Mind Wars – By Eli Kurtzman The Pentagon Incorporated: DARPA is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Many of the classified systems we discuss here in this book are projects originally developed by DARPA and institutions like Berkeley where both my Mother and Father went to school. My father Joel Kurtzman even wrote articles for the New York Times going back as far as the 1980’s, regarding DARPA’s future partnership with the Pentagon.1 The horrendous ramifications of this future merger is something I never thought I would experience myself first hand however. This book is a true story… The end result of influence operation. I have done extensive research into many of the systems used in these sorts of disruptive operations happening domestically. This book includes information gathered from declassified government documents as well an in depth investigation into these same practices by countries such as China and Russia. Much of this information was obtained through open source intelligence research. However the confirmation of classified systems came following a several year campaign of disruption targeting me personally. 1https://www.nytimes.com/1988/10/23/business/prospects-toward-a- pentagon-inc.html It is my belief this enormous undertaking was done in response to the open source intelligence research (OSINT) I had been documenting online before being pursued in this operation. This book contains many examples of what’s called HUMINT as well as SIGNALS intelligence. This was gathered and documented during this very time period. These examples, although they seem amazing, are actually small and almost insignificant when compared to the enormity of what took place. This operation spanned several years, and the reality of what happened would simply be unbelievable to a reader if described in it’s entirety. Weaponized-Information: Propaganda is a form of information used to influence public opinion. Weaponized-Information however has a whole different objective. Weaponized information is used to create harm. This distinction is very important to understand. Weaponized-Information requires action to be taken by the receiver of that information. Let me say that again… In order for a weaponized information attack to be successful it must successfully influence the receiver of that information into actions that cause harm. Weaponized information is one of the technologies I experienced being directed at me following my research. This was done in many forms I will explain more of in depth later on in the book. This book can be considered somewhat a glossy of terms in that effect. It can also be considered a layman’s guide to Information-Warfare. Information warfare operations use communication equipment to achieve this goal. This form of warfare however also utilizes something called directed energy systems. This distinguishes it from an influence operation with seeks to influence behavior or cause an effect without physical coercion. Directed energy is used to subtly change behaviors using physical coercion methods as well. These systems can be used subtly, or be used blatantly to torture and kill. In this book you will learn: 1. How are government targets society with influence operations. 2. How government targets individuals with information warfare. 3. How directed energy and other systems are used in these operations. Disruption: The strategy of ‘disruption’ is well understood by our intelligence community. Many intelligence workers have been ‘disrupted’ themselves while overseas in countries like Cuba, Russia and China. Interviews with these people frequently include both explanations of directed energy attacks, as well as a ‘strange association with words’ noticed while being targeted. This is for a reason. Internationally, the concept of ‘disruption’ can be defined as follows: Disruption in the parlance of counter intelligence agencies is a strategy for neutralizing an individual believed to be potentially dangerous to the clients members or interests of that security agency. For example if there is no legal basis for arresting and prosecuting someone and assassination is not a legal or practical option an alternative to be a long-term campaign of intense surveillance and harassment using cyber warfare and directed energy attacks. The goal of these operations (at least ostensibly) is to limit the individual’s potential to create trouble. This is done by keeping him or her distracted, agitated, or preoccupied with the various challenges and provocations. This is done by undermining the individual's social and professional relationships or otherwise interfering with that person's life in persistent and repetitive ways. Here in the United States however a strategy of disruption is also used on civilians. These ‘counter terrorism operations’ disrupt potential terrorists. A very similar strategy of disruption is used to preemptively trigger these people into violence or self destructive behavior. Actions which effectively neutralize them. If there is one single lecture I could persuade you to watch (explaining the many ways disruption is used in the United States) it is the following.2 This lecture was given by Dr. James Giordano. Here he speaks to young military cadets about how this strategy of disruption will impact both there future careers in the military as well as war itself. This event was hosted by the Modern War Institute at West Point. One of our premier military colleges. These operations are very real things… 2 https://youtu.be/N02SK9yd60s Information Operation Road-Map: The Information Operations Roadmap is a document commissioned by the Pentagon in 2003 and declassified in January 2006. The document was personally approved by former Secretary of Defense Donald. Rumsfeld. This document describes the United States Military's approach to Information warfare.3 One of the defining features of this document is the weaponized use of Media and Media Personalities in these operations. 3 https://www.esd.whs.mil/Portals/54/Documents/FOID/Reading%20Room/Other/Information_Operations_Roadm ap_30_October_2003.pdf The Hidden Hand: The Pentagons influence in our media is truly enormous. Current and former officials, retired generals, celebrities, tv and film actors and many other people are all used (often unknowingly) to promote what’s called government influence-messaging in media. ‘The Pentagons Hidden Hand’ is an article written by the New York Times covering this process in much greater detail. I highly suggest every reader take the time to read this article before moving on with the information in this book.4 My Father was at one point the New York Times Sunday Business Editor I might add…. 4 https://www.nytimes.com/2008/04/20/us/20generals.html The Pentagon spends an enormous amount of money on media operations. The biggest chunk of these funds, about $1.6 billion dollars goes into recruitment and advertising. Another $547 million goes into public affairs, which reaches American audiences. And about $489 million more goes into what is known as psychological operations. And these are older numbers… Weaponized Words: Something called ‘Clang Associations’ are groupings of words that don't have any logical reason to be grouped together. It is one of the traits people with schizophrenia may display as a symptom of there illness. Weaponized information seeks to create harmful effects similar in nature to clang associations. People targeted with weaponized information will also experience what appears to be symptoms of Pareidolia and Apophenia. Paradilia is defined as seeing pattern were they don’t exist. Faces in clouds so to speak. While Apophenia is defined as the tendency to perceive meaningful connections between unrelated things, including words. These disorders are also associated with schizophrenia. This is the reason weaponized information is used to create these effects. The creation of symptoms that mimic word association disorders lead to extreme stress, paranoia and then eventually a psychotic break with reality. This not only harms the target emotionally but disrupts there social and professional relationships. Extreme targeting of this kind is also known to lead to suicide, as well as retaliatory violence. Weaponized word association software is used to create the illusion of ‘street theater’ or ‘physical harassment’ by others. This tactic is known to create retaliatory violence. However this harassment does not actually exist. Harassment of this kind can often come from false signaling using directed energy attacks as well. One example of this is directed energy attacks when driving behind people with personalized license plates. These attacks may also occur while passing billboards or even businesses with large signs. Words that contain what appear to be relevant information will be used along with directed energy attacks that create strong muscle pulsing affects in the legs to create this word association effect. This tactic of using directed will also be used when people use language that may contain words that could be interpreted as threading or hostile. This may come in the form of muscle pulsing attacks or a sudden ringing in the ears. This is accomplished due to live time surveillance of the conversations happening. Things like cellphone surveillance as well as much more sophisticated forms of surveillance like cloud network surveillance and classified space based surveillance technologies. Personally Identifying Information: The weaponized software used in these operations include something called NLP or ‘natural language processing systems.’ There main function is the imbedding of Weaponized-Information into media. One form of weaponized information is PII or ‘personally identifying information.’ This referencing of PII in media is known as a PYSOP or a ‘psychological warfare operation.’ Weaponized media disrupts the target emotionally, altering there thinking and behavior in very harmful ways. Understanding our Governments definition of PII is very important to understanding how this works. Although PII is classically thought of as identifying personal information such as birthdays, credit card numbers and social security numbers, it is defined by our Government more broadly. PII is defined by our government as any representation of information, whether inferred or indirect, that is personally identifying. This inferred and indirect PII referencing on the news creates plausibly deniability. And the insertion of personally identifying information into public news broadcasts (in this way) creates a terrifying effect to the people being targeted. News broadcasters suddenly appear to begin referring to these people in undeniable and personal ways. However this is done indirectly as if speaking in innuendo. This may be sardonic in nature or incredibly threatening… The science behind this effect (weaponized information recognition) is also used in a non-weaponized way every day by social media companies. For example, social media companies allow users to do things as important as verify their identities. This is done by identifying comments in a line up of non personally Identifying comments. The users PII (comments) are immediately recognized by the user. Information Subsidies: An ‘information subsidy’ is defined as the provision of ready-to-use newsworthy information provided to news media organizations by our Government. This ‘information’ is said to represent a ‘subsidy’ to the media as it lowers the cost of news gathering. However this is incredibly disingenuous. What this means is that our Defense Department is literally writing local news broadcasts as well as major media broadcasts. Although many people working in these industries (including of my family members) are unaware of the government influence messaging put into media. Most people are completely unaware inferred personally identifying information is being embedded, or that directed energy attacks are being conducted in coordination with this media. The Countering Information Warfare Act was a bill first introduced In 2016-16 that proposed the use of covert or clandestine special operators and agents to influence targeted populations. And subsequent versions of this bill were most likely used as legal justification to conduct truly horrific operations. Things like DBS licenses, government subsidies, cash grants and tax exemptions are all used to incentivize media companies to air broadcasts containing weaponized information unknowingly. Script Reading: Auto-Cues are display devices that prompt the person speaking with an electronic visual text of a speech or script. Because the speaker can look directly into the lens while reading the script the teleprompter creates the illusion that the speaker is speaking spontaneously or naturally. Another thing prompters do is underline or highlight words. This function is used to prompt the reader to accentuate the word.. This tactic is frequently used in coordination with directed energy attacks as an additional force multiplier. This causes these accentuated words (containing PII) to ‘jump out’ from the narrative in a much stronger way than accentuation alone. The image below for example is a teleprompter feed sitting at the back of a press briefing… As amazing as it sounds, many people watching news broadcasts as well as politicians speaking are completely unaware these people are actually just reading very carefully crafted and edited words being scrolled across a hidden screen. The following examples are images of these various kinds of teleprompters. Hand signals play a huge role in teleprompter reading. These are used to signal to the operator to change over the material as well as being used to signal covert information. Some prompters simply appear to be clear pieces of glass to reporters or audience members. These promoters were very popular with President Barack Obama for example. People in the audience can not see the scripts being scrolled in this way. A video of how these glass plate prompters work can be seen here.5 5 https://youtu.be/s04XqJ6MmRw These technologies conceal whats happening from reporters and audience members. This makes it difficult to tell if the politician is actually speaking naturally or simply reading a carefully pre-scripted narrative. The software used with these technologies can even generate pre-scripted responses to questions posed to them by reporters… Weaponized Images: The PII embedded into news programs consists of much more than just words… Classified systems embed PII into images as well. They do this using software similar to something called DALLE. This software creates images from text prompts.6 6 https://en.m.wikipedia.org/wiki/DALL-E The weaponized versions however create images from text prompts of the targets PII. This form of attack also allows for the dissemination of these images publicly while at the same time insuring they go unnoticed by others. This is done covertly in a similar way as PII word embedding. The following is an example of a weaponized image. It contains inferred PII and is plausibly deniable. Its meaning will become clear when you are given the context and told who the target was. Weaponized images can be considered similar to something called memetic warfare by NATO.7 The next image for example is a real life MEME broadcast on a far right internet program. The MEME below contains an image and likeness of Joe Biden as well as the words **Silver Alert** This directly references the silver alerts sent out to people cell phones when an old person becomes lost or missing. The derogatory message contained in this MEME attack although indirect is still clear to the public as it contains PII. The previous image however was also a derogatory image targeting Joe Biden. The book Sundowners by Lesly Lokku was used along with a image stock number. The stock number indirectly references Joe Biden Birthday. And the title Sundowners indirectly references the word ‘Sundowning Syndrome’ a neurological phenomenon associated with increased confusion and restlessness in people with delirium or some form of dementia.8 Thousands of these kind of images are played on news broadcasts targeting people in counter terrorism operations… 7 https://www.act.nato.int/images/stories/media/doclibrary/open201705-memetic1.pdf 8 https://en.m.wikipedia.org/wiki/Sundowning The utility of memetic warfare in American Influence Operations is something written about extensively in the PDF cited here.9 Memetic warfare however was found to be inferior to weaponized images in military warfare studies. This was because derogatory memes (although an effective form of slander) was viewed negatively by the public and could reflect poorly on the news station it was deployed on. Weaponized Images however use inferred PII. This allows them to remain invisible to anyone other than the target (including the news channel itself) And it also ensures these images remain plausibly deniable if exposed. 9 https://apps.dtic.mil/sti/pdfs/AD1052398.pdf Discrete Adversarial Attacks using Text Classification: Despite successful attacks using weaponized images and audio, generating adversarial texts are significantly more challenging. One method of doing this uses joint sentence and word paraphrasing to covertly embed PII. This is received by the target without altering the semantics and syntax of the message targeting the general audience. For examples sentences like, Joe Biden is ‘Killing’ in the poll numbers! This effect has been validated by human subject evaluations on the subjective metrics, quality and semantic coherence. Recommender Systems: Commercial recommender systems are defined as a subclass of information filtering system that seeks to predict the “rating” or “preference” a user would give to an item. These systems are used commercially to auto-suggest content or products companies think their users will favor. The Department of Defense however defines these recommender systems more broadly than technology companies do. Our governments definition of a recommender system is a system that simply suggests informatIon. This definition does not distinguish between helpful or harmful information...10 10 https://www.ll.mit.edu/sites/default/files/page/doc/2018-05/22_1_6_Gadepally.pdf Weaponized algorithm recommend articles and news broadcasts that contain PII. Weaponized algorithms however cam also be created through the use of commercial algorithms. Media containing a targets PII will be watched intensely, as the terrifying nature of what’s happening makes verifying this paramount to the target. This creates a vicious cycle were more and more weaponized material is recommended and then subsequently viewed by the target. When directed energy attacks are the used in coordination with images or programs that contain PII, these non-weaponized algorithms then become powerful force multipliers that can be used to cause harm in these operations. However this is not the end of the story… Weaponized algorithms can be greatly intensified using something called a human-in-the-loop. When a human operator is introduced to these automated systems very serious disruption occurs. This is also called a MITM attack.11 Or a (Man-In-The-Middle) attack. This human-in-the-loop is part of a team which also includes satellite operators and people conducting cellphone surveillance. These are used as additional further force multipliers. 11https://en.m.wikipedia.org/wiki/Man-in-the-middle_attack https://www.ll.mit.edu/sites/default/files/page/doc/2018-05/22_1_6_Gadepally.pdf A PDF covering the unclassified use of recommender systems for Intelligence-Analysts can be seen here.12 These systems give these operators the ability to communicate indirectly with the target using media recommendations. Let me say that again.. These teams can respond to the target in live time using the recommendation of media or commercials. For example questions directed into the target microphone can be responded to with answers coming in the form of advertisements. There are many different forms of similar technologies beginning to be commercialized. This is known as interactive advertising.13 12 https://www.aaai.org/Papers/Symposia/Spring/2005/SS-05- 01/SS05-01-004.pdf 13 https://en.m.wikipedia.org/wiki/Interactive_advertising Surveillance Media: Forms of surveillance mixed with media like this has even been declassified. For example, as early as 2016 it was reported that the US government spent over $500m on fake Al-Qaeda terrorist videos that also tracked the location of viewers.14 Although this is not nearly as insidious as these forms of MIME attacks. Deep Fakes: Deep fake (also spelled deepfake) is a type of artificial intelligence used to create convincing images, audio and video hoaxes. The term, which describes both the technology and the resulting bogus content, is a ‘portmanteau’ of deep learning and its use in these operations is classified. Targets in counterintelligence operations will frequently find that text classification may be used to threaten them if they risk exposing these technologies publicly. Weaponized Algorithms: Autonomous weaponized algorithms have a very controversial history. Google employees for example have often been opposed to helping develop these sorts of weaponized algorithms.15 However even the non weaponized commercial algorithms can be weaponized. This is done through the application of directed energy. This includes things like the music lyrics in songs. Directed energy attacks used like this can turn non-weaponized media like this into weaponized media by highlighting words in this way. 14 http://labs.thebureauinvestigates.com/fake-news-and-false-flags/ 15https://medium.com/syncedreview/google-researchers-hail-new-ai-principles-designed-to-halt-ai- weaponization-5edc03b7f1ca Directed Energy: Directed-Energy includes the weaponized use of radio frequency energy. This form of attack comes from space based communication satellites. Because of this, provocative directed energy attacks still legally fall into the classification of information warfare, or ‘warfare conducted with communication technologies’ and people can be targeted 24 hours a day. Even in the privacy of there own homes. Directed energy systems are very versatile weapons. I’ve included a congressional report below showing the many other kinds of directed energy systems being used by our military and law enforcement agencies.16 U.S Space based satellite systems are one of the many reasons countries buy defensive systems like the S-500 ‘satellite killer’ missile system from places like Russia.17 Verified Attacks On Intelligence Workers: American Intelligence workers have been attacked with directed energy in places like China and Cuba and Russia. A wonderful 60 min episode containing many interviews with extremely high ranking officials can be found below. I highly recommend readers watch this video before continuing on with the book.18 16 https://crsreports.congress.gov/product/pdf/R/R46925 17 https://www.defenceview.in/the-s-500-air-defense-system-can-shoot-down-military-satellites/ 18 https://youtu.be/1meGH0Dts9M This is not a new phenomenon however. Directed radio frequency has actually been used to disrupt American intelligence workers since the 1970’s.19 Many people involved in counter terrorism operations like Gavin Long20 and Aaron Alexes21 have reported being attacked with these sorts of directed energy systems right before committing there mass shootings. These ‘retaliatory acts of violence’ were directed at the people they believed were responsible for this. (Military and Police) The vast majority of intelligence workers attacked in this way are never given compensation for there injuries, pain or tremendous suffering.22 And for people (like these two black men) targeted in these domestic counter terrorism operations, there is absolutely no legal recourse at all… The use of space based directed energy is unknown to the vast majority of elected leaders. Only a small group of people called the ‘United States Senate Select Committee on Intelligence’ are even briefed on domestic counter terrorism operations.23 These briefing is only required by our Defense Department to be made on paper. And this makes misleading elected representatives about what’s taking place in there states very easy. https://www.nytimes.com/1979/05/30/archives/soviet-halts- 19 microwaves-aimed-at-us-embassy.html 20 https://amp.kansascity.com/news/local/article90330817.html 21 https://amp.usatoday.com/amp/2869779 22https://www.cbsnews.com/news/american-diplomats-in-cuba-were- likely-targeted-by-microwave-energy-study-finds/ 23 https://en.m.wikipedia.org/wiki/United_States_Senate_Select_Committee_on_Intelligence An unclassified congressional report explaining these ‘covert operations’ to our elected leaders can be found below. I encourage readers to pause and take the time to read this PDF before continuing on with the information in this article.24 You will see a very clear difference in the information provided here and what’s being provided to these representatives… A PDF from the United Nations on the ‘Less Lethal’ Weapons Law Enforcement uses can also be seen here.25 It covers common projectile weapons, chemical weapons, laser weapons and acoustic weapons. Next-generation nonlethal systems that our military possesses however include Electro muscular incapacitation weapons, preempted vehicle stoppers, laser weapons, acoustic weapons and much more. A PDF can be seen here.26 Directed Radio Frequency Energy: A 2.45 GHz microwave field has been shown to cause stimulating effects on muscle fibre activity.27 And 3GHz attacks have been reported by intelligence workers attacked with these systems overseas using radio frequency detectors. Frequencies between 1Hz and 10MHz also affect nervous system function causing muscle twitches and spasms.28 Space based directed energy systems are so precise they are capable of causing muscle pulsing or skin tingling sensations to nearly any part of the body. These muscle twitching sensation (as well as skin tingling 24 https://sgp.fas.org/crs/intel/R45175.pdf 25 26https://jnlwp.defense.gov/Portals/50/Documents/Resources/Publications/Government_Reports/DoD%20Non- Lethal%20Weapons%20Program%20Planning%20Guidance%20March%202020.pdf?ver=2020-05-13-135329-303 27 https://pubmed.ncbi.nlm.nih.gov/12221521/ sensations) can be made to affect the core of the body or even the left or the right extremities of the body selectively. Frequencies between 10MHz and 10GHz cause localized heating and whole-body heating. Increases in the core body temperature can cause a range of symptoms: an increase of as little as 2°C can cause severe sweating for example, breathlessness and exhaustion.29 This is referred to as ‘going to hell’ in the military/intelligence community. 12-18 GHz have been shown to cause short term memory loss, nervous system harm and even death.30 This is the cause of concussions and brain injury’s in verified attacks on intelligence workers. These power levels have also been reported to have made some people commit suicide while in confinement. A 95 GHz wave causes instant searing pain. It is used in non-classified weapon systems like the active-denial system. A video demonstration of this weapon (Active Denial System) can be seen here.31 In recent years, very high powered (gigawatt) pulsed microwave generators have been developed from low-GHz through mm-wave frequencies, many in classified defense projects. A great paper regarding something called the microwave auditory effect can be seen here.32 29 https://wsh.leeds.ac.uk/emfrfmicrowaves/doc/working-emfmicrowaves 30 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5607572/ 31 https://youtu.be/kzG4oEutPbA 32 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8733248/#!po=2.3809 5 In addition to the microwave audio effect, devices known as cortical modems are used to put images into the mind in a similar way sound is put into the mind. Although this sounds unreal, these devices are very real. They are in fact based on older technologies that have been improved dramatically over the years through research grants given to universities like Berkeley. https://live-helen-wills-neuroscience- institute.pantheon.berkeley.edu/darpa-berkeley-developing-million- neuron-cortical-modem/ These technologies use directed energy to create these effects remotely… Directed Energy Communication. Pulses of directed energy can be used to signal yes or no answers. This is because left and right extremities of the body can be pulsed independently of each other. This type of precision gives satellite operators the ability to communicate information when used in coordination with cellphone surveillance. A simple form of communication can be developed between satellite operations and the target in this way. Very similar to Morse-Code. Two Way Mirrors: In one of operation it was suggested I might have information regarding the criminal activities of a man named Edward McKenzie. ‘Eddie Mac’ (as I had known him) a man who had claimed he had literally broken a man’s leg for the gangster Whitey Bulger. This man did indeed have connections to the Irish Mob in Boston. My father had been introduced to this man by his lawyer after I had gone AWOL or ‘unauthorized absence’ from the Marine Corps as a young man. My father had asked his lawyer if he knew a ‘tough guy’ that could persuade me into going back as he was receiving phone calls from the marines and was being threatened with law suits if he was harboring me. This man did indeed fly with me a plane and escorted me to the entrance of my permanent duty station, Marine Corps Base Camp Lejeune in North Carolina. This was only after befriending me however as I was very a very difficult young man to persuade. This man gave me a very nice watch that had in his words ‘fallen off the back of a truck’ and had helped me get two jobs. One in the carpenters union working on the new MIT buildings being built at the time in Cambridge Mass. And one job at the Hynes Convention Center in Boston prior to me returning with him to the marine corps. This job had been with a company called Will Works... And this is all public record. This pretext operation had appeared at the time to have been run in an effort to see if I had any information regarding some unsolved bank robberies in Boston... This operation included the appearance of Mayor Marty Walsh being hired by the Joe Biden administration for this specific reason. However this had been only been a false signals created with directed energy and weaponized algorithms. The goal of this operation had actually been an effort to terrorize me. And yes… Edie Mac was released from prison during this time period as well. The only information I had regarding a bank robbery was in Cambridge Massachusetts. And it did not involve Eddie Mac. That information has now been passed on to federal authorities through this use of this operation. For those who may believe this book is not a work of fiction… Street Theater: A wide variety of people are used in these operations to trigger the target into violence or simply terrorize them. These operations involve real people on the ground conducting what’s technically referred to as a PSYACT’s in military jargon. However it is also ‘unofficially’ referred to as Street-Theater. However even YouTubers can be used in operations intended to provoke violence.33 The example below is a real life incident that happened during the course of a counter terrorism operation. The security guard in this video is a former Chicago Police Officer. He was often mistaken for the target here at Elevate-Dispensary by customers as they both have shaved heads and stocky builds. This is a classic example of provocation. The man in the video uses derogatory and aggressive language as well as military hand signals in a clear effort to provoke this former police officer into violence. 33 https://youtu.be/foI4ANfDV2o The government use of ‘agitators’ has a long history. However this issue has been politicized in the media.34 Depending on your source of information the narrative surrounding the use of these sorts of people can change very drastically.35 The use of ‘paid protesters’ by political campaigns for example is already known to the public.36 This tactic of using ‘fake’ people is also commonly referred to in the Intelligence community as ‘Astroturfing’37 The truth is several different groups are employed by both state and federal agencies as well as private industry. The first of these groups are individuals known as TLO’s or Terrorism Liaison Officers.38 In the state of California where I live there are more than 14,000 of these TLO’s alone. This group of people have been used historically to monitor things like occupy Wall Street and the Black Lives Matter movement protest and activities. They serve as a point of contact for public safety agencies in matters related to intelligence.39 Frequently plain clothed officers like these are not told there is the potential for retaliatory violence in response to there actions. These officers are often used as bait in operations designed to provoke retaliatory violence from the person being disrupted. https://www.npr.org/2020/06/09/873592665/unmasking-the- 34 outside-agitator 35 https://www.justice.gov/opa/pr/attorney-general-william-p-barrs-statement-riots-and-domestic-terrorism 36 https://www.latimes.com/business/la-fi-crowds-extortion-20181021-story.html?_amp=true 37 https://en.m.wikipedia.org/wiki/Astroturfing 38 https://en.m.wikipedia.org/wiki/Terrorism_Liaison_Officer 39 https://ociac.ca.gov/default.aspx?menuitemid=24&AspxAutoDetectCookieSupport=1 Signature Reduction Forces: This second group of people are very different from TLO’s, paid protesters or people used unknowingly like those used in ‘flash mobs’ to cause disruption. This covert special operations forces work directly for the Pentagon. And they are fully aware of there mission objectives. However they are not told about the political interests there actions may be serving. Like the triggering of people based on there ‘political demographic group’ in an effort to create incidents for the news that benefit a particular political party. People like these are compartmentalized and only given the information needed for them to successfully perform there mission. This ‘signature reduction force’ was reported by Newsweek to have now grown to be 10 times the size of the CIA’s own clandestine forces.40 Even the name signature reduction force is purposefully misleading. ‘Signature reduction’ refers to the electromagnetic spectrum. And ‘Special Forces’ are defined as the units of a country's armed forces that undertake covert, counterterrorist, and other specialized operations. A name for this Special Forces group does not actually exist. The name of this group is rather simply the description of their capabilities… https://www.newsweek.com/exclusive-inside-militarys-secret- 40 undercover-army-1591881?amp=1 Computational-Disruption: Something referred to as computational propaganda is being used by the intelligence agencies to do much more than manipulate public opinion. Academics took a long time before recognizing computational propaganda for what it is. A form of weaponized information attack. The term (computational propaganda) was first introduced in an article about Ukraine’s pro-Kremlin disinformation campaigns in 2016. It is a very new form of Information Warfare. This ‘computational propaganda’ uses bots, algorithms, sock puppet accounts, anonymous text mail subscriber numbers, spear fishing attacks, DDoS attacks, indirect provocations, (IoT) and directed energy to absolutely terrorize people targeted with information warfare. There are many reasons why this may be done. A short two page document prepared for the European Parliament can be found in the footnote below.41 This PDF’s goal is to educate government officials (who at the time were unaware computational propaganda was a form of information warfare) about this new form of attack. Weaponized notifications are another thing being used in these operations. Held back text messages and notifications coming from accounts are both used in coordination with directed energy to terrorize the target in many different ways. Including making the suggestion to commit violence. 41 https://www.europarl.europa.eu/RegData/etudes/ATAG/2018/628284 /EPRS_ATA(2018)628284_EN.pdf Phishing Attacks: A phishing attack is a trap. Usually a link that when clicked on leads to spyware being installed on your device. It can also lead to your information being held for ransom. Or simply corrupt your files rendering them useless. These Phishing attacks can appear to look like legitimate websites, often appearing to be from a source you trust. Or they can target you in ways that lead to your desire to open the link… In the following example this came in the form of what is referred to as a ‘honey pot’ by the intelligence community. The links I was sent contained sexually suggestive language as well as appearing to come from both the cloud storage accounts I had just opened… Google docs as well as Dropbox….