Premium Only Content
The Masonic Baalite Cult Of Intelligence
"Et cognoscetis veritatem et veritas liberabit vos" - And ye shall know the truth, and the truth shall make you free...
"Timeo Danaos et dona ferentes" - Beware of Greeks bearing gifts...
"Quaerite et invenietis" - Seek and you shall find...
"In its higher octave, Saturn is the Guardian of the Threshold at the last frontier to the realm of the divine. In this capacity, Saturn is equivalent to Lucifer as the Light Bearer = Prometheus who brought the fire to mankind because he really loved humanity in contrast to god Zeus. In its lowest octave, Saturn is equated with Satan; is the seducer, persisting within the ego and a bar to resolve karmic entanglements" (Communitas Saturni, 2014).
𝗧𝗵𝗲 𝗧𝗿𝗮𝗱𝗶𝘁𝗶𝗼𝗻𝗮𝗹 𝗜𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 𝗖𝘆𝗰𝗹𝗲
The Intelligence Cycle is customarily illustrated as a repeating process consisting of five steps. Planning and direction encompasses the management of the entire effort and involves, in particular, determining collection requirements based on customer requests. Collection refers to the gathering of raw data to meet the collection requirements. These data can be derived from any number and type of open and secret sources. Processing refers to the conversion of raw data into a format analysts can use. Analysis and production describes the process of evaluating data for reliability, validity, and relevance; integrating and analyzing it; and converting the product of this effort into a meaningful whole, which includes assessments of events and implications of the information collected. Finally, the product is disseminated to its intended audience.
𝗧𝘆𝗽𝗲𝘀 𝗼𝗳 𝗜𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻
Information can be classified into two categories, either qualitative or quantitative and objective or subjective.
Qualitative information is about describing something using language. Quantitative information is about measuring things with numbers.
Objective information can be verified as fact. Subjective information is a matter of opinion.
𝗣𝘀𝘆𝗰𝗵𝗼𝗹𝗼𝗴𝗶𝗰𝗮𝗹 𝗪𝗮𝗿𝗳𝗮𝗿𝗲
Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been known by many other names or terms, including MISO, Psy Ops, political warfare, "Hearts and Minds", and propaganda.
The term is used "to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people".
Various techniques are used, and are aimed at influencing a target audience's value system, belief system, emotions, motives, reasoning, or behavior.
It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator's objectives, and are sometimes combined with black operations or false flag tactics. It is also used to destroy the morale of enemies through tactics that aim to depress troops' psychological states.
Target audiences can be governments, organizations, groups, and individuals, and is not just limited to soldiers. Civilians of foreign territories can also be targeted by technology and media so as to cause an effect in the government of their country.
In June 2015, NSA files published by Glenn Greenwald revealed details of the JTRIG group at British intelligence agency GCHQ covertly manipulating online communities. This is in line with JTRIG's goal: to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications.
Operation methods/techniques. All of JTRIG’s operations are conducted using cyber technology. Staff described a range of methods/techniques that have been used to-date for conducting effects operations. These included:
1) Uploading YouTube videos containing “persuasive” communications (to discredit, promote distrust, dissuade, deter, delay or disrupt)
2) Setting up Facebook groups, forums, blogs and Twitter accounts that encourage and monitor discussion on a topic (to discredit, promote distrust, dissuade, deter, delay or disrupt)
3) Establishing online aliases/personalities who support the communications or messages in YouTube videos, Facebook groups, forums, blogs etc
4) Establishing online aliases/personalities who support other aliases
𝗦𝗼𝗰𝗶𝗮𝗹 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿𝗶𝗻𝗴
“The more a social engineer can make his contact seem like business as usual, the more he allays suspicion. When people don’t have a reason to be suspicious, it’s easy for a social engineer to gain their trust. Once he’s got your trust, the drawbridge is lowered and the castle door thrown open so he can enter and take whatever information he wants” (Kevin D Mitnick).
-
LIVE
Benny Johnson
1 hour agoKamala Campaign EXPOSED as Scam To DEFRAUD Democrats | Spiraling Drunk Kamala Posts Slurring RANT 🤣
10,195 watching -
1:35:35
Graham Allen
4 hours agoDid Trump Just Bring Peace In Israel?! Biden Sending $24 BILLION To Ukraine! + Kamala Is Back???
93.8K161 -
1:56:47
Matt Kohrs
13 hours agoIt's Payday Friday!!! || The MK Show
35.7K7 -
35:31
BonginoReport
5 hours agoTackling Trump Derangement This Thanksgiving: Evita + Michael Knowles (Ep.94) - 11/27/24
72.3K113 -
LIVE
LFA TV
15 hours agoTRUMP BROKE KAMALA! | LIVE FROM AMERICA 11.27.24 11am EST
5,724 watching -
UPCOMING
MYLUNCHBREAK CHANNEL PAGE
20 hours agoThe Hidden History of Budapest
15.9K2 -
1:50:22
Jeff Ahern
3 hours ago $7.52 earnedNever Woke Wednesday. The Thanksgiving show!
28.9K3 -
1:34:07
Game On!
16 hours ago $11.63 earnedThis is BAD! Things are getting so much worse for Conor McGregor!
52.6K6 -
33:38
Brewzle
1 day agoI Created My First Whiskey Blend!
76.7K11 -
4:24
Gun Owners Of America
22 hours agoHere's Our Plan To Overturn Gun Control in 2025
63.4K31