The Masonic Baalite Cult Of Intelligence

8 months ago
69

"Et cognoscetis veritatem et veritas liberabit vos" - And ye shall know the truth, and the truth shall make you free...

"Timeo Danaos et dona ferentes" - Beware of Greeks bearing gifts...

"Quaerite et invenietis" - Seek and you shall find...

"In its higher octave, Saturn is the Guardian of the Threshold at the last frontier to the realm of the divine. In this capacity, Saturn is equivalent to Lucifer as the Light Bearer = Prometheus who brought the fire to mankind because he really loved humanity in contrast to god Zeus. In its lowest octave, Saturn is equated with Satan; is the seducer, persisting within the ego and a bar to resolve karmic entanglements" (Communitas Saturni, 2014).

𝗧𝗵𝗲 𝗧𝗿𝗮𝗱𝗶𝘁𝗶𝗼𝗻𝗮𝗹 𝗜𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 𝗖𝘆𝗰𝗹𝗲

The Intelligence Cycle is customarily illustrated as a repeating process consisting of five steps. Planning and direction encompasses the management of the entire effort and involves, in particular, determining collection requirements based on customer requests. Collection refers to the gathering of raw data to meet the collection requirements. These data can be derived from any number and type of open and secret sources. Processing refers to the conversion of raw data into a format analysts can use. Analysis and production describes the process of evaluating data for reliability, validity, and relevance; integrating and analyzing it; and converting the product of this effort into a meaningful whole, which includes assessments of events and implications of the information collected. Finally, the product is disseminated to its intended audience.

https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/analytic-culture-in-the-u-s-intelligence-community/chapter_4_systems_model.htm

𝗧𝘆𝗽𝗲𝘀 𝗼𝗳 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻

Information can be classified into two categories, either qualitative or quantitative and objective or subjective.

Qualitative information is about describing something using language. Quantitative information is about measuring things with numbers.

Objective information can be verified as fact. Subjective information is a matter of opinion.

https://www.ncsc.gov.uk/collection/risk-management-collection?curPage=/collection/risk-management-collection/essential-topics/variety-risk-information

𝗣𝘀𝘆𝗰𝗵𝗼𝗹𝗼𝗴𝗶𝗰𝗮𝗹 𝗪𝗮𝗿𝗳𝗮𝗿𝗲

Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been known by many other names or terms, including MISO, Psy Ops, political warfare, "Hearts and Minds", and propaganda.

The term is used "to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people".

Various techniques are used, and are aimed at influencing a target audience's value system, belief system, emotions, motives, reasoning, or behavior.

It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator's objectives, and are sometimes combined with black operations or false flag tactics. It is also used to destroy the morale of enemies through tactics that aim to depress troops' psychological states.

Target audiences can be governments, organizations, groups, and individuals, and is not just limited to soldiers. Civilians of foreign territories can also be targeted by technology and media so as to cause an effect in the government of their country.

In June 2015, NSA files published by Glenn Greenwald revealed details of the JTRIG group at British intelligence agency GCHQ covertly manipulating online communities. This is in line with JTRIG's goal: to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.

Operation methods/techniques. All of JTRIG’s operations are conducted using cyber technology. Staff described a range of methods/techniques that have been used to-date for conducting effects operations. These included:

1) Uploading YouTube videos containing “persuasive” communications (to discredit, promote distrust, dissuade, deter, delay or disrupt)

2) Setting up Facebook groups, forums, blogs and Twitter accounts that encourage and monitor discussion on a topic (to discredit, promote distrust, dissuade, deter, delay or disrupt)

3) Establishing online aliases/personalities who support the communications or messages in YouTube videos, Facebook groups, forums, blogs etc

4) Establishing online aliases/personalities who support other aliases

𝗦𝗼𝗰𝗶𝗮𝗹 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿𝗶𝗻𝗴

“The more a social engineer can make his contact seem like business as usual, the more he allays suspicion. When people don’t have a reason to be suspicious, it’s easy for a social engineer to gain their trust. Once he’s got your trust, the drawbridge is lowered and the castle door thrown open so he can enter and take whatever information he wants” (Kevin D Mitnick).

Loading comments...