Anonymous ID: 3aefda Aug. 17, 2025, 2:09 p.m. No.23474255   🗄️.is 🔗kun   >>4263

>>23474246

 

What in the actual fuck are you talking about dipshit?

 

They attempted to infiltrate, repackage & rebrand as their own.

Profit-vehicle.

Destroy through [misinformation].

Absorb the 'confused'.

Re-route traffic to other platforms.

Action was needed [2].

  1. Prevent false decodes/misinformation

  2. Kill [targeted] infection prior to expansion

Simple 'non-direct' statements made.

"Be careful who you follow."

"Some are profiting off this movement."

Message sent.

Message received.

Anonymous ID: 3aefda Aug. 17, 2025, 2:10 p.m. No.23474259   🗄️.is 🔗kun

>>23474256

 

Make sure to use hominem to attack the messenger rather than address the message

 

The choice [of information] has always been yours.

"Free thought" is a philosophical viewpoint which holds that positions regarding truth should be formed on the basis of logic, reason, and empiricism, rather than authority, tradition, revelation, or dogma.

Information warfare.

Anonymous ID: 3aefda Aug. 17, 2025, 2:35 p.m. No.23474335   🗄️.is 🔗kun

Regarding the "pre-emptive" invasion of Iraq, in

2002 Ledeen criticized the views of former National Security Adviser Brent Scowcroft, writing: 26]

Scowcroft has managed to get one thing half right, even though he misdescribes it.

He fears that if we attack Iraq "I think we could have an explosion in the Middle East. It could turn the whole region into a caldron and destroy the War on Terror." One can only hope that we turn the region into a cauldron, and faster, please.

If ever there were a region that richly deserved being cauldronized, it is the Middle East today. If we wage the war effectively, we will bring down the terror regimes in Iraq, Iran, and Syria, and either bring down the Saudi monarchy or force it to abandon its global assembly line to indoctrinate young terrorists.

That's our mission in the war against terror.

  • Michael Ledeen

Anonymous ID: 3aefda Aug. 17, 2025, 2:35 p.m. No.23474338   🗄️.is 🔗kun

How We Can Win the Global War Against Radical Islam and Its Allies

THE

FIELD OF FIGHT

Lt. General

Michael T. Flyn

and Michael Ledeen

 

Project Veritas

To support Project Veritas in 2017 and 2018 and while she was a staff member on the Chuck

Grassley led Senate Judiciary Committee, Barbara Ledeen was tasked to help discredit H.R.

McMaster because he had stated that President Trump had the intelligence of a "kindergartner" and was an "idiot."[53] She posted numerous comments on Facebook supporting Project

Veritas including "We owe a lot to Erik Prince" because of his efforts to support Project Veritas and many disparaging posts about McMaster. 143]

Her involvement in the campaign to discredit McMaster led to Barbara Ledeen being named as a member of the Groundswell group; she admitted passing on information to Project Veritas but said

"I am not part of a plot."(43][54]

 

Missing Clinton emails

Barbara Ledeen sparked controversy in 2015 when she tried to launch her own investigation into Hillary Clinton's emails, while a staffer for Senator Chuck Grassley on the Senate Judiciary Committee which was looking into Trump's Russia issue.I44] According to FBI notes, she requested the assistance of both a defense contractor and

Newt Gingrich who asked Judicial Watch for financial assistance for her efforts. (44] Judicial

Watch requested another contractor to access the "deep web and dark web" [44] Matt Tate, a former British intelligence official, was approached by Peter W. Smith, an aid close to Gingrich and who was also working with Michael Flynn who is a confidant of Barbara Ledeen's husband, who Tate said Smith was obtaining Clinton's emails independently of Barbara Ledeen's efforts which Grassley had told her to stop. (44][45][46] [b]

Anonymous ID: 3aefda Aug. 17, 2025, 2:35 p.m. No.23474339   🗄️.is 🔗kun

STATE OF NORTH DAKOTA

COUNTY OF WARD

STATE OF NORTH DAKOTA EX REL.

WAYNE STENEHJEM,

ATTORNEY GENERAL,

Plaintiff,

-VS-

TERPSICHORE MARAS, AKA TERPSICHORE MARIA HELEN LINDEMAN, AKA TERPSICHORE LINDEMAN, AKA TERPSICHOR MARAS-LINDEMAN, AKA TERPSICHORE MARAS-LINDEMAN, AKA TERPSICHOR MARAS, AKA TERPSICHORE P LINDEMAN, AKA TERPSECHORE MARAS-LINDEMAN, AKA TORE MARAS-LINDEMAN, AKA TERPSICHOR LINDEMAN, AKA TERPSECHORE MARAS-LINDEMAN, AKA TERPSEHORE P MARAS-LINDEMAN, AKA TERPSEHORE PETE MARAS-LINDEMAN, AKA TERPSEHORE MARAS-LINDEMAN, doing business as A MAGIC CITY CHRISTMAS and MLLABS - EVENTS,

 

= Newsweek

SUBSCRIBE FOR $1

Who Is Terpsichore Maras-Lindeman? Powell Witness Identified As a Pro-Trump Podcaster

Published Dec 25, 2020 at 5:24 PM EST

Login

By Emily Czachor

Staff Writer

FOLLOW

155

Terpsichore Maras-Lindeman, the witness who claimed to be a private intelligence contractor in testimonies meant to back Sidney Powell's election lawsuits, is a conservative podcaster and supporter of President Donald Trump.

 

'In your paper, you must describe your hypothetical attack and what will happen in the aftermath.' - NYU Professor Marie-Helen Maras (above), in the syllabus of her course on terrorism

 

The controversial course, taught by former Navy criminal investigator Marie-Helen Maras, asks the pupils to "step into [a terrorist's] shoes" and write a

10- to 15-page paper on their battle plan.

"Some of the most notorious terrorists, including Anwar al-Awlaki, got their start on American campuses. It looks like after the CIA killed al-Awlaki, NYU is helping to produce successors, said an outraged law-enforcement expert on terrorism.

Anonymous ID: 3aefda Aug. 17, 2025, 2:35 p.m. No.23474340   🗄️.is 🔗kun

SWISS BANK

× $74

CORPORATION

SCHWEIZERISCHER BANKVEREIN SOCIÉTÉ DE BANQUE SUISSE

Swiss Bank Corporation logo (c.

1973), featuring the three keys meant to symbolize confidence, security, and discretion

 

UBS Group AGin 1 is a multinational investment bank and financial services company founded and based in Switzerland. Headquartered in Zürich, it maintains a presence in all major financial centres as the largest Swiss banking institution and the largest private bank in the world. UBS client services are known for their strict bank-client confidentiality and culture of banking secrecy.

Inb 2] Because of the bank's large positions in the Americas, EMEA and Asia Pacific markets, the Financial Stability Board considers it a global systemically important bank.

UBS Group AG

UBS

 

NBC NEWS

• WATCH LIVE

NEWS

UBS buys Credit Suisse for $3.2 billion as regulators look to shore up the global banking system

The Financial Times reported that UBS has agreed to buy the bank for more than $2 billion, a substantial increase from the initial $1 billion offer it reported earlier

Sunday.

 

Three keys logo by Warja

Lavater. (3]

Logo for Swiss

International Exhibition of 1939 by Warja

Lavater.

Anonymous ID: 3aefda Aug. 17, 2025, 2:36 p.m. No.23474342   🗄️.is 🔗kun

The Panama Papers (Spanish: Papeles de

Panamá) are 11.5 million leaked documents (or 2.6 terabytes of data) that were published beginning on April 3, 2016. The papers detail financial and attorney-client information for more than 214,488 offshore entities. 1121131141151161 The documents, some dating back to the 1970s, l7 were created by, and taken from, former Panamanian offshore law firm and corporate service provider Mossack Fonseca, 8119 and compiled with similar leaks into a searchable database. (101

 

The Paradise Papers are a set of over 13.4 million confidential electronic documents relating to offshore investments that were leaked to the

German reporters Frederik Obermaier and Bastian Obermayer, l112) from the newspaper Süddeutsche Zeitung. 3 The newspaper shared them with the International Consortium of Investigative Journalists, 41 and a network of more than 380 journalists. Some of the details were made public on 5 November 2017 and stories are still being releasedlas of?).

Anonymous ID: 3aefda Aug. 17, 2025, 2:36 p.m. No.23474343   🗄️.is 🔗kun

"A product of the National Reconnaissance Office (NRO), Sentient is (or at least aims to be an omnivorous analysis tool, capable of devouring data of all sorts, making sense of the past and present, anticipating the future, and pointing satellites toward what it determines will be the most interesting parts of that future. That, ideally, makes things simpler downstream for human analysts at other organizations, like the NGA, with which the satellite-centric NRO partners."

"As of 2020, Aladdin managed $21.6 trillion in assets"

"…consists of around 6000 computers. The software uses these computers to analyze global economic data, stock market prices and numerous other economic factors. For example, sudden changes in government, weather conditions or possible disasters are also taken into account when evaluating portfolios."

 

"…pool of historical data that uses Monte Carlo simulation to select large, randomly generated samples from the very large number of possible future scenarios. This generates a statistical picture of different scenarios for equities and bonds under different future conditions. A portfolio can also be subjected to a stress test. For example, the impact of a global pandemic or a Lehman Brothers type of insolvency crisis on a portfolio of assets can be simulated in this way."

"Synthetic Environment for Analysis and Simulations"

Anonymous ID: 3aefda Aug. 17, 2025, 2:36 p.m. No.23474346   🗄️.is 🔗kun

'"is now capable of running real-time simulations for up to 62 nations, including Iraq, Afghanistan, and China. The simulations gobble up breaking news, census data, economic indicators, and climactic events in the real world, along with proprietary information such as military intelligence. […] The Iraq and Afghanistan computer models are the most highly developed and complex of the 62 available to JFCOM-J9. Each has about five million individual nodes representing things such as hospitals, mosques, pipelines, and people.""

"SEAS was developed to help Fortune 500 companies with strategic planning"

"In 2004 SEAS was evaluated for its ability to help simulate "the non-kinetic aspects of combat, things like the diplomatic, economic, political, infrastructure and social issues.""

 

"Sentient World Simulation is the name given to the current vision of making SEAS a

"continuously running, continually updated mirror model of the real world that can be used to predict and evaluate future events and courses of action.""

edited 8:02 PM J/

Anonymous ID: 3aefda Aug. 17, 2025, 2:36 p.m. No.23474347   🗄️.is 🔗kun

Geopolitical Chess: Decoding Power, Influence, and Hidden Forces in Global Conflicts As of August 16, 2025, at 2:20 PM PDT, the global stage is a complex chessboard where alliances shift, conflicts simmer, and peace talks mask deeper strategic plays. From high-stakes negotiations in Ukraine to provocative offers in the Middle East, the world is witnessing a delicate dance of diplomacy, power, and influence. Beneath the headlines, a web of intelligence networks, financial elites, and shadowy figures shapes outcomes, often using public leaders as symbolic tools. This article explores these dynamics, weaving together recent events, historical patterns, and theoretical insights to reveal the hidden hands guiding global affairs.

Shifting Alliances and Public Spectacles

Ukraine's Fragile Path to Peace

Recent developments in Ukraine highlight the intricate interplay of diplomacy and strategy. On August 16, 2025, U.S. President Donald Trump met Russian President Vladimir Putin in Anchorage, Alaska, to discuss the ongoing war in Ukraine. Initially focused on a ceasefire, the talks have shifted toward a comprehensive peace agreement. Russia, however, remains firm, demanding control over the Donbas region—specifically Donetsk and Luhansk oblasts-as a non-negotiable condition. Reports suggest a potential U.S.-Russia plan where Ukraine's borders remain unchanged on paper, but Russia might retain de facto control over certain areas, possibly managed by local administrators, similar to the West Bank model.

This approach echoes the Hegelian dialectic, a philosophical concept from Georg Wilhelm Friedrich Hegel (1770-1831), where conflict (thesis) meets resistance (antithesis) to produce a predetermined resolution (synthesis). In Ukraine's case, prolonged fighting—marked by Russia's recent capture of over 240 square miles and Ukraine's interception of only two-thirds of incoming drones and missiles—may exhaust both sides, paving the way for a negotiated settlement.

Similarly, the ongoing crisis in Gaza illustrates this dynamic. Since the escalation of the Israel-Palestine conflict in October 2023, Gaza has faced catastrophic destruction, with 92% of its housing units—approximately 436,000 homes—destroyed or severely damaged, according to the UN Office for the Coordination of Humanitarian Affairs (OCHA). With 1.9 million people displaced, famine looming, and no viable refuge in neighboring countries like Egypt or Jordan, Gaza's population is pushed to the brink of exhaustion. This dire situation, marked by over 48,000 deaths and a blockade slashing aid by 90%, pressures Palestinians toward accepting a resolution that may preserve Israel's strategic dominance while offering limited humanitarian relief, perpetuating a cycle of controlled tension. Ukrainian President Volodymyr Zelenskyy is set to meet Trump at the White House on August 18, where pressure for concessions could intensify.

Meanwhile, Hillary Clinton's August 15 suggestion to nominate Trump for a Nobel Peace Prize if he ends the war without ceding territory reflects domestic political posturing. Clinton emphasized Ukraine's sovereignty, a stance shared by many Democrats wary of territorial losses. Trump called

Anonymous ID: 3aefda Aug. 17, 2025, 2:37 p.m. No.23474348   🗄️.is 🔗kun

the comment "very nice," but the reality of negotiations suggests Russia is unlikely to relinquish its gains, complicating the path to peace.

The Middle East's Water Wars

In the Middle East, another geopolitical maneuver unfolded on August 13, 2025, when Israeli Prime Minister Benjamin Netanyahu offered to assist Iran with its escalating water crisis. Iran faces a dire situation, with Tehran at risk of "Day Zero"-when reservoirs could run dry within weeks-due to drought, overuse, and infrastructure failures worsened by international sanctions.

Netanyahu's proposal, however, came with a catch: Israeli expertise in desalination and water recycling would be provided only if Iranians "break free" from their regime, framing the crisis as a

"thirst for freedom." Iranian President Masoud Pezeshkian dismissed the offer as a "mirage," accusing Israel of exploiting Iran's plight amid protests over shortages. This exchange underscores how resource scarcity can be weaponized in geopolitical strategies, with public gestures masking ulterior motives.

Public Figures as Pawns

Leaders like Trump, Clinton, or Netanyahu often serve as lightning rods for public emotion, absorbing societal frustrations while deeper agendas unfold. This dynamic aligns with the theories of French philosopher René Girard (1923-2015), who argued that human desires are imitative, leading to rivalry and conflict. Societies resolve these tensions through scapegoating, channeling collective anger onto a single figure to achieve catharsis. Historical examples, like the vilification of figures during the Watergate scandal or Trump's polarized role in U.S. politics over issues like immigration and election integrity, illustrate this pattern. These leaders become outlets for public discontent, distracting from systemic issues or covert operations.

Media amplifies this cycle, turning personal controversies into spectacles that overshadow policy failures. While the public debates the latest scandal, strategic moves-such as intelligence operations or financial maneuvers-often occur out of sight, executed by those who wield true influence.

The Shadowy Networks of Power

The case of Jeffrey Epstein offers a troubling glimpse into these hidden networks. Declassified U.S. Department of Justice documents released in July 2025 have reignited speculation about Epstein's role as a potential intelligence asset for agencies in the U.S., Israel, or Saudi Arabia.

Some former CIA officers have claimed he was "most likely Mossad," suggesting he used "honey pots" to gather compromising material for blackmail-a tactic rooted in Cold War-era strategies and still relevant in modern hybrid warfare. However, no definitive evidence ties Epstein directly to foreign intelligence, and former Israeli Prime Minister Naftali Bennett has dismissed such claims as "slander." Mainstream analyses often label these theories as unsubstantiated conspiracies.

Anonymous ID: 3aefda Aug. 17, 2025, 2:37 p.m. No.23474350   🗄️.is 🔗kun

Still, court records confirm Epstein's extensive connections to powerful figures in politics, business, and royalty, pointing to a broader network of influence. Financial institutions, intelligence agencies, and elite individuals likely collaborated for mutual benefit, using data and kompromat as currency. In this geopolitical game, information is power, shaping outcomes through leverage and control.

The Bigger Picture

These events reveal a world where visible leaders are often pawns in a larger chess match. The real players-those controlling knowledge, resources, and influence-operate behind the scenes, using psychological operations, economic pressure, and strategic concessions to shape the global order. In Ukraine, a potential peace deal could redefine NATO's role, with calls for "NATO-like" guarantees to prevent Russia from vetoing future enlargement. In the Middle East, water scarcity and political rhetoric could escalate tensions or force uneasy alliances.

The interplay of scapegoating, catharsis, and calculated maneuvers will likely continue to drive global conflicts, with ripple effects on energy markets, migration, and international alliances. As the Anchorage summit and Tehran's water crisis demonstrate, the gap between public rhetoric and private negotiations remains wide, inviting us to question the unseen forces steering an interconnected world.

Additional Context

• Ukraine's Military Challenges: Ukraine's air defenses have struggled, intercepting only about 66% of Russian drones and missiles in recent months, according to defense reports.

Russia's territorial gains, though incremental, signal a war of attrition that could pressure Ukraine into accepting a deal.

Gaza's Humanitarian Crisis: The conflict in Gaza, reignited by Hamas's October 2023 attack, has left 90% of its 2.3 million residents without stable housing. With 88% of schools and most hospitals nonfunctional, and regional neighbors like Egypt and Jordan refusing large-scale refugee intake, Gaza's population faces starvation and disease, with over 48,000 deaths reported by February 2025.

Iran's Water Crisis: Iran's water shortages are compounded by decades of mismanagement and U.S.-led sanctions, which have limited access to modern infrastructure. Tehran's reservoirs are at critically low levels, with some estimates suggesting a 50% reduction in capacity since 2020.

Epstein's Network: While speculation about Epstein's intelligence ties persists, court documents confirm his interactions with figures like Bill Clinton, Prince Andrew, and prominent financiers, highlighting the scope of his influence.

Anonymous ID: 3aefda Aug. 17, 2025, 3:02 p.m. No.23474402   🗄️.is 🔗kun

In May 2020, The Washington Post reported: "A new Democratic-aligned political action committee advised by retired Army Gen. Stanley McChrystal … is planning to deploy technology … to combat online efforts to promote President Trump's handling of the coronavirus pandemic. The group, Defeat Disinfo, will … map discussion of the president's claims on social media. It will seek to intervene … through a network of more than 3.4 million influencers …

paying users with large followings to take sides against the president." [98]

 

  1. As further evidence of the unlawful access and tampering, Defendant

Giuliani has invited others, including Terpsehore "Tore" Maras, to his apartment in

New York City to access, analyze and manipulate the transferred data he had in his

possession. On information and belief, Defendant Giuliani paid for Maras's trip to New

York City.

Anonymous ID: 3aefda Aug. 17, 2025, 3:03 p.m. No.23474404   🗄️.is 🔗kun

Michael Flynn

© This article is more than 6 years old

Michael Flynn to disclose advisory role linked to Cambridge Analytica

Former national security adviser prepares amended public financial filing revealing ties to data firm funded by Trump backer Robert

Mercer

Associated Press in Washington

 

WFOX NEWS

Watch TV

2020 PRESIDENTIAL ELECTION

Dems deploying DARPA-funded Al-driven

information warfare tool to target pro-Trump accounts

By Gregg Re • Fox News

Published May 4, 2020 2:20am EDT Updated May 4, 2020 5:41pm EDT

 

In the fall of 2014 McChrystal's townhouse in Alexandria, Virginia was the address Michael Flynn used to register his consulting and intelligence business, the Flynn Intel Group. 91]

 

HOUSE

i

QAnon

• This article is more than 1 year old

Michael Flynn appears to have called QAnon 'total nonsense' despite his links

Trump ally reportedly says conspiracy theory a

'disinformation campaign' created by CIA and the left, apparent recording reveals

Victoria Bekiempis in New York

Mon 29 Nov 2021 01.00 EST

Anonymous ID: 3aefda Aug. 17, 2025, 3:04 p.m. No.23474406   🗄️.is 🔗kun

 

https://sclgroup.cc/home

Go

130 captures

24 Oct 2016 - 14 Jan 2024

2017

JAN 11 2019

FEB

2020

SCL Group provides data, analytics and strategy to governments and military organizations worldwide. For over 25 years, we have conducted behavioral change programs in over 60 countries & have been formally recognized for our work in defense & social change.

PURPOSE

The purpose of this Compendium is to provide a broad overview of memetics based on a variety of papers by various authors. These digital papers were gathered from the Internet during 2006 to 2008, assembled, and, in some cases, edited for grammar, spelling, and clarity; all of the papers were transformed into a common format (font, font size, appearance) for coherence to ease reading. The compendium was developed as part of memetics research conducted for the Defense Advanced Research Projects Agency (DARPA).

In the more than 30 years since the meme was identified as an entity of interest, there has been almost no research to determine whether memetics can be placed on a scientific basis so that its phenomena and effects can be quantified, predicted, and controlled. Most of the research of memetics, such as it is, has been conducted in scattered efforts, often as personal projects on the part of dedicated academics, mostly outside the U.S. There have been no significant, coherent efforts until now, where DARPA is exploring whether a scientific framework can be established for memetics.

Anonymous ID: 3aefda Aug. 17, 2025, 3:04 p.m. No.23474411   🗄️.is 🔗kun

STATE OF NORTH DAKOTA

COUNTY OF WARD

STATE OF NORTH DAKOTA EX REL.

WAYNE STENEHJEM,

ATTORNEY GENERAL,

Plaintiff,

-VS-

TERPSICHORE MARAS, AKA TERPSICHORE MARIA HELEN LINDEMAN, AKA TERPSICHORE LINDEMAN, AKA TERPSICHOR MARAS-LINDEMAN, AKA TERPSICHORE MARAS-LINDEMAN, AKA TERPSICHOR MARAS, AKA TERPSICHORE P LINDEMAN, AKA TERPSECHORE MARAS-LINDEMAN, AKA TORE MARAS-LINDEMAN, AKA TERPSICHOR LINDEMAN, AKA TERPSECHORE MARAS-LINDEMAN, AKA TERPSEHORE P MARAS-LINDEMAN, AKA TERPSEHORE PETE MARAS-LINDEMAN, AKA TERPSEHORE MARAS-LINDEMAN, doing business as A MAGIC CITY CHRISTMAS and MLLABS - EVENTS,

 

= Newsweek

SUBSCRIBE FOR $1

Who Is Terpsichore Maras-Lindeman? Powell Witness Identified As a Pro-Trump Podcaster

Published Dec 25, 2020 at 5:24 PM EST

Login

By Emily Czachor

Staff Writer

FOLLOW

155

Terpsichore Maras-Lindeman, the witness who claimed to be a private intelligence contractor in testimonies meant to back Sidney Powell's election lawsuits, is a conservative podcaster and supporter of President Donald Trump.

 

'In your paper, you must describe your hypothetical attack and what will happen in the aftermath.' - NYU Professor Marie-Helen Maras (above), in the syllabus of her course on terrorism

 

The controversial course, taught by former Navy criminal investigator Marie-Helen Maras, asks the pupils to "step into [a terrorist's] shoes" and write a

10- to 15-page paper on their battle plan.

"Some of the most notorious terrorists, including Anwar al-Awlaki, got their start on American campuses. It looks like after the CIA killed al-Awlaki, NYU is helping to produce successors, said an outraged law-enforcement expert on terrorism.

Anonymous ID: 3aefda Aug. 17, 2025, 3:18 p.m. No.23474458   🗄️.is 🔗kun

Verbal Judo

Why do we call it "verbal judo"? Because it is for a defensive purpose. Judo is a self-defensive martial art, practiced strictly in a pacifist sense. Judo focuses on deflecting the enemy's attacks rather than meeting aggression with aggression. It is valuable whenever possible to practice this form of conflict negation. You win every fight you stop.

Approaches to verbal judo include:

Avoidance - Recognizing a conflict early and heading it off before it becomes one.

• Withdrawing - Retreating on a position temporarily until a more advantageous time.

• Deflecting - Changing the topic or focus of a conflict.

• Compromise - Making a deal that's advantageous to both parties.

 

• 'Information collection' - A false poster is brought forward to volunteer a controversial opinion and then ask who else holds that opinion. In fact, the original poster is a false flag, but everybody who posts agreeing with them will be carefully researched and noted.

• 'Anger trolling' - General demoralizing of the other side's members. Trolling for trolling's sake, to make people who hold the opposite view become distracted and hopefully give up in disgust.

 

• 'Forum Sliding' - Posting many irrelevant comments to bury an unfavorable comment.

• 'Consensus cracking' - An intentionally false, unsubstantiated claim is introduced, followed by increasingly strong support from a ring of apparently gullible posters who all side in to "believe" the posting and present stronger claims and evidence. Used to drive the casual reader to accept the conclusion.

• 'Topic dilution' - Whenever a damaging post against the candidate is made, astroturf workers descend to sidetrack the discussion into dozens of irrelevant threads. Anybody who posts commenting on the topic is immediately attacked; the poster then goes on the defensive against the intentional trolling and the topic is diluted.

 

• Ad hominem - Attacking the target instead of what they do or say. Blaringly obvious in war posters that paint insulting caricatures of Mussolini and so on.

• Appeal to accomplishment - "We're all in this together!" Rousing the troops towards a goal. The aim is always a call to action.

• Appeal to fear - The enemy is always painted as a scary, immediate threat.

• Moral high ground - Of course, our side is always the side of justice and freedom, isn't it?

• Misleading vividness - Using garish and shocking depictions to oversell your
case.

 

Gaslighting is a form of mental abuse in which the victim is tricked into doubting their own sanity. Its name comes from the 1938 stage play "Gaslight" where a man slowly drives his wife insane just by disturbing her reality.

An example would be if a group of people in your home decided to take something of yours when you're not looking, then when you asked where it was, everyone would conspire to pretend as if it never existed and you were making it up. Or, you might decide to "haunt" somebody with a guilty conscience by making ghostly sound effects and "unexplained" startling events, to convince them that a ghost was haunting them.

 

Complete brainwashing and control of cult subjects follows a very rigorous pattern. There's a method established by all such persons:

• Thought reform - Fundamental changes to the way the target thinks. See earlier sections on propaganda, gaslighting, and such.

• Isolation - This is the most important factor. In order to control someone completely, you must cut them off from all outside influence. Frequently cult members are forbidden from watching TV or from communicating with their family.

• Induced dependency - Making the cult leader the sole source of livelihood. Cult members are forbidden from having their own money, and must live with the cult leader, only eating what they allow.

• Dread - Ruling through fear is the key tool of cult brainwashing. The cult leader convinces the members that there is a grave threat to them outside the cult compound. The cult leader also harshly punishes all disobedience.

• Demands of dedication - Finally, the cult members must pledge their lives, brain and blood, to the cause of the cult leader. They dedicate every waking hour to serving their leader's mission.

Keeping people in a cult is the ultimate in psychological warfare. It is also beyond the skillset of most people, which is a great blessing. However, brainwashing is a bit more common, but also far more involving than most people would undertake.

Fortunately, this is the end of our exploration. There is no higher level we can find.

Anonymous ID: 3aefda Aug. 17, 2025, 3:19 p.m. No.23474459   🗄️.is 🔗kun

..

https://sclgroup.cc/home

130 captures

24 Oct 2016 - 14 Jan 2024

DEC

Go

2017

JAN 11 2019

FEB

2020

SCL Group provides data, analytics and strategy to governments and military organizations worldwide. For over 25 years, we have conducted behavioral change programs in over 60 countries & have been formally recognized for our work in defense & social change.

SCL Group, Cambridge Analytica, and Ties to the CIA and General Flynn

The SCL Group, a British behavioral research and strategic communication firm, gained international notoriety through its subsidiary, Cambridge Analytica, particularly during the 2016 U.S. presidential election. Founded in 1990 by Nigel Oakes, SCL positioned itself as a "global election management agency," leveraging psychological profiling and data analytics to influence political outcomes. Cambridge Analytica, established in 2013 with backing from billionaire Robert Mercer and guidance from Steve Bannon, became a key player in this mission, notably working on Donald Trump's campaign. However, the firm's connections to U.S. intelligence, including the CIA, and figures like General Michael Flynn, have raised questions about the broader implications of its activities.

Anonymous ID: 3aefda Aug. 17, 2025, 3:19 p.m. No.23474461   🗄️.is 🔗kun

SCL Group's history is deeply rooted in military and intelligence work. Before its political ventures, SCL conducted psychological operations (psyops) for defense agencies, including the U.S.

Department of Defense, NATO, and the British military. Its expertise in behavioral manipulation, honed through contracts like a 2010 project analyzing Afghan populations under Michael Flynn—then a top U.S. intelligence official in Afghanistan-suggests a crossover between military intelligence tactics and political influence campaigns. While no direct evidence ties SCL or Cambridge Analytica explicitly to the CIA, the firm's reliance on former intelligence officials and its work on U.S. government contracts fuel speculation about informal links. For instance, SCL's pursuit of Pentagon and State Department contracts, including a $500,000 deal in 2017 to counter terrorist propaganda, underscores its alignment with U.S. national security interests.

General Michael Flynn, a retired U.S. Army lieutenant general and Trump's first national security advisor, represents a tangible connection between SCL and the U.S. government. In late 2016, shortly before joining the Trump

administration, Flynn served as an advisor to SCL Group, assisting its efforts to expand defense contracting work. This role, disclosed in an amended financial filing in 2017, coincided with SCL's push to secure U.S. government deals, raising ethical questions from lawmakers like Senator Bob Menendez about potential conflicts of interest during Trump's transition. Flynn's tenure as Director of the Defense Intelligence Agency (2012-2014) and his prior collaboration with SCL in Afghanistan further suggest he brought insider knowledge to the firm's operations.

Though Flynn did not perform paid work for SCL, his involvement highlights how military intelligence expertise flowed into Cambridge Analytica's political endeavors.

 

The relationship between SCL, Cambridge Analytica, and figures like Flynn hints at a convergence of intelligence tradecraft and electoral manipulation. While concrete evidence of CIA orchestration remains elusive, the firm's use of psychographic targeting-refined through military contracts—and its ties to influential U.S. figures like Flynn illustrate a murky intersection of state power and private enterprise. Cambridge Analytica's collapse in 2018 amid the Facebook data scandal did not erase these questions, as successor firms like Emerdata, linked to SCL alumni, continue to operate, suggesting the legacy of this nexus persists.

Anonymous ID: 3aefda Aug. 17, 2025, 3:19 p.m. No.23474462   🗄️.is 🔗kun

TOP SECRET

Behavioural Science Support for JTRIG's (Joint Threat Research and Intelligence Group's) Effects and Online

HUMINT Operations

, PhD

Human Systems Group, Information Management Department, Dstl

10 March 2011

Two of the Global team's current

aims are regime change in Zimbabwe by discrediting the present regime, and preventing Argentina from taking over the Falkland Islands by conducting online HUMINT.

Examples of Effects and Online HUMINT Operations

2.2 Operation targets. JTRIG's operations may cover all areas of the globe. Staff described operations that are currently targeted at, for example, Iran, Africa, Argentina, Afghanistan, Pakistan, North Korea, UK, and Eastern Europe, including Russia. Operations may target specific individuals (e.g., suspect caught in-theatre or cyber criminal), groups (e.g., Islamic extremists or those engaged in online credit card fraud), the general population (e.g., Iranians), or regimes (e.g., Zanu PF).

Anonymous ID: 3aefda Aug. 17, 2025, 3:19 p.m. No.23474464   🗄️.is 🔗kun

The Shadowy World of GCHQ, JTRIG, and Government-Sanctioned Cyber Operations

The British Government Communications

Headquarters (GCHQ) and its secretive Joint Threat Research Intelligence Group (TRIG) represent a cornerstone of modern intelligence operations, blending surveillance, disruption, and psychological manipulation in the digital realm.

Exposed largely through Edward Snowden's leaks in 2014, JTRIG's toolkit and tactics reveal a sophisticated apparatus for online influence, raising questions about government-approved

"gang stalking" in cyberspace, international coordination via alliances like Five Eyes, and parallels to U.S.-based efforts like Defeat Disinfo and QAnon. This article delves into JTRIG's five key online tactics, spotlights tools like ANGRY PIRATE and SLIPSTREAM, and explores the broader implications of these operations, including potential ties to American influencers, psychological operations (psyops), and a modern cyberspace equivalent of COINTELPRO.

Anonymous ID: 3aefda Aug. 17, 2025, 3:20 p.m. No.23474466   🗄️.is 🔗kun

JTRIG's Five Key Online Tactics

Leaked documents, such as the "JTRIG Tools and Techniques presentation, outline a range of methods designed for surveillance, deception, and disruption. Here are five standout tactics, with their implications for online manipulation:

  1. Disinformation and False Flags

TRIG plants fake content online, attributing it to targets to mislead or discredit them. This could involve forging documents, posting inflammatory comments, or creating fictitious personas to provoke reactions. The goal is to confuse adversaries or fracture their credibility, a tactic reminiscent of classic espionage but turbocharged for the internet age.

  1. Social Media Manipulation

Using fake accounts, JTRIG infiltrates online communities, spreads propaganda, or amplifies divisive narratives. This includes "honey traps"–luring targets into compromising situations-or steering conversations to suit intelligence objectives. It's a form of digital puppetry, controlling discourse from the shadows.

  1. Psychological Operations (PSYOPS)

JTRIG employs psychology to disrupt targets' lives, such as ruining reputations or relationships through online smear campaigns. A leaked slide bragged about "destroying business and personal relationships," showing a willingness to weaponize personal vulnerabilities for strategic gain.

  1. Technical Disruption

Beyond influence, JTRIG deploys malware, launches Distributed Denial of Service (DDoS) attacks, or hacks systems to disable adversaries' online presence. This brute-force approach targets infrastructure–think chatrooms or websites-used by groups like hacktivists or extremists.

  1. Trolling-Like Provocation

TRIG posts deliberately provocative content to elicit responses, potentially justifying further surveillance or action. This mirrors internet trolling but with state backing, turning casual provocation into a tool for intelligence gathering or entrapment.

Anonymous ID: 3aefda Aug. 17, 2025, 3:20 p.m. No.23474467   🗄️.is 🔗kun

ANGRY PIRATE and SLIPSTREAM: Tools of Disruption

Among TRIG's arsenal, two tools stand out for their specificity and audacity:

ANGRY PIRATE:

Described as a "fully operational" tool, ANGRY PIRATE disables target accounts, likely through hacking or administrative interference. Imagine a dissident's social media suddenly vanishing—ANGRY PIRATE could be the culprit, silencing voices with surgical precision.

SLIPSTREAM:

This tool alters online content, such as modifying poll results or injecting fake data into websites.

SLIPSTREAM exemplifies TRIG's ability to rewrite digital reality, undermining trust in online information and shaping perceptions covertly.

These tools, marked as "ready to fire" in 2012, highlight JTRIG's dual focus on suppression (ANGRY PIRATE) and deception (SLIPSTREAM), offering a glimpse into how state actors can dominate cyberspace.

 

Five Eyes and U.S.-UK Coordination

JTRIG doesn't operate in isolation. It's part of the Five Eyes alliance (U.S., UK, Canada, Australia, New Zealand), an intelligence-sharing pact that extends to Nine Eyes (adding Denmark, France, Netherlands, Norway) and Fourteen Eyes (adding Germany, Belgium, Italy, Spain, Sweden).

Snowden leaks confirm NSA-GCHQ collaboration, with TRIG tools and tactics shared across borders. This coordination allows the U.S. and UK to pool resources, bypass domestic surveillance laws, and maintain plausible deniability—e.g., the NSA could ask GCHQ to monitor Americans, skirting U.S. legal restrictions, and vice versa.

This layered structure mirrors how Five Eyes might outsource cyber psyops, with foreign agencies acting as proxies for deniable operations on allied soil.

—–

Government-Approved Gang Stalking?

JTRIG's tactics—persistent monitoring, psychological disruption, and targeted harassment

—echo the concept of "gang stalking," where individuals feel relentlessly pursued by coordinated actors. Unlike civilian conspiracies, this is state-sanctioned, with a clear "why": to neutralize threats (terrorists, activists,

whistleblowers) and protect national interests. The

"how" involves blending surveillance with provocation, using fake personas and technical sabotage to isolate or discredit targets. If directed at individuals, this could feel like a digital mob attack, orchestrated by unseen government hands

  • a modern twist on historical programs like

COINTELPRO, which harassed dissidents through physical means.

Anonymous ID: 3aefda Aug. 17, 2025, 3:20 p.m. No.23474470   🗄️.is 🔗kun

JTRIG in American Cyberspace

Does TRIG operate in U.S. cyberspace? Direct evidence is scarce, but Five Eyes collaboration suggests it's plausible. JTRIG's tools target global platforms—YouTube, Facebook, Twitter-where Americans are active. A 2014 Intercept report noted JTRIG spied on YouTube and Facebook users, implying cross-border reach. Given NSA partnerships, JTRIG could monitor or disrupt U.S.-based targets, especially if requested by American agencies under Five Eyes agreements.

This raises questions about sovereignty and accountability in cyberspace.

Supporting Influencers and Ties to SCL

JTRIG doesn't explicitly "support" influencers in the traditional sense, but its tactics–amplifying narratives via fake accounts-could bolster aligned voices indirectly. Enter SCL Group (parent of Cambridge Analytica), a British firm with intelligence ties, including ex-MI5 and MI6 personnel. SCL's work on behavioral influence, notably during the 2016 U.S. election, parallels JTRIG's psyops. Figures like Michael Flynn, a former DIA chief and QAnon promoter, intersect here-SCL's data-driven influence campaigns could amplify figures like Flynn, whose Flynn Intel Group (registered at Stanley McChrystal's Virginia address and employing ex-CIA like James Woolsey) suggests a nexus of military-intelligence influence peddling.

Anonymous ID: 3aefda Aug. 17, 2025, 3:20 p.m. No.23474471   🗄️.is 🔗kun

Defeat Disinfo vs. Flynn's QAnon vs.

JTRIG

Defeat Disinfo:

Led by McChrystal, this 2020 initiative countered Trump-aligned disinformation using Al and influencers. It's a semi-transparent, U.S.-backed effort to shape narratives, akin to JTRIG's social media manipulation but less covert and more defensive.

Flynn and QAnon:

Flynn's embrace of Anon, tied to figures like Jim and Ron Watkins, Tracy Diaz, and Microchip, leverages a grassroots conspiracy for influence.

Unlike JTRIG's top-down control, QAnon's organic spread–possibly nudged by Flynn's psyops expertise serves personal and political ends, not institutional ones.

JTRIG:

More systematic and state-driven, JTRIG focuses on disruption and intelligence, not public mobilization. Its tools are sharper, its footprint hidden, contrasting with Anon's chaotic visibility and Defeat Disinfo's overt counter-narrative push.

The U.S. government's interest in memetic warfare—seen in DARPA's social media studies— underscores a broader fascination with online influence, mirroring TRIG's playbook.

 

Flynn Intel and Psyops on Americans

Flynn Intel Group's ties to McChrystal and Woolsey, combined with Flynn's QAnon role, suggest he's adapted military psyops for domestic impact. QAnon's cryptic drops and cult-like following resemble JTRIG-style deception, inciting responses (e.g., January 6th) that align with Flynn's apparent anti-establishment agenda. This isn't TRIG, but it's a parallel use of psychological levers–possibly learned from intelligence tradecraft—to sway the American populace.

Foreign Psyops and Plausible Deniability

Could foreign agencies, via Five Eyes or otherwise, conduct cyber psyops on Americans for the U.S. government? The Five Eyes model—where allies spy on each other's citizens-offers a legal loophole. A foreign actor (e.g., GCHQ) could target U.S. audiences at NSA behest, preserving deniability. No hard proof exists, but the framework supports it, especially given SCL's cross-Atlantic ties and Flynn's orbit.

A Modern COINTELPRO?

COINTELPRO disrupted dissidents through infiltration and harassment; TRIG and similar efforts update this for cyberspace. The FBis social media monitoring, NSAs PRISM, and potential TRIG operations suggest a modern equivalent-less about physical intimidation, more about digital control. Anon's spread, possibly aided by figures like Flynn, and Defeat Disinfo's counter-efforts hint at a fragmented, ongoing psyops war on American soil.

Anonymous ID: 3aefda Aug. 17, 2025, 3:21 p.m. No.23474473   🗄️.is 🔗kun

RAND, Terrorism, and Pragmatic Cyber Campaigns

RAND's research on terrorism's practical applications (e.g., destabilizing regimes) raises a chilling possibility: U.S. agencies might facilitate online "terror campaigns" for self-serving ends—think election influence or suppressing dissent.

JTRIG's disruption tactics and Flynn's Anon gambit could be prototypes, testing how fear and division amplify power. No smoking gun ties this to current policy, but the tools and motives align.

QAnon's Influential Players

@Anon's ecosystem-Flynn, Mcinerney, Stone, Watkins, Schoenberger, et al.-mixes military brass, tech insiders, and grifters. Flynn's leadership, McInerney's rhetoric, and the Watkins' 8kun platform drove its spread, while figures like Microchip and Diaz shaped its early narrative.

This loose coalition, possibly leveraging psyops know-how, contrasts with JTRIG's disciplined statecraft but shares a goal: influence through chaos.

Conclusion

TRIG and GCHQ epitomize government-backed cyber manipulation, with Five Eyes amplifying their reach. Their tactics—disinformation, psyops, disruption-mirror alleged U.S. efforts, from Flynn's QAnon to SCL's influence ops, suggesting a transatlantic playbook. Whether a modern COINTELPRO or a pragmatic terror campaign, these activities blur lines between security and control, raising urgent questions about democracy in the digital age. The U.S. government's meme studies and Flynn's maneuvers hint at a deeper game-one where cyberspace is both battlefield and weapon.

Anonymous ID: 3aefda Aug. 17, 2025, 3:21 p.m. No.23474476   🗄️.is 🔗kun

The Web of Influence: Venture Capital, Intelligence Agencies, and the Shaping of Digital Perception

The sprawling influence of venture capital firms like Sequoia Capital, backed by institutions such as the Ford Foundation, and the CIA's own In-Q-Tel, raises provocative questions about the architecture of the modern internet. Sequoia's investments in tech giants like Apple, Google, YouTube, WhatsApp, Instagram, Airbnb, and SpaceX, alongside In-Q-Tel's funding of technologies like Palantir and Keyhole (later Google Earth), paint a picture of a deeply interconnected ecosystem. Beneath this surface lies a deeper speculation: are these entities, alongside the Pentagon and DARPA, vehicles for intelligence agencies-tied to the CIA, NRO, Mi6, and the Five Eyes or Nine Eyes alliances—to build and control the public-facing internet infrastructure? The threads seem to weave back to a modern evolution of Operation Mockingbird, where mainstream and alternative media, internet

 

Sequoia Capital's rise as a Silicon Valley titan is undeniable. Founded in 1972, it has fueled the growth of transformative companies like Cisco Systems, Oracle, NVIDIA, and PayPal, with limited partners like the Ford Foundation reaping the rewards to fund nonprofit causes. The Ford Foundation's history, however, casts a shadow: during the Cold War, it funneled CIA money into cultural projects, with nearly half its international grants from the 1950s to 1960s linked to covert operations, as uncovered by 1976 congressional probes. Figures like Paul Hoffman and John McCloy, with their intelligence pedigrees, blurred the lines between philanthropy and espionage.

Though this era has passed, the foundation's role as a backer of Sequoia-whose portfolio includes Stripe, DoorDash, and Snowflake invites scrutiny: could its capital, however indirectly, align with U.S. strategic interests today?

In-Q-Tel, by contrast, wears its CIA ties on its sleeve. Launched in 1999, it invests in startups to bolster intelligence capabilities, often in dual-use technologies with civilian and military applications, unlike Sequoia's broader bets on companies like Instacart, Klarna, and Unity Technologies.

DARPA, the Pentagon's innovation arm, similarly seeds projects-think ARPANET, the internet's precursor-that shape the digital landscape, much like its influence echoes in firms Sequoia backed, such as Palo Alto Networks and ServiceNow.

Sequoia and In-Q-Tel don't publicly overlap, but their ecosystems do: Silicon Valley thrives on networks where venture capital, tech founders, and government interests intersect. Sequoia's stakes in SpaceX (satellites) or cybersecurity firms mirror In-Q-Tel's focus, hinting at a convergence of commercial and national security goals. Add the National Reconnaissance Office (NRO), which oversees spy satellites and has partnered with SpaceX, and the picture grows murkier.

Anonymous ID: 3aefda Aug. 17, 2025, 3:21 p.m. No.23474478   🗄️.is 🔗kun

The Five Eyes alliance (U.S., UK, Canada, Australia, New Zealand) and its Nine Eyes extension amplify this narrative. MI6 and the CIA, alongside their partners, have long collaborated on signals intelligence and influence operations.

Operation Mockingbird, the ClAs Cold War program to manipulate media, offers a historical parallel: today's "Mockingbird 2.0" might span CNN, X posts, and alt-media ShadoVVision s, with venture-backed platforms as the delivery system.

Sequoia-funded YouTube hosts algorithm-driven echo chambers; WhatsApp spreads encrypted narratives; Instagram shapes cultural optics.

Meanwhile, ByteDance (TikTok's parent), Zomato, and 23andMe also Sequoia bets- extend this influence globally. DARPA's early internet work and In-Q-Tel's investments suggest a deliberate buildout of infrastructure ripe for perception management, with echoes in Sequoia's early backing of Atari and its modern stake in Zoom.

No smoking gun ties Sequoia or the Ford Foundation directly to CIA control. Sequoia's profit-driven model, seen in successes like Google and Airbnb, contrasts with In-Q-Tel's mission, and the Ford Foundation's modern focus is social justice, not spycraft. Yet, the patterns-historical CIA-foundation links, overlapping tech interests in firms like NVIDIA and Stripe, and the intelligence community's stake in digital dominance-fuel suspicion. X users speculate about Sequoia as a

"CIA tech arm" or In-Q-Tel as a shadow player, but evidence remains circumstantial. Still, the internet's public face, from content platforms like Linkedin and YouTube to underlying networks seeded by Oracle and Cisco, bears the imprint of these forces. Whether by design or coincidence, the vehicles of venture capital and government innovation-spanning Sequoia's vast portfolio and beyond-seem perfectly positioned to steer the stories we see-and believe.