the war.  For more on this please read Dr. Farrell’s The Third Way – The Nazi International, European Union & Corporate Fascism, which is a phenomenal read in its entirety and serves to explain much of what is also currently taking place in the world.

To those that might think its ludicrous that the Nazi’s even contemplated ‘coming back’ from the war, the author cites another reliable source to show that this was in fact the case:

“Captured Nazi documents reveal they had a comeback plan.  Their plan to regain power after the war revolved around using their friends and fascist sympathizers in other countries – particularly in the United States – to do their bidding while rebuilding Germany.  These documents note that, as late as 1944, the Nazis were hoping for a Republican victory in the presidential election because they would get an easier peace.  The second part of their plan aimed at provoking a war between the U.S. and Soviet Union would allow the Nazis to retake power in Germany without U.S. intervention.”
[1]

Farrell also notes another separate sourced document that goes on to state that the Nazis had to continue carrying out their plans underground.[2]

In its mind-bending totality, Saucers, Swatstikas And Psyops is a book pregnant with implications that will undoubtedly become more and more apparent with time.  This exposition by Dr. Farrell outlining the foundation for the breakaway civilization, its psychological operations, and the historical details certainly sets the stage for further areas of research.

One great aspect of the book is that Saucers, Swatstikas And Psyops is chock-full of sources and footnotes, which allow the reader not only a chance to verify information and also follow up research, but also shows the seriousness of Dr. Farrell’s work.

For those seeking further information bout the Nazi’s Postwar plan, please read Dr. Farrell’s, please read The ThirdWay – The Nazi International, European Union & Corporate Fascism.  And for those seeking information about the Breakaway Civilizations please read the second and third book in Dr. Farrell’s trilogy:

Covert Wars & Breakaway Civilizations – The Secret Space Program, Celestial Psyops & Hidden Conflicts
Covert Wars & Clash Of Civilizations – UFOs, Oligarchs & Space Secrecy

___________________________________________________________
Footnotes:
[1] Dr. Joseph P. Farrell Ph.D., Glen Yeadon & John Hawkins, The Nazi Hydra In America: The Suppressed History Of A Century, p.23., cited in Saucers, Swastikas & Psyops, p. 109.]
[2] Dr. Joseph P. Farrell Ph.D., Saucers, Swastikas & Psyops, p. 113.

___________________________________________________________
If you find value in this information, please share it.  This article is free and open source.  All individuals have permission to republish this article under a Creative Commons license with attribution to Zy Marquiez and  BreakawayIndividual.com

___________________________________________________________
About The Author:

Zy Marquiez is an avid book reviewer, inquirer, an open-minded skeptic, yogi, and freelance writer who aims at empowering individuals while also studying and regularly mirroring subjects like Consciousness, Education, Creativity, The Individual, Ancient History & Ancient Civilizations, Forbidden Archaeology, Big Pharma, Alternative Health, Space, Geoengineering, Social Engineering, Propaganda, and much more.