PsyOp Internet Battle for Hearts, and MindsSancho Jones
The Internet revolution has changed the face of our planet. Over the last 20 years there’s been a complete transformation of the way we live, conduct business, and share information. In the same amount of time, information technology has helped bring countless atrocities committed by governments, and global corporations into view. We’ve seen the rise of groups like “We Are Change”, and birthing of the “Truth Movement”; which has kicked off a viral, and grassroots information wave. The Internet’s been in many regards a saving grace of mankind, and in the same likeness the greatest threat to the establishment!
Recently, we had the Global Warming talks in Copenhagen; they were a failure! What else could come from the exposure of emails showing fudged data on Global Warming? Nothing is what. Climate Gate changed what would have been global “Cap, & Trade” agreements, and other carbon tax legislation from an assured victory at Copenhagen, to an embarrassment. Al Gore decided it’d be better not to show up at all, after having to run from angry mobs, and being pelted by snow balls due to the leaks. The only thing that came of the conference, was a poor attempt at “saving face” through a non binding resolution.
Those hiding behind governments, and global corporations have long known the necessity of owning the Hearts, and Minds of the people; in order to further their agendas. We’ve learned catchy phrases which embody the techniques. Some of these would include; “Divide, and Conquer”, “Smoke, & Mirrors”, “Order out of Chaos”, “Problem, Reaction, Solution”. Through the usage of these tools, perceptions can be changed, and goals can be accomplished. The US Govt. has actively sought to win the Hearts, and Minds of people openly since the Cold War.
During the height of the Cold War, and Civil Rights movement, the FBI created COINTEL; which is an acronym of various programs the US Govt. used to deal with both issues. The methods used in COINTEL were inline with the techniques mentioned above. The overall goal was to control the information, and/or distort it so as to crush all legitimate opposition to the US Policy, or Hegemony of the time. This propaganda machine officially ended, but from the information presented below, it looks as though it is going stronger than ever before; and the Internet is the new battle ground.
There is subversion being committed across the World Wide Web on an ever increasing basis. The mainstream media has been very active in the shaping of our feelings, and thoughts, from the bottom up to meet current policy. We’ have MSM Journalists self censoring for advancement, or towing the party line. We see corporate MSM censorship through management, Government censorship of the MSM, and all culminating into supporting policies, such as war. A recent article regarding a book by Nick Davies called, “How the spooks took over the news”, delves into how the world governments will insert stories at the community level, several years before a given agenda is needed.
“For the first time in human history, there is a concerted strategy to manipulate global perception. And the mass media are operating as compliant assistants, failing both to resist it and to expose it.”
“The sheer ease with which this machinery has been able to do its work reflects a creeping structural weakness which now afflicts the production of our news. I’ve spent the last two years researching books about falsehood, distortion and propaganda in the global media.”
In the USA, we have several groups designated to shape, and alter perceptions. The U.S. Army Civil Affairs, and Psychological Operations Command (Airborne), or USACAPOC(A), consists of 40 Army Reserve units, or around 10,000 soldiers, who are stationed across the USA, are among many leading the mission of COINTEL. They have two main components, Civil Affairs, which is largely made up of lawyers, judges, physicians, bankers, health inspectors, fire chiefs, or other professionals who can deal directly with the Civil nature of shaping a communities perception. The other portion is Psychological Operations; both operate by sword, deed, and word to alter Hearts, and Minds.
Another tactic being used in the U.S. is to actually pay operatives to create havoc, or to further the fury of an average person, so they will attempt an act associated with a criminal, or terrorism element. Hal Turner is an example of an operative employed by the US Govt. to further agendas, and policies. In his own words,”I was not some street snitch”; in fact in his own words,”I was a deep undercover intelligence operative”. According to the FBI,”Special Agent Stephen Haug wrote that “[Turner's] value outweighs the discomfort associated with source’s rhetoric. Source’s unique access provides important intelligence which, if lost, would be irreplaceable.” Another FBI memo cited that Turner “has proven highly reliable and is in a unique position to provide vital information on multiple subversive domestic organizations.” Note the words subversive domestic organizations.
Do you feel left out, or would you like to get in on the gravy train; while at the same time selling out your fellow man? The US Govt. with 5 million US Dollars is promoting, and paying bloggers, texters, and building websites across the Middle East, and North Africa! The official purpose is to spread ideologies, and learning to embrace others ideas. Of course through the wreaking putrid of the rhetoric comes the truth; it’s to promote US Democracy through the Arab world. I can read the websites now,”Freedom is the freedom to comply with The Patriot Act!”
Countries like Israel implement direct subversion, or disinformation as well. “Israel’s Foreign Ministry is hiring students and demobilized soldiers who will work around the clock writing pro-Israeli responses on Internet websites all over the world…. presenting themselves as ordinary surfers…
This is in addition to the existing Israeli volunteer internet task forces & propaganda applications like Megaphone & GIYUS – a chief Israeli propagandist is interviewed below….
"Our people will not say: 'Hello, I am from the policy-explanation department of the Israeli Foreign Ministry and I want to tell you the following.' Nor will they necessarily identify themselves as Israelis. They will speak as net-surfers and as citizens, and will write responses that will look personal but will be based on a prepared list of messages that the Foreign Ministry developed."
Amongst the many groups on the Net fighting the struggle for Israel, is the Jewish Internet Defense Forces. From their homepage,”leading the fight against antisemitism, and terrorism on the web, coordinating concerned citizens around the globe, and promoting jewish pride, knowledge, and unity.” A striking quality about any of these different groups, or the controlled MSM, who are sent out to propagandize the Hearts, and Minds of the people, is that they always cite Anonymous sources, or don’t cite who the “officials” are who said “what”. These kinds of propaganda articles are now common place.
Other countries around the world are implementing strategies to combat the information wave of the Internet; which is destroying their hold on the Hearts, and Minds of people worldwide. Australia’s Government has instituted their new Cyber Security Strategy. It’s goals are of course always painted in a nice shiny, and clean picture. They’ll be focusing on legitimate cyber crimes, and of course they’ll have to monitor *possible* terrorist activities. They have created their own Computer Emergency Response Team, or CERT as the main crime fighter; the program will begin operation January 2010, and will coordinate their activities with other National CERT’s across the globe to combat Internet crimes, or as is becoming abundantly clear, to infiltrate, and use propaganda to halt the Information revolution.
The saying goes something like, if at first you don’t succeed, then try, try again; right? Well, that’s exactly what the US Govt. is doing. The FBI now is installing super spyware on people’s personal computers. They are using “Computer, and Internet Protocol Address Verifiers”, or CIPAV to infiltrate personal computers, or systems, download all files, and upload to government servers in Virginia It sounds somewhat “1984ish”, but imagine with everything covered so far, and taking into context what COINTEL did by replacing words, or meanings, imagine what they can upload to your own computer without the users ever knowing.
It’s not just the FBI with their fancy CIPAV, but the actual giant Internet companies who’ve been bought out are complicit with this ever increasing war for our Hearts, and Minds; through information. Google is catering to the CIA, NSA, FBI, and to most other Government agencies by offering the tools necessary to scavenge stored data, and other electronic media. They are also offering a closed “Intellipedia, a Wikipedia knock off for spooks. Not only Google, but most US social networks have been caught selling private chats, photos, and emails to Governments.
The Internet is proving to be a real hassle for the corporate, and government elites. Leaked evidence that Yahoo is selling all documents for a given user to the U.S. Government for between $30 to $80 has surfaced recently. Not only are they selling the contents of what we feel is our private area, but also the IP addresses of where we sign on. This is not limited to Yahoo, and Google, but again spans the innertubes of the Internet. The U.S. Federal Government, and other government’s are actively trying to not only use subversive means to control information, but also to mark those who present a problem; apparently so as to isolate them in the future.
It’s a massive amount of data to be stored, and would almost seem impossible. However, we must remember the U.S. Govt., and the Federal Reserve print money 24 hours a day. They are building Fusion Centers across the country, and implementing computer systems such as Maincore. In Utah, the “National Security Agency is constructing a colossal $1.9 billion information storage center at Camp Williams which could be considered a power trip. But it’s not the sort of power trip that keeps civil libertarians lying awake at night. No, this power grab is for the stuff of Thomas Edison and Nikola Tesla -- the juice needed to keep acres of NSA supercomputers humming and a cyber eye peeled for the world’s bad guys.” The problem is, that what the government considers as the bad guys is becoming the average American people, and in a hurry!
The deal is that people behind, or in control of governments, and global corporations realize the Internet is the one single threat that can create over night awareness into their ominous plans. They are attacking it, and people who are spreading information at every turn. Besides the leaks of Climate Gate, or Personal Data Gate, now there is the Secret Copyright Gate! See exert below:
“* That ISPs have to proactively police copyright on user-contributed material. This means that it will be impossible to run a service like Flickr or YouTube or Blogger, since hiring enough lawyers to ensure that the mountain of material uploaded every second isn't infringing will exceed any hope of profitability.
* That ISPs have to cut off the Internet access of accused copyright infringers or face liability. This means that your entire family could be denied the internet -- and hence to civic participation, health information, education, communications, and their means of earning a living -- if one member is accused of copyright infringement, without access to a trial or counsel.
* That the whole world must adopt US-style "notice-and-takedown" rules that require ISPs to remove any material that is accused -- again, without evidence or trial -- of infringing copyright. This will be a disaster in the US and other countries, where it provides an easy means of censoring material, just by accusing it of infringing copyright.
*There will be mandatory prohibitions on breaking DRM, even if doing so for a lawful purpose (e.g., to make a work available to disabled people; for archival preservation; because you own the copyrighted work that is locked up with DRM)[/quote] Visit link for full text.” Welcome to the world of the DMCA’s, and censorship! They are creating these treaties in combination with other censorship policies designed to limit access to undesirable websites; of course the policy maker’s will decide what is “undesirable”, or which websites aren’t fit to help foster the correct environment for the people in their country. It goes back to the beginning of this article; it is about winning, controlling, or owning the Hearts, and Minds of the people. Without owning those, the people behind the corporations controlling the policy makers who run governments cannot succeed. The Internet will be turned shortly, or the attempt will be made to turn it into an Orwellian hell of pay per click, or pay by minute. Followed with skewed, and distorted information.
It will take all of us to stop these people from censoring the Internet in their battle to win control our hearts and minds.
 http://www.google.com/#hl=en&q=Climate+ … 32dbb01be6
 http://www.foreignpolicy.com/articles/2 … ing_slogan
 http://georgewashington2.blogspot.com/2 … ia-is.html
 http://www.independent.co.uk/news/media … 80672.html
 http://www.globalsecurity.org/military/ … -psyop.htm
 http://rawstory.com/2009/11/report-fbi- … placeable/
 http://desertpeace.wordpress.com/2009/1 … ney-at-it/
 http://www.muzzlewatch.com/2009/07/14/t … overnment/
 http://www.breitbart.com/article.php?id … _article=1
 http://www.arnnet.com.au/article/327642 … hting_team
 http://www.wired.com/threatlevel/2009/0 … yware-pro/
 http://www.infowars.net/articles/march2 … Google.htm
 http://www.deseretnews.com/article/7053 … .html?pg=1
 http://dprogram.net/2009/11/04/secret-c … -very-bad/
 http://www.eff.org/deeplinks/2009/11/le … rikes-and-
 http://www.infowars.com/death-of-the-in … -websites/
- How Will You Use It? New Website Let's You Rate and Review Police Officers
- Seven States That Are Next In Line to Legalize Marijuana
- The Net Is Mightier Than The Sword - James Corbett at TEDxGroningen
- Judge Issues Temporary Ban on Arrests For Feeding Homeless
- Citizen Pulls Over Cop, Demands ID, Gets It. Lets Cop Off with Verbal Warning
- D.C. Council Member Recommends Disarming the Police
- Should We Just Follow Orders? Rules of Engagement for Resisting the Police State
- The Death Of James Traficant
FAIR USE NOTICE
This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the DMCA and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.