(I'm going to
use keyword hijacking to connect Don Knotts to a CIA disaster I never knew about before below after I deal with DE's snark. This will be good, people.)
DE, you pulled up my partial post that this effing board didn't let me complete. I can hardly get through this bloody server anymore. It took TEN MINUTES just to enter a simple edit and instead it had to be a new bloody post right after the partial you grabbed. You know that. Talk about selective editing.
See my post of July 2 at 23:11, 11 minutes after what you just put-
Posted: 02 Jul 2007 23:11 Post subject: Dreams End- lack of any context.
DE, that 'pain dump' stunt was really juvenile, the equivalent of shrieking in a crowd for attention or sweeping all the dishes off a table with a crash.
I know you are bright enough to make connections, too. Your tantrum is oddly out of character. Maybe you need a nap.
There was NO CONTEXT in your 'pain dump.'
DE, you do realize that I've acquired a real Pentagon Psychological Operations 101type training manual, right? I'm not making this stuff up. There are forms to fill in like getting a license at the DMV.
Quote:
Subcourse PO 0805 Edition 7
Target Analysis Worksheet:
Target Audience:
Conditions:
Target Vulnerabilities:
Target Susceptibility:
Psychological Objective:
Target Effectiveness:
Impact Indicators:
I've been asked what would be attributes of a keyword hijacking (in order to recognize them-hmw) and I'd model it on the formula above-
>Cover up value - The highest. A violent coup by US death squads within the government.
>Timing - 2008 is the 45th anniversary of JFK's death
>Visibility - Movie title is highly visible in advertising campaign.
>Target audience - Movie audience of 14-24 year olds.
........................................................................................
See, DE? CONTEXT.
Methods from the manual and my applying them to methods of keyword hijacking.
You wanna find out how media psy-ops works or do you want to beat me up?
Wait, I can tell.
You throw away CAFitts because she comes from finance and plans financial reactions to corruption? Over that one bad group? Do you ignore Lt. Col. L. Fletcher Prouty because he spoke to Carto's people? Do you ignore Dr. Colin Ross because he spoke to those Scientologists?
I don't.
Perhaps you'd like to ignore her 'NarcoDollars 101' article or 'The Myth of the Rule of Law' or her expose on the black budget or her acount of how HUD was looted by black ops or her account of how attempts were made to draw her into a UFO disinfo project to silence her.
Read every psy-ops manual you can get.
The principles are codified and you better apply them to your environment to see what is USG covert material. Much much more than you'd like to think.
I got a HARD copy psy-ops manual with postmarks that authenticate it even if it is a 'correspondence course' from 1988-1989. And it validates what I already found elsewhere. But I find all the evidence I possibly can in pixels and hard copy.
This is in it-
Counterpropaganda Techniques:
> Direct Refutation
>Indirect Refutation
>Diversionary appeals
>Silence
>Forestalling
>Conditioning
>Restrictive measures
>Minimization
>Imitative deception
WHOA. What was that last one? Ah, it refers to altering the effect of hostile info, precisely what pre-emptive bias decoys do though keyword hijacking.
Imitative deception:
Imitative deception involves the changing or altering of hostile propaganda to decrease the credibility and alter the effect.
For instance, friendly broadcasts can deceive the listener as to the identity of the sender.
Audio or video tapes of enemy broadcasts can be slightly altered to change their theme or intent and can be rebroadcast at a later time.
Just prior to World War II, the Germans taped many of President Roosevelt's 'Fireside Chats.' By unscrupulous editing of these tapes and rebroadcasting them in Europe, the German Propaganda Ministry was able to convey the false impression that the U. S. President was supportive towards German policies when, in fact, that was not the case.
Imitative deception is closely associated with black propaganda and cover and deception operations. All of these operations are hazardous in that, if exposed, the user stands to suffer great loss of credibility. So severe is this hazard, the counter-propagandist must see that this technique is employed infrequently and with the utmost proficiency.
Well, it seems imitative deception is now constant, not infrequent.
Mockingbird and its Hollywood branch are working overtime.
Here's FM 90-2 Chapter 5 on Deception and decoys but think MEDIA psy-ops.
Think of USG media as a military stability operations where the truth is considered 'hostile or enemy' propaganda which must be prevented from causing 'the sixties' ever again -http://www.fas.org/irp/doddir/army/fm90-2/90-2ch5.htm Remember that there are many things going on in the battle area that do not appreciably change, regardless of the tactical course of action being followed. Therefore, those specific activities that can reveal the true operation must be identified as critical by the commander and staff. The commander must task participating units to those critical activities. So, in effect there are two aspects of deception that must be brought together in instructions or orders: that which we want the enemy to perceive and that which we must hide.
CHAPTER 5
Deception Means
To achieve victory we must as far as possible make the enemy blind and deaf by sealing his eyes and ears, and drive his commanders to distraction by creating confusion in their minds.
- Mao Tse-Tung,
1893-1976 on Distracted War
Deception means are the methods, resources, and techniques used to convey or deny information to the enemy (see JCS Pub 1). Deception requires providing false indicators to the enemy. If the supporting attack is to be portrayed as a main attack (a feint), the unit conducting the feint must give the enemy evidence that it is the main attack. The enemy collects his battlefield information through visual, olfactory, sonic, and electronic methods.
VISUAL
Much of the enemy's intelligence is based on what is observed on the ground or seen in aerial photographs. Hence, effective visual deception is critical to the projection of the deception story.
....
The enemy's collection capability determines the necessary combination. Since the enemy cannot see the entire battlefield continuously, visual deception efforts must be targeted for specific collector's known to be used in that particular area. The enemy's collection activities should lead him to accept the deception action as our true intention.
DUMMIES AND DECOYS
Two items commonly used in visual deception are dummies and decoys. A dummy is an imitation of something on the battlefield. A decoy is used to draw the enemy's attention away from a more important area. When a dummy is used to draw the enemy's attention away from some other area, it is also termed a decoy. It is not necessary to have specially manufactured equipment for use as dummies. If not extensively damaged, unserviceable or combat-loss items can be used, Also, dummies may be available from supply stocks, or they may be constructed locally using salvage. The distance from which the enemy observes friendly items or actions dictates what degree of realism is required.
Visual deception activity must present a realistic and complete picture. If you are simulating a fortification, an installation, or another activity, you must show significant items the enemy expects to see.
....
CAMOUFLAGE
Camouflage is an important element in deception operations. If we are going to project visual evidence of a deception story, the enemy must not observe evidence of our true operation. We hide, blend, or disguise to prevent the enemy from observing our real activities. However, when employing visual deception, we may camouflage all or part of a real or false military object to project the desired effect. We may intentionally camouflage something poorly so that he will observe what we want him to observe, or we may completely conceal a unit we do not want observed. In any type or size of deception, it is important that projection of visual evidence be consistent. When portraying a particular unit, the use of camouflage must be consistent with that unit's prior camouflage signature (see FM 5-20).
.....
PEOPLE AND THINGS
Using previously prepared positions increases the realism of visual deception. Switching dummy and real items in and out of these positions may calm suspicion that the activity portrayed is a deception. It is especially important to switch real and false items if the deception must be projected for long periods of time.
FALSE VERSUS REAL
If the enemy is to believe a deception activity is real, he must be able to see it. However, care must be taken to make sure that visibility of the deception activity is not too obvious, otherwise the enemy will not accept the projected deception as a real activity. While a deception activity is being projected, it is critical that real activities are concealed from the enemy's view.
.....
Electronic deception operations must be conducted in such a manner that realistic signatures are replicated. Electronic deception operations are often conducted as part of a larger operation. Personnel conducting electronic deception should be specially trained and skilled to ensure that all electronic signatures are orchestrated with other deception events to provide overall fidelity (see Figure 5-2). Deception planners mus remember that what the enemy collects electronically must agree with what he has seen, heard, and smelled.
.....
TIME
The required duration of deception efforts is an important planning consideration. Sufficient time must be available for the enemy to act or react in a desired manner to the deception story. It is undesirable to devise an elaborate deception plan if the enemy does not have sufficient time to read it and take actions which complement friendly intentions.
.....
MATERIEL
Materiel assets for the deception operation may be divided into two parts: those that help us hide the real, and those that help us portray the false,
Hiding the Real
At the core of any successful deception is OPSEC-hiding the real situation from enemy sensors. These sensors range from a reconnaissance patrol leader with binoculars to space platforms. The most commonly used techniques and materials to prevent threat detection are-
* Camouflage.
* Suppressive and absorptive screens.
* Smoke.
* Shielding and/or masking various types of emitters.
* Using terrain to mask units and movements.
* Signal security (SIGSEC) procedures.
* Electronic warfare.
The enemy's sensor capabilities and our exposure time determine the level of OPSEC necessary to successfully hide our real situation and portray the false with deception.
.....
Portraying the False
The most common methods of portraying the false for tactical units may be divided into two categories: visual and electronic.
.....
TECHNIQUES
Four types of deception techniques are used to present the deception story: feints, demonstrations, ruses, and displays.
.....
DISPLAYS
A unit can be tasked to conduct a display as a projection of the deception story. To do this, the unit presents a static production to the enemy surveillance system. In the course of a display, the unit may use simulations, disguises, portrayals, or any combination thereof.
.....
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
NOW TO USE KEYWORD HIJACKING TO CONNECT DON KNOTTS TO A CIA DISASTER AND INTERNATIONAL INCIDENT.
'We Must Protect Our Kids From the Truth'
that was in bold for the scanning readers.
You put this one together, DE. Use your nimble search skills to work out the keywords in:
Don Knotts stars in 'The Incredible Mr. Limpet.'