“FALSE FLAGS” are LEGAL PROPAGANDA Produced by the Department of




By Anonymous Patriots


Why would the government
support false flag events?


This question would go through
our minds every time we would see a new false flag event plastered all over the
  Like many of you, we would think, “It has to be real, otherwise
the government and participants would be engaging in treason.” But the narrative and the evidence never seem
to match up.
  How odd that at Sandy Hook and
at San Bernardino there were so many responders from federal agencies and that
other drills were already happening on the same day just a mile away.
  Coincidence seemed unlikely for
one event.
  Totally unlikely for two.


It even seemed that the
“official story” that was “fed” to the news agencies was filled with holes on
  When 450 responders showed up
in San Bernardino, including FEMA, ATF, Homeland Security, FBI, DoD, and all
local agencies, within 14 minutes and had their lawn chairs and coolers set up
while most of them walked around aimlessly with no worries in the world, we
couldn’t take it anymore.
  We had always known that “false
flags” usually precede severe military action and we couldn’t really imagine
military action within US domestic borders since the military is not empowered
to act against its own citizens.


Therefore, we decided to WAKE
UP and study the false flag phenomena. Don’t presume to think this is just
another conspiracy theory article.
  What you will read will chill
you to the bone. We know this is a long article, but while you were sleeping
much has been done to destroy your country. You need to see the immense work
that is being done behind your back to destroy your beloved country. And, most
important, when you get to the end of the article, we have a CITIZEN



We beseech you, our fellow
Americans, to read this article and pass it along to others.  Unplug
your electronic tethers and read this very important article.  If
not for you, then the children and loved ones in your life who will live like
slaves in this hellish New World Order that is already here.  Our
patriotic duty was to do the research; yours is to read and distribute to other

Like many of you, we believe
that 9-11 was a false flag event. We don’t know exactly who, what, why and how,
but we know that when overwhelming circumstantial evidence points in the
opposite direction of the official story, something is wrong.
  So when the Sandy Hook and San
Bernardino events unfolded, we became very uneasy as these events seemed to be
a new type of false flag.
  In both events, the president
was demanding that Americans give up their guns and constitutional rights even
before the fake pools of blood on the steps of the Sandy Hook school


Actually, the pools of blood on
the sidewalk at Sandy Hook were the first indicator of fraud: two uncoagulated
pools of liquid blood without a trail of blood, without any victims ever coming
out of the building to “make” the pools, and authorities ignoring them and not
even treating them as part of a crime scene.
  Every picture we saw or video
we listened to was completely fake and looked more like a drill.
  Nothing added up.  In San Bernardino there were
ten different “black SUV” pictures released that are completely contradictory.
  An alarm kept going off in our
heads saying, “Why are they
purposely releasing contrary evidence as though they didn’t care that the
evidence made them complicit with a crime, or even treason?”


We started studying the evidence.
We were beyond the basic evidence—that crisis actors were used to stage both
events and multiple government agencies showed up within minutes.
  But one thing that totally took
us by surprise is that San Bernardino was the site of the largest Jade Helm
2015 military maneuvers.
  We asked ourselves, “Why would
so many people, including so many U.S. government agencies, be involved in
deceiving Americans?”
  It took courage to look beyond
the first veil of illusion. 


If you have followed Sandy Hook
and San Bernardino you realize that no one (except the patsies) are killed.
  No one dies; therefore, no crime has been committed.  This knowledge gave us some
comfort, but raised many questions concerning false flag events in


What is the goal of the recent
(since 2012) false flag events?


Who gains from the appearance
of insidious criminal events?


What mechanisms are used to
silence so many participants, i.e. paid crisis actors, government agencies?


How do these agencies “get away
with” using creating lies, distortions, and false flags?
  Wouldn’t that be called


After pondering these questions
relentlessly, we lifted another veil of illusion. We asked, “What if these
activities to manipulate public opinion were legal?
  Could there be a law that
protects the president and US agencies (local, state, and federal) from
conducting false flag event?
  So we changed our focus and
began to research false flags as being legal propaganda.
  We found the answers in plain sight.  We were beyond disbelief when we discovered that the US Congress
has passed laws, post 9-11, that makes state-sponsored propaganda legal.
  Take a moment and think about
that before reading on. 


Our research lead us to
discover the tenets of the National Defense Authorization Act of 2012 which
makes it legal to propagate and broadcast propaganda within America.
  We are all being treated like
enemy combatants whose “perception” must be managed to come in line with
presidential “national security” policies.
  The Department of Defense may now broadcast propaganda with the
approval and authority of the Broadcasting Board of Governors (BBG) both
internationally and domestically.
  Just Google it folks.  There is actually an agency
with this name.


Perception Management


Any presidential policy may be
accompanied by broadcasts that use subliminal programming as part of perception
  These mechanisms that squelch
dissent have been used since the Reagan Administration to shape public opinion
to support administrative policies.
  Wars require domestic support
and these “black ops” programs started to use the “psy-ops” tools of the
  DARPA, the research and
development arm of the military, has created many tools to control the enemy
through media that shapes public perception, which we will elucidate later in
this article.
  It is called perception management and has
been used legally in advertising since the late seventies and also in
electronic warfare throughout the world to “brain-wash” our enemies and shape
their perception and opinion of America.


The only question left was the
issue of what the goal of the president (or the real powers behind him—the
Council on Foreign Relations) might be, besides the obvious one of having few
people who disagree with his policies.
  We then studied the United
Nations Small Arms Treaty which Obama signed in 2011, but couldn’t get Congress
to ratify.
  In this treaty we found the
goal Obama is driving towards — disarm
America, with the help of the United Nations.
  But two things have to happen:
1) we have to give up our guns or have them taken from us and 2) the UN has to
have a military presence in our country.
  Keep in mind that the United
Nations cannot have a military presence in our country, unless invited.


Have you already started
connecting the dots? Remember seeing all of the images of all that UN military
equipment that was distributed throughout America during Jade Helm 2015?
  It seemed that besides the San
Bernardino exercises, moving UN heavy military equipment throughout America was
the only thing that we noticed happening during Jade Helm 2015.
  Another veil lifted.  Obama’s job was to go for a gun
grab, either by Congressional action or UN treaty.
  But patriots started waking up and our elected officials
in Congress could not ratify the United Nations Small Arms Treaty.
  So Obama and his political
minions began to manufacture false flags, hoping that our horror to Sandy Hook
and San Bernardino would cause us to lay down our rights and guns. 


Keep in mind, that false flag
incidents and state-sponsored propaganda could not be considered treasonous
acts against Americans as Congress (through the NDAA) had made


Congress Does Not Ratify Gun-Taking Treaty


Congress would not, and has
not, ratified the UN Small Arms Treaty, nor would they vote on Second Amendment
  So false flags were used to create conscious and “unconscious”
support of a national gun grab.
  Sandy Hook was the most heinous
“example” of what “guns do.”
  Incredible anti-gun sentiment
was created by Sandy Hook and people still reel from it with anger and hatred
for “people on drugs” and “gun lovers.”
  San Bernardino happened right
before the congressional vote on gun control.
  And even with images of San
Bernardino a day before the congressional vote on gun control, Obama lost his
attempt for gun restrictions.


Now do you see why he has taken
things into his own hands and signed into effect 23 Executive Orders that move
his gun control policies forward in contradistinction to the fact that Congress
rejected such ideas? The motive became quite clear once you read the UN Treaty
– to dismantle the Second Amendment and disarm America.
  Since Obama couldn’t use the United Nations or Congress to get his
way, he just wrote his own laws and pretends like Executive Orders outrank
congressional law.
Obama is behind the UN timeline of disarmament, since the other
nations who signed the treaty have already begun to disarm its citizens. 


Controlling the Human Domain


Once we understood the goal and
the legalization of propaganda, with its insidious DARPA electronic war
devices, the rest fell into place as one Internet search after the next
revealed the truth before our eyes.
  This is shocking and almost
  But it is law (NDAA) and
Congress did not stop this law from being passed. 


Another question is why our
elected officials did not call out the president in using subliminal
programming, psy-ops perception management and war-like marketing strategies to
shape public opinion?
  Simple. They use it themselves
in their own campaigns.
  Subliminal programming is openly used in the broadcasting
– that’s why people believe untruths from the news and watch
mindless TV while drinking their cola beverage (It’s the Real Thing) and
imagining that the official story on main stream media is the only story.


As Jade Helm 2015 taught us,
the military is interested in Controlling
the Human Domain
, the very motto of their operation emblazoned on
their logo.
  Fellow patriots, we are in a
war which is coming from all sides towards the middle.
  We cannot trust authorities and
politicians to have our best interest at heart.
  We need to wake up and observe
more carefully and ask more questions even when a nagging voice in the back of
our minds says, “It is the official story, I should not question it,” or “I
should trust my elected officials to come forward and blow a whistle if such
heinous propaganda was being perpetrated upon unsuspecting Americans.”
  Better yet, perhaps we need to
know how we are being controlled!
  So before we lose you in our
web of deception and lies, remember that Jade Helm is telling us that the goal
is to control the human domain.


First we need to drill down on
some of the basic terms and strategies before we bring the full picture into
  Stay with us and keep reading, fellow patriots.


The Deceptive Art of Perception Management


Throughout human history,
governments have been interested in “mastering the human domain.” The mind control
of their populations, what we once called propaganda, is now called perception
management, political diplomacy and other such deceptive names.
  This theme is echoed in the
slogan for Jade Helm, “Mastering the human domain.”


The National Defense
Authorization Act of 2012, which was just updated for 2016, provides that the
Department of Defense, through the Broadcasting Board of Governors, controls
all broadcasting both international and domestic.
  Therefore, Obama is acting legally carrying out “false
flag” events inside the US borders.
  Obama is not a traitor for this activity; he is a lawyer who made
it legal to be a traitor.
  Obama is not only at war with
Syria, Libya, Iraq, Somalia and Yemen; he is also at war with Americans who
don’t support his policies.


Obama has made a commitment to disarm Americans called the United
Nation’s Small Arms Treaty
  This treaty is consistent with
his efforts to dismantle the Second Amendment.
  It is this motivation that
seems to have driven his non-stop agenda for disarming America and empowering
the executive branch of the government, i.e., his own agenda of bombing
sovereign nations and bringing America under the control of the United Nations
and his administration.
  This, coupled with his continued
efforts to broaden his powers through the NDAA, Executive Orders, and
Presidential Policy Directives creates a clear picture of manipulating public
sentiment with the force of a military war on his American opponents.

United Nations Small Arms Treaty


In 2011 Obama signed the United
Nations Small Arms Treaty and since
then there have been 108 mass shootings in America in less than a 4 year
  In the four years before Obama
was elected (2003-2007) there was a total of 27 mass shootings. Prior to 2003
there was an average of 2.5 mass shootings per year.
  In 2015 alone, there have been
over 58. That is over 20 times higher than it was before. (MSA Data, 2015)


The Small Arms Guns Treaty has
been passed by the UN and is ready to go into effect across the world. The
treaty passed in the general assembly in April 2013.  The treaty, which seeks to prevent and control the illicit trade of
weapons while regulating the international trade of them
, includes
measures such as creating a
national gun registry; mandating control of firearms and ammunition; regulating
the manufacture of gun parts; and limiting stores’ ability to sell
The NRA and a bipartisan majority of pro-gun Senators
have succeeded in blocking this treaty’s ratification in the United States.
  This treaty violates the Second
  For any UN treaty to have any
effect on American laws, it must first be ratified by a two-thirds majority of
the Senate. 


NDAA Provides for Legal Propaganda


Through the 2012 National
Defense Authorization Act the US government has the legal regulation to use propaganda against foreign audiences
and American citizens.
 The intention is to sway public opinion by using television, radio,
newspapers, and social media targeting American and foreign targets in
controlled psy-ops or perception management.


The NDAA has an amendment added
that negates the Smith-Mundt Act of 1948 (SMA) and the Foreign
Relations Authorization Act of 1987.
  These laws made propaganda used
to influence foreigners and US citizens illegal. The Broadcasting Board of
Governors is not new as it 
was created from SMA; although today
it is quite a different agency as you will read.
  Originally, this agency claimed
to “inform, engage, and connect people around the world in support of freedom
and democracy.”


114 of the NDAA was approved by the House in May of 2012.

The Smith-Mundt Modernization Act (2012) reads:


Sec. 501. (a) The Secretary and
the Broadcasting Board of Governors are authorized to use funds appropriated or
otherwise made available for public diplomacy information programs to provide
for the preparation, dissemination, and use of information intended for foreign audiences abroad about
the United States, its people, and its policies, through press, publications,
radio, motion pictures, the Internet, and other information media, including
social media, and through information centers, instructors, and other direct or
indirect means of communication.


(b)(1) Except as provided in
paragraph (2), the Secretary and the Broadcasting Board of Governors may, upon
request and reimbursement of the reasonable costs incurred in fulfilling such a
request, make available, in the
United States
, motion pictures, films, video, audio, and other
materials prepared for dissemination abroad or disseminated abroad.


According to Michael Hastings:  “The new law would
give sweeping powers to the State Department and Pentagon to push television,
radio, newspaper, and social media onto the U.S. public.”


“It removes the protection for
Americans,” says a Pentagon official who is concerned about the law. “It
removes oversight from the people who want to put out this information. There are no checks and balances. No one
knows if the information is accurate, partially accurate, or entirely false


Representatives Mac Thornberry (R-TX) and Adam Smith (D-WA)
in the Smith-Mundt Modernization Act (2012) (H.R.
5736), advocate that it is time
to liberate the authority of the US government to broadcast American produced
foreign propaganda in the U.S


The amendment empowers the
State Department and Pentagon to utilize all forms of media against the American public for the sake of
coercing US citizens to believe whatever version of the truth the US government
wants them to believe.
  All oversight is removed
with Amendment 114.  Regardless of whether
the information disseminated is truthful, partially truthful or completely
false bears no weight.


Four billion dollars per year
is spent by the Pentagon on propaganda aimed at the American public; as well as
$202 million spent by the Department of Defense on misinformation operations in
Iraq and Afghanistan in 2011. The
Pentagon is using fake handles on social media sites to purvey false
information, harass users and enact perception management to influence
 Sophisticated software allows military to engage in
online conversations with coordinated answers, blog comments and instant
messaging remarks that are solely meant to spread pro-American propaganda.

This new perception management
is called Information Operations (IO), which is defined as “the integrated employment of electronic
warfare (EW), computer network operations (CNO), psychological operations
(PSYOP), military deception (MILDEC), and operations security (OPSEC), in
concert with specified supporting and related capabilities, to influence,
disrupt, corrupt or usurp adversarial human and automated decision making
while protecting our own.”

Repealing the Smith-Mundt Act allows the direct deployment of these tactics on the American public.


Information Operations
activities are undertaken to shape the essential narrative of a conflict or
situation and thus affect the attitudes and behaviors of the targeted
audience and equates descriptions of combat operations with standard
marketing strategies. With the NDAA 2012 in its current form, the
State Department and Pentagon can go beyond manipulating mainstream media
outlets and directly disseminate campaigns of misinformation to the U.S.
wars require domestic acceptance


The NDAA 2012 – specifically
Section 1021(b)(2) – has already institutionalized the
U.S. military’s ability to
indefinitely detain, without charge or trial, citizens and non-citizens alike.
  Major parts of the legislation
are based on the assumption that key legal protections for individuals are
incompatible with the requirements of national security.


The purpose of the Smith-Mundt
Modernization Act of 2012 is “to authorize the domestic dissemination of
information and material about the United States intended primarily for foreign
audiences.”  The act was added to the 2013 NDAA bill as section of 1078 to
amend certain passages of Smith-Mundt
Act of 1948
 and Foreign Relations Authorization Act of
1987. The Smith-Mundt Modernization Act of 2012 passed Congress
as part of the NDAA 2013 on December 28, 2012.  Amendments made to
the Smith-Mundt Act of 1948 and Foreign
Relations Authorization Act of 1987 allow for materials produced by the State Department and the Broadcasting Board of Governors (BBG) to be released within US borders


National Defense Resources Preparedness Order


In 2012 Obama signed an order called National Defense
Resources Preparedness giving himself explicit control over the nation and declaring
a permanent state of Martial Law in the U.S.
  The very
same year, Obama signed the National Defense Authorization Act (NDAA) which
gave the U.S. Government the right to detain anyone for anything indefinitely. He has renewed that order every year since then. The
Obama administration was even able to get a court ruling overturned after
the ruling had successfully removed the Indefinite Detention provision from the


Virginia Wakes Up


A bill introduced in the
Virginia assembly (HB2144) would take the next step in stopping illegal federal kidnapping under the
2012 NDAA.
 Virginia stood alone and passed the first bill in
the country addressing detention provisions written into the NDAA in 2012.
That law forbids state agencies, in some
situations, from cooperating with any federal attempts to exercise the
indefinite detention provisions written into sections 1021 and 1022 of the
National Defense Authorization Act.


What Did They Say about NDAA?


“NDAA, and SOPA would put us on
a par with the most oppressive nations in the world.”
  Sergey Brin, Google co-founder

“I never thought I would have
to write this: but – incredibly – Congress has now passed the National Defense
Appropriations Act, with Amendment 1031, which allows for the military
detention of American citizens.”
  Naomi Wolf, author

“…bold and dangerous attempt to
establish martial law in America.”
  Presidential candidate Rand Paul

“…was carefully crafted to
mislead the public.”
  Justin Amash, U. S.

“Provisions that were snuck
into the bill with little notice from mainstream media could spell indefinite
detention without a hearing, keep Guantanamo open, and hinder fair trials.”
  Amnesty International

“Myth #3: U.S. citizens are
exempted from this new bill: This is simply false, at least when expressed so
definitively and without caveats. The bill is purposely muddled on this issue
which is what is enabling the falsehood.”
  Glenn Greenwald, constitutional lawyer

“What the American People are
witnessing now with this new legislation is the further development of an American Police State into
a Military Dictatorship
, a process that was started by the so-called
USA Patriot Act in 2001.”
  “If it is enacted into law,
America will lose all pretense of having our Military subjected to the control
of democratically elected civilian leaders as originally envisioned and
required by the Constitution.
  Professor Francis Boyle,
constitutional law authority at the University of Illinois, Champaign.


NDAA Versions Continue to Erode Bill of Rights and Constitution


NDAA 2013


The 2013 version of the NDAA
allows the State Department and Defense Department to direct the same kind of
massive propaganda campaigns
here in the U.S. that are presently waged as part of American war efforts in
foreign lands
  The US government propaganda is
directed at the American people with the belief that successful wars require
domestic acceptance.


The 2013 NDAA overturned a 64-year ban on the domestic
dissemination of propaganda which is described as public diplomacy information.
 It preaches freedom of
the press abroad while practicing censorship at home.
 The resources and personnel who focus on talking about America
overseas are diverted in favor of domestic perception management. There are no
checks and balances. No one knows if the information is accurate, partially
accurate, or entirely false.


NDAA 2014


NDAA 2014 underwrote $662
billion for continued US aggression in our many foreign wars while, on the
domestic front, it violates the Bill
of Rights
. According to the American Civil Liberties Union, it
authorizes presidents “to order the
military to pick up and imprison people, including U.S. citizens, without
charging them or putting them on trial


The ACLU charges the provisions
of NDAA “were negotiated by a small group of members of Congress, in secret,
and without proper congressional review (and), are inconsistent with
fundamental American values embodied in the Constitution….(our) fundamental freedoms are on the line.”


We had already had many of the
provisions of the Bill of Rights supplanted by the Patriot Act.
  President Carter has denounced
the Patriot Act for authorizing
federal agents “to search people’s homes and businesses secretly, to confiscate
property without any deadline or without giving notice 
that the
intrusion had taken place, and to collect without notice personal information
on American citizens including their medical histories, books checked out of
libraries, and goods they purchase.”


NDAA 2016


The National Defense
Authorization Act for 2016 is costing Americans $612 billion.
  Obama skirts around the
Constitution by having the National Defense Authorization Act (NDAA), Sections 1021 and 1022, which
authorizes indefinite military detention, without charge or
without trial, any person, 
including an American citizen, and applies the “Laws of War,” to U.S.
soil, making the 
United States legally a battlefield.

claims he will develop “An Appropriate Legal Regime” to permanently detain
people prior to having committed any crime.
  The idea of these detentions
would be to prevent any individual from committing a possible future crime.
Obama says that he might detain someone up to ten years before they might
commit a crime.
  The NDAA removes all of the
rights guaranteed under the Bill of Rights except the 2nd Amendment, and you
know how hard Obama is trying to get rid of that also.


Obama’s Executive Orders


President Obama has been using
executive orders (EO’s) in ways they have never been used before. He is using
them to do end-runs around
Congress by legislating from the White House
. Some EO’s are dormant
but pose a potential future threat. One of those is EO 13603 which was signed
EO 13603 on March 16, 2012. The purpose is to delegate authority and
address “National Defense” resource policies and programs under the Defense
Production Act of 1950. It provides the framework and authority for the
allocation or appropriation of resources, materials and services to promote
“National Defense.”
  It is an update of a prior EO’s
on the National Defense Resources Preparedness. One difference which is
concerning is that the
definition “national emergency” is now broader and quite vague.


Executive Order 13603 – National Defense Resources
 allows the government to completely control our
lives through the “industrial and technological base,” should the president
declare a “national emergency.”
  It gives Obama the power over “all commodities and products
capable of being ingested by human beings and animals; all forms of energy; all
forms of civil transportation; all usable water from all sources; health
resources; forces labor such as military conscription; and federal officials
can issue regulations to prioritize and allocate resources.”


Presidential Policy Directives


In the Barack Obama
Administration, the directives that are used to promulgate Presidential
decisions on “National
Security” matters are designated Presidential Policy Directives
Directives that are used to initiate policy review procedures are called Presidential
Study Directives
  In May 2013, the   Administration issued a
previously unknown category of directive known as a Presidential Policy
Guidance (PPG).


Presidential Policy Directives
have the same legal force as an Executive Order, forming a body of largely secret law.
  Executive Orders are public and
must be published in the Federal Register whereas PPDs are not.
  It is a secret law.


President Obama’s directive on
hostage policy was originally released as Presidential Policy Directive
numbered PPD-29. When the White House corrected that number to PPD-30, it meant
Obama had issued a secret directive as PPD-29.
  Of the 30 PPDs issued by
Obama, 19 have not been
. And for 11 of those, the White House has not disclosed
even the subject of the order.
  Not even Congress has a copyIt’s a domain of unchecked presidential


Alarming Trends in the Military


Since Obama took office, an
unprecedented number of top military leaders have been removed from their posts
– nearly 200 generals, flag officers and other high-ranking officials. They are
being “removed” at a rate of about one per week.
  In 2013, an ex-Navy Seal came
forward and warned that Obama is firing soldiers who say they would not fire
upon US Citizens if ordered.


Recently, the Department of Homeland Security was caught
buying 1.6 billion rounds of ammunition, 
enough to have
sustained our war in Iraq for twenty years. Earlier this year, the DHS purchased another 62 million
rounds of AR-15 hollow point ammo
 claiming it was allocated for
“target practice.”


The military wants to transform
Information Operations into a core military competency on a par with
air, ground, maritime and special operations including:
the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC),
and operations security (OPSEC),
in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp
adversarial human and automated decision making while protecting our own


IO intends to shape the essential narrative of a conflict or
situation and thus affect the attitudes and behaviors of the targeted
audience and equates combat operations with standard marketing strategies


History of American Internal Propaganda and the BBG


In January 1983, President
Reagan took the first formal step to create an unprecedented peacetime
propaganda bureaucracy by signing National Security Decision Directive 77,
entitled “Management of Public
Diplomacy Relative to National Security
.” Reagan deemed it
“necessary to strengthen the organization, planning and coordination of the
various aspects of public diplomacy of the United States Government.”
  Reagan ordered the creation of
a special planning group within the National Security Council to direct these
“public diplomacy” campaigns. This group was run through the Department of


The DoD’s Broadcasting Board of Governors traces
its beginnings to the early Cold War years, as a covert propaganda project of
the newly-created Central Intelligence Agency to wage “psychological warfare”
against Communist regimes and others deemed a threat to US interests.
  In 1948, National Security Council Directive 10/2 officially
authorized the CIA to engage in “covert operations” against the Communist
Menace. Clause 5 of the directive defined “covert operations” as
propaganda, economic warfare; preventive
direct action, including sabotage, anti-sabotage, demolition and evacuation
measures; subversion against hostile states,
including assistance to
underground resistance movements, guerrillas and refugee liberation groups, and
support of indigenous anti-communist elements in threatened countries of the
free world.”
  Propaganda quickly became one
of the key weapons in the CIA’s covert operations arsenal. The agency established and funded radio stations, newspapers,
magazines, historical societies, research institutes, and cultural programs all
over Europe.


The BBG was officially formed
in 1999 and ran on a $721 million dollar annual budget. It reports directly to the Secretary of State and operates a host of
Cold War-era CIA spinoffs and “psychological warfare” projects: Radio Free
Europe, Radio Free Asia, Radio Martí, Voice of America, Radio Liberation from
Bolshevism and a dozen other government-funded radio stations and media outlets pumping out pro-American propaganda
across the globe


The BBG is managed by a
military think-tank and is no longer funded by the CIA’s black budget.
  Its role in “psychological
warfare” continues but its operations are openly funded. The BBG and its
subsidiaries still engage in propaganda
warfare, subversion and soft-power projection
 against anyone
deemed hostile to US interests and “National Security.” And it is still deeply
intertwined with the same military and CIA-connected intelligence
organizations. The Broadcasting Board of Governors runs a propaganda network
that blankets the globe.


The BBG is also involved in the
technology of post-Cold War, Internet-era propaganda. It has bankrolled
satellite Internet access in Iran and continues to fund an SMS-based social network in Cuba called


As the BBG outlined in a 2013
fact sheet for its “Internet Anti-Censorship” unit: “The BBG collaborates with
other Internet freedom projects and organizations, including RFA’s Open
Technology Fund, the State Department, USAID, and DARPAs SAFER Warfighter
Communications Program. IAC is also reaching out to other groups interested in
Internet freedom such as Google, Freedom House and the National Endowment for
Democracy’s Center for International Media Assistance.”


Today, the
Congressionally-funded federal agency is also one of the biggest backers of grassroots
and open-source Internet privacy technology. These investments started in
2012, when the BBG launched the “Open Technology Fund” (OTF).
  The BBG endowed Radio Free
Asia’s Open Technology Fund with a multimillion dollar budget and a single
task: “to fulfill the US
Congressional global mandate for Internet freedom


The Open Technology Fund
supports many new encryption programs like: CryptoCat, Tor, Open Whisper
Systems, LEAP, GlobaLeaks, ChatSecure, and Orbot.
  In 2014, Congress increased the
BBG’s “Internet freedom” budget to $25 million. In 2014, OTF launched a
coordinated project with Dropbox and Google to make free,
easy-to-use privacy tools, and Facebook announced
it was incorporating the
underlying encryption technology of one of OTF’s flagship projects –
OpenWhisper Systems
 – into its WhatsApp text messaging service.


It should seem suspicious that
DoD’s money would be so warmly welcomed by some of the Internet’s fiercest
anti-government activists.
  Why is a federally-funded CIA
spinoff with decades of experience in “psychological warfare” suddenly blowing
tens of millions in government funds on privacy tools meant to protect people
from being surveilled by another arm of the very same government? 
  It is called: “Perception


Perception Management Is Being Used Against You


Perception management is a
term originated by the US Department of Defense.
  It defines it as: “Actions to
convey and/or deny selected information and indicators to foreign audiences
to influence their emotions,
motives, and objective reasoning as well as to intelligence systems and leaders
at all to influence official estimates, ultimately resulting in foreign
behaviors and official actions favorable to the originator’s objectives.
 In various ways, perception management
combines truth projection, 
operations security, cover and deception, and psychological


The factors that influence
the targeted audience
consist of the following: 


If ambiguity increases, the perceiver may find it harder to form an accurate


: a person’s real or perceived position in society or in
an organization.


Impression management: an attempt to control
the perceptions or impressions of others.


The phrase “perception
management” has often functioned as a euphemism for
“an aspect of information warfare.”
The distinction between “perception management” and public
, which “does not, as a rule, involve falsehood and deception,whereas
these are important ingredients
of perception managementget the other side to believe what one wishes
it to believe, whatever the truth may be


Although perception management
operations are typically carried out within the international arena between
governments, and between governments and citizens, use of perception management techniques have
become part of mainstream information management systems.
may even contract with other businesses to conduct perception management for
them, or they may conduct it in-house with their public relations staff.


The term “perception
management” is not new to the lexicon of government language. For years
the FBI has
listed foreign perception
management as one of eight “key issue threats” to “National Security”
including it with terrorism, attacks on critical US infrastructure, and weapons
proliferation among others. The FBI clearly recognizes perception management as
a threat when it is directed at the US by foreign governments. Deception
and sleight of hand are important in gaining
advantages in war, both to gain
domestic support of the operations
 and for the military against
the enemy.


In late 2001, after 9/11,
Defense Secretary Donald
H. Rumsfeld
 created the Pentagon’s Office of Strategic Influence (OSI).
The Office of Special Plans was created with a
goal of selective intelligence vetting outside the normal chartered
intelligence apparatus, with foreign propaganda activities moved to the Office of Information Activities under the
direction of the Assistant Secretary of Defense for Special Operations and Low
Intensity Conflict
.  Strategic influence, special plans, psychological operations (psy-ops), and
perception management are all direct synonyms within the DoD.


The DoD has identified the information domain as its new
“asymmetric flank.”
 The level of use of perception management is continuing to
grow throughout the military. There are now specialists, known as psychological operations officers and civil affairs officers, whose only
purpose is to decide how to present information/propaganda to the media and to
the people of the current country.


False Flag (Perception Management) Characteristics


Let’s compare what Wikipedia
tells us are the “12 basic strategies of perception management” with what might
be its counterpart in “characteristics of a false flag event.”


if ambiguity increases, the perceiver finds it harder to form an accurate

Counterpart: Eyewitnesses have conflicting accounts.

: targeting a person’s position in society or in an

Counterpart: The official narrative has obvious domestic and geopolitical advantages
for the governing body

Impression managementthe
perceptions or impressions of others

Counterpart: The narrative behind the attack serves to leverage emotions like fear, as
well as patriotism, in order to manufacture consent around a previously
controversial issue.

Preparation – having clear goals and
knowing the ideal position you want people to hold.

Counterpart: Military and law enforcement training drills occur on
the same day very close by causing confusion to obscure eye-witness testimony
and allow orchestrators to plant both patsies, disinformation and backup
 Immediate calls for
gun control or restricting civil liberties.

Credibility – all information uses
prejudices or expectations to increase credibility.

Counterpart: News agencies keep saying that they are “being given reports” or “being
told” and do not cite who reported or told them the unconfirmed information
they broadcast as real. 

Multi-channel support –
have multiple arguments and fabricated facts to reinforce your information.

Counterpart:  No obvious motive for the mass attack and no prior indicators.
Shooter leaves manifesto or lots of evidence “proving” they were “radicalized”
or “on drugs” or other were other undesirables.

Centralized control –
employ entities to promote propaganda.

Counterpart: Fake “victims” and crisis actors.

Security – the nature of the
deception campaign is known by few.

Counterpart: All drill participants and crisis actors sign Non-disclosure Agreements
with “National

Security” clause promising swift and severe punishment if broken.  Everyone involved is on a “need to know” basis and kept in the
dark about the overall intent of the event.

Flexibility – the deception campaign
adapts and changes over time as needs change.

Counterpart: Evidence gets destroyed or tampered with and the
details don’t matter because the culprits are dead.
  No more interest in an investigation.

Coordination – organize in a hierarchy
to maintain consistent distribution of information.

Counterpart: The federal agencies trump the local law enforcement agencies due to the

Security” element of the drill which is ultimately controlled by
the Department of Defense.

Concealment – contradicting
information is destroyed.

Counterpart: Culprit is dead and evidence disappears from news reports, Internet, and
 Patsy has no military
training, yet shoots extremely fast and accurately but no authority looks at
the evidence.

Untruthful statements –
fabricate the truth.

Counterpart:  Families of “victims” have acting backgrounds and receive payoffs
in GoFundMe

accounts and direct payoffs, especially mortgages. They often show
little to no emotion, and even smile or laugh. The lie perpetuates and the
“official story” is shaped by the media into truth.


Narrative Networks


In 2015, DARPA’s “Narrative
” (or N2) program is producing results.
  The project is intended to
analyze how “narratives” play into human psychology, delving into the way these
constructs affect the mind.
  A narrative is a way
of phrasing something, a choice of words that is likely a biased strategy to
frame information.


Narratives exert a powerful influence on human thoughts, emotions and
behavior and can be particularly important in security contexts
Conflict resolution and counterterrorism scenarios and detecting the neural response underlying
empathy induced by stories
 is of critical importance.”
  From DARPA researchers in a
paper published in the Journal of Neuroscience Methods.


Mastery of “narratives” could
potentially be used to manipulate the perception of a population
using platforms of communication like television to subtly and potently make a
person think a certain way.


Governments often use stories to present information, so
understanding how we comprehend them is important,” said co-author Eric
Schumacher, an associate professor of psychology at the Georgia Institute of


Researchers observed a
phenomenon of “tunnel vision,” or impaired reasoning, triggered in the brain
when viewers processed a suspenseful moment.
  When suspense grew, brain
activity in the viewers’ peripheral vision decreased.


The US Military has a long
history of funding psychological experiments, some entrenched in human rights
  Now we have the Pentagon-funded
DARPA program which pays researchers at colleges and other scientists millions
of dollars to enhance and bolster methods of war. Such work places
great technological power in the hands of the Department of Defense.


DARPA’s Narrative Networks as Mind-Control


DARPA launched the Narrative
Networks program to understand how narratives influence human cognition and
behavior, and apply those
findings in international security contexts.
 Narratives may
consolidate memory, shape emotions, cue heuristics and biases in judgment, and
influence group distinctions.


The Narrative Networks Program
has three parallel tracks of research and development:


Develop quantitative analytic
tools to study narratives and their effects on human behavior in security


Analyze the neurobiological
impact of narratives on hormones and neurotransmitters, reward processing, and
emotion-cognition interaction; and Develop models and simulations of narrative
influence in social and environmental contexts, develop sensors to determine
their impact on individuals and groups, and suggest doctrinal modifications.


DARPA is studying Narrative
Comprehension and Persuasion in a study entitled: Toward Narrative
Disruptors and Inductors: Mapping the Narrative Comprehension Network and Its
Persuasive Effects
. The DARPA-funded research project ($6.1 million)
is studying the effectiveness of different narratives in efforts of mass persuasion.
Using MRI and EEG they will map areas of the brain involved in narrative
comprehension and even attempt to enhance or disrupt narrative understanding using this
information as well as Transcranial Magnetic Stimulation. It will study
the neurobiology of narrative comprehension, validate narrative theories and
explore the connection between narrative and persuasion. This groundbreaking
research study will employ multi-modal neuro-imaging, combining the temporal
resolution of EEG with the spatial resolution of MRI.


This project will provide
empirical evidence integrating brain regions and cognitive processes into a
neural network of narrative comprehension. By virtue of the experimental
design, these relationships will also directly inform the primary aspects of
narrative and strategic communication under examination: narrative validity,
narrative transportation, and vertical integration. The empirical correlation
of narrative theory to neurocognitive activity is an important advance in the
understanding of narrative and how the brain governs narrative comprehension.


The programs goals include:

Integrate narrative theory,
neuroimaging, and persuasive

Resolve conceptual problems in
narrative and psychology of religion.

Produce significant innovations
in the study of the neuropsychology of narrative.

Generate practical innovations.

Tests key narrative theories
from communication, literary studies, and psychology.

Uses stimuli based on religious master narratives.

Understand the psychological
effects of particular message features.

Attend to the relationship
between narrative and political violence in contested populations.

Disrupt or enhance aspects of narrative structure, and/or brain
functioning, to minimize or maximize persuasive effects on subject proclivity
to engage in political violence


Mapping the Narrative
Comprehension Network will provide empirical leverage for developing models of
narrative comprehension that are biologically plausible. Moreover, the current
research will establish how
narrative elicits persuasion in the brain


Predicting a particular narrative message influence on an


Introducing new stories into the narrative system to disrupt its


Rational logic aspires to be
objective, repeatable, consistent and impersonal, whereas narrative logic works
on completely different principles. It is rooted in the simultaneously cognitive and emotional processing of
information that marks human behavior
, and finds its validity in
principles of coherence and fidelity. These qualities help explain the seemingly irrational persuasive power of
 and provide guidance for how to manipulate narrative
stimuli in order to accurately map the Narrative Comprehension Network in the


Culture provides schema, or
templates, for ordering narrative data (top-down); individuals process incoming
story data and organize it with a selected schema. The process continues until
comprehension is achieved, or lack of comprehension mandates implementation of
a new schema. A master narrative can be seen as an exemplar narrative schema.
Because master narratives
embody specific cultural values, they can be strategically deployed as an
explanatory frame for current events in order to encourage a particular
interpretation and for persuasive purposes.
 Master narratives
execute ideological functions, positioning these cultural values as naturalized
and universal.


Vertical integration is
achieved when personal, local and master narratives all line up consistently.
This congruence formulates a powerful model for identity formation and persuasion.
Cognitive processes that are indicated by vertical integration to be part of
the Narrative Comprehension Network include: self-recognition, identity, and
theory of mind (to see oneself in a story), pattern recognition (to see
parallels between master narratives and contemporary situations), and memory
(to remember the master narrative elements).


Subliminal Mind Control – SSSS


The “Sound of
Silence” is a military-intelligence code-word for certain psychotronic weapons of mass mind-control tested
in the mid-1950s, perfected during the 70s, and used extensively by the US
military in the early 90s.
  This weapon is based on
subliminal carrier technology, or the Silent Sound Spread Spectrum (SSSS). 
  It was developed for military
use by Dr. Oliver Lowery of Norcross, Georgia, and is described
in US Patent #5,159,703 – “Silent Subliminal
Presentation System” for commercial use in 1992.


The patent abstract reads:


“A silent communications system
in which non-aural carriers, in the very low (ELF) or very high audio-frequency
(VHF) range or in the adjacent ultrasonic frequency spectrum, are amplitude- or
frequency-modulated with the desired intelligence and propagated acoustically
or vibrationally, for inducement
into the brain, typically through the use of loudspeakers, earphones, or
piezoelectric transducers
. The modulated carriers may be transmitted
directly in real time or may be conveniently recorded and stored on mechanical,
magnetic, or optical media for delayed or repeated transmission to the


The Sound of Silence Spread
Spectrum broadcasting equipment allows for the implantation of thoughts,
emotions, and even prescribed physical actions into human beings.
  In the private sector SSSS goes
by the name
  Silent Subliminal Presentation
System and the technology has also been released to certain corporate vendors
who have attached brand names like BrainSpeak and
Silent Subliminals to their own SSSS-based products.


It is a technology that
uses subliminal programming that is carried over
Ultra-High Frequency (UHF) broadcast waves, planting inaudible messages directly into the subconscious human mind.
  Perfected more than twenty
years ago by the DoD and battlefield-tested upon Iraqi soldiers in the
Gulf War during 1991, SSSS is a proven weapon.


The US Government has plans
to extend the range of this
technology to envelop all peoples, all countries through BBG broadcasts
  SSSS is completely undetectable
by those being targeted and it delivers its subliminal programming directly to
the human brain via the auditory sense at frequencies that humans are incapable
of perceiving as sound, there is no defense against it. Coupled with the use of
supercomputers, an individual’s unique electroencephalographic (EEG) patterns
can be digitally altered and then stored for rebroadcast via digital UHF.
Computer-enhanced EEGs can identify and isolate the brain’s low-amplitude
emotion signature clusters, synthesize them and they can then be broadcast over TV and radio signals directly into the
where they can then silently trigger the same basic
emotion in another human being.


DARPA and Social Media


The SMISC program has invested
millions of dollars investigating social media, social networks, and how
information spreads across them. One study, funded by the Air Force Research
Laboratory (AFRL), entitled “Containment Control for a Social Network with State-Dependent
” demonstrates that the mathematical principles used to control groups of autonomous robots
can be applied to social networks in order to control human behavior. If
properly calibrated, the mathematical models developed by Dixon and his fellow
researchers could be used to sway the opinion of social networks toward a
desired set of behaviors.
  It is called soft Info-warfare.


DARPA launched its SMISC
program in 2011 to examine ways social networks could be used for propaganda
and what broadly falls under the title of Military Information Support
Operations (MISO), formerly known as Psychological Operations – psy-ops. The SMISC program includes studies that
analyze Twitter, investigate the 
spread of Internet memesmodeling user attitude toward
controversial topics in online social media
  It models how collaboration
between “key influencers” in social networks could affect the behavior of
groups within the network by using the principle of “containment control.”


British intelligence agency
GCHQ has developed tools specifically aimed at leveraging social
media for “effects” operations
. The organization has shared its
methods with the NSA, and these capabilities have been used in Afghanistan and
elsewhere to “shape”
information available to members of targeted organizations online and via
mobile phones


The Department of Defense already uses some social media
manipulation techniques as part of its “information support” operations,
targeting message boards
 and websites associated
with foreign groups that are considered “extremist.”
  In April, the Associated Press
uncovered an effort by the US Agency for International Development (USAID) in
2009 to create ZunZuneo, a Twitter-like mobile social network aimed at
undermining the Communist regime in Cuba. The research that DoD is
financing has much broader cultural implications than as a tool of information
warfare against adversaries abroad.


Psy-Ops and DARPA


DARPA’s new ultrasonic neural interface devices can frame information
as narratives which shape, explain, and make sense of data
Cognitive computers themselves can also do
this – creating news articles from pooled data with no human being
involved. What used to be
called propaganda is now called “
strategic communications” that tell a stories or create narrative
  DARPA is focused on creating counter-narratives,
or stories they believe will counteract the effects of radicalization. 


The Ultrasonic Neural Interface Program is used to affect changes in a
person’s beliefs, their sense of identity, and even memory
, partly
because they stimulate the release of brain chemicals. Neural interfaces and
narrative networks can manipulate the brain using electrical and/or magnetic
energy. The most common is Transcranial Magnetic Stimulation (TMS). When
targeted at a specific area in the brain, TMS can create a variety of effects,
including emotional changes and bodily movement. Its goals were to: (i) map out
the precise areas of the brain that are affected by stories; (ii) analyze how
people respond to specific stories; and (iii) test ways of changing their
response to a story, i.e. by altering the story format, and/or zapping their
brains with TMS.
  This technique is more properly
referred to as neuromodulation, and involves stimulating the
release of neurotransmitters by targeting specific areas of the brain with
electromagnetic pulses.

DARPA’s research has found that
stories affect our emotions, our cultural and religious beliefs, and even
memory. In other words, the
narratives we hear (on TV, in the news, blogs, tweets, etc) affect important
brain chemicals, and therefore our very identities.
 So do
pulsed electromagnetic fields – such as TMS.


DARPA is clearly aware of the
vast range of possible applications for these devices, and have also been
funding a new way of altering brain chemistry, called pulsed ultrasound.
  Focused ultrasound can deliver,
spatio-temporal patterns of acoustic waves
” to achieve similar
results to TMS, but has a spatial resolution which is five times greater, and
can reach far deeper into the brain. Ultrasound can be used to activate reward pathways (dopamine) in the
brain which 
may be used to condition and/or
reinforce certain desired attributes and/or to motivate specific behavioral


DARPA has spent several years
analyzing universal narrative structures, and the physiological effects they
have on people, as well as tracking popular narratives (and the memes they
produce) in social media. The
US Government’s 
Strategic Communications plan involves sentiment analysis, the
use of counter-narratives, and ‘downvoting’ stories which it does not approve
of, preventing discussion of certain ‘banned’ topics, as well as using “
persona management software” to create false identities, and thus
manipulate public perception of news and fool people into believing in a false
popular consensus.”


One part of the new Psy-op
strategy is controlling the conversation. By manipulating the news we hear, our primal responses can therefore be
influenced, without us even knowing it.
interfaces (BCIs) are already being used to link people’s minds/feelings to a
movie they’re watching. MyndPlay have devised an EEG headset which monitors the
viewer’s emotional reactions to the movie, and changes the ending accordingly.


New DARPA Projects to Enslave Our Minds


DARPA is one of the government-sponsored
research agencies that most boldly explores the future of science and
technology. Given that many of its research projects have military applications,
it has been traditional for the agency to be secretive about them. In recent
years, however, DARPA has been embracing the benefits of open source, particularly for
promoting rapid innovation. With an annual budget of $2.8 billion, DARPA
drives a good portion of the advanced research that happens at universities and
corporations in the US.


DARPA has given out open source
software that has been sponsored by the agency. The focus area for first year
is the XDATA initiative that is developing open
source infrastructure for supporting big data. DARPA has an open
source strategy for areas of work including big data to help increase the
impact of government investments in building a flexible technology base.  


One new DARPA program is to remotely disrupt political dissent and
extremism by employing “Transcranial Magnetic Stimulation”
 (TMS) in tandem with
sophisticated propaganda based on this technology.
  The research at Arizona State
University is entitled, “Toward Narrative Disruptors and Inductors: Mapping the
Narrative Comprehension Network and its Persuasive Effects.”
  TMS stimulates the temporal
lobe of the brain with electromagnetic fields. This research aims to induce or disrupt the operation of narratives
within the brain.
 This area of study has received $100 million
in funding via Obama’s ten-year BRAIN Project, as well as a $1.3 billion commitment from Europe


DARPA is the research and
development tool of the National Security Council and thus has carte blanche to
openly seek help from industry and the private sector to build the most cutting
edge war devices that anyone can imagine.
  Below we list some declassified
projects but the ones that are most heinous are still classified. 


DARPA’s Open Catalog contains
a curated list of DARPA-sponsored software and peer-reviewed publications.
DARPA sponsors fundamental and applied research in a variety of areas that may
lead to experimental results and reusable technology designed to benefit
multiple government domains. The DARPA Open Catalog organizes
publicly releasable material from DARPA programs. DARPA has an open strategy to
help increase the impact of government investments.
  DARPA is interested in building
communities around government-funded research. DARPA plans to continue to make
available information generated by DARPA programs, including software,
publications, data, and experimental results.


Some recently released DARPA
projects are listed below and demonstrate that DARPA is focused on “Controlling
the Human Domain” in every way possible. 


The Active Authentication (AA) program seeks to develop
novel ways of validating the
identity of computer users
 by focusing on the unique aspects of
individuals through software-based biometrics. Biometrics are defined as the
characteristics used to recognize individuals based on one or more intrinsic
physical or behavioral traits. This program is focused on behavioral


~Translation:  Foundation code that gives NSA a system to identify all users
whether encrypted or not.


The Anomaly Detection at
Multiple Scales (ADAMS)
 program seeks to create,
adapt and apply technology to anomaly characterization and detection in massive data sets.
Anomalies in data cue the collection of additional, actionable information in a
wide variety of real world contexts.


~Translation: NSA spying on everything to find “red flags”
that trigger further surveillance.


The Automated Program Analysis
for Cybersecurity (APAC)
 program aims to address
the challenge of timely and robust security validation of mobile apps by first
defining security properties to be measured against and then developing
automated tools to perform the measuring.
  APAC seeks to apply recent
research breakthroughs in this field in an attempt to scale DoD’s program analysis capability to a level never
before achieved with an automated solution

~Translation: DoD system to analyze all streaming data from
all systems, encrypted or otherwise.


The Memex Program was released to Open
Source in September 2014. Memex seeks to develop software that advances online search capabilities far
beyond the current state of the art. Creation of a new domain-specific indexing
and search paradigm will provide mechanisms for improved content discovery,
information extraction, information retrieval, user collaboration, and
extension of current search capabilities to the deep web, the dark web, and
non-traditional (e.g. multimedia) content.


~Translation:  NSA will now control all search engines that use Memex as the base


The Mission-oriented Resilient
Clouds (MRC)
 program is addressing some of the security challenges facing
cloud computing by developing technologies to detect, diagnose and respond to
attacks in the cloud, with the goal of effectively building a ‘community health system’ for the
. MRC is also developing technologies intended to enable
missions that are supported by cloud computing and other networked systems to
continue functioning while under cyberattack.


~Translation:  NSA control of all cloud computing with back doors directly to US
cyber-control systems.


DARPA’s Programming Computation
on Encrypted Data (PROCEED)
 program is a research
effort that seeks to develop methods that allow computing with encrypted data without first decrypting that data,
making it possible to compute more securely in untrusted environments.


~Translation:  NSA double-speak for controlling all encryption and having a
method of seeing through encryption without being detected.


The SAFER Program seeks to develop
technology to enable safe, resilient communications over the Internet, particularly in situations in which third
parties attempt to discover the identity or location of the end users
or block communications. The program also seeks to provide the technological
quality of service required to support applications such as electronic mail,
instant messaging, voice over IP, and other media that promote effective


~Translation:  NSA double-speak for complete control of IP address identifiers
for surveillance from all devices.


Social Media in Strategic
Communication (SMISC)
 program is to develop a new science of social networks built
on an emerging technology base. Through the program, DARPA seeks to develop
tools to support the efforts of human operators to counter misinformation or deception campaigns with
truthful information.


~Translation: NSA control of all social media.


XDATA Program is developing an open
source software library for big data to help overcome the challenges of
effectively scaling to modern data volume and characteristics. The program is
developing the tools and techniques to process and analyze large sets of imperfect, incomplete data.
Its programs and publications focus on the areas of analytics, visualization,
and infrastructure to efficiently fuse, analyze, and disseminate these large
volumes of data.


~Translation:  NSA system to analyze and target media users and all data.

DARPA and the Brain Initiative


President Obama announced the BRAIN initiative in April 2013.
Today, the initiative is supported by several federal agencies as well as
dozens of technology firms, academic institutions, scientists and other key
contributors to the field of neuroscience. DARPA is supporting the BRAIN initiative through a number of programs.


Electrical Prescriptions (ElectRx) – The
ElectRx program aims to help the human body heal itself through neuromodulation of organ functions using
ultra-miniaturized devices
, approximately the size of individual
nerve fibers, which could be delivered through minimally invasive injection.


~Translation: Military control of our neurological systems.


Hand Proprioception and Touch Interfaces (HAPTIX) –
The HAPTIX program aims to create fully implantable, modular and reconfigurable neural-interface
microsystems that communicate wirelessly with external modules
, such
as a prosthesis interface link, to deliver naturalistic sensations to amputees.


~Translation: Wireless brain-control over other electronic
systems (robots, vehicles, planes, etc.).


Neuro Function, Activity, Structure and Technology
 – The Neuro-FAST program seeks to enable unprecedented visualization and decoding of
brain activity
 to better characterize and mitigate threats to
the human brain, as well as facilitate
development of brain-in-the loop systems to accelerate and improve functional
 The program has developed CLARITY, a revolutionary
tissue-preservation method, and builds off recent discoveries in genetics,
optical recordings and brain-computer interfaces offering
faster, better views of the entire brain


~Translation: The basis of cybernetic interfaces between
humans and machines.


Restoring Active Memory (RAM) – The RAM
program aims to develop and test a wireless, fully implantable neural-interface medical device for
human clinical use. The device would facilitate the formation of new memories and retrieval of existing ones.


~Translation:  Control of memories and the creation of personal identities
generated by computers.


Reliable Neural-Interface Technology (RE-NET) –
The RE-NET program seeks to develop the technologies needed to reliably extract information from the nervous
, and to do so at a scale and rate necessary to control
complex machines,

such as high-performance prosthetic


~Translation:  Neural interrogation invades our minds.


Systems-Based Neurotechnology
for Emerging Therapies (SUBNETS)
 – The SUBNETS program
seeks to create implanted,
closed-loop diagnostic and therapeutic systems for treating neuro-psychological
illnesses and 
networks of the brain.

~Translation: Mechanical psychiatrists will be able to
prescribe neural restructuring of the personality.


Patents for Mind Control and Psy-Ops


The arsenal of mind control
technologies developed by the government is quite vast. A number of well
researched books on the subject have been published revealing the complexity
and variety of these technologies. The US Patents described below define technology
used for behavior manipulation through all types of media.
  These patents reflect “old”
technology compared to DARPA classified projects.
  This list just shows the
pervasiveness of this technology that is commonly found in all types of media.


Nervous system manipulation by electromagnetic fields from
  US Patent #6,506,148, 1/14/2003


Physiological effects have been
observed in a human subject in response to stimulation of the skin with weak
electromagnetic fields that are pulsed with certain frequencies near 1/2 Hz or
2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV
tubes, when displaying pulsed images, emit pulsed electromagnetic fields of
sufficient amplitudes to cause such excitation. It is possible to manipulate the nervous system of a subject by pulsing
images displayed on a nearby computer monitor or TV set.
the latter, the image pulsing may be imbedded in the program material, or it
may be overlaid by modulating a video stream, either as an RF signal or as a
video signal.  For certain monitors, pulsed electromagnetic fields capable
of exciting sensory resonances in nearby subjects may be generated even as the
displayed images are pulsed with subliminal intensity.


Computer monitor and TV
monitors can be made to emit weak low-frequency electromagnetic fields by
pulsing the intensity of displayed images. Experiments have shown that the 1/2
Hz sensory resonance can be excited in this manner in a

subject near the monitor. The
2.4 Hz sensory resonance can also be excited in this fashion. A TV monitor or computer monitor can be used
to manipulate the nervous system of nearby people.

This method can be used in
making movies and recording video tapes and DVDs. Video tapes can be edited
such as to overlay the pulsing by means of modulating hardware. US Patent
#872528, 6/1/2001


Ultrasonic Speech Translator and Communication System, US Patent #5,539,705, M.
A. Akerman, Curtis Ayers, Howard Haynes, July 23, 1996. A wireless communication system, undetectable
by radio-frequency methods, for converting audio signals, including human
voice, to electronic signals in the ultrasonic frequency range
transmitting the ultrasonic signal by way of acoustic pressure waves across a
carrier medium, including gases, liquids and solids, and reconverting the
ultrasonic acoustic pressure waves back to the original audio signal. This
invention was made with government support under Contract DE-ACO5-840R2l400,
awarded by the US Department of Energy to Martin Marietta Energy Systems, Inc.

Method and Recording for Producing Sounds and Messages to Achieve
Alpha and Theta Brainwave States and Positive Emotional States in Humans
, US Patent #5,352,181, Mark
Davis, October 4, l994.


Method of and Apparatus for Inducing Desired States of Consciousness, US Patent #5.356,368, Robert
Monroe, October 18, 1994. Improved methods and apparatus for entraining human
brain patterns, employing frequency-following-response (FFR) techniques and
facilitating attainment of desired states of consciousness.


Method of Inducing Mental, Emotional and Physical States of
 including Specific Mental Activity, in Human Beings, US
Patent #5,213,562, Robert Monroe, May 25, 1993.


Subliminal Message Generator, US Patent #5,270,800, Robert
Sweet, December 14, 1993. A combined subliminal and supraliminal message
generator for use with a television receiver; permits complete control of
subliminal messages and their presentation. Also applicable to cable television
and computers.


Superimposing Method and Apparatus Useful for Subliminal Messages, US Patent #5,134,484,
Joseph Wilson, July 28, 1992. Method of Changing a Person’s Behavior.


Silent Subliminal Presentation System, US Patent #5,159,703,
Oliver Lowery, October 27, 1992. A silent communications system in which
non-aural carriers in the very low or very high audio-frequency range, or in
the adjacent ultrasonic frequency spectrum, are amplitude-modulated with the
desired intelligence and propagated acoustically or vibrationally for
inducement into the brain.


Method and System for Altering Consciousness, US Patent #5,123,899, James
Gall, June 23, 1992. A system for altering the states of human consciousness
involving the use of simultaneous application of multiple stimuli, preferably
sounds, having differing frequencies.


Hearing System, US Patent #4,877,027, Wayne
Brunkan, October 31, 1989. A
method for directly inducing sound into the head of a person, using microwaves
the range of 100 MHz to 10,000 MHz, modulated with a waveform of frequency-
modulated bursts.



Non-Invasive Method and Apparatus for Modulating Brain Signals through an External
Magnetic or Electric Field to Reduce Pain, US Patent #4,889,526, Elizabeth
Rauscher and William Van Bise, December 26, 1989.

Apparatus for Inducing Frequency Reduction in Brain Wave, US Patent #4,834,70l, Kazumi
Masaki, May 30, 1989.


Non-Audible Speech Generation Method and Apparatus, US Patent #4,821,326, Norman
MacLeod, April 11, 1989.


Method and Apparatus for Translating the EEG into Music to Induce and
Control Various Psychological and Physiological States
 and to
Control a Musical Instrument, US Patent #4,883,067, Knispel et. al., November
28, 1989.


Hearing Device, US Patent #4,858,612, Philip
Stocklin, August 22, 1989. A method and apparatus for simulation of hearing in
mammals by introduction of a plurality of microwaves into the regions of the
auditory cortex.


US Patent #4,717,343, Alan
Densky, January 5, 1988. A
method of conditioning a person’s unconscious mind
 in order to
effect desired change in the person’s behavior, and which does not require the
services of a trained therapist.


Auditory Subliminal Programming System, US Patent #4,777,529, Richard
Schultz and Raymond Dolejs, October 11, 1988.


Auditory Subliminal Message System and Method, US Patent #4,395,600, Rene
Lundy and David Tyler, July 26, 1983. An amplitude-controlled subliminal
message may be mixed with background music.


Device for the Induction of Specific Brain Wave Patterns, US Patent #4,335,710, John Williamson,
June 22, 1982. Brainwave patterns associated with relaxed and meditative states
in a subject are gradually induced without deleterious chemical or neurologic
side effects.


Apparatus for Electrophysiological Stimulation, US Patent #4,227,516, Bruce
Meland and Bernard Gindes, October 14, 1980.


Noise Generator and
Transmitter, US Patent #4,034,741, Guy Adams and Jess Carden, Jr, July 12,
1977. An analgesic


Apparatus for the Treatment of Neuropsychic and Somatic Diseases
with Heat, Light, Sound and VHF Electromagnetic Radiation
, US Patent #3,773,049, L. Y.
Rabichev, V. F. Vasiliev, A. S. Putilin, T. G. Ilina, P. V. Raku and L. P.
Kemitsky, November 20, 1973. This is the patent for LIDA, the Soviet
brainwashing machine.


Psycho-Acoustic Projector, US Patent #3,568,347, Andrew
Flanders, February 23, 1971. A system for producing aural psychological
disturbances and partial deafness in the enemy during combat situations.


False Flags are Domestic LEGAL Propaganda


By now your head is probably
spinning and you are, like us, sick to the core at what our elected officials
are permitting to happen in our country and the world in the United States’


President Obama, and the powers that are behind him, weren’t
kidding when he said that he would transform America.
  They have a motive, a means,
and an opportunity to effect positive public support for any
  agenda items through the work
of the DoD and the BBG within the boundaries of America.
  It doesn’t matter whether it is
gun control, the Iran Deal, bombing other nations, TPP, ObamaCare, NDAA, or any
agenda item, somehow he pushes it
through without much resistance. And when public consent cannot be
manufactured with perception management and psychological manipulation of
narrative networks, Obama just writes another Executive Order, Presidential
Policy Directive (PPD), Presidential Study Directives (PSD) or
Presidential Policy Guidance (PPG), or whatever he wants to rename his misuse
of executive authority.


One thing is for sure: Obama
seems to be unchallenged by his fellow politicians who must be part of some
larger scheme that coerces their votes.
  They must be complicit. There
must be a message in the media that promotes common political schemes without
being “illegal”, “treasonous”, or even uncommon.
  Shaping the narrative with
“talking points” is perception management of narrative networks. 


In the name of “National
Security” Obama has bombed Syria, Libya, Iraq, Somalia, and Yemen without any
congressional approval.
  These acts of war were
accompanied with excellent smoke and mirrors – perception management and DARPA
subliminal devices.
  Only a few lone voices pointed
out that we need congressional approval to wage war!


Could the crickets be DARPA
electronic warfare bouncing around in our manipulated brains?


Could Obama’s speeches be
electronic warfare aimed at our neural narrative networks?


Why is DARPA so set on creating
things that “control the human domain,” just as Jade Helm?


Has Jade Helm 2015 ended or
does it get renewed each year by Obama just like the NDAA?


Are we targets for pro-Obama
propaganda provided by the DoD’s BBG?


Could some false flags (where
no one truly dies) be more propaganda films created by the huge BBG
broadcasting network?


YES.  The answer to all of these
questions above is YES.


What Can We Do, Fellow Patriots?


First. Arm yourself with the truth – like a two edged sword. Read and re-read this
article as painful as it may be for you.
  Do your own research from what
we have provided you. 


Second. Arm yourself with a consciousness higher than the driving force of global
manipulation for personal power and greed – like a personal shield.
  Personal self-awareness has
always been the fulcrum of human evolution.
  Oftentimes, it comes down to a
few people, or even one person, who turns the tide of evil away from
controlling the evolution of human consciousness.
  One lawsuit can turn the
  One law.  One person.  One Patriot.


Third.  Arm yourself with the knowledge of the weapons being used against
you and the motives
  Once you have that knowledge,
you can find devices to counteract some of those weapons.
  There are an equal number of
good devices to counter the evil ones.


Fourth.  Arm yourself with the knowledge
to discern when
narratives (“story-lies”) are being used to manipulate you against your will.
  Take the 12 Steps of Perception
Management, as presented above, and apply them to possible false flag scenarios
to learn to recognize the patterns and see through to reality.


Fifth.  Arm yourself against your enemy
and attempt to neutralize them
using their own methods and devices.
  A call goes out to all Patriots
to secretly subvert political
manipulation of Americans on American soil
  In other words, wait for the
right moment and then throw a monkey wrench into the works.
  Help the evil devices
malfunction and upset the “official story” with random acts of Patriotism.


Sixth.  Arm yourself with the justice of the law and bring
lawsuits against domestic propaganda and subliminal manipulation of Americans –
or anyone. 


Seventh.  Arm yourself against government agendas that
now consider Americans to be enemy combatants on domestic soil who must be
supportive of agendas that take away American civil liberties and
constitutional rights. 


Of course, we forgot to mention
the first and most primal step – ‘get
mad as hell about it and don’t take it anymore.’ The idea that you
have been manipulated most of your life by commercial interests through legal
subliminal programming is enough to demand answers: “Why the hell do elected
officials and the government ‘allow’ this to happen?”
  And now you are armed with the
answer: The “government” is doing the same thing to us but with military grade
electronic warfare that is mind-boggling. 


Warning: As you begin to go back in your memory of these
(9-11, Sandy Hook, San Bernardino, and many others) with this new awakening, you may feel raped, used, and
manipulated. The more you watched the “shootings” the more you believed the
“story” – the narrative.
  The more you were sucked in and
could not get those images out of your head, the more your freedom was stolen.
  But, if you looked closely, the
“man behind the curtain” is actually our own government. Only chaos and
confusion arises from such evil manipulation and thus FEAR is bred.
  FEAR is another name for TERROR which is another name for WAR. 


War is big business and it
needs the best of marketing devices to get public support for presidential
policy – in the name of “National
Security,” which trumps all else.


We have an out-of-control
president who uses military mind-control devices to manage the perceptions of
American citizens to “make” them “allow” his unprecedented abuse of executive
  Since he is the commander and
chief and controls the DoD, which should have no authority inside of America,
he needed the NDAA to legally permit him to consider Americans a threat to
“National Security.”
  For five years he has consistently broaden his “powers” to take
away civil liberties, virtually unchallenged.


The time is now to wake up and
end electronic warfare in America through loopholes in the NDAA.
  This Act must be rewritten to
specifically address these issues and make sure that American civil liberties
are not violated by clever
lawyers like Obama who have made treason legal.