"Timeo Danaos et dona ferentes" - Beware of Greeks bearing gifts...
"Quaerite et invenietis" - Seek and you shall find...
"In its higher octave, Saturn is the Guardian of the Threshold at the last frontier to the realm of the divine. In this capacity, Saturn is equivalent to Lucifer as the Light Bearer = Prometheus who brought the fire to mankind because he really loved humanity in contrast to god Zeus. In its lowest octave, Saturn is equated with Satan; is the seducer, persisting within the ego and a bar to resolve karmic entanglements" (Communitas Saturni, 2014).
๐ง๐ต๐ฒ ๐ง๐ฟ๐ฎ๐ฑ๐ถ๐๐ถ๐ผ๐ป๐ฎ๐น ๐๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ ๐๐๐ฐ๐น๐ฒ
The Intelligence Cycle is customarily illustrated as a repeating process consisting of five steps. Planning and direction encompasses the management of the entire effort and involves, in particular, determining collection requirements based on customer requests. Collection refers to the gathering of raw data to meet the collection requirements. These data can be derived from any number and type of open and secret sources. Processing refers to the conversion of raw data into a format analysts can use. Analysis and production describes the process of evaluating data for reliability, validity, and relevance; integrating and analyzing it; and converting the product of this effort into a meaningful whole, which includes assessments of events and implications of the information collected. Finally, the product is disseminated to its intended audience.
๐ง๐๐ฝ๐ฒ๐ ๐ผ๐ณ ๐๐ป๐ณ๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป
Information can be classified into two categories, either qualitative or quantitative and objective or subjective.
Qualitative information is about describing something using language. Quantitative information is about measuring things with numbers.
Objective information can be verified as fact. Subjective information is a matter of opinion.
๐ฃ๐๐๐ฐ๐ต๐ผ๐น๐ผ๐ด๐ถ๐ฐ๐ฎ๐น ๐ช๐ฎ๐ฟ๐ณ๐ฎ๐ฟ๐ฒ
Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been known by many other names or terms, including MISO, Psy Ops, political warfare, "Hearts and Minds", and propaganda.
The term is used "to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people".
Various techniques are used, and are aimed at influencing a target audience's value system, belief system, emotions, motives, reasoning, or behavior.
It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator's objectives, and are sometimes combined with black operations or false flag tactics. It is also used to destroy the morale of enemies through tactics that aim to depress troops' psychological states.
Target audiences can be governments, organizations, groups, and individuals, and is not just limited to soldiers. Civilians of foreign territories can also be targeted by technology and media so as to cause an effect in the government of their country.
In June 2015, NSA files published by Glenn Greenwald revealed details of the JTRIG group at British intelligence agency GCHQ covertly manipulating online communities. This is in line with JTRIG's goal: to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.
Operation methods/techniques. All of JTRIG’s operations are conducted using cyber technology. Staff described a range of methods/techniques that have been used to-date for conducting effects operations. These included:
1) Uploading YouTube videos containing “persuasive” communications (to discredit, promote distrust, dissuade, deter, delay or disrupt)
2) Setting up Facebook groups, forums, blogs and Twitter accounts that encourage and monitor discussion on a topic (to discredit, promote distrust, dissuade, deter, delay or disrupt)
3) Establishing online aliases/personalities who support the communications or messages in YouTube videos, Facebook groups, forums, blogs etc
4) Establishing online aliases/personalities who support other aliases
๐ฆ๐ผ๐ฐ๐ถ๐ฎ๐น ๐๐ป๐ด๐ถ๐ป๐ฒ๐ฒ๐ฟ๐ถ๐ป๐ด
“The more a social engineer can make his contact seem like business as usual, the more he allays suspicion. When people don’t have a reason to be suspicious, it’s easy for a social engineer to gain their trust. Once he’s got your trust, the drawbridge is lowered and the castle door thrown open so he can enter and take whatever information he wants” (Kevin D Mitnick).
0 Comments