Something different?

“The secret of change is to focus all of your energy, not on fighting the old, but on building the new.” — Socrates

Font Size




Menu Style

You are here You are here: Home Study Psychology & Mind “False Flags”: Legal Propaganda
  12 Ways to Recognize a BBG Production     by: Anonymous Patriots
“False Flags”: Legal Propaganda Produced by the Dept. of Defense

falseflags 230

Why would the government support false flag events?

This question would go through our minds every time
we would see a new false flag event plastered all over
the media. Like many of you, we would think,

“It has to be real, otherwise the government
  and participants would be engaging in treason.”

But the narrative and evidence never seem to match up.
   ■ How odd that at Sandy Hook and at San Bernardino
      there were so many responders from federal agencies
      and that other drills were already happening on the
      same day just a mile away.
   ■ Coincidence seemed unlikely for one event. Totally unlikely for two.

It even seemed that the “official story” that was “fed” to the news agencies was filled with holes on purpose.
   ■ When 450 responders showed up in San Bernardino, including FEMA, ATF, Homeland Security,
      FBI, DoD, and all local agencies, within 14 minutes and had their lawn chairs and coolers set up
      while most of them walked around aimlessly with no worries in the world, we couldn’t take
      it anymore.
   ■ We had always known that “false flags” usually precede severe military action and we couldn’t
      really imagine military action within US domestic borders since the military is not empowered
      to act against its own citizens.

Therefore, we decided to WAKE UP and study the false flag phenomena.
   ■ Don’t presume to think this is just another conspiracy theory article.
   ■ What you will read will chill you to the bone.

We know this is a long article, but while you were sleeping much has been done to destroy your country.
   ■ You need to see the immense work that is being done behind your back to destroy your
      beloved country.
   ■ And, most important, when you get to the end of the article, we have a

We beseech you, our fellow Americans, to read this article and pass it along to others.
   ■ Unplug your electronic tethers and read this very important article.
   ■ If not for you, then the children and loved ones in your life who will live like slaves in this
      hellish New World Order that is already here.
   ■ Our patriotic duty was to do the research; yours is to read and distribute to other patriots.

Legal to propagate and broadcast propaganda within America

What if these activities to manipulate public opinion
were legal? Could there be a law that protects the
president and US agencies (local, state, and federal)
from conducting false flag events?

Like many of you, we believe that
9-11 was a false flag event.

   ■ We don’t know exactly who, what,
     why and how, but we know that when
     overwhelming circumstantial evidence
     points in the opposite direction of the official story, something is wrong.

So when the Sandy Hook and San Bernardino events unfolded, we became very uneasy as these events seemed to be a new type of false flag.
   ■ In both events, the president was demanding that Americans give up their guns
      and constitutional rights even before the fake pools of blood on the steps of
      the Sandy Hook school dried.

Actually, the pools of blood on the sidewalk at Sandy Hook were the first indicator of fraud:
   ■ Two uncoagulated pools of liquid blood without a trail of blood, without any victims
      ever coming out of the building to “make” the pools.
   ■ And authorities ignoring them and not even treating them as part of a crime scene.

Every picture we saw or video we listened to was completely fake and looked more like a drill. Nothing added up.
   ■ In San Bernardino there were ten different “black SUV” pictures released that are completely
   ■ An alarm kept going off in our heads saying,

  • “Why are they purposely releasing contrary evidence as though they didn’t care that the evidence made them complicit with a crime, or even treason?”

We started studying the evidence. We were beyond the basic evidence — that crisis actors were used to stage both events and multiple government agencies showed up within minutes.
   ■ But one thing that totally took us by surprise is that San Bernardino was the site of
      the largest Jade Helm 2015 military maneuvers.
   ■ We asked ourselves, “Why would so many people, including so many U.S. government agencies,
      be involved in deceiving Americans?”
   ■ It took courage to look beyond the first veil of illusion.

If you have followed Sandy Hook and San Bernardino you realize that no one (except the patsies) are killed.
   ■ No one dies; therefore, no crime has been committed.

This knowledge gave us some comfort, but raised many questions concerning false flag events in America.
   ■ What is the goal of the recent (since 2012) false flag events?
   ■ Who gains from the appearance of insidious criminal events?
   ■ What mechanisms are used to silence so many participants, i.e. paid crisis actors, government
   ■ How do these agencies “get away with” using creating lies, distortions, and false flags?
      Wouldn’t that be called propaganda?

After pondering these questions relentlessly, we lifted another veil of illusion. We asked,

  • “What if these activities to manipulate public opinion were legal?
    Could there be a law that protects the president and US agencies (local,
    state, and federal) from conducting false flag events?”

So we changed our focus and began to research false flags as being legal propaganda.
   ■ We found the answers in plain sight.
   ■ We were beyond disbelief when we discovered that the US Congress has passed laws, post
      9-11, that makes state-sponsored propaganda legal.

   ■ Take a moment and think about that before reading on.

Our research lead us to discover the tenets of the National Defense Authorization Act of 2012 which makes it legal to propagate and broadcast propaganda within America.
   ■ We are all being treated like enemy combatants whose “perception” must be managed to come
      in line with presidential “national security” policies.
   ■ The Department of Defense may now broadcast propaganda with the approval and authority
      of the Broadcasting Board of Governors (BBG) both internationally and domestically.
   ■ Just Google it folks. There is actually an agency with this name.

Perception Management
State-sponsored propaganda

False flag incidents and state-sponsored propaganda
could not be considered treasonous acts against
Americans as Congress had made treason – legal.

Any presidential policy may be accompanied by broadcasts that use subliminal programming as part of perception management.
   ■ These mechanisms that squelch dissent have been used since the Reagan Administration
      to shape public opinion to support administrative policies.
   ■ Wars require domestic support and these “black ops” programs started to use the “psy-ops”
      tools of the military.
   ■ DARPA, the research and development arm of the military, has created many tools
      to control the enemy through media that shapes public perception, which we will elucidate
      later in this article.
   ■ It is called perception management and has been used legally in advertising since the late
      seventies and also in electronic warfare throughout the world to “brain-wash” our enemies
      and shape their perception and opinion of America.

The only question left was the issue of what the goal of the president (or the real powers behind him — the Council on Foreign Relations) might be, besides the obvious one of having few people who disagree with his policies.
   ■ We then studied the United Nations Small Arms Treaty which Obama signed in 2011,
      but couldn’t get Congress to ratify.
   ■ In this treaty we found the goal Obama is driving towards — disarm America, with the help
      of the United Nations.

But two things have to happen:
   1) We have to give up our guns or have them taken from us and
   2) The UN has to have a military presence in our country.
   ■ Keep in mind that the United Nations cannot have a military presence in our country,
      unless invited.

Have you already started connecting the dots?
   ■ Remember seeing all of the images of all that UN military equipment that was distributed
      throughout America during Jade Helm 2015?
   ■ It seemed that besides the San Bernardino exercises, moving UN heavy military equipment
      throughout America was the only thing that we noticed happening during Jade Helm 2015.
   ■ Another veil lifted. Obama’s job was to go for a gun grab, either by Congressional action or
      UN treaty.
   ■ But patriots started waking up and our elected officials in Congress could not ratify the
      United Nations Small Arms Treaty.
   ■ So Obama and his political minions began to manufacture false flags, hoping that our horror
      to Sandy Hook and San Bernardino would cause us to lay down our rights and guns.

Keep in mind, that false flag incidents and state-sponsored propaganda could not be considered treasonous acts against Americans as Congress (through the NDAA) had made treason – legal.

Congress Does Not Ratify Gun-Taking Treaty

Congress would not, and has not, ratified the UN Small Arms Treaty, nor would they vote on Second Amendment restrictions.
   ■ So false flags were used to create conscious and “unconscious” support of a national
      gun grab.
   ■ Sandy Hook was the most heinous “example” of what “guns do.”
   ■ Incredible anti-gun sentiment was created by Sandy Hook and people still reel from it with
      anger and hatred for “people on drugs” and “gun lovers.”
   ■ San Bernardino happened right before the congressional vote on gun control.
   ■ And even with images of San Bernardino a day before the congressional vote on gun control,
      Obama lost his attempt for gun restrictions.

Now do you see why he has taken things into his own hands and signed into effect 23 Executive Orders that move his gun control policies forward in contradistinction to the fact that Congress rejected such ideas?
   ■ The motive became quite clear once you read the UN Treaty – to dismantle the Second
      Amendment and disarm America.
   ■ Since Obama couldn’t use the United Nations or Congress to get his way, he just wrote
      his own laws and pretends like Executive Orders outrank congressional law.
   ■ Obama is behind the UN timeline of disarmament, since the other nations who signed
      the treaty have already begun to disarm its citizens.

Controlling the Human Domain

jade helm 15 logo 215
Jade Helm 2015 Logo

Once we understood the goal and the legalization of propaganda, with its insidious DARPA electronic war devices, the rest fell into place as one Internet search after the next revealed the truth before our eyes.
   ■ This is shocking and almost inconceivable.
   ■ But it is law (NDAA) and Congress did not stop this law
      from being passed.

Another question is why our elected officials did not
call out the president in using subliminal programming, psy-ops perception management and war-like marketing strategies to shape public opinion?

   ■ Simple. They use it themselves in their own campaigns.
   ■ Subliminal programming is openly used in the broadcasting industry
   ■ That’s why people believe untruths from the news and watch mindless TV while drinking their
      cola beverage (It’s the Real Thing) and imagining that the official story on main stream media
      is the only story.

As Jade Helm 2015 taught us, the military is interested in Controlling the Human Domain, the very motto of their operation emblazoned on their logo.
   ■ Fellow patriots, we are in a war which is coming from all sides towards the middle.
   ■ We cannot trust authorities and politicians to have our best interest at heart.
   ■ We need to wake up and observe more carefully and ask more questions even when a
      nagging voice in the back of our minds says, “It's the official story, I should not question it,”
      or “I should trust my elected officials to come forward and blow a whistle if such heinous
      propaganda was being perpetrated upon unsuspecting Americans.”

Better yet, perhaps we need to know how we are being controlled!
   ■ So before we lose you in our web of deception and lies, remember that Jade Helm is telling
      us that the goal is to control the human domain.

First we need to drill down on some of the basic terms and strategies before we bring the full picture into view. Stay with us and keep reading, fellow patriots.

The Deceptive Art of Perception Management

Obama is acting legally carrying out
“false flag” events inside the US borders.

Throughout human history, governments have been interested in “mastering the human domain.”
   ■ The mind control of their populations, what we once called propaganda, is now called
      perception management, political diplomacy and other such deceptive names.
   ■ This theme is echoed in the slogan for Jade Helm, “Mastering the human domain.”

The National Defense Authorization Act of 2012, which was just updated for 2016, provides that the Department of Defense, through the Broadcasting Board of Governors, controls all broadcasting both international and domestic. Therefore:
   ■ Obama is acting legally carrying out “false flag” events inside the US borders.
   ■ Obama is not a traitor for this activity; he is a lawyer who made it legal to be a traitor.
   ■ Obama is not only at war with Syria, Libya, Iraq, Somalia and Yemen; he is also at war with
      Americans who don’t support his policies.

Obama has made a commitment to disarm Americans called the United Nation’s Small Arms Treaty.
   ■ This treaty is consistent with his efforts to dismantle the Second Amendment.
It is this motivation that seems to have driven his non-stop agenda for disarming America

      and empowering the executive branch of the government, i.e., his own agenda of bombing
      sovereign nations and bringing America under the control of the United Nations and
      his administration.
This, coupled with his continued efforts to broaden his powers through the NDAA,

      Executive Orders, and Presidential Policy Directives creates a clear picture of manipulating
      public sentiment with the force of a military war on his American opponents.

United Nations Small Arms Treaty

In 2011 Obama signed the United Nations Small Arms Treaty and since then there have been 108 mass shootings in America in less than a 4 year period.
   ■ In the four years before Obama was elected (2003-2007) there was a total of 27 mass
   ■ Prior to 2003 there was an average of 2.5 mass shootings per year.
   ■ In 2015 alone, there have been over 58.
   ■ That is over 20 times higher than it was before. (MSA Data, 2015)

The Small Arms Guns Treaty has been passed by the UN and is ready to go into effect across the world.
   ■ The treaty passed in the general assembly in April 2013.
   ■ The treaty, which seeks to prevent and control the illicit trade of weapons while regulating
      the international trade of them
, includes measures such as:
         ■ Creating a national gun registry;
         ■ Mandating control of firearms and ammunition;
         ■ Regulating the manufacture of gun parts;
         ■ Limiting stores’ ability to sell firearms.
   ■ The NRA and a bipartisan majority of pro-gun Senators have succeeded in blocking this
      treaty’s ratification in the United States.
   ■ This treaty violates the Second Amendment.
   ■ For any UN treaty to have any effect on American laws, it must first be ratified by
      a two-thirds majority of the Senate.

National Defense Authorization Act
NDAA Provides for Legal Propaganda

Through the 2012 National Defense Authorization Act the US government has the legal regulation to use propaganda against foreign audiences and American citizens.
   ■ The intention is to sway public opinion by using television, radio, newspapers,
      and social media targeting American and foreign targets in controlled psy-ops
      or perception management.

The NDAA has an amendment added that negates the Smith-Mundt Act of 1948 (SMA) and the Foreign Relations Authorization Act of 1987.
   ■ These laws made propaganda used to influence foreigners and US citizens illegal.

The Broadcasting Board of Governors is not new as it was created from SMA; although today it is quite a different agency as you will read.
   ■ Originally, this agency claimed to “inform, engage, and connect people around
      the world in support of freedom and democracy.”

Amendment 114

Four billion dollars per year is spent
by the Pentagon on propaganda
aimed at the American public

Amendment 114 of the NDAA was approved by the House in May of 2012.

The Smith-Mundt Modernization Act (2012) reads:

Sec. 501. (a) The Secretary and the Broadcasting Board of Governors are authorized to use funds appropriated or otherwise made available for public diplomacy information programs to provide for the preparation, dissemination, and use of information intended for foreign audiences abroad about the United States, its people, and its policies, through press, publications, radio, motion pictures, the Internet, and other information media, including social media, and through information centers, instructors, and other direct or indirect means of communication.

(b)(1) Except as provided in paragraph (2), the Secretary and the Broadcasting Board of Governors may, upon request and reimbursement of the reasonable costs incurred in fulfilling such a request, make available, in the United States, motion pictures, films, video, audio, and other materials prepared for dissemination abroad or disseminated abroad.

According to Mac Thornberry:

  • “The new law would give sweeping powers to the State Department and Pentagon to push television, radio, newspaper, and social media onto the U.S. public.”

A Pentagon official who is concerned about the law says,

  • “It removes the protection for Americans, … It removes oversight from the people who want to put out this information.There are no checks and balances. No one knows if the information is accurate, partially accurate, or entirely false.”

Representatives Mac Thornberry (R-TX) and Adam Smith (D-WA) in the Smith-Mundt Modernization Act (2012) (H.R. 5736), advocate that it is time to liberate the authority of the US government to broadcast American produced foreign propaganda in the U.S.

The amendment empowers the State Department and Pentagon to utilize all forms of media against the American public for the sake of coercing US citizens to believe whatever version of the truth the US government wants them to believe.
   ■ All oversight is removed with Amendment 114.
   ■ Regardless of whether the information disseminated is truthful, partially truthful
      or completely false bears no weight.

Four billion dollars per year is spent by the Pentagon on propaganda aimed at the American public; as well as $202 million spent by the Department of Defense on misinformation operations in Iraq and Afghanistan in 2011.

The Pentagon is using fake handles on social media sites to purvey false information, harass users and enact perception management to influence Americans.
   ■ Sophisticated software allows military to engage in online conversations with
      coordinated answers, blog comments and instant messaging remarks that are
      solely meant to spread pro-American propaganda.

Information Operations

This new perception management is called Information Operations (IO), defined as:

  • “the integrated employment of
         ■ Electronic warfare (EW),
         ■ Computer network operations (CNO),
         ■ Psychological operations (PSYOP),
         ■ Military deception (MILDEC),
         ■ Operations security (OPSEC),
    In concert with specified supporting and related capabilities, to:
         ■ Influence,
         ■ Disrupt,
         ■ Corrupt or
         ■ Usurp
    Adversarial human and automated decision making while protecting our own.”

Repealing the Smith-Mundt Act allows the direct deployment of these tactics on the American public.

Information Operations activities are undertaken to shape the essential narrative of a conflict or situation and thus affect the attitudes and behaviors of the targeted audience and equates descriptions of combat operations with standard marketing strategies.
   ■ With the NDAA 2012 in its current form, the State Department and Pentagon can go beyond
      manipulating mainstream media outlets and directly disseminate campaigns of misinformation
      to the U.S. public.
   ■ Successful wars require domestic acceptance.

The NDAA 2012 – specifically Section 1021(b)(2) – has already institutionalized the U.S. military’s ability to indefinitely detain, without charge or trial, citizens and non-citizens alike.
   ■ Major parts of the legislation are based on the assumption that key legal protections for
      individuals are incompatible with the requirements of national security.

The purpose of the Smith-Mundt Modernization Act of 2012 is “to authorize the domestic dissemination of information and material about the United States intended primarily for foreign audiences.”
   ■ The act was added to the 2013 NDAA bill as section of 1078 to amend certain passages of
      Smith-Mundt Act of 1948 and Foreign Relations Authorization Act of 1987.
   ■ The Smith-Mundt Modernization Act of 2012 passed Congress as part of the NDAA 2013
      on December 28, 2012.

Amendments made to the Smith-Mundt Act of 1948 and Foreign Relations Authorization Act of 1987 allow for materials produced by the State Department and the Broadcasting Board of Governors (BBG) to be released within US borders.

National Defense Resources Preparedness Order

In 2012 Obama signed an order called National Defense Resources Preparedness giving himself explicit control over the nation and declaring a permanent state of Martial Law in the U.S.
   ■ The very same year, Obama signed the National Defense Authorization Act (NDAA) which
      gave the U.S. Government the right to detain anyone for anything indefinitely.
   ■ He has renewed that order every year since then.
   ■ The Obama administration was even able to get a court ruling overturned after the ruling
      had successfully removed the Indefinite Detention provision from the NDAA.

Virginia Wakes Up

A bill introduced in the Virginia assembly (HB2144) would take the next step in stopping illegal federal kidnapping under the 2012 NDAA.
   ■ Virginia stood alone and passed the first bill in the country addressing detention provisions
      written into the NDAA in 2012.
   ■ That law forbids state agencies, in some situations, from cooperating with any federal
      attempts to exercise the indefinite detention provisions written into sections 1021 and
      1022 of the National Defense Authorization Act.

What Did They Say about NDAA?

“NDAA, and SOPA would put us on a par with the most oppressive nations in the world.” – Sergey Brin, Google co-founder

“I never thought I would have to write this: but – incredibly – Congress has now passed the National Defense Appropriations Act, with Amendment 1031, which allows for the military detention of American citizens.” – Naomi Wolf, author

“…bold and dangerous attempt to establish martial law in America.”
Presidential candidate Rand Paul

“…was carefully crafted to mislead the public.”
– Justin Amash, U. S. Representative

“Provisions that were snuck into the bill with little notice from mainstream media could spell indefinite detention without a hearing, keep Guantanamo open, and hinder fair trials.”– Amnesty International

“Myth #3: U.S. citizens are exempted from this new bill: This is simply false, at least when expressed so definitively and without caveats. The bill is purposely muddled on this issue which is what is enabling the falsehood.” – Glenn Greenwald, constitutional lawyer

“What the American People are witnessing now with this new legislation is the further development of an American Police State into a Military Dictatorship, a process that was started by the so-called USA Patriot Act in 2001. … If it is enacted into law, America will lose all pretense of having our Military subjected to the control of democratically elected civilian leaders as originally envisioned and required by the Constitution.”
Professor Francis Boyle, constitutional law authority at the University of Illinois, Champaign.

NDAA Versions Continue to Erode Bill of Rights and Constitution

(NDAA) … applies the “Laws of War,” to U.S. soil,
making the United States legally a battlefield.

NDAA 2013

The 2013 version of the NDAA allows the State Department and Defense Department to direct the same kind of massive propaganda campaigns here in the U.S. that are presently waged as part of American war efforts in foreign lands.
   ■ The US government propaganda is directed at the American people with the belief that
      successful wars require domestic acceptance.

The 2013 NDAA overturned a 64-year ban on the domestic dissemination of propaganda which is described as public diplomacy information.
   ■ It preaches freedom of the press abroad while practicing censorship at home.
   ■ The resources and personnel who focus on talking about America overseas are diverted
      in favor of domestic perception management.
   ■ There are no checks and balances. No one knows if the information is accurate, partially
      accurate, or entirely false.

NDAA 2014

NDAA 2014 underwrote $662 billion for continued US aggression in our many foreign wars while, on the domestic front, it violates the Bill of Rights.
   ■ According to the American Civil Liberties Union, it authorizes presidents “to order the
      military to pick up and imprison people, including U.S. citizens, without charging them or
      putting them on trial.”

The ACLU charges the provisions of NDAA “were negotiated by a small group of members of Congress, in secret, and without proper congressional review (and), are inconsistent with fundamental American values embodied in the Constitution. …
(our) fundamental freedoms are on the line.”

We had already had many of the provisions of the Bill of Rights supplanted by the Patriot Act.
   ■ President Carter has denounced the Patriot Act for authorizing federal agents “to search
      people’s homes and businesses secretly, to confiscate property without any deadline or
      without giving notice that the intrusion had taken place, and to collect without notice
      personal information on American citizens including their medical histories, books
      checked out of libraries, and goods they purchase.”

NDAA 2016

The National Defense Authorization Act for 2016 is costing Americans $612 billion. Obama skirts around the Constitution by having the National Defense Authorization Act (NDAA), Sections 1021 and 1022, which authorizes indefinite military detention, without charge or without trial, any person, including an American citizen, and applies the “Laws of War,” to U.S. soil, making the United States legally a battlefield.

Obama claims he will develop “An Appropriate Legal Regime” to permanently detain people prior to having committed any crime.
   ■ The idea of these detentions would be to prevent any individual from committing a possible
      future crime.
   ■ Obama says that he might detain someone up to ten years before they might commit
      a crime.
   ■ The NDAA removes all of the rights guaranteed under the Bill of Rights except the
      Second Amendment, and you know how hard Obama is trying to get rid of that also.

Obama’s Executive Orders
End-runs around Congress

President Obama has been using executive orders (EO’s) in ways they have never been used before.
   ■ He is using them to do end-runs around Congress by legislating from the White House.

Some EO’s are dormant but pose a potential future threat.
   ■ One of those is EO 13603 which was signed EO 13603 on March 16, 2012.
   ■ The purpose is to delegate authority and address “National Defense” resource policies
      and programs under the Defense Production Act of 1950.
   ■ It provides the framework and authority for the allocation or appropriation of resources,
      materials and services to promote “National Defense.”
   ■ It is an update of a prior EO’s on the National Defense Resources Preparedness.
   ■ One difference which is concerning is that the definition “national emergency” is now
      broader and quite vague.

Executive Order 13603 – National Defense Resources Preparedness allows the government to completely control our lives through the “industrial and technological base,” should the president declare a “national emergency.”
It gives Obama the power over:

   ■ “All commodities and products capable of being ingested by human beings and animals;
   ■ All forms of energy;
   ■ All forms of civil transportation;
   ■ All usable water from all sources;
   ■ Health resources;
   ■ Forces labor such as military conscription; and
   ■ Federal officials can issue regulations to prioritize and allocate resources.”

Presidential Policy Directives

In the Barack Obama Administration, the directives that are used to promulgate Presidential decisions on National Security” matters are designated Presidential Policy Directives (PPDs).
   ■ Directives that are used to initiate policy review procedures are called Presidential
      Study Directives (PSDs).
   ■ In May 2013, the Administration issued a previously unknown category of directive known
      as a Presidential Policy Guidance (PPG).

Presidential Policy Directives have the same legal force as an Executive Order, forming a body of largely secret law.
   ■ Executive Orders are public and must be published in the Federal Register.
   ■ PPDs are not. It is a secret law.

President Obama’s directive on hostage policy was originally released as Presidential Policy Directive numbered PPD-29.
   ■ When the White House corrected that number to PPD-30, it meant Obama had issued
      a secret directive as PPD-29.
   ■ Of the 30 PPDs issued by Obama, 19 have not been released.
   ■ And for 11 of those, the White House has not disclosed even the subject of the order.
   ■ Not even Congress has a copy. It’s a domain of unchecked presidential authority.

Alarming Trends in the Military

Since Obama took office, an unprecedented number of top military leaders have been removed from their posts – nearly 200 generals, flag officers and other high-ranking officials.
   ■ They are being “removed” at a rate of about one per week.
   ■ In 2013, an ex-Navy Seal came forward and warned that Obama is firing soldiers
      who say they would not fire upon US Citizens if ordered.

Recently, the Department of Homeland Security was caught buying 1.6 billion rounds of ammunition, enough to have sustained our war in Iraq for twenty years.
   ■ Earlier this year, the DHS purchased another 62 million rounds of AR-15 hollow point ammo
      claiming it was allocated for “target practice.”

The military wants to transform Information Operations into a core military competency on a par with air, ground, maritime and special operations including the integrated employment of:
   ■ Electronic warfare (EW),
   ■ Computer network operations (CNO),
   ■ Psychological operations (PSYOP),
   ■ Military deception (MILDEC), and
   ■ Operations security (OPSEC),
In concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own.

IO intends to shape the essential narrative of a conflict or situation and thus affect the attitudes and behaviors of the targeted audience and equates combat operations with standard marketing strategies.

The Broadcasting Board of Governors
History of American Internal Propaganda and the BBG

Propaganda quickly became one
of the key weapons in the CIA’s
covert operations arsenal.

In January 1983, President Reagan took the first formal step to create an unprecedented peacetime propaganda bureaucracy by signing National Security Decision Directive 77, entitled
Management of Public Diplomacy Relative to National Security.”

   ■ Reagan deemed it “necessary to strengthen the organization, planning and coordination
      of the various aspects of public diplomacy of the United States Government.”
   ■ Reagan ordered the creation of a special planning group within the National Security Council
      to direct these “public diplomacy” campaigns.
   ■ This group was run through the Department of Defense.

The DoD’s Broadcasting Board of Governors traces its beginnings to the early Cold War years, as a covert propaganda project of the newly-created Central Intelligence Agency to wage “psychological warfare” against Communist regimes and others deemed a threat to US interests.
   ■ In 1948, National Security Council Directive 10/2 officially authorized the CIA to engage in
      “covert operations” against the Communist Menace.
   ■ Clause 5 of the directive defined “covert operations” as “propaganda, economic warfare;
      preventive direct action, including sabotage, anti-sabotage, demolition and evacuation
      measures; subversion against hostile states, including assistance to underground
      resistance movements, guerrillas and refugee liberation groups, and support of
      indigenous anti-communist elements in threatened countries of the free world.”
   ■ Propaganda quickly became one of the key weapons in the CIA’s covert operations arsenal.
   ■ The agency established and funded radio stations, newspapers, magazines, historical
      societies, research institutes, and cultural programs all over Europe.

A propaganda network that blankets the globe

The Broadcasting Board of Governors runs a
propaganda network that blankets the globe.

The BBG was officially formed in 1999 and
ran on a $721 million dollar annual budget.

   ■ It reports directly to the Secretary of
      State and operates a host of Cold War-era CIA spinoffs and “psychological warfare” projects:
      Radio Free Europe, Radio Free Asia, Radio Martí, Voice of America, Radio Liberation from
      Bolshevism and a dozen other government-funded radio stations and media outlets
      pumping out pro-American propaganda across the globe.

The BBG is managed by a military think-tank and is no longer funded by the CIA’s black budget.
   ■ Its role in “psychological warfare” continues but its operations are openly funded.
   ■ The BBG and its subsidiaries still engage in propaganda warfare, subversion and soft-power
      projection against anyone deemed hostile to US interests and “National Security.”
   ■ And it is still deeply intertwined with the same military and CIA-connected intelligence
   ■ The Broadcasting Board of Governors runs a propaganda network that blankets the globe.

The BBG is also involved in the technology of post-Cold War, Internet-era propaganda.
   ■ It has bankrolled satellite Internet access in Iran and continues to fund an SMS-based
      social network in Cuba called Piramideo.

As the BBG outlined in a 2013 fact sheet for its “Internet Anti-Censorship” unit: “The BBG collaborates with other Internet freedom projects and organizations, including RFA’s Open Technology Fund, the State Department, USAID, and DARPAs SAFER Warfighter Communications Program.
   ■ IAC is also reaching out to other groups interested in Internet freedom such as Google,
      Freedom House and the National Endowment for Democracy’s Center for International
      Media Assistance.”

The Open Technology Fund

Today, the Congressionally-funded federal agency is also one of the biggest backers of grassroots and open-source Internet privacy technology.
   ■ These investments started in 2012, when the BBG launched the “Open Technology Fund” (OTF).
   ■ The BBG endowed Radio Free Asia’s Open Technology Fund with a multimillion dollar budget
      and a single task: “to fulfill the US Congressional global mandate for Internet freedom.”

The Open Technology Fund supports many new encryption programs like: CryptoCat, Tor, Open Whisper Systems, LEAP, GlobaLeaks, ChatSecure, and Orbot.
   ■ In 2014, Congress increased the BBG’s “Internet freedom” budget to $25 million.
   ■ In 2014, OTF launched a coordinated project with Dropbox and Google to make free,
      easy-to-use privacy tools.
   ■ Facebook announced it was incorporating the underlying encryption technology of one of
      OTF’s flagship projects – OpenWhisper Systems – into its WhatsApp text messaging service.

It should seem suspicious that DoD’s money would be so warmly welcomed by some of the Internet’s fiercest anti-government activists.
   ■ Why is a federally-funded CIA spinoff with decades of experience in “psychological warfare”
      suddenly blowing tens of millions in government funds on privacy tools meant to protect
      people from being surveilled by another arm of the very same government?
   ■ It is called: “Perception Management.”

Mainstream information management systems
Perception Management Is Being Used Against You

Perception management is a term originated by the US Department of Defense. It defines it as:

“Actions to convey and/or deny selected information and indicators to foreign audiences to influence their emotions, motives, and objective reasoning as well as to intelligence systems and leaders at all to influence official estimates, ultimately resulting in foreign behaviors and official actions favorable to the originator’s objectives. In various ways, perception management combines truth projection, operations security, cover and deception, and psychological operations.

The factors that influence the targeted audience consist of the following:
   ■ Ambiguity: If ambiguity increases, the perceiver may find it harder to form
      an accurate perception.
   ■ Social status: a person’s real or perceived position in society or in an organization.
   ■ Impression management: an attempt to control the perceptions or impressions
      of others.

The phrase “perception management” has often functioned as a euphemism for “an aspect of information warfare.”
   ■ The distinction between “perception management” and public diplomacy, which “does not,
      as a rule, involve falsehood and deception, whereas these are important ingredients of
      perception management.
   ■ The purpose is to get the other side to believe what one wishes it to believe,
      whatever the truth may be.”

Although perception management operations are typically carried out within the international arena between governments, and between governments and citizens, use of perception management techniques have become part of mainstream information management systems.
   ■ Businesses may even contract with other businesses to conduct perception management
      for them, or they may conduct it in-house with their public relations staff.

Deception and sleight of hand

The term “perception management” is not new to the lexicon of government language.
   ■ For years the FBI has listed foreign perception management as one of eight “key issue
     threats” to “National Security”, including it with terrorism, attacks on critical
      US infrastructure, and weapons proliferation among others.
   ■ The FBI clearly recognizes perception management as a threat when it is directed at
      the US by foreign governments.
   ■ Deception and sleight of hand are important in gaining advantages in war, both to gain
      domestic support of the operations and for the military against the enemy

In late 2001, after 9/11, Defense Secretary Donald H. Rumsfeld created the Pentagon’s Office of Strategic Influence (OSI).
   ■ The Office of Special Plans was created with a goal of selective intelligence vetting outside
      the normal chartered intelligence apparatus.
   ■ Foreign propaganda activities moved to the Office of Information Activities under the
      direction of the Asst. Secretary of Defense for Special Operations and Low Intensity Conflict.
   ■ Strategic influence, special plans, psychological operations (psy-ops), and perception
      management are all direct synonyms within the DoD.

The DoD has identified the information domain as its new “asymmetric flank.”
   ■ The level of use of perception management is continuing to grow throughout the military.
   ■ There are now specialists, known as psychological operations officers and civil affairs
      officers, whose only purpose is to decide how to present information/propaganda
      to the media and to the people of the current country.

False Flag (Perception Management) Characteristics

Let’s compare what Wikipedia tells us are the “12 basic strategies of perception management” with what might be its counterpart in “characteristics of a false flag event.”

Ambiguity: if ambiguity increases, the perceiver finds it harder to form an accurate perception.
Counterpart: Eyewitnesses have conflicting accounts.

Social status: targeting a person’s position in society or in an organization.
Counterpart: The official narrative has obvious domestic and geopolitical advantages for the governing body.

Impression management: the perceptions or impressions of others.
Counterpart: The narrative behind the attack serves to leverage emotions like fear, as well as patriotism, in order to manufacture consent around a previously controversial issue.

Preparation – having clear goals and knowing the ideal position you want people to hold.
Counterpart: Military and law enforcement training drills occur on the same day very close by causing confusion to obscure eye-witness testimony and allow orchestrators to plant both patsies, disinformation and backup operatives. Immediate calls for gun control or restricting civil liberties.

Credibility – all information uses prejudices or expectations to increase credibility.
Counterpart: News agencies keep saying that they are “being given reports” or “being told” and do not cite who reported or told them the unconfirmed information they broadcast as real.

Multi-channel support – have multiple arguments and fabricated facts to reinforce your information.
Counterpart: No obvious motive for the mass attack and no prior indicators. Shooter leaves manifesto or lots of evidence “proving” they were “radicalized” or “on drugs” or other were other undesirables.

Centralized control – employ entities to promote propaganda.
Counterpart: Fake “victims” and crisis actors.

Security – the nature of the deception campaign is known by few.
Counterpart: All drill participants and crisis actors sign Non-disclosure Agreements with “National Security” clause promising swift and severe punishment if broken. Everyone involved is on a “need to know” basis and kept in the dark about the overall intent of the event.

Flexibility – the deception campaign adapts and changes over time as needs change.
Counterpart: Evidence gets destroyed or tampered with and the details don’t matter because the culprits are dead. No more interest in an investigation.

Coordination – organize in a hierarchy to maintain consistent distribution of information.
Counterpart: The federal agencies trump the local law enforcement agencies due to the “National Security” element of the drill which is ultimately controlled by the Department of Defense.

Concealment – contradicting information is destroyed.
Counterpart: Culprit is dead and evidence disappears from news reports, Internet, and media. Patsy has no military training, yet shoots extremely fast and accurately but no authority looks at the evidence.

Untruthful statements – fabricate the truth.
Counterpart: Families of “victims” have acting backgrounds and receive payoffs in GoFundMe accounts and direct payoffs, especially mortgages. They often show little to no emotion, and even smile or laugh. The lie perpetuates and the “official story” is shaped by the media into truth.

Narrative Networks
A biased strategy to frame information

In 2015, DARPA’s “Narrative Networks” (or N2) program is producing results.
   ■ The project is intended to analyze how “narratives” play into human psychology,
      delving into the way these constructs affect the mind.
   ■ A narrative is a way of phrasing something, a choice of words that is likely
      a biased strategy to frame information.

“Narratives exert a powerful influence on human thoughts, emotions and behavior and can be particularly important in security contexts. Conflict resolution and counterterrorism scenarios and detecting the neural response underlying empathy induced by stories is of critical importance.”
– from DARPA researchers in a paper published in the Journal of Neuroscience Methods.

Mastery of “narratives” could potentially be used to manipulate the perception of a population using platforms of communication like television to subtly and potently make a person think a certain way.

Governments often use stories to present information, so understanding how we comprehend them is important,” said co-author Eric Schumacher, an associate professor of psychology at the Georgia Institute of Technology.

Researchers observed a phenomenon of “tunnel vision,” or impaired reasoning, triggered in the brain when viewers processed a suspenseful moment.
   ■ When suspense grew, brain activity in the viewers’ peripheral vision decreased.

The US Military has a long history of funding psychological experiments, some entrenched in human rights violations.
   ■ Now we have the Pentagon-funded DARPA program which pays researchers at colleges
      and other scientists millions of dollars to enhance and bolster methods of war.
   ■ Such work places great technological power in the hands of the Department of Defense.

DARPA’s Narrative Networks as Mind-Control

DARPA launched the Narrative Networks program to understand how narratives influence human cognition and behavior, and apply those findings in international security contexts. Narratives may:
   ■ Consolidate memory
   ■ Shape emotions
   ■ Cue heuristics and biases in judgment
   ■ Influence group distinctions

The Narrative Networks Program has three parallel tracks of research and development:

  1. Develop quantitative analytic tools to study narratives and their effects on human behavior in security contexts.
  2. Analyze the neurobiological impact of narratives on hormones and neurotransmitters, reward processing, and emotion-cognition interaction
  3. Develop models and simulations of narrative influence in social and environmental contexts, develop sensors to determine their impact on individuals and groups, and suggest doctrinal modifications.

DARPA is studying Narrative Comprehension and Persuasion in a study entitled Toward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and Its Persuasive Effects.
   ■ The DARPA-funded research project ($6.1 million) is studying the effectiveness of different
      narratives in efforts of mass persuasion.
   ■ Using MRI and EEG they will map areas of the brain involved in narrative comprehension
      and even attempt to enhance or disrupt narrative understanding using this information
      as well as Transcranial Magnetic Stimulation.
   ■ It will study the neurobiology of narrative comprehension, validate narrative theories
      and explore the connection between narrative and persuasion.
   ■ This groundbreaking research study will employ multi-modal neuro-imaging, combining
      the temporal resolution of EEG with the spatial resolution of MRI.

Neural network of narrative comprehension

This project will provide empirical evidence integrating brain regions and cognitive processes into a neural network of narrative comprehension.
   ■ By virtue of the experimental design, these relationships will also directly inform
      the primary aspects of narrative and strategic communication under examination:
          ■ Narrative validity
          ■ Narrative transportation
          ■ Vertical integration.
   ■ The empirical correlation of narrative theory to neurocognitive activity is
      an important advance in the understanding of narrative and how the brain
      governs narrative comprehension.

The programs goals include:
   ■ Integrate narrative theory, neuroimaging, and persuasive outcomes.
   ■ Resolve conceptual problems in narrative and psychology of religion.
   ■ Produce significant innovations in the study of the neuropsychology of narrative.
   ■ Generate practical innovations.
   ■ Tests key narrative theories from communication, literary studies, and psychology.
   ■ Uses stimuli based on religious master narratives.
   ■ Understand the psychological effects of particular message features.
   ■ Attend to the relationship between narrative and political violence in contested

   ■ Disrupt or enhance aspects of narrative structure, and/or brain functioning,
      to minimize or maximize persuasive effects on subject proclivity to engage in
      political violence.

Mapping the Narrative Comprehension Network will provide empirical leverage for developing models of narrative comprehension that are biologically plausible.
   ■ Moreover, the current research will establish how narrative elicits persuasion in the brain.

Predicting the influence of a narrative's message on an audience

Introducing new stories into the narrative system to disrupt its coherence.

Rational logic aspires to be objective, repeatable, consistent and impersonal, whereas narrative logic works on completely different principles.
   ■ It is rooted in the simultaneously cognitive and emotional processing of information that
      marks human behavior, and finds its validity in principles of coherence and fidelity.
   ■ These qualities help explain the seemingly irrational persuasive power of narrative
      and provide guidance for how to manipulate narrative stimuli in order to accurately map
      the Narrative Comprehension Network in the brain.

Culture provides schema, or templates, for ordering narrative data (top-down); individuals process incoming story data and organize it with a selected schema.
   ■ The process continues until comprehension is achieved, or lack of comprehension mandates
      implementation of a new schema.

A master narrative can be seen as an exemplar narrative schema.
   ■ Because master narratives embody specific cultural values, they can be strategically
      deployed as an explanatory frame for current events in order to encourage a particular
      interpretation and for persuasive purposes.
   ■ Master narratives execute ideological functions, positioning these cultural values as
      naturalized and universal.

Vertical integration is achieved when personal, local and master narratives all line up consistently.
   ■ This congruence formulates a powerful model for identity formation and persuasion.

Cognitive processes that are indicated by vertical integration to be part of the Narrative Comprehension Network include:
   ■ Self-recognition
   ■ Identity, and theory of mind (to see oneself in a story)
   ■ Pattern recognition (to see parallels between master narratives and
      contemporary situations)
   ■ Memory (to remember the master narrative elements).

Subliminal Mind Control – SSSS

The “Sound of Silence” is a military-intelligence code-word for certain psychotronic weapons of mass mind-control  tested in the mid-1950s, perfected during the '70s, and used extensively by the US military in the early '90s.
   ■ This weapon is based on subliminal carrier technology, or the Silent Sound Spread Spectrum
   ■ It was developed for military use by Dr. Oliver Lowery of Norcross, Georgia, and described in
      US Patent #5,159,703 – “Silent Subliminal Presentation System” for commercial use in 1992.

The patent abstract reads:

“A silent communications system in which non-aural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum, are amplitude- or frequency-modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener.”

The Sound of Silence Spread Spectrum broadcasting equipment allows for the implantation of thoughts, emotions, and even prescribed physical actions into human beings.
   ■ In the private sector SSSS goes by the name Silent Subliminal Presentation System
   ■ The technology has also been released to certain corporate vendors who have attached
      brand names like BrainSpeak and Silent Subliminals to their own SSSS-based products.

It is a technology that uses subliminal programming that is carried over Ultra-High Frequency (UHF) broadcast waves, planting inaudible messages directly into the subconscious human mind.
   ■ Perfected more than twenty years ago by the DoD and battlefield-tested upon Iraqi soldiers
      in the Gulf War during 1991, SSSS is a proven weapon.

The US Government has plans to extend the range of this technology to envelop all peoples, all countries through BBG broadcasts.
   ■ SSSS is completely undetectable by those being targeted and it delivers its subliminal
      programming directly to the human brain via the auditory sense at frequencies that
      humans are incapable of perceiving as sound, there is no defense against it.
   ■ Coupled with the use of supercomputers, an individual’s unique electroencephalographic (EEG)
      patterns can be digitally altered and then stored for rebroadcast via digital UHF.
   ■ Computer-enhanced EEGs can identify and isolate the brain’s low-amplitude emotion
      signature clusters, synthesize them and they can then be broadcast over TV and radio
      signals directly into the brain where they can then silently trigger the same basic emotion
      in another human being.

DARPA and Social Media

The Social Media in Strategic Communication program (SMISC) has invested millions of dollars investigating social media, social networks, and how information spreads across them.
   ■ One study, funded by the Air Force Research Laboratory (AFRL), entitled “Containment
      Control for a Social Network with State-Dependent Connectivity” demonstrates that
      the mathematical principles used to control groups of autonomous robots can be applied
      to social networks in order to control human behavior.
   ■ If properly calibrated, the mathematical models developed by Dixon and his fellow
      researchers could be used to sway the opinion of social networks toward a desired set
      of behaviors.
   ■ It is called soft Info-warfare.

DARPA launched its SMISC program in 2011 to examine ways social networks could be used for propaganda and what broadly falls under the title of Military Information Support Operations (MISO), formerly known as Psychological Operations – psy-ops.
   ■ The SMISC program includes studies that analyze Twitter, investigate the spread of
      Internet memes; automatically identifying deceptive content in social media with linguistic
      cues; and modeling user attitude toward controversial topics in online social media.
   ■ It models how collaboration between “key influencers” in social networks could affect
      the behavior of groups within the network by using the principle of “containment control.”

British intelligence agency GCHQ has developed tools specifically aimed at leveraging social media for “effects” operations.
   ■ The organization has shared its methods with the NSA, and these capabilities have been
      used in Afghanistan and elsewhere to “shape” information available to members of targeted
      organizations online and via mobile phones.

The Department of Defense already uses some social media manipulation techniques as part of its “information support” operations, targeting message boards and websites associated with foreign groups that are considered “extremist.”
   ■ In April, the Associated Press uncovered an effort by the US Agency for International
      Development (USAID) in 2009 to create ZunZuneo, a Twitter-like mobile social network
      aimed at undermining the Communist regime in Cuba.
   ■ The research that DoD is financing has much broader cultural implications than as a tool
      of information warfare against adversaries abroad.

Psy-Ops and DARPA

DARPA’s new ultrasonic neural interface devices can frame information as narratives which shape, explain, and make sense of data.
   ■ Cognitive computers themselves can also do this – creating news articles from pooled data
      with no human being involved.
   ■ What used to be called propaganda is now called “strategic communications” that tell
      stories or create narrative networks.
   ■ DARPA is focused on creating counter-narratives, or stories they believe will counteract
      the effects of radicalization.

The Ultrasonic Neural Interface Program is used to affect changes in a person’s beliefs, their sense of identity, and even memory, partly because they stimulate the release of brain chemicals.
   ■ Neural interfaces and narrative networks can manipulate the brain using electrical and/or
      magnetic energy.

The most common is Transcranial Magnetic Stimulation (TMS).
   ■ When targeted at a specific area in the brain, TMS can create a variety of effects,
      including emotional changes and bodily movement.
   ■ Its goals were to:
          ■ Map out the precise areas of the brain that are affected by stories;
          ■ Analyze how people respond to specific stories; and
          ■ Test ways of changing their response to a story, i.e. by altering the story format,
             and/or zapping their brains with TMS.
   ■ This technique is more properly referred to as neuromodulation, and involves stimulating
      the release of neurotransmitters by targeting specific areas of the brain with
      electromagnetic pulses.

DARPA’s research has found that stories affect our emotions, our cultural and religious beliefs, and even memory.
   ■ In other words, the narratives we hear (on TV, in the news, blogs, tweets, etc) affect
      important brain chemicals, and therefore our very identities.
   ■ So do pulsed electromagnetic fields – such as TMS.

Controlling the conversation

DARPA is clearly aware of the vast range of possible applications for these devices, and have also been funding a new way of altering brain chemistry, called pulsed ultrasound.
   ■ Focused ultrasound can deliver, “complex spatio-temporal patterns of acoustic waves
      to achieve similar results to TMS, but has a spatial resolution which is five times greater,
      and can reach far deeper into the brain.
   ■ Ultrasound can be used to activate reward pathways (dopamine) in the brain which may
      be used to condition and/or reinforce certain desired attributes and/or to motivate
      specific behavioral actions.

DARPA has spent several years analyzing universal narrative structures, and the physiological effects they have on people, as well as tracking popular narratives (and the memes they produce) in social media.

The US Government’s Strategic Communications plan involves:
   ■ Sentiment analysis
   ■ The use of counter-narratives
   ■ ‘Downvoting’ stories which it does not approve of, preventing discussion of certain ‘banned’
      topics, as well as
   ■ Using “persona management software” to create false identities, and thus manipulate
      public perception of news and fool people into believing in a false “popular consensus.”

One part of the new Psy-op strategy is controlling the conversation.
   ■ By manipulating the news we hear, our primal responses can therefore be influenced,
      without us even knowing it.
   ■ Brain-to-computer interfaces (BCIs) are already being used to link people’s minds/feelings
      to a movie they’re watching.
   ■ MyndPlay have devised an EEG headset which monitors the viewer’s emotional reactions to
      the movie, and changes the ending accordingly.

New DARPA Projects to Enslave Our Minds

DARPA is one of the government-sponsored research agencies that most boldly explores the future of science and technology.
   ■ Given that many of its research projects have military applications, it has been traditional
      for the agency to be secretive about them.
   ■ In recent years, however, DARPA has been embracing the benefits of open source,
      particularly for promoting rapid innovation.
   ■ With an annual budget of $2.8 billion, DARPA drives a good portion of the advanced
      research that happens at universities and corporations in the US.

DARPA has given out open source software that has been sponsored by the agency.
   ■ The focus area for first year is the XDATA initiative that is developing open source
      infrastructure for supporting big data.
   ■ DARPA has an open source strategy for areas of work including big data to help increase
      the impact of government investments in building a flexible technology base.

One new DARPA program is to remotely disrupt political dissent and extremism by employing “Transcranial Magnetic Stimulation” (TMS) in tandem with sophisticated propaganda based on this technology.
   ■ The research at Arizona State University is entitled, “Toward Narrative Disruptors and
      Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects.”
   ■ TMS stimulates the temporal lobe of the brain with electromagnetic fields.
   ■ This research aims to induce or disrupt the operation of narratives within the brain.
   ■ This area of study has received $100 million in funding via Obama’s ten-year BRAIN Project,
      as well as a $1.3 billion commitment from Europe.

DARPA is the research and development tool of the National Security Council and thus has carte blanche to openly seek help from industry and the private sector to build the most cutting edge war devices that anyone can imagine.
   ■ Below we list some declassified projects but the ones that are most heinous are still

DARPA’s Open Catalog contains a curated list of DARPA-sponsored software and peer-reviewed publications.
   ■ DARPA sponsors fundamental and applied research in a variety of areas that may lead to
      experimental results and reusable technology designed to benefit multiple government
   ■ The DARPA Open Catalog organizes publicly releasable material from DARPA programs.
   ■ DARPA has an open strategy to help increase the impact of government investments.
   ■ DARPA is interested in building communities around government-funded research.
   ■ DARPA plans to continue to make available information generated by DARPA programs,
      including software, publications, data, and experimental results.

Recent DARPA projects

Some recently released DARPA projects are listed below and demonstrate that DARPA is focused on “Controlling the Human Domain” in every way possible.

The Active Authentication (AA) program seeks to develop novel ways of validating the identity of computer users by focusing on the unique aspects of individuals through software-based biometrics. Biometrics are defined as the characteristics used to recognize individuals based on one or more intrinsic physical or behavioral traits. This program is focused on behavioral biometrics.

~Translation: Foundation code that gives NSA a system to identify all users whether encrypted or not.

The Anomaly Detection at Multiple Scales (ADAMS) program seeks to create, adapt and apply technology to anomaly characterization and detection in massive data sets. Anomalies in data cue the collection of additional, actionable information in a wide variety of real world contexts.

~Translation: NSA spying on everything to find “red flags” that trigger further surveillance.

The Automated Program Analysis for Cybersecurity (APAC) program aims to address the challenge of timely and robust security validation of mobile apps by first defining security properties to be measured against and then developing automated tools to perform the measuring. APAC seeks to apply recent research breakthroughs in this field in an attempt to scale DoD’s program analysis capability to a level never before achieved with an automated solution.

~Translation: DoD system to analyze all streaming data from all systems, encrypted or otherwise.

The Memex Program was released to Open Source in September 2014. Memex seeks to develop software that advances online search capabilities far beyond the current state of the art. Creation of a new domain-specific indexing and search paradigm will provide mechanisms for improved content discovery, information extraction, information retrieval, user collaboration, and extension of current search capabilities to the deep web, the dark web, and non-traditional (e.g. multimedia) content.

~Translation: NSA will now control all search engines that use Memex as the base code.

The Mission-oriented Resilient Clouds (MRC) program is addressing some of the security challenges facing cloud computing by developing technologies to detect, diagnose and respond to attacks in the cloud, with the goal of effectively building a ‘community health system’ for the cloud. MRC is also developing technologies intended to enable missions that are supported by cloud computing and other networked systems to continue functioning while under cyberattack.

~Translation: NSA control of all cloud computing with back doors directly to US cyber-control systems.

DARPA’s Programming Computation on Encrypted Data (PROCEED) program is a research effort that seeks to develop methods that allow computing with encrypted data without first decrypting that data, making it possible to compute more securely in untrusted environments.

~Translation: NSA double-speak for controlling all encryption and having a method of seeing through encryption without being detected.

The SAFER Program seeks to develop technology to enable safe, resilient communications over the Internet, particularly in situations in which third parties attempt to discover the identity or location of the end users, or block communications. The program also seeks to provide the technological quality of service required to support applications such as electronic mail, instant messaging, voice over IP, and other media that promote effective communication.

~Translation: NSA double-speak for complete control of IP address identifiers for surveillance from all devices.

Social Media in Strategic Communication (SMISC) program is to develop a new science of social networks built on an emerging technology base. Through the program, DARPA seeks to develop tools to support the efforts of human operators to counter misinformation or deception campaigns with truthful information.

~Translation: NSA control of all social media.

XDATA Program is developing an open source software library for big data to help overcome the challenges of effectively scaling to modern data volume and characteristics. The program is developing the tools and techniques to process and analyze large sets of imperfect, incomplete data. Its programs and publications focus on the areas of analytics, visualization, and infrastructure to efficiently fuse, analyze, and disseminate these large volumes of data.

~Translation: NSA system to analyze and target media users and all data.

DARPA and the Brain Initiative

President Obama announced the BRAIN initiative in April 2013.
   ■ Today, the initiative is supported by several federal agencies as well as dozens
      of technology firms, academic institutions, scientists and other key contributors
      to the field of neuroscience.
   ■ DARPA is supporting the BRAIN initiative through a number of programs.

Electrical Prescriptions (ElectRx) – The ElectRx program aims to help the human body heal itself through neuromodulation of organ functions using ultra-miniaturized devices, approximately the size of individual nerve fibers, which could be delivered through minimally invasive injection.

~Translation: Military control of our neurological systems.

Hand Proprioception and Touch Interfaces (HAPTIX) – The HAPTIX program aims to create fully implantable, modular and reconfigurable neural-interface microsystems that communicate wirelessly with external modules, such as a prosthesis interface link, to deliver naturalistic sensations to amputees.

~Translation: Wireless brain-control over other electronic systems (robots, vehicles, planes, etc.).

Neuro Function, Activity, Structure and Technology (Neuro-FAST) – The Neuro-FAST program seeks to enable unprecedented visualization and decoding of brain activity to better characterize and mitigate threats to the human brain, as well as facilitate development of brain-in-the loop systems to accelerate and improve functional behaviors. The program has developed CLARITY, a revolutionary tissue-preservation method, and builds off recent discoveries in genetics, optical recordings and brain-computer interfaces offering faster, better views of the entire brain.

~Translation: The basis of cybernetic interfaces between humans and machines.

Restoring Active Memory (RAM) – The RAM program aims to develop and test a wireless, fully implantable neural-interface medical device for human clinical use. The device would facilitate the formation of new memories and retrieval of existing ones.

~Translation: Control of memories and the creation of personal identities generated by computers.

Reliable Neural-Interface Technology (RE-NET) – The RE-NET program seeks to develop the technologies needed to reliably extract information from the nervous system, and to do so at a scale and rate necessary to control complex machines, such as high-performance prosthetic limbs.

~Translation: Neural interrogation invades our minds.

Systems-Based Neurotechnology for Emerging Therapies (SUBNETS) – The SUBNETS program seeks to create implanted, closed-loop diagnostic and therapeutic systems for treating neuro-psychological illnesses and networks of the brain.

~Translation: Mechanical psychiatrists will be able to prescribe neural restructuring of the personality.

Patents for Mind Control and Psy-Ops - I

The arsenal of mind control technologies developed by the government is quite vast.
   ■ A number of well researched books on the subject have been published revealing
      the complexity and variety of these technologies.
   ■ The US Patents described below define technology used for behavior manipulation
      through all types of media.
   ■ These patents reflect “old” technology compared to DARPA classified projects.
   ■ This list just shows the pervasiveness of this technology that is commonly found
      in all types of media.

Nervous system manipulation by electromagnetic fields from monitors. US Patent #6,506,148, 1/14/2003

Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near 1/2 Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity.

Computer monitor and TV monitors can be made to emit weak low-frequency electromagnetic fields by pulsing the intensity of displayed images. Experiments have shown that the 1/2 Hz sensory resonance can be excited in this manner in a subject near the monitor. The 2.4 Hz sensory resonance can also be excited in this fashion. A TV monitor or computer monitor can be used to manipulate the nervous system of nearby people.

This method can be used in making movies and recording video tapes and DVDs. Video tapes can be edited such as to overlay the pulsing by means of modulating hardware. US Patent #872528, 6/1/2001

Ultrasonic Speech Translator and Communication System, US Patent #5,539,705, M.A. Akerman, Curtis Ayers, Howard Haynes, 7/23/1996. A wireless communication system, undetectable by radio-frequency methods, for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840R2l400, awarded by the US Department of Energy to Martin Marietta Energy Systems, Inc.

Method and Recording for Producing Sounds and Messages to Achieve Alpha and Theta Brainwave States and Positive Emotional States in Humans, US Patent #5,352,181, Mark Davis, 10/04/l994.

Method of and Apparatus for Inducing Desired States of Consciousness, US Patent #5,356,368, Robert Monroe, 10/18/1994. Improved methods and apparatus for entraining human brain patterns, employing frequency-following-response (FFR) techniques and facilitating attainment of desired states of consciousness.

Method of Inducing Mental, Emotional and Physical States of Consciousness, including Specific Mental Activity, in Human Beings, US Patent #5,213,562, Robert Monroe, 05/25/1993.

Subliminal Message Generator, US Patent #5,270,800, Robert Sweet, 12/14/1993. A combined subliminal and supraliminal message generator for use with a television receiver; permits complete control of subliminal messages and their presentation. Also applicable to cable television and computers.

Patents for Mind Control and Psy-Ops - II

Superimposing Method and Apparatus Useful for Subliminal Messages, US Patent #5,134,484, Joseph Wilson, 07/28/1992. Method of Changing a Person’s Behavior.

Silent Subliminal Presentation System, US Patent #5,159,703, Oliver Lowery, 10/27/1992. A silent communications system in which non-aural carriers in the very low or very high audio-frequency range, or in the adjacent ultrasonic frequency spectrum, are amplitude-modulated with the desired intelligence and propagated acoustically or vibrationally for inducement into the brain.

Method and System for Altering Consciousness, US Patent #5,123,899, James Gall, 06/23/1992. A system for altering the states of human consciousness involving the use of simultaneous application of multiple stimuli, preferably sounds, having differing frequencies.

Hearing System, US Patent #4,877,027, Wayne Brunkan, 10/31/1989. A method for directly inducing sound into the head of a person, using microwaves in the range of 100 MHz to 10,000 MHz, modulated with a waveform of frequency-modulated bursts.

Non-Invasive Method and Apparatus for Modulating Brain Signals through an External Magnetic or Electric Field to Reduce Pain, US Patent #4,889,526, Elizabeth Rauscher and William Van Bise, 12/26/1989.

Apparatus for Inducing Frequency Reduction in Brain Wave, US Patent #4,834,701, Kazumi Masaki, 05/30/1989.

Non-Audible Speech Generation Method and Apparatus, US Patent #4,821,326, Norman MacLeod, 04/11/1989.

Method and Apparatus for Translating the EEG into Music to Induce and Control Various Psychological and Physiological States and to Control a Musical Instrument, US Patent #4,883,067, Knispel et. al., 11/28/1989.

Hearing Device, US Patent #4,858,612, Philip Stocklin, 08/22/1989. A method and apparatus for simulation of hearing in mammals by introduction of a plurality of microwaves into the regions of the auditory cortex.

A method of conditioning a person’s unconscious mind in order to effect desired change in the person’s behavior, and which does not require the services of a trained therapist. US Patent #4,717,343, Alan Densky, 01/05/1988.

Auditory Subliminal Programming System, US Patent #4,777,529, Richard Schultz and Raymond Dolejs, 10/11/1988.

Auditory Subliminal Message System and Method, US Patent #4,395,600, Rene Lundy and David Tyler, 07/26/1983. An amplitude-controlled subliminal message may be mixed with background music.

Device for the Induction of Specific Brain Wave Patterns, US Patent #4,335,710, John Williamson, 06/22/1982. Brainwave patterns associated with relaxed and meditative states in a subject are gradually induced without deleterious chemical or neurologic side effects.

Apparatus for Electrophysiological Stimulation, US Patent #4,227,516, Bruce Meland and Bernard Gindes, 10/14/1980.

Noise Generator and Transmitter, US Patent #4,034,741, Guy Adams and Jess Carden, Jr, 07/12/1977. An analgesic noise-generator.

Apparatus for the Treatment of Neuropsychic and Somatic Diseases with Heat, Light, Sound and VHF Electromagnetic Radiation, US Patent #3,773,049, L.Y. Rabichev, V.F. Vasiliev, A.S. Putilin, T.G. Ilina, P.V. Raku and L.P. Kemitsky, 11/20/1973. This is the patent for LIDA, the Soviet brainwashing machine.

Psycho-Acoustic Projector, US Patent #3,566,347, Andrew Flanders, 02/23/1971. A system for producing aural psychological disturbances and partial deafness in the enemy during combat situations.

Legal Propaganda
False Flags are Domestic LEGAL Propaganda

By now your head is probably spinning and you are, like us, sick to the core at what our elected officials are permitting to happen in our country and the world in the United States’ name.

President Obama, and the powers that are behind him, weren’t kidding when he said that he would transform America.
   ■ They have a motive, a means, and an opportunity to effect positive public support for any
      agenda items through the work of the DoD and the BBG within the boundaries of America.
   ■ It doesn’t matter whether it is gun control, the Iran Deal, bombing other nations, TPP,
      ObamaCare, NDAA, or any agenda item, somehow he pushes it through without much
   ■ And when public consent cannot be manufactured with perception management and
      psychological manipulation of narrative networks, Obama just writes another Executive Order,
      Presidential Policy Directive (PPD), Presidential Study Directives (PSD) or Presidential Policy
      Guidance (PPG), or whatever he wants to rename his misuse of executive authority.

One thing is for sure: Obama seems to be unchallenged by his fellow politicians who must be part of some larger scheme that coerces their votes.
   ■ They must be complicit.
   ■ There must be a message in the media that promotes common political schemes without
      being “illegal”, “treasonous”, or even uncommon.
   ■ Shaping the narrative with “talking points” is perception management of narrative networks.

In the name of “National Security” Obama has bombed Syria, Libya, Iraq, Somalia, and Yemen without any congressional approval.
   ■ These acts of war were accompanied with excellent smoke and mirrors – perception
      management and DARPA subliminal devices.
   ■ Only a few lone voices pointed out that we need congressional approval to wage war!

Could the crickets be DARPA electronic warfare bouncing around in our manipulated brains?

Could Obama’s speeches be electronic warfare aimed at our neural narrative networks?

Why is DARPA so set on creating things that “control the human domain,” just as Jade Helm?

Has Jade Helm 2015 ended or does it get renewed each year by Obama just like the NDAA?

Are we targets for pro-Obama propaganda provided by the DoD’s BBG?

Could some false flags (where no one truly dies) be more propaganda films created by the huge BBG broadcasting network?

YES. The answer to all of these questions above is YES.

What Can We Do, Fellow Patriots?

First. Arm yourself with the truth – like a two edged sword. Read and re-read this article as painful as it may be for you. Do your own research from what we have provided you.

Second. Arm yourself with a consciousness higher than the driving force of global manipulation for personal power and greed – like a personal shield. Personal self-awareness has always been the fulcrum of human evolution. Oftentimes, it comes down to a few people, or even one person, who turns the tide of evil away from controlling the evolution of human consciousness. One lawsuit can turn the tables. One law. One person. One Patriot.

Third. Arm yourself with the knowledge of the weapons being used against you and the motives. Once you have that knowledge, you can find devices to counteract some of those weapons. There are an equal number of good devices to counter the evil ones.

Fourth. Arm yourself with the knowledge to discern when narratives (“story-lies”) are being used to manipulate you against your will. Take the 12 Steps of Perception Management, as presented above, and apply them to possible false flag scenarios to learn to recognize the patterns and see through to reality.

Fifth. Arm yourself against your enemy and attempt to neutralize them using their own methods and devices. A call goes out to all Patriots to secretly subvert political manipulation of Americans on American soil. In other words, wait for the right moment and then throw a monkey wrench into the works. Help the evil devices malfunction and upset the “official story” with random acts of Patriotism.

Sixth. Arm yourself with the justice of the law and bring lawsuits against domestic propaganda and subliminal manipulation of Americans – or anyone.

Seventh. Arm yourself against government agendas that now consider Americans to be enemy combatants on domestic soil who must be supportive of agendas that take away American civil liberties and constitutional rights.

Of course, we forgot to mention the first and most primal step – ‘get mad as hell about it and don’t take it anymore.’
   ■ The idea that you have been manipulated most of your life by commercial
      interests through legal subliminal programming is enough to demand answers:
      “Why the hell do elected officials and the government ‘allow’ this to happen?”
   ■ And now you are armed with the answer: The “government” is doing the same
      thing to us but with military grade electronic warfare that is mind-boggling.

Fear and Terror: other names for War

Warning: As you begin to go back in your memory of these events (9-11, Sandy Hook, San Bernardino, and many others) with this new awakening, you may feel raped, used, and manipulated.
   ■ The more you watched the “shootings” the more you believed the “story” – the narrative.
   ■ The more you were sucked in and could not get those images out of your head, the more
      your freedom was stolen.
   ■ But, if you looked closely, the “man behind the curtain” is actually our own government.
   ■ Only chaos and confusion arises from such evil manipulation and thus FEAR is bred.
   ■ FEAR is another name for TERROR which is another name for WAR.

War is big business and it needs the best of marketing devices to get public support for presidential policy – in the name of “National Security,” which trumps all else.

We have an out-of-control president who uses military mind-control devices to manage the perceptions of American citizens to “make” them “allow” his unprecedented abuse of executive authority.
   ■ Since he is the commander and chief and controls the DoD, which should have no authority
      inside of America, he needed the NDAA to legally permit him to consider Americans
      a threat to “National Security.”
   ■ For five years he has consistently broadened his “powers” to take away civil liberties,
      virtually unchallenged.

The time is now to wake up and end electronic warfare in America through loopholes in the NDAA.
   ■ This Act must be rewritten to specifically address these issues and make sure
      that American civil liberties are not violated by clever lawyers like Obama
      who have made treason legal.

Why Did They Pass a Law That Makes Staged Hoaxes and
Crisis-Acted Movies Legal?

Psychology & Mind

Prev Next Page:

Trance Formation

From: The Crowhouse We have created this society, not each one of us but our past generations. We have, those, and us, have created this present immoral, destructive society and we are trapped by that society. That society was made by each one of us, so we are responsible for that society. Whether, it is possible, not to change society, but is it possible to radically, deeply transform our condition, which is, understanddeeply, our consciousness, which is what we are. Is it possible to transform,...

Read more

Growth, Change and Death

From: Growth, Change, & Death What will it take for you to change and grow? — for you to become what God or the gods intended? What will it take for you to manifest what is godly or divine-like in you and to live from that place?  For example, immature people, as well as bad people, do not know how to take good care of the things in their life.  They don’t know how to be “responsible”; they do not know how to love and care for what life gives them (or brings into their life) that is good and decent.  They are...

Read more

The Horrific Processes of Reciprocal Se…

The Horrific Processes  of Reciprocal Self Destruction

Guernica by Pablo Picassohangs at the United Nations building [1] From: Zero Point “... it was possible sometimes to observe very strange manifestations of theirs, that is, from time to time they did something which was never done by three-brained beings on other planets, namely, they would suddenly, without rhyme or reason, begin destroying one another’s existence.  . . .  from this horrible process of theirs their numbers rapidly diminished . . .”  (p. 91) “I must tell you that the chief particularity of the psyche of your favorites, namely, the ‘periodic-need-to-destroy-the-existence-of-others-like-oneself,’ interested me more and more with every succeeding century of theirs, and side by...

Read more

Time and Initiative

Time and Initiative

  Time and Initiative        From Google books – by David Applebaum     Is time an illusion? The question of time was first felt by humans not as an abstraction but practically: In the rise and fall of rivers. The periodic return of the moon and constellations of stars. The migration of prey, and the progression of seasons. At the dawn of civilization early sciences — geometry, astronomy, and music — arose and were specific solutions to the question of time. Consciousness did not yet distinguish the inner from the outer, or experience from the cosmos to which it belonged. Recurrence was manifest also in human life,...

Read more

Fragments of an Unknown Being

Fragments of an Unknown Being

  Fragments of an Unknown Being       From: Zen, Yoga, Gurdjieff   Gurdjieff made it quite clear in "Beelzebub's tales to his grandson" that man no longer has to serve the moon. The original reason that the organ Kundabuffer was implanted in man was because that at that time in the solar system's history, the consciousness of men was forced, due to unforeseen circumstances in the form of outright mistakes on the part of higher cosmic individuals, to feed the earth's unintended and accidental satellite. To put it quite bluntly... according to Gurdjieff, mankind got screwed.

Read more

What is Reality and What is It Made of?

What is Reality and What is It Made of?

  What is Reality and What is It Made of?      From: Life Coach Code Digging deeper into the understanding of reality we come to a conclusion that Reality is not exactly what we have always thought! What is reality? A question that troubled and still trouble many of the greatest minds. Almost everything is created by a combination of 2 elementary particles, Bosons and Fermions. Matter is created by Fermions, and Bosons are the ones that hold matter together, like a glue. Despite these 2 elementary particles, matter is also created by waves and elements like Photons, which light is created from, that...

Read more

Minds Beyond Brains

Minds Beyond Brains

  Minds Beyond Brains: New Experimental Evidence   From: New Dawn Magazine By: Rupert Sheldrake Where are our minds located? We have been brought up to believe that they are inside our heads, that mental activity is nothing but brain activity. Instead, I suggest that our minds extend far beyond our brains; they stretch out through fields that link us to our environment and to each other. Mental fields are rooted in brains, just as magnetic fields around magnets are rooted in the magnets themselves, or just as the fields of transmission around mobile phones are rooted in the phones and their internal electrical activities....

Read more

“False Flags”: Legal Propaganda

“False Flags”: Legal Propaganda

  12 Ways to Recognize a BBG Production     by: Anonymous Patriots “False Flags”: Legal Propaganda Produced by the Dept. of Defense Why would the government support false flag events? This question would go through our minds every time we would see a new false flag event plastered all over the media. Like many of you, we would think, “It has to be real, otherwise the government  and participants would be engaging in treason.” Don’t presume this is just another conspiracy theory article. What you will read will chill you to the bone. We know this is a long article, but while you were sleeping much has been done to destroy your country. ...

Read more

Contents - Psychology & Mind