The Nature of
Disinformation
Disinformation is the
most potent tool for manipulating mass
consciousness. While there is no shortage of
innocent misinformation stemming from
logical fallacies, wishful thinking, false
assumptions, selective evidence, and
outright ignorance, the difference is that
disinformation intentionally exploits these
weaknesses to shape the beliefs and actions
of targeted audiences.
Disinformation is
especially successful when its core agenda
is bundled in the sincere convictions of
disseminators who have their own vested
interests for believing and defending it.
For instance, a cold and calculating
intelligence may engineer a disinformation
package which is then propagated through a
naive individual who finds it so appealing
to his ego identity and emotional security
that he will do everything to defend it.
This allows a small and unseen group of
disinformers to work through a vast body of
unsuspecting vectors who sincerely believe
in what they are doing.
Disinformation also
uses selective truths to support false
conclusions. Good reasoning may proceed from
false premises, fallacious twists of logic
are used, or reasoning is discouraged
altogether and the conclusion is asked to be
taken on emotional appeal or the authority
of its purported source. Disinformation has
no problem throwing strategic gambits,
revealing genuine but convenient truths to
make its case if the payoff is bigger than
the sacrifice.
Discerning
Disinformation
Discerning
disinformation is tricky business. It
amounts to performing a mental biopsy on the
pathological underpinnings of a suspect
source. It helps to have a well-honed
intuition that can detect pretense, after
which critical thinking zeroes in on the
exact problem. The problems tend to be false
assumptions, ignored counterexamples,
logical fallacies, and ulterior motives.
More specifically,
alien disinformation plays to these common
psychological vulnerabilities: lazy
thinking, ego insecurities and the desire to
be special, naive optimism that leads good
intentions down a dangerous path, greater
respect for credibility and authority than
personal discernment and intuition, wishful
thinking, desperation for answers and
consequent lowering of standards, wonderment
at amazing but superficial appearances to
the point of gullibility, and desire for
escapism out of sheer boredom.
Since the goal is to
influence opinion, the best disinformation
is concise, slick, and persuasive. It
maximizes credibility by taking whatever
form of authority the target respects most
and is careful to dispel suspicions that the
source is doing it for fame or financial
gain. It is false to assume that if someone
risks publishing revelatory information
without asking anything in return, he must
be sincere; on the contrary, what
disinformation asks for in return is belief
in its half-truths.
The best
disinformation so tidily packages its
deceptions that the containing story can be
impressively concise, charming,
entertaining, and easy to follow. It goes
beyond mere logical fallacies and employs
hypnotic techniques to massage the targeted
mind into accepting the payload. These
manipulation tactics are nothing exotic.
Psychological warfare specialists, street
magicians, neurolinguistic programmers, and
advertisers make regular use of them in
their professions.
Disinformation must
ideally exploit the deepest desires,
insecurities, and blind spots of the target,
which necessarily vary by audience type. The
originators of disinformation therefore use
different methods and sources to appeal to
different audiences. In the case of
individuals used as unwitting
agents of deception, their selection depends
on how easily their weaknesses allow them to
be hooked into performing that function and
how well their strengths are suited to
playing on the weaknesses of the audience.
In this way a chain of influence reaches the
audience via an intermediary who has the
added appeal of being skilled and respected.
Avenues of
Disinformation
What follows is an
exploration of several avenues for alien
disinformation and why they are convenient
and effective. This should indicate just how
easily the fringe research community and
general public can be misled by sources they
trust if they fail to take into
consideration the possibilities discussed
below. These same avenues can also be
outlets for truth, so my aim is not to
universally discredit these sources, but
rather point out their potential
shortcomings.
The
Channeler
Summary:
Channeling involves one or more
individuals allowing themselves to be
used by unseen intelligences who
communicate information through them.
This includes the use of ouija boards,
mediumistic trance states, automatic
writing, and conscious verbalization of
intuitive impressions. Pendulum dowsing,
muscle testing, scrying, and crystal
gazing may also allow such
communication. The channeled sources may
claim to be anything ranging from aliens
to angels, deceased persons to demonic
beings, famous individuals in history,
time travelers, other dimensional
entities, the subconscious, and
impersonal archetypes.
Strength of
Source: Discarnate entities, alien
beings, and advanced human military
factions can transmit verbal and visual
information remotely, whether
electromagnetically or telepathically.
They also have limited ability to induce
paranormal phenomena, predict the
future, and arrange synchronistic events
by which they can prove their existence
and overwhelmingly awe the target into
submission. This exploits the logical
fallacy that truth of existence somehow
equates to existence of truth, which
ignores the possibility that a real
source can provide bogus information
where it counts. These demonstrations of
faux omniscience, omnipotence, and
precognition rule out that the source is
just a fabrication of the channeler, but
do not prove that the source being
channeled is necessarily being truthful.
Channeling also
affords deceptive sources complete
anonymity and freedom to fabricate an
identity and back story. Channeling is
therefore highly customizable to the
weaknesses of the targets. The same
source can change identities repeatedly
to whatever sounds most authoritative.
Weakness of
the Vector: Establishing and
maintaining a connection requires mental
dissociation so that the source can come
through clearly without restriction by
the conscious mind of the channeler.
This amounts to a relinquishing of
freewill, and a manipulative entity may
abuse this offer by sinking roots into
the mind of the channeler, deeper than
it could otherwise. In worst cases this
can lead to possession, where the
channeler not only transmits
disinformation during specified
sessions, but becomes a walking
extension of the negative entity,
serving an agenda in broader ways.
Conscious abandonment over the
channeling process may also grow into
habitual abandonment of discernment and
critical thinking, whereby the channeler
simply accepts and relays what is
transmitted after having been won over
with convenient but trivial truths.
Strength of
the Vector: Being just the
messenger frees a channeler from having
to personally defend the information
received. The source is likewise freed
from always having to back up its claims
by virtue of its self-proclaimed
authority and various specious excuses.
Through channeling, disinformation is
given unlimited creative latitude,
taking bold and direct expressions since
claims that are too far-fetched for
other audiences will readily be accepted
by channeling enthusiasts. If especially
entertaining and fascinating, source and
channeler rise to cult or celebrity
status, which adds to the authority
factor that overrides critical thinking.
Weakness of
Audience: Since channeling is
perceived by rationalists as a dubious
means of investigation, it appeals more
to people who pride themselves on being
open minded and not fettered by the
limitations of cold intellect. But there
is a fine line between open mindedness
and gullibility, and those who would
replace rather than complement reason
with intuition leave themselves
vulnerable to logical sleights of hand,
emotional manipulation, wishful
thinking, and other forms of
subjectivity. Channeled disinformation
would play upon these weaknesses.
Remote
Viewer
Summary:
Remote viewing uses rigid protocols to
psychically gather information about a
target with minimal subjective bias.
Several remote viewers may tune into the
same target and receive similar
impressions, which are then analyzed
afterward to construct an accurate
assessment of the target. The U.S.
military is publicly known to have
explored remote viewing as an
intelligence gathering method. More
recently, various researchers have used
remote viewing to probe the nature of
the alien presence.
Strength of
Source: As in the case of
channeling, alien and advanced human
disinformers can transmit information
remotely through natural or artificial
telepathy. Remote viewers, even entire
teams, are thus open to having their
psychic line spliced by such
disinformers and fed misleading
impressions.
Weakness of
Vector: The greatest weakness is
assuming that remote viewing success is
measured by its signal to noise ratio,
which ignores the possibility of a
strong but counterfeit signal. Even with
subjectivity eliminated, what remains is
no guarantee of being truthful.
Strength of
Vector: Remote viewing has a
reputation for being rigid, objective,
even scientific. Some of its
practitioners have worked for the
military, others have respectable
academic backgrounds. All this gives it
an air of credibility and authority that
can augment any disinformation
disseminated through it.
Weakness of
Audience: Remote viewing appeals to
open minded individuals who value
objectivity and scientific procedure.
Although it is more hard-edged than
channeling, when used for disinformation
the apparent objectivity is just better
window dressing for the same deception.
That the public military has
experimented with remote viewing and
successfully gathered intelligence on
targets in nations without psychic
defenses does not mean remote viewing
alien targets is equally reliable.
Disinformation passed through remote
viewers disseminates deceptive ideas
under the guise of strict objectivity.
Insider /
Whistleblower
Summary:
Insiders are members of secret
societies, military projects, or
government agencies who are privy to
non-public information. For various
reasons, insiders may leak some of this
information to the public. Often they do
it anonymously, perhaps through third
party contacts on the outside who can
vouch for their identity but keep it
confidential while relaying the
information. They may also speak openly
without hiding their identity, but then
tend to be careful about not revealing
more than they are allowed. Some
self-claimed insiders are casually
upfront and detailed, seemingly holding
nothing back.
Strength of
Source: Insiders work within highly
controlled, compartmentalized, and
monitored environments as demanded by
the secret nature of their work. They
are therefore in close proximity to high
level sources of disinformation who have
immediate access to them, particularly
sources stationed above them in the
hierarchy. If the source is an advanced
military faction, the covert nature of
the military network allows personnel to
be abducted and mind programmed as
necessary to create unwitting
disinformation vectors. Personnel may
also be tested, monitored, and recruited
into becoming skilled disinformation
operatives, whether fully aware of their
mission to deceive, or given a
convincing cover story and some fake but
noble sounding reason to leak
“important” information to the public.
Some may even be shown misleading
evidence and documents and stealthily
nudged into becoming whistleblowers,
thereby disseminating the deception with
full conviction that they are somehow
undermining their superiors when they
are actually carryout out their
intentions.
Weakness of
Vector: Insiders gain increasing
levels of security clearance by
demonstrating a need to know, passing
tests of allegiance and usability,
signing secrecy oaths, giving away
personal rights, and agreeing ahead of
time to the punishments for breaking
these oaths. Secretive networks have
numerous methods for ensuring that
security stays intact including monetary
incentives, blackmail, threats to
livelihood, hypnotic mind control, and
selecting only highly manageable and
obedient candidates for recruitment.
Personnel are only told what they need
to know to do their jobs, which often
includes false but plausible stories to
compel their cooperation.
Compartmentalization makes it difficult
for an insider to compare notes with
others to detect disinformation fed to
him by superiors. Despite having secret
knowledge, insiders are still woefully
in the dark concerning information
beyond their clearance level.
Compartmentalization keeps the bigger
picture out of sight, and without that
context insiders may not always detect
disinformation in what they have already
been told.
Strength of
Vector: Anyone who is verifiably on
the “inside” is venerated for being in
so privileged and qualified a position,
and for being courageous and generous
enough to risk leaking precious
information to the public. This bestows
upon their words great credence because
what they say amounts to expert witness
testimony, words by those who are in a
position to know. Of course this
appearance of authority creates the
perfect vehicle for seeding
disinformation. Secrecy oaths and
national security laws are also good
excuses for dodging certain inconvenient
questions and adding an atmosphere of
intrigue.
Weakness of
Audience: Compartmentalization and
secrecy laws prevent the public from
more thoroughly investigating insider
claims by barring them from accessing
evidence under wraps, documents still
classified, and witnesses unwilling to
risk their lives. Much of what insiders
say must be taken on the basis of their
credibility. If they can prove their
credentials, that impresses many, but
insiders are secured an influential
voice if their story is also
conveniently corroborated by leaked
documents and intriguing photos that
pander to the audience’s assumptions,
questions, and desperation for
confirmation.
Audiences are
guaranteed to be duped if they fail to
rule out the possibility of the insider
being a disinformer regardless of his
credentials, especially if his claims
are supported by forged photos and
documents supplied by the well-equipped
and connected network sponsoring him.
The best that audiences can do is look
for errors and contradictions in his
claims, and more importantly, make a
probabilistic assessment of his
integrity based on the angle behind his
claims and whom it would benefit most.
Public
Official
Summary:
Public officials include elected or
appointed members of political and
religious institutions, usually those
with special titles and credentials who
are situated in respected positions of
leadership.
Strength of
Source: Disinformers hold a great
advantage of influencing through a
highly visible figurehead without
themselves being seen. They can be among
his personal advisors, programmed or
recruited associates who are planted
close to him to sway his beliefs and
decisions, secret organizations from
which he periodically receives
instructions, or alien factions
abducting and programming him into
adopting their goals. These sources can
easily blackmail the official, exploit
his naivete, offer incentives of money
and power for obedience, and tell/show
him whatever “truth” shocks him into
cooperating.
Weakness of
Vector: The official is first and
foremost a public figure whose loss of
reputation and popular support spells
the end of his career. He can therefore
be threatened with character
assassination, real assassination, or
bribed with promises of personal and
institutional advancement and
protection. Being a public official can
be so time-consuming that time for
personal independent research and
thorough contemplation is limited, which
may make him dependent on advisors for
condensed briefings and recommendations.
This makes for reliance on potential
sources of disinformation and an overall
lack of discernment concerning matters
beyond his expertise. His prominence as
a public figure may also make him too
much of a liability to be given the real
truth, so he may be barred from higher
security clearances unless he has an
absolute need to know. And unless he has
intelligence, allegiance, and power that
surpass his role as public official, he
is expendable.
Strength of
Vector: Officials are
decision-makers, opinion leaders. If
their reputation is intact, their words
hold sway over public opinion. They can
influence public opinion to hijack
democracy, advancing private agendas
under the protection of majority vote.
Officials can also invoke the power and
reverence of the institutions they
represent, like a church official
declaring some political agenda as being
in the will of God.
Weakness of
Audience: The audience in this case
is the general public, the least
discerning audience of all. Typically
speaking, the public has blind respect
for authority, is easily impressed by
credentials, and lacks the knowledge and
context to properly evaluate they are
told — especially if they are told
disinformation concerning fringe
subjects like aliens. This is simply the
fact of statistical averages. The
mainstream public has a need for
security, stability, and certainty,
which authorities are obliged to
provide, though not without political
motivation. Should public officials,
with full sanctioning by their
affiliated institutions, reveal the
existence of aliens, the shock to mass
consciousness and ensuing clamor for
answers and assurance allows these same
officials to also unload a torrent of
gladly received disinformation
concerning alien motivations and
identities.
Academic
Summary:
Academics include credentialed doctors,
scientists, professors, theologians,
analysts, and other highly educated
specialists whose research and
presentations methods are formal,
systematic, and sophisticated. Those
involved in researching various facets
of the alien phenomenon may have degrees
useful to their facet of study. They
typically cite other academics to boost
their own credibility, drawing their
conclusions by surveying the relevant
literature and collating authoritative
viewpoints into a generalized
observation somewhat enhanced by their
own original research.
Strength of
Source: Since the intellectual
capabilities and strategic value of an
academic can be inferred without
difficulty through his credentials,
reputation, and publications, a broad
pool of candidates may be monitored to
select who is most qualified to be
groomed into a disinformation vector.
Academics who refuse to cooperate and
become liabilities can be eliminated,
either through murder or smearing of
character.
Alien and military
factions can also corrupt the
relied-upon data pool by inserting decoy
data, say through abductees programmed
with screen memories that portray a
false picture of alien motivations. In
that case, without suspecting the
possibility of deception, an academic
will accept the decoy at face value and
inject its contents into his works. And
even if he suspects it, his suspicions
cannot be voiced without risking his
credibility by appearing paranoid.
Weakness of
Vector: The need to preserve
reputation and appear reasoned,
cautious, and formal can lead to an
agnostic timidity that keeps the
academic from taking those creative
leaps of thinking necessary to penetrate
the depths of a mystery. It also
discourages him from acknowledging
sources of information that do not meet
the standard of his peers despite
containing critical pieces of the
puzzle. Additionally, it is no secret
that universities are as much
indoctrination and filtering devices as
educational institutions, and those who
most successfully pass through that
filter have demonstrated programmability
and a willingness to obey the rules and
pander to group consensus. And so
despite having a sharp intellect, the
potential lack of individualism and
astute intuition can make a renowned
academic gullible to the grandest of
deceptions, especially those endorsed by
his respected peers and academic
superiors.
Strength of
Vector: The primary strength of an
academic is his level of sophistication,
in the sense of being cultured and
refined. But sophisticated does not
necessarily mean discernment, as it
could mean being a sophisticated
rationalizer and disinformer, hence a
master sophist. Further, academics are
automatically endowed with credibility
due to their credentials and often work
in positions of influence and
advisement. Credibility and
sophistication together lead to
effective debunking of truths and
verification of lies. They can also
function as role models in the fringe
community, spreading an infectious
attitude of myopic agnosticism to those
most in need of the opposite.
Weakness of
Audience: For some audiences,
academics are epitomes of objectivity
and respectability who are beyond
reproach, especially groups of academics
in agreement with each other. The most
skeptical audiences will listen to
academics more than other types of
disinformation vectors. They may find
the disinformation to be more plausible
than the truth because at least the it
fits their unrealistic assumptions and
comes from an assumedly incorruptible
source. The job of an academic
disinformer would be to make an
intricate case for a deceptive agenda
while marginalizing contrary truths as
not meeting the standards of
plausibility and credibility.
Abductee /
Contactee
Summary:
Abductees and contactees are people who
have had direct contact with alien
beings. Abductees are taken from their
familiar surroundings and brought into
the abductor environment where they
undergo various procedures. Contactees
have conscious participation in the
interaction and become spokespersons for
their alien contacts. Not all contactees
are necessarily abductees, nor are all
abductees necessarily contactees, but
the two categories overlap since
contactees get abducted and abductees
can be groomed into consciously
facilitating an alien message.
Strength of
Source: Abductors have direct
access to the abductee in an environment
they control. Various alien and military
factions have the ability to create
false memories, scan the mind and auric
vibrational signature to analyze
weaknesses and biases, use posthypnotic
mind programming techniques to install
subconscious commands, employ telepathic
or implant-generated persuasion, monitor
their subjects from afar, stage false
confirmation through garish
coincidences, and construct exquisite
lies and rationalizations. They can scan
the population and the probable futures
of interesting individuals to select
those who are most suitable to their
aims, and through logistical and
hyper-dimensional advantages give
customized attention to the ones chosen.
Weakness of
Vector: The greatest weakness of an
abductee or contactee is knowing less
about himself than what his contacts or
abductors know. They have backdoor
entrances to his mind and can perform
manipulations that stealthily influence
his thoughts and impulses. Unless he is
aware of that possibility and guards
against it, it is pretty much
inevitable.
Abductees and
contactees may feel alienated from
society due to having uncommon and
unbelievable experiences, thus seeing
themselves as different from others. If
hitched to ego, this can degenerate into
feelings of privilege, superiority, or
specialness which serve as hook points
for the abductors to compel allegiance.
Their identity may become so heavily
invested in being the contactee of a
particular alien group that any
suggestion of dishonest motivations by
their alien contacts is subconsciously
interpreted as an attack upon their very
identity, which naturally provokes an
irrational defense mechanism.
Some may simply
give up, feeling overpowered by superior
intelligences with superior technology,
and in a psychotic attempt to salvage
the situation turn into willing and
zealous cooperators per Stockholm
Syndrome.
Strength of
Vector: Real abductees and
contactees exude plenty of sincerity and
conviction in recounting their firsthand
experiences with aliens. Their candor
can be disarming to undiscerning
audiences. Abductees who document their
experiences may have audiovisual,
medical, or testimonial evidence that
they are indeed being abducted, and that
alone piques people’s curiosity about
what they learned in the presence of
assumedly real aliens.
Weakness of
Audience: Like in the case of
channelers, contactees can become the
center of personality cults, playing the
role of intermediaries between the
audience and their alien idols like a
prophet or pontiff intermediating
between worshippers and the divine. It
is the abductee and contactee’s
proximity and direct interaction with
mysterious aliens that boosts the
credibility of whatever disinformation
is vectored through them.
The targeted
audience consists of abductees searching
for answers, researchers of the
abduction phenomenon looking for inside
information on alien motivations, and
people wishing they themselves could be
contacted by aliens. Disinformation
appeals to their private longings and
blind spots, taking what little they
know toward false conclusions and
satisfying their ego along the way.
Hypnotist
Summary:
The hypnotist is trained to guide a
client into achieving altered states of
consciousness deep enough to access the
subconscious. The hypnotic trance is one
of high suggestibility and dissociation.
Abduction researchers commonly accept
hypnosis as an investigative tool to
help their subjects recover abduction
memories made inaccessible by having
been in an altered state of
consciousness during the abduction, or
by abductors installing screen memories
and posthypnotic commands to forget.
Hypnotized subjects can also be used for
remote viewing, exploring past and
future probable lives, and as passive
instruments for channeling other beings.
Strength of
Source: Alien and military factions
can install multiple layered screen
memories in abductees, stage misleading
abduction scenarios, and remotely jack
into a hypnotized subject’s mind to
speak through him while he is
unconscious.
Weakness of
Vector: Hypnotists may be in over
their heads when dealing with
disinformation sources coming through
their clients. If they are unaware that
screen memories can lurk beneath deeper
screen memories, they may only penetrate
the decoy screen and accept the next one
as likely truth. Same with staged
abductions, where what is recalled is
indeed what was experienced, but the
experience itself was staged for the
abductee as a diversion. And if the
hypnotized person becomes an instrument
through which a disinformer can directly
speak, then the hypnotist is in live
contact with someone or something that
can play to his weaknesses.
Strength of
Vector: The information retrievable
through hypnosis is fascinating,
entertaining, and often verifiable. This
gives it wide appeal and respect in the
fringe research field. It may also be
used by academics as a research
supplement to expand their data pool.
Like in the case of channeling, because
what is said cannot always be verified,
disinformation can be as creative and
fantastic as desired.
Weakness of
Audience: Disinformation rides the
assumption that what is retrieved
through hypnosis, if not fabricated by
the subject or induced by the hypnotist
through leading questions, is very
likely the truth. Once again, this is
the fallacy “if not subjective and
false, then objective and true,” which
ignores the possibility of objective
deception. In ordinary cases where there
are no deceptive intentions involved,
hypnosis can indeed be reliable. But the
trust and respect hypnosis earns by the
reliable cases should not be blindly
transferred to potentially
disinformative cases.
Direct
Messages
Summary:
Messages to the public may appear to
come directly from aliens without a
middleman. This includes radio signals
from space, hijacked television
transmissions, crop circles, and
anonymously disseminated texts written
from their point of view.
Strength of
Source: Any alien or military group
with sufficiently advanced technology
can create crop circles, take over
television signals, broadcast radio
signals from space, and use anonymous
human proxies to distribute carefully
written messages to the world. Their
abilities greatly exceed what the casual
hoaxer can pull off, which they use to
their advantage to make the messages
seem beyond hoaxability and thus
authentic.
Weakness of
Audience: If the audience really
believes the message comes from aliens,
they will be intrigued and take the
message as a sincere declaration of
alien intentions. The message may take
an authoritative tone, take the form of
responses to messages we ourselves have
sent into space, appeal to ethical memes
like concerns over global warming,
overpopulation, or government
corruption, tantalize the intellect with
feigned crypticism, or prime the
audience for future deceptions by giving
key future dates and prophecies. The
audience must truly be convinced aliens
are sending urgent messages to the world
so that the content of the message
influences their opinion about the
nature of these aliens and what must be
done. Disinformation sent via direct
messages aim to distort public awareness
of alien motivations and influence the
audience into supporting certain actions
and values that are beneficial to an
agenda.
As can be seen,
disinformation uses a variety of methods to
target a variety of audiences.
Audiences include:
- The general
public who would prefer stability and
security over disquieting truths
- Spiritual and New
Age types who succumb to wishful
thinking and emotionalism
- Intellectuals
whose limited reasoning follows from
flawed premises
- Counter-cultures
whose fascination with the bizarre
outweighs their interest in truth
- Factualists who
only accept evidence fitting their
subjective standards of credibility
- Political
activists who would support false
solutions to combat true injustices
-
UFO buffs who
hungrily swallow crumbs of
disinformation for its sensational
nature
- Abductees whose
identities are invested in being
liaisons between humans and aliens
Methods include:
- Appealing to
blind respect for authority
- Appealing to
false and limiting assumptions
- Appealing to
emotional biases
- Appealing to a
need for safety, security, and certainty
- Appealing to the
ego’s desire for identity and
specialness
- Appealing to
boredom through tantalizing and
entertaining stories
- Appealing to
skepticism to ridicule the truth
- Appealing to
mental lassitude by presenting an overly
simplistic picture
- Offering a false
outlet for good intentions
- Using logical
sleights of hand
- Forcing a choice
between two equally false opposites
- Providing
misleading evidence
- Staging
artificial corroboration through
seemingly independent sources
How can one tell if a
source is peddling disinformation and not
just innocently expressing a differing
opinion? It is true that people can
unwittingly pass on half-truths after having
bought into them, but the question concerns
the ultimate source of those ideas. The
answer is that the intentionality behind
disinformation gives its flaws a pointed
direction. In other words, the flaws are too
clever and directional to be unintentional,
bearing the signature of crafty intelligence
beneath its projected guise of innocence.
Leaderless Conspiracy
At the same time, it
must be emphasized that an agenda can be
carried out through seemingly opposing
elements, whereby the illusion of outward
disunity and independence cloaks the
underlying order.
Therefore the
conspiracy isn’t as organized as one would
think because those beneath the capstone of
the pyramid of control may seemingly act on
their own. They may be at odds with each
other, mutually suspicious or contemptuous,
independently carrying out their own agendas
and acting on their own unique ideologies.
But like swimmers drifting down a river
together despite moving independently
relative to each other, these vectors of
disinformation may oppose and cancel each
other in the superficial sense yet still
have a common direction that advances the
highest unseen agenda.
There is no need for
coordination among lower elements of a
conspiracy if a broad range of carefully
designed causes initiated earlier produce
cascading effects that cleverly converge at
the right time. For human conspirators this
would require an incredible level of
foresight, but foresight and hindsight are
interchangeable for interdimensional forces
operating outside linear time who have no
problem scanning the timeline for the right
points to target.
So while different
streams of disinformation and misinformation
appear to contradict each other in the
details, it is their common direction and
combined synergy that matter. One must
examine the ultimate consequences to discern
the ultimate motives. This I will do in the
next part by providing and analyzing
numerous examples of alien disinformation. |