Mind Wars – By Eli Kurtzman The Pentagon Incorporated: DARPA is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Many of the classified systems we discuss here in this book are projects originally developed by DARPA and institutions like Berkeley where both my Mother and Father went to school. My father Joel Kurtzman even wrote articles for the New York Times going back as far as the 1980’s, regarding DARPA’s future partnership with the Pentagon. 1 The horrendous ramifications of this future merger is something I never thought I would experience myself first hand however. This book is a true story... The end result of influence operation. I have done extensive research into many of the systems used in these sorts of disruptive operations happening domestically. This book includes information gathered from declassified government documents as well an in depth investigation into these same practices by countries such as China and Russia. Much of this information was obtained through open source intelligence research. However the confirmation of classified systems came following a several year campaign of disruption targeting me personally. 1 https://www.nytimes.com/1988/10/23/business/prospects-toward-a- pentagon-inc.html It is my belief this enormous undertaking was done in response to the open source intelligence research (OSINT) I had been documenting online before being pursued in this operation. This book contains many examples of what’s called HUMINT as well as SIGNALS intelligence. This was gathered and documented during this very time period. These examples, although they seem amazing, are actually small and almost insignificant when compared to the enormity of what took place. This operation spanned several years, and the reality of what happened would simply be unbelievable to a reader if described in it’s entirety. Weaponized-Information: Propaganda is a form of information used to influence public opinion. Weaponized-Information however has a whole different objective. Weaponized information is used to create harm. This distinction is very important to understand. Weaponized-Information requires action to be taken by the receiver of that information. Let me say that again... In order for a weaponized information attack to be successful it must successfully influence the receiver of that information into actions that cause harm. Weaponized information is one of the technologies I experienced being directed at me following my research. This was done in many forms I will explain more of in depth later on in the book. This book can be considered somewhat a glossy of terms in that effect. It can also be considered a layman’s guide to Information-Warfare. Information warfare operations use communication equipment to achieve this goal. This form of warfare however also utilizes something called directed energy systems. This distinguishes it from an influence operation with seeks to influence behavior or cause an effect without physical coercion. Directed energy is used to subtly change behaviors using physical coercion methods as well. These systems can be used subtly, or be used blatantly to torture and kill. In this book you will learn: 1. How are government targets society with influence operations. 2. How government targets individuals with information warfare. 3. How directed energy and other systems are used in these operations. Disruption: The strategy of ‘disruption’ is well understood by our intelligence community. Many intelligence workers have been ‘disrupted’ themselves while overseas in countries like Cuba, Russia and China. Interviews with these people frequently include both explanations of directed energy attacks, as well as a ‘strange association with words’ noticed while being targeted. This is for a reason. Internationally, the concept of ‘disruption’ can be defined as follows: Disruption in the parlance of counter intelligence agencies is a strategy for neutralizing an individual believed to be potentially dangerous to the clients members or interests of that security agency. For example if there is no legal basis for arresting and prosecuting someone and assassination is not a legal or practical option an alternative to be a long-term campaign of intense surveillance and harassment using cyber warfare and directed energy attacks. The goal of these operations (at least ostensibly) is to limit the individual’s potential to create trouble. This is done by keeping him or her distracted, agitated, or preoccupied with the various challenges and provocations. This is done by undermining the individual's social and professional relationships or otherwise interfering with that person's life in persistent and repetitive ways. Here in the United States however a strategy of disruption is also used on civilians. These ‘counter terrorism operations’ disrupt potential terrorists. A very similar strategy of disruption is used to preemptively trigger these people into violence or self destructive behavior. Actions which effectively neutralize them. If there is one single lecture I could persuade you to watch (explaining the many ways disruption is used in the United States) it is the following. 2 This lecture was given by Dr. James Giordano. Here he speaks to young military cadets about how this strategy of disruption will impact both there future careers in the military as well as war itself. This event was hosted by the Modern War Institute at West Point. One of our premier military colleges. These operations are very real things... 2 https://youtu.be/N02SK9yd60s Information Operation Road-Map: The Information Operations Roadmap is a document commissioned by the Pentagon in 2003 and declassified in January 2006. The document was personally approved by former Secretary of Defense Donald. Rumsfeld. This document describes the United States Military's approach to Information warfare. 3 One of the defining features of this document is the weaponized use of Media and Media Personalities in these operations. 3 https://www.esd.whs.mil/Portals/54/Documents/FOID/Reading%20Room/Other/Information_Operations_Roadm ap_30_October_2003.pdf The Hidden Hand: The Pentagons influence in our media is truly enormous. Current and former officials, retired generals, celebrities, tv and film actors and many other people are all used (often unknowingly) to promote what’s called government influence-messaging in media. ‘The Pentagons Hidden Hand’ is an article written by the New York Times covering this process in much greater detail. I highly suggest every reader take the time to read this article before moving on with the information in this book. 4 My Father was at one point the New York Times Sunday Business Editor I might add.... 4 https://www.nytimes.com/2008/04/20/us/20generals.html The Pentagon spends an enormous amount of money on media operations. The biggest chunk of these funds, about $1.6 billion dollars goes into recruitment and advertising. Another $547 million goes into public affairs, which reaches American audiences. And about $489 million more goes into what is known as psychological operations. And these are older numbers... Weaponized Words: Something called ‘Clang Associations’ are groupings of words that don't have any logical reason to be grouped together. It is one of the traits people with schizophrenia may display as a symptom of there illness. Weaponized information seeks to create harmful effects similar in nature to clang associations. People targeted with weaponized information will also experience what appears to be symptoms of Pareidolia and Apophenia. Paradilia is defined as seeing pattern were they don’t exist. Faces in clouds so to speak. While Apophenia is defined as the tendency to perceive meaningful connections between unrelated things, including words. These disorders are also associated with schizophrenia. This is the reason weaponized information is used to create these effects. The creation of symptoms that mimic word association disorders lead to extreme stress, paranoia and then eventually a psychotic break with reality. This not only harms the target emotionally but disrupts there social and professional relationships. Extreme targeting of this kind is also known to lead to suicide, as well as retaliatory violence. Weaponized word association software is used to create the illusion of ‘street theater’ or ‘physical harassment’ by others. This tactic is known to create retaliatory violence. However this harassment does not actually exist. Harassment of this kind can often come from false signaling using directed energy attacks as well. One example of this is directed energy attacks when driving behind people with personalized license plates. These attacks may also occur while passing billboards or even businesses with large signs. Words that contain what appear to be relevant information will be used along with directed energy attacks that create strong muscle pulsing affects in the legs to create this word association effect. This tactic of using directed will also be used when people use language that may contain words that could be interpreted as threading or hostile. This may come in the form of muscle pulsing attacks or a sudden ringing in the ears. This is accomplished due to live time surveillance of the conversations happening. Things like cellphone surveillance as well as much more sophisticated forms of surveillance like cloud network surveillance and classified space based surveillance technologies. Personally Identifying Information: The weaponized software used in these operations include something called NLP or ‘natural language processing systems.’ There main function is the imbedding of Weaponized-Information into media. One form of weaponized information is PII or ‘personally identifying information.’ This referencing of PII in media is known as a PYSOP or a ‘psychological warfare operation.’ Weaponized media disrupts the target emotionally, altering there thinking and behavior in very harmful ways. Understanding our Governments definition of PII is very important to understanding how this works. Although PII is classically thought of as identifying personal information such as birthdays, credit card numbers and social security numbers, it is defined by our Government more broadly. PII is defined by our government as any representation of information, whether inferred or indirect, that is personally identifying. This inferred and indirect PII referencing on the news creates plausibly deniability. And the insertion of personally identifying information into public news broadcasts (in this way) creates a terrifying effect to the people being targeted. News broadcasters suddenly appear to begin referring to these people in undeniable and personal ways. However this is done indirectly as if speaking in innuendo. This may be sardonic in nature or incredibly threatening... The science behind this effect (weaponized information recognition) is also used in a non-weaponized way every day by social media companies. For example, social media companies allow users to do things as important as verify their identities. This is done by identifying comments in a line up of non personally Identifying comments. The users PII (comments) are immediately recognized by the user. Information Subsidies: An ‘information subsidy’ is defined as the provision of ready-to-use newsworthy information provided to news media organizations by our Government. This ‘information’ is said to represent a ‘subsidy’ to the media as it lowers the cost of news gathering. However this is incredibly disingenuous. What this means is that our Defense Department is literally writing local news broadcasts as well as major media broadcasts. Although many people working in these industries (including of my family members) are unaware of the government influence messaging put into media. Most people are completely unaware inferred personally identifying information is being embedded, or that directed energy attacks are being conducted in coordination with this media. The Countering Information Warfare Act was a bill first introduced In 2016-16 that proposed the use of covert or clandestine special operators and agents to influence targeted populations. And subsequent versions of this bill were most likely used as legal justification to conduct truly horrific operations. Things like DBS licenses, government subsidies, cash grants and tax exemptions are all used to incentivize media companies to air broadcasts containing weaponized information unknowingly. Script Reading: Auto-Cues are display devices that prompt the person speaking with an electronic visual text of a speech or script. Because the speaker can look directly into the lens while reading the script the teleprompter creates the illusion that the speaker is speaking spontaneously or naturally. Another thing prompters do is underline or highlight words. This function is used to prompt the reader to accentuate the word.. This tactic is frequently used in coordination with directed energy attacks as an additional force multiplier. This causes these accentuated words (containing PII) to ‘jump out’ from the narrative in a much stronger way than accentuation alone. The image below for example is a teleprompter feed sitting at the back of a press briefing... As amazing as it sounds, many people watching news broadcasts as well as politicians speaking are completely unaware these people are actually just reading very carefully crafted and edited words being scrolled across a hidden screen. The following examples are images of these various kinds of teleprompters. Hand signals play a huge role in teleprompter reading. These are used to signal to the operator to change over the material as well as being used to signal covert information. Some prompters simply appear to be clear pieces of glass to reporters or audience members. These promoters were very popular with President Barack Obama for example. People in the audience can not see the scripts being scrolled in this way. A video of how these glass plate prompters work can be seen here. 5 5 https://youtu.be/s04XqJ6MmRw These technologies conceal whats happening from reporters and audience members. This makes it difficult to tell if the politician is actually speaking naturally or simply reading a carefully pre-scripted narrative. The software used with these technologies can even generate pre-scripted responses to questions posed to them by reporters... Weaponized Images: The PII embedded into news programs consists of much more than just words... Classified systems embed PII into images as well. They do this using software similar to something called DALLE. This software creates images from text prompts. 6 6 https://en.m.wikipedia.org/wiki/DALL-E The weaponized versions however create images from text prompts of the targets PII. This form of attack also allows for the dissemination of these images publicly while at the same time insuring they go unnoticed by others. This is done covertly in a similar way as PII word embedding. The following is an example of a weaponized image. It contains inferred PII and is plausibly deniable. Its meaning will become clear when you are given the context and told who the target was. Weaponized images can be considered similar to something called memetic warfare by NATO. 7 The next image for example is a real life MEME broadcast on a far right internet program. The MEME below contains an image and likeness of Joe Biden as well as the words **Silver Alert** This directly references the silver alerts sent out to people cell phones when an old person becomes lost or missing. The derogatory message contained in this MEME attack although indirect is still clear to the public as it contains PII. The previous image however was also a derogatory image targeting Joe Biden. The book Sundowners by Lesly Lokku was used along with a image stock number. The stock number indirectly references Joe Biden Birthday. And the title Sundowners indirectly references the word ‘Sundowning Syndrome’ a neurological phenomenon associated with increased confusion and restlessness in people with delirium or some form of dementia. 8 Thousands of these kind of images are played on news broadcasts targeting people in counter terrorism operations... 7 https://www.act.nato.int/images/stories/media/doclibrary/open201705-memetic1.pdf 8 https://en.m.wikipedia.org/wiki/Sundowning The utility of memetic warfare in American Influence Operations is something written about extensively in the PDF cited here. 9 Memetic warfare however was found to be inferior to weaponized images in military warfare studies. This was because derogatory memes (although an effective form of slander) was viewed negatively by the public and could reflect poorly on the news station it was deployed on. Weaponized Images however use inferred PII. This allows them to remain invisible to anyone other than the target (including the news channel itself) And it also ensures these images remain plausibly deniable if exposed. 9 https://apps.dtic.mil/sti/pdfs/AD1052398.pdf