Wayne MADSEN | 28.02.2014
|  | |
| 
It was only a matter of time. The National Security Agency's British 
FIVE EYES partner, the Government Communications Headquarters (GCHQ), 
has now made common cause with another creation of British intelligence,
 the Tavistock Institute of Human Relations in London. From the time of 
its creation in 1921 under the aegis of the British Army's Bureau of 
Psychological Warfare to the present time, the Tavistock Institute has 
been at the forefront of research into and application of targeted and 
mass mind control techniques. The institute has cooperated with research
 entities, including the Stanford Research Institute (SRI) and Esalen 
Institute in the United States, that carry out psychological operations 
on behalf of the Central Intelligence Agency and Department of Defense. 
 The latest tranche of PowerPoint slides revealed by NSA whistleblower 
Edward Snowden shows the similarities between the GCHQ's Joint Threat 
Research Intelligence Group (JTRIG)'s Human Science Operations Cell 
(HSOC). The very name «Human Science Operations» appears yanked right 
from the operational charter of the Tavistock Institute, which includes 
the ability to engage in «full spectrum domination» by U.S. and U.K. 
intelligence services, in other words, the two core members of the FIVE 
EYES alliance. 
 What is most alarming about the most recent disclosure of slides marked
 SECRET//SI//REL TO USA. FVEY [Special Intelligence, Releasable to USA 
and FIVE EYES] and UK TOP SECRET STRAP is that the FIVE EYES signals 
intelligence alliance of the United States, Britain, Canada, Australia, 
and New Zealand are adding psychological operations (psyops) and 
Tavistock-developed mind control operations to its traditional signals 
intelligence (SIGINT) role. The blending of SIGINT and human 
intelligence (HUMINT) as part of cyber-warfare and computer network 
exploitation (CNE), with little or no actual oversight from legislative 
oversight authorities, is the closest proof revealed to date that the 
NSA and its partners have embarked on a policy of instituting «1984» Big
 Brother controls using the Internet as a primary weapon. 
 The latest tranche of slides points to a number of deception programs 
being carried out on the web. These include alias development and 
masquerading (which includes the employment of «sock puppet» personae 
already in use by the U.S. military to disrupt and influence the 
Internet), mass messaging (or spamming) and «call bombing,» propaganda, 
and «pushing stories». 
 These tactics have been refined since the CIA and its George 
Soros-financed non-governmental organization activist allies brought 
about the «Arab Spring» overthrow of governments in Egypt, Tunisia, 
Libya, and Yemen, as well as the bloody civil war in Syria. In Ukraine, 
the democratically-elected government of President Viktor Yanukovych 
fell more quickly than either Egyptian President Hosni Mubarak or Libyan
 leader Muammar Qaddafi simply because the Western corporate media fully
 cooperated in FIVE EYES efforts to activate armies of sock puppets with
 aliases who disseminated anti-Yanukovych propaganda and, with the 
assistance of the global corporate news media, «pushed stories». In the 
case of Ukraine, the «pushed stories» were products of CIA, NSA, GCHQ, 
British MI-6, and Communications Security Establishment Canada (CSEC) 
propaganda mills working in close collaboration with such intelligence 
agency fronts as Soros's Open Society Institute, Freedom House, Hudson 
Institute, Center for Strategic and International Studies (CSIS), 
Heritage Foundation, and Demos of the UK. 
 Western intelligence agencies «pushed stories» through the use of 
Twitter, Facebook, Flickr, and Youtube. These applications are part and 
parcel of GCHQ and NSA Computer Network Information Operations (CNIO). 
Outside the realm of technological warfare, JTRIG admits that it employs
 «credential harvesting» against «foreign news agencies». In fact, spies
 and provocateurs masquerading as spies were not only discovered filing 
phony news reports from Ukraine but also from Venezuela during 
simultaneous anti-government rioting in that country. Fake journalists 
were also exposed in Egypt, Thailand, China, and Russia. 
 Two GCHQ programs that were likely used to bombard news organizations 
with propaganda from the Western-financed Ukrainian opposition are code 
named INFINITE CURVATURE and MOUNTAIN SLOPE. Without independently 
verifying what was being disseminated by text messages, email, fax, and 
phone calls, the global corporate media willingly re-broadcast and 
re-published FIVE EYES propaganda on the situation in Ukraine as fact. 
This included such canards as Russian special forces SPETSNAZ snipers 
shooting dead protesters in Kyiv's Maidan Square (actual reports had 
neo-Nazi Maidanovci agitators on Maidan Square shooting protesters with 
the intent that the government security personnel would be blamed), 
Yanukovych amassing a treasure of expensive paintings and sculptures in 
the manner of Muammar Qaddafi and Saddam Hussein (in fact, Yanukovych's 
tastes are more oriented toward kitschy bling than opulent 
extravagances), and that protesters were set on fire by police. As to 
the last item, the Associated Press transmitted a photograph of what was
 described as a protesters in Kyiv running away in flames. In fact, the 
«protester» was a Ukrainian policeman and his Ukrainian MBC police 
insignia could readily be seen on his uniform's left sleeve. 
 Where do JTRIG and its Tavistock-trained handlers obtain images, 
documents, and other information used for propaganda deception and 
disruption psyops? The answer is found in the latest released slides: 
the SALAMANCA database of information mined from the Internet. In 
addition, GHCQ and its NSA allies can target specific cell phones for 
propaganda dissemination through Target Geographic Identifiers (TGIs) 
assigned to particular cell phones. Such operations can also be used to 
disrupt the cell phones of targeted individuals through CNIO disruption. 
 JTRIG's slides point to how network operations are used to support 
intelligence operations in the field. These operations are identified as
 infiltration, ruse, set-piece, false flag, false rescue, disruption, 
and sting. In the case of Ukraine, Western overt and covert agents 
infiltrated the demonstrators at Maidan Square. In some cases, 
counter-CNIO operations can be successful against Western intelligence 
agencies. One video from Maidan Square showed Ukrainian Bercut special 
police detaining a man who was carrying an 2012 expired International 
Police Association (IPA) membership credential in the name of Oleksandr 
Boiarchuk, in addition to an IPA Ukraine chapter badge. IPA stands 
accused of being a front for Western intelligence agencies. 
 The firing by neo-Nazi snipers on Maidan Square demonstrators qualifies
 as both a ruse and false flag operation. The overall goal of such an 
operation was to blame Ukrainian security personnel for the shooting 
deaths of demonstrators and, as far as the Western media was concerned, 
the ruse and false flag was successful. One media organization after 
another likened the shooting deaths to the Tiananmen Square massacre of 
1989 and Yanukovych was likened to Saddam Hussein and Qaddafi, both of 
whom fell victim to early embryonic computer network information 
operations… 
 The Ukraine operation was also in many ways a set-piece operation. A 
set-piece is a predictable operation that has been successfully employed
 in the past. Certainly, the Maidan Square uprising was almost a carbon 
copy, but with much more violence, of the Western-engineered 2004 Orange
 Revolution in Ukraine. The same template, developed by the CIA-financed
 OTPOR provocateurs against the government of Slobodon Milosevic in 
Serbia and refined by the Center for Applied Non-Violent Action and 
Strategies (CANVAS), was used in «themed revolutions» in Georgia, Iran, 
Egypt, Tunisia, Syria, Venezuela, Burma, Maldives, Thailand, and other 
countries, as well as in the latest coup d'etat in Ukraine. 
 Disruption operations were also used at an early stage in Ukraine 
chiefly by the Soros- and Zionist-funded FEMEN movement, an 
anti-Christian and anti-Muslim group that works closely with Pussy Riot 
and Voina social order disruptors in Russia. Attacks by FEMEN on symbols
 of Christianity in Ukraine helped spark the social disorder that 
ultimately led to the rioting in central Kyiv. Neo-Nazi and extreme 
right-wing Ukrainian nationalists became agitated by the attacks on 
Christian crosses and churches in the country and cited the overt 
support that Zionist Jews like American Jed Sunden, an investor in 
Ukrainian media companies like the Kyiv Post, gave to FEMEN protesters. 
 Employing agents from neo-Nazi, Zionist, and nationalist factions is 
spelled out by one JTRIG slide, which calls for the «identification and 
exploitation of fracture points» in a targeted country, region, or other
 element. The intent of such exploitation is to create «tension» through
 the use of «pre-existing cleavages» and competing «ideological 
differences». These factors are coupled with «things that push a group 
together» like «shared opposition» and «common beliefs». These 
exploitation factors were of beneficial use in the type of successful 
intelligence operation that took place in Ukraine. 
 Other tactics employed by the Human System Analysis (HSA) Online Covert
 Action (OCA) personnel of GCHQ and NSA are the setting up of targets in
 «honey traps» (the use of lures who use sex to entrap targeted 
individuals); changing photographs on social networking sites using 
sophisticated Photoshop-lime techniques; establishing blogs purporting 
to be those of a target's victim or victims; and e-mailing and texting 
false and defamatory information to the friends, colleagues, and 
neighbors of a target. These tactics bring to the Internet familiar 
physical «dirty tricks» operations used in the past by human 
intelligence field agents. 
 Other areas where JTRIG and Tavistock have commonality are the use of 
«herding» and «group dynamics» to create «group think» among targeted 
audiences. The quickness by the general population to accept everything 
written and broadcast about the situation in Ukraine serves as a case in
 point. Only alternative media provided unbiased facts about what was 
occurring in Ukraine without the color of intelligence agency 
propaganda. However, JTRIG has a rapid response mechanism for alternate 
news reports: it calls for the use of «conspiracy stories» to influence 
thoughts and behavior. Either alternative news reports are derided as 
conspiracy theories by the GCHQ and NSA influence operations 
organizations or the intelligence agencies, themselves, put forward 
conspiracy stories to muddy the waters. 
 JTRIG also relies on the Hofstede Dimensions of Dutch psychologist 
Geert Hofstede, which call for the employment of cross-cultural 
«collectivism» or «group think» to achieve psychological goals. Such 
practices represent pure Tavistock dogma. This, in addition to JTRIG's 
desire to perform «cyber magic» on the Internet, arrives full circle at 
Tavistock's reliance on the occult to extend its ability to mold 
opinions and behaviors across large swaths of the global population. 
Tavistock tactics were instrumental in manufacturing popular consent for
 World War II, the Cold War, the «Global War on Terrorism,» the Balkans 
War, central African conflicts, and the two Western wars against Iraq. 
More recently, Tavistock methods, refined and employed by GCHQ and NSA, 
were used during the Arab Spring movement and the recent upheaval in 
Ukraine.  
 The melding of SIGINT, HUMINT, and Tavistock mind-bending technology 
represents a dangerous move by Western intelligence agencies into an 
arena that may suffer from tremendous blowback. The social disruption 
visited by the use of such practices in Libya and Syria resulted in 
civil war. Ukraine may also descend into civil war among competing 
nationalities and language groups in a manner similar to Yugoslavia. | |
| http://www.strategic-culture.org/news/2014/02/28/massive-psyop-employed-against-ukraine-by-gchq-and-nsa.html | |
 


 
  
      

 






 
   
