Anonymous ID: 195f63 Dec. 30, 2023, 9:27 p.m. No.20156816   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6827

>>20156715

>Knows qresearch is functional merely as a news aggregator now.

  1. Conduits to Targets

Within MILDEC, conduits are information or intelligence gateways to the deception target. Conduits may be used to control flows of information to a deception target. It is rare that a deceptive message is sent directly to the deception target itself. Most often, deception messages are sent to intelligence collectors (conduits) with the expectation that the deceptive message will systematically make its way to the deception target.

 

a. Examples of conduits include FISS*, intelligence collection platforms, open-source intelligence, and individuals through whom information reaches the deception target.

 

b. The development and utilization of conduits should be approached systematically. A path should be discernable from the initial input to the conduit to the deception target. Ideally, conduits are part of a closed loop system which facilitate and enable feedback regarding receipt of the deceptive message by the intended deception target and whether or not the desired adversary actions are occurring or will occur. Factors to be considered include: Are there stop gaps between the initial receptor and the final desired end point (the deception target)? Are there filters that might skew the desired perception? Are there conduits that might potentially validate or contradict the desired message? In the case of FISS*, could the conduit potentially serve as a feedback mechanism?

โ€ฆ

b. Termination and Strategic End State. In later phases of an operation, prior to termination, MILDEC should support the transition of responsibility to civil control or other authority. The complexity of joint operations in later phases is compounded by the attempt to disengage the joint force; support for host nation, other government agencies, and nongovernmental organizations as they assume responsibility; the nonlinear nature of the operating area; and the possible lack of sequential timing in the transfer of responsibilities for control of the area. Thus, MILDEC planning and execution during later phases of a campaign may involve selected nonmilitary members, complicating operations security (OPSEC) concerns, and should focus on national objectives and end state, not just the military termination.

 

*foreign intelligence and security services (FISS)

https://jfsc.ndu.edu/portals/72/documents/jc2ios/additional_reading/1c3-jp_3-13-4_mildec.pdf

Anonymous ID: 195f63 Dec. 30, 2023, 9:40 p.m. No.20156892   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>20156866

In Mishnah Middot 3:2-3, it is recorded that there were two openings at the base of the altar, and into those two cavities drained the blood poured at the base down into the SHISSIN, where it tells us they emptied out into the Kidron brook. The Kidron brook is a small stream that runs in the Kidron valley on the eastern side of the city of Jerusalem, and descends southward from there towards the Dead Sea.

โ€ฆ

we read in Pesachim 65b that the drain holes at the base of the altar that normally kept the blood of the sacrifices from pooling were deliberately plugged during the holy day of Passover! This odd deed caused an already gory situation to become an almost unimaginably macabre scenario. The blood was not dealt with immediately by descending into the SHISSIN. It stayed in the courtyard, and with each successive slaughter of the lamb on Passover, the blood on the floor increased, until it was a vast pool covering the entire floor around the altar! The priests, unable to wear shoes while ministering, therefore walked barefoot in the blood of the Passover lambs.

 

THE BLEEDING TEMPLE

https://www.randomgroovybiblefacts.com/the_bleeding_temple.html

Anonymous ID: 195f63 Dec. 30, 2023, 11:15 p.m. No.20157207   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7214

>>20157183

>Infiltrated the Q movement

Perhaps, but they lacked the staying power and missed Q #3387. They merely accomplished the following for a brief period:

 

The Significance of Deception in Contemporary Information Warfare

the major methods of deception are:

โ€ข Producing โ€˜noiseโ€™ in the communication channel so that the foe receives only the data allowed by the deceiver.

Information Warfare and Deception, Informing Science, Volume 9, 2006

https://www.researchgate.net/publication/49277989_Information_Warfare_and_Deception