Premium Only Content
The Masonic Baalite Cult Of Intelligence
"Et cognoscetis veritatem et veritas liberabit vos" - And ye shall know the truth, and the truth shall make you free...
"Timeo Danaos et dona ferentes" - Beware of Greeks bearing gifts...
"Quaerite et invenietis" - Seek and you shall find...
"In its higher octave, Saturn is the Guardian of the Threshold at the last frontier to the realm of the divine. In this capacity, Saturn is equivalent to Lucifer as the Light Bearer = Prometheus who brought the fire to mankind because he really loved humanity in contrast to god Zeus. In its lowest octave, Saturn is equated with Satan; is the seducer, persisting within the ego and a bar to resolve karmic entanglements" (Communitas Saturni, 2014).
𝗧𝗵𝗲 𝗧𝗿𝗮𝗱𝗶𝘁𝗶𝗼𝗻𝗮𝗹 𝗜𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 𝗖𝘆𝗰𝗹𝗲
The Intelligence Cycle is customarily illustrated as a repeating process consisting of five steps. Planning and direction encompasses the management of the entire effort and involves, in particular, determining collection requirements based on customer requests. Collection refers to the gathering of raw data to meet the collection requirements. These data can be derived from any number and type of open and secret sources. Processing refers to the conversion of raw data into a format analysts can use. Analysis and production describes the process of evaluating data for reliability, validity, and relevance; integrating and analyzing it; and converting the product of this effort into a meaningful whole, which includes assessments of events and implications of the information collected. Finally, the product is disseminated to its intended audience.
𝗧𝘆𝗽𝗲𝘀 𝗼𝗳 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻
Information can be classified into two categories, either qualitative or quantitative and objective or subjective.
Qualitative information is about describing something using language. Quantitative information is about measuring things with numbers.
Objective information can be verified as fact. Subjective information is a matter of opinion.
𝗣𝘀𝘆𝗰𝗵𝗼𝗹𝗼𝗴𝗶𝗰𝗮𝗹 𝗪𝗮𝗿𝗳𝗮𝗿𝗲
Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been known by many other names or terms, including MISO, Psy Ops, political warfare, "Hearts and Minds", and propaganda.
The term is used "to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people".
Various techniques are used, and are aimed at influencing a target audience's value system, belief system, emotions, motives, reasoning, or behavior.
It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator's objectives, and are sometimes combined with black operations or false flag tactics. It is also used to destroy the morale of enemies through tactics that aim to depress troops' psychological states.
Target audiences can be governments, organizations, groups, and individuals, and is not just limited to soldiers. Civilians of foreign territories can also be targeted by technology and media so as to cause an effect in the government of their country.
In June 2015, NSA files published by Glenn Greenwald revealed details of the JTRIG group at British intelligence agency GCHQ covertly manipulating online communities. This is in line with JTRIG's goal: to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.
Operation methods/techniques. All of JTRIG’s operations are conducted using cyber technology. Staff described a range of methods/techniques that have been used to-date for conducting effects operations. These included:
1) Uploading YouTube videos containing “persuasive” communications (to discredit, promote distrust, dissuade, deter, delay or disrupt)
2) Setting up Facebook groups, forums, blogs and Twitter accounts that encourage and monitor discussion on a topic (to discredit, promote distrust, dissuade, deter, delay or disrupt)
3) Establishing online aliases/personalities who support the communications or messages in YouTube videos, Facebook groups, forums, blogs etc
4) Establishing online aliases/personalities who support other aliases
𝗦𝗼𝗰𝗶𝗮𝗹 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿𝗶𝗻𝗴
“The more a social engineer can make his contact seem like business as usual, the more he allays suspicion. When people don’t have a reason to be suspicious, it’s easy for a social engineer to gain their trust. Once he’s got your trust, the drawbridge is lowered and the castle door thrown open so he can enter and take whatever information he wants” (Kevin D Mitnick).
-
32:56
MYLUNCHBREAK CHANNEL PAGE
10 hours agoUnder The Necropolis - Pt 3
27.4K25 -
37:08
Degenerate Plays
15 hours ago $0.27 earnedThe Greatest Chase Scene Of All Time - Assassin's Creed : Part 33
11.1K1 -
1:08:34
Squaring The Circle, A Randall Carlson Podcast
14 hours ago#034 The Mysteries Of Stonehenge: Uncovering The Origins Of The Stones - Squaring The Circle
8.18K3 -
10:35
Misha Petrov
11 hours ago"We Need More Women Firefighters!" LA Wildfires Expose Shocking Mismanagement and DEI Priorities
8.64K24 -
8:36
Gamers Unbeaten
15 hours agoMarvel Rivals: The Menace of Jeff the Shark | Deep Thoughts While Gaming
24.4K1 -
11:05
Guns & Gadgets 2nd Amendment News
10 hours agoBREAKING NEWS: ATF Reinstituting The Pistol Brace Ban?!
17.1K11 -
48:04
PMG
12 hours ago $0.32 earned"Will Trump FINALLY Prosecute the 2020 Election Criminals? w/ FEC Commissioner Trey Trainor"
11.8K -
11:19:20
Phyxicx
12 hours agoFinal Fantasy XIV - Finishing Stormblood - 1/11/2025
81.4K4 -
9:21
BlackDiamondGunsandGear
12 hours agoBest of Both AR-15 + Ak47 = CMMG Mutant DISSENT
58.2K8 -
4:27:23
JdaDelete
22 hours ago $11.62 earnedCool Spot - Sega Saturday + Pizza Tower (Encore)
105K6