Discerning Alien Disinformation
Part 3
21 October 2008
The Nature of Disinformation
Disinformation is the most potent tool for manipulating mass
consciousness.
While there is no shortage of innocent misinformation
stemming from logical fallacies, wishful thinking, false
assumptions, selective evidence, and outright ignorance, the
difference is that disinformation intentionally exploits these
weaknesses to shape the beliefs and actions of targeted audiences.
Disinformation is especially successful when its core agenda is
bundled in the sincere convictions of disseminators who have their
own vested interests for believing and defending it. For instance, a
cold and calculating intelligence may engineer a disinformation
package which is then propagated through a naive individual who
finds it so appealing to his ego identity and emotional security
that he will do everything to defend it. This allows a small and
unseen group of disinformers to work through a vast body of
unsuspecting vectors who sincerely believe in what they are doing.
Disinformation also uses selective truths to support false
conclusions. Good reasoning may proceed from false premises,
fallacious twists of logic are used, or reasoning is discouraged
altogether and the conclusion is asked to be taken on emotional
appeal or the authority of its purported source.
Disinformation has
no problem throwing strategic gambits, revealing genuine but
convenient truths to make its case if the payoff is bigger than the
sacrifice.
Discerning Disinformation
Discerning disinformation is tricky business. It amounts to
performing a mental biopsy on the pathological underpinnings of a
suspect source. It helps to have a well-honed intuition that can
detect pretense, after which critical thinking zeroes in on the
exact problem. The problems tend to be false assumptions, ignored
counterexamples, logical fallacies, and ulterior motives.
More specifically, alien disinformation plays to these common
psychological vulnerabilities:
-
lazy thinking
-
ego insecurities and
the desire to be special
-
naive optimism that leads good intentions
down a dangerous path
-
greater respect for credibility and authority
than personal discernment and intuition
-
wishful thinking
-
desperation for answers and consequent lowering of standards
-
wonderment at amazing but superficial appearances to the point of
gullibility
-
desire for escapism out of sheer
boredom
Since the goal is to influence opinion, the best disinformation is
concise, slick, and persuasive. It maximizes credibility by taking
whatever form of authority the target respects most and is careful
to dispel suspicions that the source is doing it for fame or
financial gain. It is false to assume that if someone risks
publishing revelatory information without asking anything in return,
he must be sincere; on the contrary, what disinformation asks for in
return is belief in its half-truths.
The best disinformation so tidily packages its deceptions that the
containing story can be impressively concise, charming,
entertaining, and easy to follow. It goes beyond mere logical
fallacies and employs hypnotic techniques to massage the targeted
mind into accepting the payload. These manipulation tactics are
nothing exotic.
Psychological warfare specialists, street magicians, neurolinguistic programmers, and advertisers make regular use of
them in their professions.
Disinformation must ideally exploit the deepest desires,
insecurities, and blind spots of the target, which necessarily vary
by audience type. The originators of disinformation therefore use
different methods and sources to appeal to different audiences. In
the case of individuals used as unwitting agents of deception, their
selection depends on how easily their weaknesses allow them to be
hooked into performing that function and how well their strengths
are suited to playing on the weaknesses of the audience.
In this way
a chain of influence reaches the audience via an intermediary who
has the added appeal of being skilled and respected.
Avenues of Disinformation
What follows is an exploration of several avenues for alien
disinformation and why they are convenient and effective.
This
should indicate just how easily the fringe research community and
general public can be misled by sources they trust if they fail to
take into consideration the possibilities discussed below.
These
same avenues can also be outlets for truth, so my aim is not to
universally discredit these sources, but rather point out their
potential shortcomings.
The Channeler
-
Summary:
Channeling involves one or more individuals allowing
themselves to be used by unseen intelligences who communicate
information through them. This includes the use of ouija boards,
mediumistic trance states, automatic writing, and conscious
verbalization of intuitive impressions.
Pendulum dowsing, muscle
testing, scrying, and crystal gazing may also allow such
communication. The channeled sources may claim to be anything
ranging from aliens to angels, deceased persons to demonic beings,
famous individuals in history, time travelers, other dimensional
entities, the subconscious, and impersonal archetypes.
-
Strength of Source:
Discarnate entities, alien beings, and advanced
human military factions can transmit verbal and visual information
remotely, whether electromagnetically or telepathically. They also
have limited ability to induce paranormal phenomena, predict the
future, and arrange synchronistic events by which they can prove
their existence and overwhelmingly awe the target into submission.
This exploits the logical fallacy that truth of existence somehow
equates to existence of truth, which ignores the possibility that a
real source can provide bogus information where it counts. These
demonstrations of faux omniscience, omnipotence, and precognition
rule out that the source is just a fabrication of the
channeler, but
do not prove that the source being channeled is necessarily being
truthful.
Channeling also affords deceptive sources complete anonymity and
freedom to fabricate an identity and back story. Channeling is
therefore highly customizable to the weaknesses of the targets. The
same source can change identities repeatedly to whatever sounds most
authoritative.
-
Weakness of the Vector:
Establishing and maintaining a connection
requires mental dissociation so that the source can come through
clearly without restriction by the conscious mind of the channeler.
This amounts to a relinquishing of freewill, and a manipulative
entity may abuse this offer by sinking roots into the mind of the
channeler, deeper than it could otherwise.
In worst cases this can
lead to possession, where the channeler not only transmits
disinformation during specified sessions, but becomes a walking
extension of the negative entity, serving an agenda in broader ways.
Conscious abandonment over the channeling process may also grow into
habitual abandonment of discernment and critical thinking, whereby
the channeler simply accepts and relays what is transmitted after
having been won over with convenient but trivial truths.
-
Strength of the Vector:
Being just the messenger frees a channeler
from having to personally defend the information received. The
source is likewise freed from always having to back up its claims by
virtue of its self-proclaimed authority and various specious
excuses.
Through channeling, disinformation is given unlimited
creative latitude, taking bold and direct expressions since claims
that are too far-fetched for other audiences will readily be
accepted by channeling enthusiasts. If especially entertaining and
fascinating, source and channeler rise to cult or celebrity status,
which adds to the authority factor that overrides critical thinking.
-
Weakness of Audience:
Since channeling is perceived by rationalists
as a dubious means of investigation, it appeals more to people who
pride themselves on being open minded and not fettered by the
limitations of cold intellect.
But there is a fine line between
open
mindedness and gullibility, and those who would replace rather than
complement reason with intuition leave themselves vulnerable to
logical sleights of hand, emotional manipulation, wishful thinking,
and other forms of subjectivity.
Channeled disinformation would play
upon these weaknesses.
Remote Viewer
-
Summary:
Remote viewing uses rigid protocols to psychically gather
information about a target with minimal subjective bias. Several
remote viewers may tune into the same target and receive similar
impressions, which are then analyzed afterward to construct an
accurate assessment of the target.
The U.S. military is publicly
known to have explored remote viewing as an intelligence gathering
method. More recently, various researchers have used remote viewing
to probe the nature of the alien presence.
-
Strength of Source:
As in the case of channeling, alien and advanced
human disinformers can transmit information remotely through natural
or artificial telepathy. Remote viewers, even entire teams, are thus
open to having their psychic line spliced by such disinformers and
fed misleading impressions.
-
Weakness of Vector:
The greatest weakness is assuming that remote
viewing success is measured by its signal to noise ratio, which
ignores the possibility of a strong but counterfeit signal. Even
with subjectivity eliminated, what remains is no guarantee of being
truthful.
-
Strength of Vector:
Remote viewing has a reputation for being rigid,
objective, even scientific. Some of its practitioners have worked
for the military, others have respectable academic backgrounds. All
this gives it an air of credibility and authority that can augment
any disinformation disseminated through it.
-
Weakness of Audience:
Remote viewing appeals to open minded
individuals who value objectivity and scientific procedure. Although
it is more hard-edged than channeling, when used for disinformation
the apparent objectivity is just better window dressing for the same
deception.
That the public military has experimented with remote
viewing and successfully gathered intelligence on targets in nations
without psychic defenses does not mean remote viewing alien targets
is equally reliable.
Disinformation passed through remote viewers
disseminates deceptive ideas under the guise of strict objectivity.
Insider / Whistleblower
-
Summary:
Insiders are members of secret societies, military
projects, or government agencies who are privy to non-public
information. For various reasons, insiders may leak some of this
information to the public. Often they do it anonymously, perhaps
through third party contacts on the outside who can vouch for their
identity but keep it confidential while relaying the information.
They may also speak openly without hiding their identity, but then
tend to be careful about not revealing more than they are allowed.
Some self-claimed insiders are casually upfront and detailed,
seemingly holding nothing back.
-
Strength of Source:
Insiders work within highly controlled,
compartmentalized, and monitored environments as demanded by the
secret nature of their work. They are therefore in close proximity
to high level sources of disinformation who have immediate access to
them, particularly sources stationed above them in the hierarchy. If
the source is an advanced military faction, the covert nature of the
military network allows personnel to be abducted and mind programmed
as necessary to create unwitting disinformation vectors.
Personnel
may also be tested, monitored, and recruited into becoming skilled
disinformation operatives, whether fully aware of their mission to
deceive, or given a convincing cover story and some fake but noble
sounding reason to leak “important” information to the public.
Some
may even be shown misleading evidence and documents and stealthily
nudged into becoming whistleblowers, thereby disseminating the
deception with full conviction that they are somehow undermining
their superiors when they are actually carryout out their
intentions.
-
Weakness of Vector:
Insiders gain increasing levels of security
clearance by demonstrating a need to know, passing tests of
allegiance and usability, signing secrecy oaths, giving away
personal rights, and agreeing ahead of time to the punishments for
breaking these oaths. Secretive networks have numerous methods for
ensuring that security stays intact including monetary incentives,
blackmail, threats to livelihood, hypnotic mind control, and
selecting only highly manageable and obedient candidates for
recruitment.
Personnel are only told what they need to know to do
their jobs, which often includes false but plausible stories to
compel their cooperation. Compartmentalization makes it difficult
for an insider to compare notes with others to detect disinformation
fed to him by superiors. Despite having secret knowledge, insiders
are still woefully in the dark concerning information beyond their
clearance level.
Compartmentalization keeps the bigger picture out
of sight, and without that context insiders may not always detect
disinformation in what they have already been told.
-
Strength of Vector:
Anyone who is verifiably on the “inside” is
venerated for being in so privileged and qualified a position, and
for being courageous and generous enough to risk leaking precious
information to the public.
This bestows upon their words great
credence because what they say amounts to expert witness testimony,
words by those who are in a position to know. Of course this
appearance of authority creates the perfect vehicle for seeding
disinformation.
Secrecy oaths and national security laws are also
good excuses for dodging certain inconvenient questions and adding
an atmosphere of intrigue.
-
Weakness of Audience:
Compartmentalization and secrecy laws prevent
the public from more thoroughly investigating insider claims by
barring them from accessing evidence under wraps, documents still
classified, and witnesses unwilling to risk their lives. Much of
what insiders say must be taken on the basis of their credibility.
If they can prove their credentials, that impresses many, but
insiders are secured an influential voice if their story is also
conveniently corroborated by leaked documents and intriguing photos
that pander to the audience’s assumptions, questions, and
desperation for confirmation.
Audiences are guaranteed to be duped if they fail to rule out the
possibility of the insider being a disinformer regardless of his
credentials, especially if his claims are supported by forged photos
and documents supplied by the well-equipped and connected network
sponsoring him.
The best that audiences can do is look for errors
and contradictions in his claims, and more importantly, make a
probabilistic assessment of his integrity based on the angle behind
his claims and whom it would benefit most.
Public Official
-
Summary:
Public officials include elected or appointed members of
political and religious institutions, usually those with special
titles and credentials who are situated in respected positions of
leadership.
-
Strength of Source:
Disinformers hold a great advantage of
influencing through a highly visible figurehead without themselves
being seen. They can be among his personal advisors, programmed or
recruited associates who are planted close to him to sway his
beliefs and decisions, secret organizations from which he
periodically receives instructions, or alien factions abducting and
programming him into adopting their goals.
These sources can easily
blackmail the official, exploit his naïveté, offer incentives of
money and power for obedience, and tell/show him whatever “truth”
shocks him into cooperating.
-
Weakness of Vector:
The official is first and foremost a public
figure whose loss of reputation and popular support spells the end
of his career. He can therefore be threatened with character
assassination, real assassination, or bribed with promises of
personal and institutional advancement and protection.
Being a
public official can be so time-consuming that time for personal
independent research and thorough contemplation is limited, which
may make him dependent on advisors for condensed briefings and
recommendations. This makes for reliance on potential sources of
disinformation and an overall lack of discernment concerning matters
beyond his expertise.
His prominence as a public figure may also
make him too much of a liability to be given the real truth, so he
may be barred from higher security clearances unless he has an
absolute need to know.
And unless he has intelligence, allegiance,
and power that surpass his role as public official, he is
expendable.
-
Strength of Vector:
Officials are decision-makers, opinion leaders.
If their reputation is intact, their words hold sway over public
opinion. They can influence public opinion to hijack democracy,
advancing private agendas under the protection of majority vote.
Officials can also invoke the power and reverence of the
institutions they represent, like a church official declaring some
political agenda as being in the will of God.
-
Weakness of Audience:
The audience in this case is the general
public, the least discerning audience of all. Typically speaking,
the public has blind respect for authority, is easily impressed by
credentials, and lacks the knowledge and context to properly
evaluate they are told — especially if they are told disinformation
concerning fringe subjects like aliens. This is simply the fact of
statistical averages.
The mainstream public has a need for security,
stability, and certainty, which authorities are obliged to provide,
though not without political motivation.
Should public officials,
with full sanctioning by their affiliated institutions, reveal the
existence of aliens, the shock to mass consciousness and ensuing
clamor for answers and assurance allows these same officials to also
unload a torrent of gladly received disinformation concerning alien
motivations and identities.
Academic
-
Summary:
Academics include credentialed doctors, scientists,
professors, theologians, analysts, and other highly educated
specialists whose research and presentations methods are formal,
systematic, and sophisticated. Those involved in researching various
facets of the alien phenomenon may have degrees useful to their
facet of study.
They typically cite other academics to boost their
own credibility, drawing their conclusions by surveying the relevant
literature and collating authoritative viewpoints into a generalized
observation somewhat enhanced by their own original research.
-
Strength of Source:
Since the intellectual capabilities and
strategic value of an academic can be inferred without difficulty
through his credentials, reputation, and publications, a broad pool
of candidates may be monitored to select who is most qualified to be
groomed into a disinformation vector.
Academics who refuse to
cooperate and become liabilities can be eliminated, either through
murder or smearing of character.
Alien and military factions can also corrupt the relied-upon data
pool by inserting decoy data, say through abductees programmed with
screen memories that portray a false picture of alien motivations.
In that case, without suspecting the possibility of deception, an
academic will accept the decoy at face value and inject its contents
into his works.
And even if he suspects it, his suspicions cannot be
voiced without risking his credibility by appearing paranoid.
-
Weakness of Vector:
The need to preserve reputation and appear
reasoned, cautious, and formal can lead to an agnostic timidity that
keeps the academic from taking those creative leaps of thinking
necessary to penetrate the depths of a mystery. It also discourages
him from acknowledging sources of information that do not meet the
standard of his peers despite containing critical pieces of the
puzzle.
Additionally, it is no secret that universities are as much
indoctrination and filtering devices as educational institutions,
and those who most successfully pass through that filter have
demonstrated programmability and a willingness to obey the rules and
pander to group consensus.
And so despite having a sharp intellect,
the potential lack of individualism and astute intuition can make a
renowned academic gullible to the grandest of deceptions, especially
those endorsed by his respected peers and academic superiors.
-
Strength of Vector:
The primary strength of an academic is his level
of sophistication, in the sense of being cultured and refined. But
sophisticated does not necessarily mean discernment, as it could
mean being a sophisticated rationalizer and disinformer, hence a
master sophist.
Further, academics are automatically endowed with
credibility due to their credentials and often work in positions of
influence and advisement. Credibility and sophistication together
lead to effective debunking of truths and verification of lies.
They
can also function as role models in the fringe community, spreading
an infectious attitude of myopic agnosticism to those most in need
of the opposite.
-
Weakness of Audience:
For some audiences, academics are epitomes of
objectivity and respectability who are beyond reproach, especially
groups of academics in agreement with each other.
The most skeptical
audiences will listen to academics more than other types of
disinformation vectors. They may find the disinformation to be more
plausible than the truth because at least the it fits their
unrealistic assumptions and comes from an assumedly incorruptible
source.
The job of an academic disinformer would be to make an
intricate case for a deceptive agenda while marginalizing contrary
truths as not meeting the standards of plausibility and credibility.
Abductee / Contactee
-
Summary:
Abductees and
contactees are people who have had direct
contact with alien beings. Abductees are taken from their familiar
surroundings and brought into the abductor environment where they
undergo various procedures. Contactees have conscious participation
in the interaction and become spokespersons for their alien
contacts.
Not all contactees are necessarily abductees, nor are all
abductees necessarily contactees, but the two categories overlap
since contactees get abducted and abductees can be groomed into
consciously facilitating an alien message.
-
Strength of Source:
Abductors have direct access to the abductee in
an environment they control. Various alien and military factions
have the ability to create false memories, scan the mind and auric
vibrational signature to analyze weaknesses and biases, use
posthypnotic mind programming techniques to install subconscious
commands, employ telepathic or implant-generated persuasion, monitor
their subjects from afar, stage false confirmation through garish
coincidences, and construct exquisite lies and rationalizations.
They can scan the population and the probable futures of interesting
individuals to select those who are most suitable to their aims, and
through logistical and hyper-dimensional advantages give customized
attention to the ones chosen.
-
Weakness of Vector:
The greatest weakness of an abductee or
contactee is knowing less about himself than what his contacts or
abductors know. They have backdoor entrances to his mind and can
perform manipulations that stealthily influence his thoughts and
impulses. Unless he is aware of that possibility and guards against
it, it is pretty much inevitable.
Abductees and contactees may feel alienated from society due to
having uncommon and unbelievable experiences, thus seeing themselves
as different from others. If hitched to ego, this can degenerate
into feelings of privilege, superiority, or specialness which serve
as hook points for the abductors to compel allegiance.
Their
identity may become so heavily invested in being the contactee of a
particular alien group that any suggestion of dishonest motivations
by their alien contacts is subconsciously interpreted as an attack
upon their very identity, which naturally provokes an irrational
defense mechanism.
Some may simply give up, feeling overpowered by superior
intelligences with superior technology, and in a psychotic attempt
to salvage the situation turn into willing and zealous cooperators
per Stockholm Syndrome.
-
Strength of Vector:
Real abductees and contactees exude plenty of
sincerity and conviction in recounting their firsthand experiences
with aliens. Their candor can be disarming to undiscerning
audiences.
Abductees who document their experiences may have
audiovisual, medical, or testimonial evidence that they are indeed
being abducted, and that alone piques people’s curiosity about what
they learned in the presence of assumedly real aliens.
-
Weakness of Audience:
Like in the case of channelers, contactees can
become the center of personality cults, playing the role of
intermediaries between the audience and their alien idols like a
prophet or pontiff intermediating between worshippers and the
divine. It is the abductee and contactee’s proximity and direct
interaction with mysterious aliens that boosts the credibility of
whatever disinformation is vectored through them.
The targeted audience consists of abductees searching for answers,
researchers of the abduction phenomenon looking for inside
information on alien motivations, and people wishing they themselves
could be contacted by aliens.
Disinformation appeals to their
private longings and blind spots, taking what little they know
toward false conclusions and satisfying their ego along the way.
Hypnotist
-
Summary:
The hypnotist is trained to guide a client into achieving
altered states of consciousness deep enough to access the
subconscious. The hypnotic trance is one of high suggestibility and
dissociation. Abduction researchers commonly accept hypnosis as an
investigative tool to help their subjects recover abduction memories
made inaccessible by having been in an altered state of
consciousness during the abduction, or by abductors installing
screen memories and posthypnotic commands to forget.
Hypnotized
subjects can also be used for remote viewing, exploring past and
future probable lives, and as passive instruments for channeling
other beings.
-
Strength of Source:
Alien and military factions can install multiple
layered screen memories in abductees, stage misleading abduction
scenarios, and remotely jack into a hypnotized subject’s mind to
speak through him while he is unconscious.
-
Weakness of Vector:
Hypnotists may be in over their heads when
dealing with disinformation sources coming through their clients. If
they are unaware that screen memories can lurk beneath deeper screen
memories, they may only penetrate the decoy screen and accept the
next one as likely truth. Same with staged abductions, where what is
recalled is indeed what was experienced, but the experience itself
was staged for the abductee as a diversion.
And if the hypnotized
person becomes an instrument through which a disinformer can
directly speak, then the hypnotist is in live contact with someone
or something that can play to his weaknesses.
-
Strength of Vector:
The information retrievable through hypnosis is
fascinating, entertaining, and often verifiable. This gives it wide
appeal and respect in the fringe research field. It may also be used
by academics as a research supplement to expand their data pool.
Like in the case of channeling, because what is said cannot always
be verified, disinformation can be as creative and fantastic as
desired.
-
Weakness of Audience:
Disinformation rides the assumption that what
is retrieved through hypnosis, if not fabricated by the subject or
induced by the hypnotist through leading questions, is very likely
the truth. Once again, this is the fallacy “if not subjective and
false, then objective and true,” which ignores the possibility of
objective deception.
In ordinary cases where there are no deceptive
intentions involved, hypnosis can indeed be reliable. But the trust
and respect hypnosis earns by the reliable cases should not be
blindly transferred to potentially disinformative cases.
Direct Messages
-
Summary:
Messages to the public may appear to come directly from
aliens without a middleman.
This includes:
-
Strength of Source:
Any alien or military group with sufficiently
advanced technology can create crop circles, take over television
signals, broadcast radio signals from space, and use anonymous human
proxies to distribute carefully written messages to the world.
Their
abilities greatly exceed what the casual hoaxer can pull off, which
they use to their advantage to make the messages seem beyond hoaxability and thus authentic.
-
Weakness of Audience:
If the audience really believes the message
comes from aliens, they will be intrigued and take the message as a
sincere declaration of alien intentions.
The message may take an
authoritative tone, take the form of responses to messages we
ourselves have sent into space, appeal to ethical memes like
concerns over global warming, overpopulation, or government
corruption, tantalize the intellect with feigned crypticism, or
prime the audience for future deceptions by giving key future dates
and prophecies. The audience must truly be convinced aliens are
sending urgent messages to the world so that the content of the
message influences their opinion about the nature of these aliens
and what must be done.
Disinformation sent via direct messages aim
to distort public awareness of alien motivations and influence the
audience into supporting certain actions and values that are
beneficial to an agenda.
As can be seen, disinformation uses a variety of
methods to target a
variety of audiences.
Audiences include:
-
The general public who would prefer stability and security over
disquieting truths
-
Spiritual and New Age types who succumb to wishful thinking and
emotionalism
-
Intellectuals whose limited reasoning follows from flawed premises
-
Counter-cultures whose fascination with the bizarre outweighs
their interest in truth
-
Factualists who only accept evidence fitting their subjective
standards of credibility
-
Political activists who would support false solutions to combat
true injustices
-
UFO buffs who hungrily swallow crumbs of disinformation for its
sensational nature
-
Abductees whose identities are invested in being liaisons between
humans and aliens
Methods include:
-
Appealing to blind respect for authority
-
Appealing to false and limiting assumptions
-
Appealing to emotional biases
-
Appealing to a need for safety, security, and certainty
-
Appealing to the ego’s desire for identity and specialness
-
Appealing to boredom through tantalizing and entertaining stories
-
Appealing to skepticism to ridicule the truth
-
Appealing to mental lassitude by presenting an overly simplistic
picture
-
Offering a false outlet for good intentions
-
Using logical sleights of hand
-
Forcing a choice between two equally false opposites
-
Providing misleading evidence
-
Staging artificial corroboration through seemingly independent
sources
How can one tell if a source is peddling disinformation and not just
innocently expressing a differing opinion?
It is true that people
can unwittingly pass on half-truths after having bought into them,
but the question concerns the ultimate source of those ideas. The
answer is that the intentionality behind disinformation gives its
flaws a pointed direction.
In other words, the flaws are too clever
and directional to be unintentional, bearing the signature of crafty
intelligence beneath its projected guise of innocence.
Leaderless Conspiracy
At the same time, it must be emphasized that an agenda can be
carried out through seemingly opposing elements, whereby the
illusion of outward disunity and independence cloaks the underlying
order.
Therefore the conspiracy isn’t as organized as one would think
because those beneath the capstone of the pyramid of control may
seemingly act on their own. They may be at odds with each other,
mutually suspicious or contemptuous, independently carrying out
their own agendas and acting on their own unique ideologies.
But
like swimmers drifting down a river together despite moving
independently relative to each other, these vectors of
disinformation may oppose and cancel each other in the superficial
sense yet still have a common direction that advances the highest
unseen agenda.
There is no need for coordination among lower elements of a
conspiracy if a broad range of carefully designed causes initiated
earlier produce cascading effects that cleverly converge at the
right time. For human conspirators this would require an incredible
level of foresight, but foresight and hindsight are interchangeable
for interdimensional forces operating outside linear time who have
no problem scanning the timeline for the right points to target.
So while different streams of disinformation and misinformation
appear to contradict each other in the details, it is their common
direction and combined synergy that matter. One must examine the
ultimate consequences to discern the ultimate motives.
This I will
do in the next part by providing and analyzing numerous examples of
alien disinformation.
Back to Contents
|