Anonymous ID: e2c4ee Nov. 1, 2023, 4:50 p.m. No.19845090   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5100 >>5134

>>19845034

>11.3

Deception in Support of Operations Security (DISO). DISO is a MILDEC activity that protects friendly operations, personnel, programs, equipment, and other assets against foreign intelligence and security services (FISS) collection. The intent of a DISO is to create multiple false indicators to confuse or make friendly force intentions harder to interpret by FISS, limiting the ability of FISS to collect accurate intelligence on friendly forces. DISOs are general in nature, they are not specifically targeted against particular adversary military, paramilitary, or VEO decision makers, but are, instead, used to protect friendly operations and forces by obfuscating friendly capabilities, intent, or vulnerabilities. JP 3-13.4 https://jfsc.ndu.edu/portals/72/documents/jc2ios/additional_reading/1c3-jp_3-13-4_mildec.pdf

 

Examples of Deception In Support of Operations (DISO)* in the writings of Q :

*('create multiple false indicators to confuse or make friendly force intentions harder to interpret'), (obfuscating)

 

11.3 (https://qalerts.net/?q=11.3) 9 post(s) found containing "11.3".

D5 (https://www.newsweek.com/qanon-conspiracy-posts-trump-news-d5-december-5-george-bush-storm-great-1245823) Successful feint. See Q #2553.

2018 will be glorious. (https://qalerts.net/?q=2018+will+be) 13 post(s) found containing "2018 will be glorious".

11.11.18

 

Conduits to Targets

Within MILDEC, conduits are information or intelligence gateways to the deception target. Conduits may be used to control flows of information to a deception target. It is rare that a deceptive message is sent directly to the deception target itself. Most often, deception messages are sent to intelligence collectors (conduits) with the expectation that the deceptive message will systematically make its way to the deception target.

a. Examples of conduits include FISS, intelligence collection platforms, open-source intelligence, and individuals through whom information reaches the deception target.

b. The development and utilization of conduits should be approached systematically. A path should be discernable from the initial input to the conduit to the deception target. Ideally, conduits are part of a closed loop system which facilitate and enable feedback regarding receipt of the deceptive message by the intended deception target and whether or not the desired adversary actions are occurring or will occur. Factors to be considered include: Are there stop gaps between the initial receptor and the final desired end point (the deception target)? Are there filters that might skew the desired perception? Are there conduits that might potentially validate or contradict the desired message? In the case of FISS, could the conduit potentially serve as a feedback mechanism? JP 3-13.4

 

Really, a conduit like CBTS or /qresearch could be 'a feedback mechanism' to a 'foreign intelligence and security service'? 11.3 was DISO. /qresearch is a conduit. Pic related.

Anonymous ID: e2c4ee Nov. 1, 2023, 5:14 p.m. No.19845237   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>19845183

The masses are trailing you. They must be synchronized to peak together for maximum societal impact. That's the desired and most-advantageous offensive outcome of an information war designed to move populations into the desired social outcome. We'll all be taken to a societal precipice together - some of us have arrived early.