Let's look into Alex Jones. 'Stratfor' btw, IS a 'globalist' company.

Additionally, she was the marketing director for Dell and program director for IBM.
Michael Dell Wikipedia
Michael Saul Dell (born February 23, 1965) is an American billionaire businessman and philanthropist. He is the founder, chairman and CEO of Dell Technologies, one of the world's largest technology infrastructure companies.[1] He is ranked 20th richest person in the world by Bloomberg Billionaires Index, with a net worth of US$60 billion as of February 2022.[2]

Dell was born in 1965 in Houston, to a Jewish family. His parents were Lorraine Charlotte (née Langfan), a stockbroker,[7] and Alexander Dell, an orthodontist. Michael Dell attended Herod Elementary School in Houston.
[8]
 


Verna Grayce Chao
she was the marketing director for Dell and program director for IBM

Build on the leading blockchain platform​

Get an in-depth look at developer tools, pricing, product tours, customer reviews and documentation for the IBM Blockchain Platform, the leading blockchain open source for business — interoperable and available anywhere for enterprises and entrepreneurs.

=========================================================

Blockchain security: Can blockchain be hacked? - Infosec Institute ...

https://resources.infosecinstitute.com › topic › attacks-on-blockchain
Sybil attacks: A Sybil attacker takes advantage of the anonymity of blockchain by registering many malicious accounts on the blockchain. While this does not enable them to hijack consensus (since it does not provide more of the scarce resource used to manage control over the blockchain consensus process), it can be used to facilitate other attacks.

=============================================================

North Korean hackers are targeting blockchain companies ...

https://techcrunch.com › 2022 › 04 › 19 › north-korea-blockchain-crypto
5 days ago The U.S. government has warned that North Korean state-backed hackers known as the Lazarus Group are targeting organizations in the blockchain industry using trojanized cryptocurrency applications.
 

Israel’s shadowy role in Guatemala’s dirty war​


Gabriel Schivone The Electronic Intifada 20 January 2017
rtrlfive090884.jpg

Israel’s well-documented role in Guatemala’s Dirty War that left more than 200,000 dead has not been met with justice.
William Gularte Reuters
Last year was a busy one for Guatemala’s criminal justice system.
January 2016 saw the arrests of 18 former military officers for their alleged part in the country’s dirty war of the 1980s. In February last year, two ex-soldiers were convicted in an unprecedented wartime sexual slavery case from the same era.
Such legal proceedings represent further openings in the judicial system following the 2013 trial and conviction of former head of state General Efraín Ríos Montt for genocide and crimes against humanity. Although the Guatemalan Constitutional Court very quickly annulled the trial (finally restarted in March after fitful stops and starts, but currently stalled again), a global precedent has been set for holding national leaders accountable in the country where their crimes took place.
And in November, a Guatemalan judge allowed a separate case against Ríos Montt to proceed. The case relates to the 1982 massacre in the village of Dos Erres.
Ríos Montt was president from 1982 to 1983, a period marked by intense state violence against the indigenous Mayan peoples. The violence included the destruction of entire villages, resulting in mass displacement.
Mayans were repeatedly targeted during the period of repression that lasted from 1954 – when the US engineered a military coup – to 1996. More than 200,000 people were killed in Guatemala during that period, 83 percent of whom were Mayans.
The crimes committed by the Guatemalan state were carried out with foreign – particularly US – assistance. One key party to these crimes has so far eluded any mention inside the courts: Israel.

Proxy for US​

From the 1980s to today, Israel’s extensive military role in Guatemala remains an open secret that is well-documented but receives scant criticism.
Discussing the military coup which installed him as president in 1982, Ríos Montt told an ABC News reporter that his regime takeover went so smoothly “because many of our soldiers were trained by Israelis.” In Israel, the press reported that 300 Israeli advisers were on the ground training Ríos Montt’s soldiers.
One Israeli adviser in Guatemala at the time, Lieutenant Colonel Amatzia Shuali, said: “I don’t care what the Gentiles do with the arms. The main thing is that the Jews profit,” as recounted in Dangerous Liaison by Andrew and Leslie Cockburn.
Some years earlier, when Congressional restrictions under the Carter administration limited US military aid to Guatemala due to human rights violations, Israeli economic and military technology leaders saw a golden opportunity to enter the market.
Yaakov Meridor, then an Israeli minister of economy, indicated in the early 1980s that Israel wished to be a proxy for the US in countries where it had decided not to openly sell weapons. Meridor said: “We will say to the Americans: Don’t compete with us in Taiwan; don’t compete with us in South Africa; don’t compete with us in the Caribbean or in other places where you cannot sell arms directly. Let us do it … Israel will be your intermediary.”
The CBS Evening News with Dan Rather program attempted to explain the source of Israel’s global expertise by noting in 1983 that the advanced weaponry and methods Israel peddled in Guatemala had been successfully “tried and tested on the West Bank and Gaza, designed simply to beat the guerrilla.”
Israel’s selling points for its weapons relied not only on their use in the occupied West Bank and Gaza but also in the wider region. Journalist George Black reported that Guatemalan military circles admired the Israeli army’s performance during the 1982 invasion of Lebanon. Their overseas admiration was so unabashed that rightists in Guatemala “spoke openly of the ‘Palestinianization’ of the nation’s rebellious Mayan Indians,” according to Black.
Military cooperation between Israel and Guatemala has been traced back to the 1960s. By the time of Ríos Montt’s rule, Israel had become Guatemala’s main provider of weapons, military training, surveillance technology and other vital assistance in the state’s war on urban leftists and rural indigenous Mayans.
In turn, many Guatemalans suffered the results of this special relationship and have connected Israel to their national tragedy.

READ MORE AT
SITE, OR PDF.

pdf, virus free on my side.​


BODY SNATCHERS
 

Attachments

  • Israel’s shadowy role in Guatemala’s dirty war.pdf
    9.4 KB · Views: 1
Last edited:

Organ donation and transplantation in Central America

https://pubmed.ncbi.nlm.nih.gov › 25695780
Organ donation and transplantation in Central America. ... Transplant Programs, Public Health, Guatemala City. 2 Director, Spain's Organización Nacional de Trasplantes, Spain (ONT) and Iberoamerican Council for Donation and Transplantation (RCIDT). 3 Executive Director, ... Organ Trafficking Organ Transplantation* ...
=============================================

See Baby-Selling Ring, LATIN AM. WKLY. REP., Feb. 4, 1988, at 12 (re-
porting that two Israelis and three Guatemalans were arrested for alleged involvement
in children's organ trafficking
).
10. See Eric Sottas, Director, World Organisation Against Torture, Address at
Eurosciences Media Workshop on Trade in Organs and Torture (Mar. 7, 1994)
[hereinafter Sottas Report] (report on file with AM. U. J. INT'L L. & POL'Y)
(discussing countries where the rumors are widespread, including Brazil, Argentina,
Peru, Colombia, Mexico, and Honduras). Guatemala recently experienced a resurgence
of the rumors. See William Booth, Witch Hunt, WASH. POST, May 17, 1994, at C1-2
(detailing the impact of the rumors in Guatemala).
11. See Letter from James 0. Mason, Assistant Secretary of Health,

Organ Trafficking News - Havocscope

https://havocscope.com › tag › organ-trafficking-news
In the first seven months of 2013, criminal justice programs in Guatemala reported that 22 children were kidnapped or stolen in the country. The children are reportedly taken for the purpose of illegal adoptions and organ trafficking. Hospital workers such as doctors and midwives are reportedly involved in the black market trade and assist the…


Why do you think they go there?
 
Last edited:
Alex will make Aliyah when the real SHTF.

Aliyah | The Jewish Agency for Israel - U.S.

The Global Service Center is our one-stop- Aliyah hotline, open throughout the day, in six languages. The Global Service Center is a call center and service provider for those who are interested in immigration to Israel. The service is provided via Toll-free numbers from 39 countries, email, or through a web application.
 
JADE HELM 15
HYSTERICAL ALEX JONES
RUSSIAN BOTS ON SOCIAL MEDIA PUSHING ALEX JONES' STORY

RADEMADE in Ukraine with Buckley Hamman, STRATFOR connection.


Read story at the site to learn what a damned TOOL that Alex Jones really is.

Operation Jade Helm: The Conspiracy Theory That Presaged Our Post-Truth World​

By Marco Margaritoff | Checked By John Loeffler

Published February 14, 2020

In the summer of 2015, a routine U.S. military exercise called Jade Helm 15 led to mass hysteria over an imminent invasion of Texas. Now, we might know why — and the reason is frightening.​

The reason is ALEX JONES.
 
Modern War Institute at West Point. I put it here on purpose. Alex is a business selling model, this is 180 degrees opposite.


PSYOP, Cyber, and InfoWar: Combating the New Age IED​



Chaveso Cook and Liam Collins | 04.06.21

PSYOP, Cyber, and InfoWar: Combating the New Age IED

Editor’s note: This article is the fourth in a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert commentary on diverse issues surrounding US competition with peer and near-peer competitors in the cyber and information spaces. Read all articles in the series here.
Special thanks to series editors Capt. Maggie Smith, PhD of the Army Cyber Institute and MWI fellow Dr. Barnett S. Koven.



Extremist ideology and the associated mass-casualty acts of both domestic and foreign terrorism remain a threat to the global community. Ideology is the manifestation of deeper beliefs based upon intensely held but rarely understood underlying assumptions. A bullet may kill an extremist but it will not kill extreme ideology; that is, “Bullets do not kill ideas. . . . A ‘hot’ war against an idea is destined to be a losing prospect.” Arguably, 9/11-like events in the form of large suicide bombs will be replaced by mass media exploitation, political chess, electoral manipulation, and cyber intrusion via social influence mediums. These events will likely occur just beneath the surface, more improvised explosive device (IED) than weapon of mass destruction (WMD).
The ubiquity of the internet and social networking involves the exponential growth of a globally connected culture. As a consequence, a comprehensive understanding of the web is critical for the defense of our nation. As a manifestation of Moore’s Law, technology has advanced at an exponential pace and the associated technological platforms have evolved at an even higher rate. These platforms need to be understood, as recognized in the creation of US Cyber Command (USCYBERCOM) in 2009. However, it is possible that the social network is the new daisy-chained IED, in that it may be the case that USCYBERCOM is not best positioned to be the assault force, quick reaction force (QRF), or explosive ordinance disposal (EOD) team. To address this possibility, this article examines the reasons why psychological operations (PSYOP) forces have distinct advantages in comparison to the cyber community regarding online influence efforts.
Just as IEDs can tell quite a story about the networks behind them when their components and characteristics are examined in detail, much can be learned about the actors behind information operations by examining the social network links and nodes through which they propagate. Arguably, success against extremism and propaganda in the cyber domain hinges less on deftly maneuvering within the hypertext transfer protocol and more in the psychological battlespace—that is to say, through understanding the “gray matter,” or decision-making apparatus, of adversaries and their foreign populations. The internet is the means, not the ends. Perspective with precedent matters here. If Clausewitz’s idea that war is an extension of politics is still believed, and Moises Naim’s claims in The End Of Power—that power no longer resides exclusively (if at all) in states, institutions, or large corporations—are also believed, then centers of gravity will remain located in the networks that structure society.
The information revolution has created new economic entities, ones predicated on streams of data and social networks and possessing at least as much power as other forms of organization. However, these endeavors remain human endeavors animated by psychological functioning. As such, the fight of today and tomorrow is one of understanding minds, beliefs, and behaviors. To this end, as stated on a Modern Warfare Institute podcast, “exquisite understanding is more important than exquisite technology.”
The PSYOP practitioner, together with other special operations forces, shoulders the ability to understand, operate within, and influence populations, but given the growing power of influence operations in the cyber domain, it is increasingly important for all forces to understand, operate within, and influence populations. The United States will continue to encounter foes who seek to conduct nonstandard, unconventional, and irregular warfare. Regardless of the methods that may be used by these adversaries, the ultimate objective is to change perception and opinion. After decommissioning the US Information Agency in the late 1990s, influencers have had no unifying agency to coordinate messaging across the internet. However, influencers have still understood the importance of leveraging the internet as a critical piece of infrastructure. Nevertheless, to use this infrastructure effectively, a practitioner must also be well versed and well practiced in changing the behaviors of the internet’s human users.
Action . . . and Doctrine
The conflation of efforts by USCYBERCOM and PSYOP elements creates two challenges. The first is tied to doctrine: information operations doctrine acknowledges the important role that cyberspace operations play in information operations, while cyberspace operations doctrine largely ignores this relationship and the human element. At the inception of USCYBERCOM, Joint Publication 3-13 offered a roadmap for information operations that included cyberspace operations, PSYOP, electronic warfare, operations security, military deception, and public affairs. Ensuing doctrine defined cyberspace as “a global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.” However, this definition, unlike the information operations roadmap, lacks the cognitive, human element that the internet represents; this omission has adversely affected how the military organizes, trains, and utilizes its forces.
The second challenge involves the velocity and volume of disinformation, propaganda, and threats to cybersecurity in the contemporary information space. The erosion of global borders is inversely proportional to the growth in internet usage. Contemporary life, therefore, has a ubiquitous digital component; increasingly, people around the globe log into a thriving online society that mirrors the physical community. Therefore, cyberspace and its influence have undoubtedly shaped all interactions, up to and including warfare, and technology has increased options for the antagonist as much as it has for the protagonist. Those that “seize the key terrain of social-media exploitation will have strategic military advantage.”
As such, cyber-based influence has become a continually iterative and time-sensitive process where messaging first (quickest on the draw) and most often (maintaining a sustained rate of fire) is crucial. A decade ago, Clay Shirky noted that “as the communication landscape gets denser, more complex, and more participatory, the networked population is gaining greater access to information, more opportunities to engage in public [sentiment], and an enhanced ability to undertake collective action.” As much as this situation has been positive for global growth, in the modern operating environment “the nearly limitless potential for strategic communication on the Internet has [also] not gone unnoticed by terrorist organizations.”
In his Senate testimony, General Richard Clarke, commander of US Special Operations Command (USSOCOM), advocated for the use of PSYOP forces to address the opportunities and risks of the global information space—a critical domain that challenges the Department of Defense’s command-and-control boundaries. Increasingly, there has been a belief that if “used preemptively, [online activities] could keep a conflict from evolving in a more lethal direction.” As today’s battlefield is dominated by electronic media, the reality is that all future conflict will contain cyber elements at all levels of warfare; regardless of asymmetries in capabilities, usage of cyber components is “now part of the battlefield and strategic environment writ large.” The argument here is that USCYBERCOM should not own the majority of offensive or defensive cyber operations. In particular, leveraging information for influence should mainly be the responsibility of USSOCOM’s influence action arm—the PSYOP community. This is especially important given the need for speed and agility when engaging in cyber-based influence, and due to the relevance of cyber elements during all forms of conflict including the irregular conflicts and competition that DoD is most likely to find itself engaged in.
Leveraging Information for Irregular Warfare
Inevitably, DoD’s engagement in online influence activities, whether offensive or defensive, will move into the realm of irregular warfare. In turn, social media networks can best be understood as unconventional weapons. As the Army’s only deployable division-level unconventional warfare unit, 1st Special Forces Command recognizes the importance of this domain of weaponry: its “A Vision for 2021 and Beyond” lists its newly dubbed Information Warfare Center as its first priority, which combines “cross functional capabilities . . . to mass effects against global competitors in the Information Environment.” As such, cyber-based irregular warfare efforts must engage the threat discriminately and apply capabilities indirectly as “technology abhors homogeneity;” difference is the standard rather than the exception. USSOCOM’s PSYOP forces are directly subordinate to 1st Special Forces Command, alongside civil affairs and Special Forces.
The conduct of irregular warfare requires studying the confluence of the land, cyber, and human domains. Although the methods of social network and link analysis are not new to the analytical community, the challenge of collecting the right data at the right time in the right context makes these methods difficult to apply to the irregular warfare fight. If social network analysis (and influence efforts in general, for that matter) solely focus on the relationships between people, groups, and organizations without a thorough understanding of the human psychological terrain, irregular warfare practitioners will be inadequately informed about key aspects of the operating environment. Irregular warfare operations therefore require an understanding of the political, social, military, economic, terrestrial, and informational architecture of the environment from a broad and deep psychological, social relationship, and cultural perspective.
Why are PSYOP forces the best fit for this? To be an effective strategic communicator in the irregular warfare context requires a broad and deep integration of cultural/regional acumen in concert with technical knowledge, skills, abilities, and attributes. As a principal element of USSOCOM, PSYOP forces are collectively trained and equipped with cultural expertise and technical knowledge, skills, abilities, and attributes before they utilize any cyber-based equipment. The hallmark of the USSOCOM community is a “penchant for creatively incorporating unique and unconventional tools into its arsenal,” but the command’s personnel must first be assessed and trained in the aforementioned “soft skills.” When implementing strategic communication in the irregular warfare environment, “systematic surveys, public opinion polls, focus group interviews, and cultural attitudinal databases are just a few examples of tools [used] to establish baselines of perceptions, monitor political and social movements, and measure [impacts]”—all activities that PSYOPers currently do with particular expertise.
Finally, to conduct irregular warfare an influencer must understand the art and science of influence regarding human behavior and its structure and development. The art and science of influence has two key aspects. First, it is rooted in a consistent drive to understand the global information environment from the perspective of all sources of influence including human psychological and social functioning, media, technological, and others. Second, it is rooted in focusing one’s experience, training, and education on leveraging this understanding to initiate actions that change people’s attitudes, values, and beliefs, which ultimately underscore and drive behavior. As essential precursors to any influence campaign, within or outside of the cyber domain, nonkinetic activities and change efforts require an understanding of human behavior in the context of the environment and cross-cultural competence. Arguably PSYOPers are their own influence platform. They are a highly effective human weapons delivery system, when appropriately equipped. If influence is the projectile and the PSYOPer is the delivery system, then psychology and human understanding is the gunpowder behind the digital, print, or radio bullet. A concrete understanding of human behavior and an expert competency in foreign cultures clearly differentiates the PSYOPer from the cyber practitioner.
Final Thoughts
Of paramount importance is the understanding that actions and activities by the PSYOP community are not meant to replace any component of USCYBERCOM. These activities and their specialized training do not give the PSYOPer some silver bullet on the battlefield. Moreover, the use of information as dictated by the operational environment should be both shared and deconflicted across all available assets. Influence within the cyber domain should supplement all ground-level practitioners with specific tools to capitalize on the exponential increase of the use of the internet as a means of irregular warfare. Disrupting connections within social networks requires more than stopping or infiltrating technology. We must get “left of boom” (the figurative boom of a viral post as opposed to the literal boom of an IED) and strive to stop digital “IED” makers by changing their desire to weaponize the internet, instead of just reacting to the boom.
Instead, this should raise the question of who potentially has the most institutional expertise when it comes to conducting information warfare, especially in an irregular warfare context. It has been argued that since USCYBERCOM’s creation “it has specialized in the conduct of cyber operations (and thus has concentrated on acquiring the technical expertise that such operations require).” Whereas those technical talents are no doubt important, expertise in influence, be it on the internet or otherwise, requires adroit psychological understanding and a background in human behavior and how it is developed and how it may be changed. Certainly, no one could argue against the fact that “cyber operations are intended to hack silicon-based processors and technology, while psychological operations are intended to hack carbon-based processors (that is, human brains).” Technology only magnifies the effects of force employment; however, technology is never a substitute for good force employment.

Lieutenant Colonel Chaveso Cook is a senior fellow with the Center for Junior Officers, a member of the Carnegie Council for Ethics in International Affairs, and a term member with the Council on Foreign Relations. He holds a PhD from Tufts University and master’s degrees from Columbia University and the University of Texas at El Paso, and is also the cofounder and executive director of the nonprofit MilitaryMentors.org.
Colonel (retired) Liam Collins is a fellow with New America and a permanent member with the Council on Foreign Relations. He was the founding director of the Modern War Institute at West Point and former director of the Combating Terrorism Center at West Point. He holds a PhD from Princeton University’s School of Public and International Affairs and is coeditor of the forthcoming book,
Routledge handbook of U.S. Counterterrorism and Irregular Warfare Operations.
The views expressed are those of the authors and do not reflect the official position of the United States Military Academy, Department of the Army, or Department of Defense.
 
CointelPro’s and The War Over Your Mind
Snipped to the extreme.

Obama isn’t intentionally using mass hypnosis

http://whale.to/c/an_examination_of_obama.html
This document contains over a hundred examples of Obama’s specific language patterns and hypnosis techniques that follow textbook Ericksonian principles and characteristics too much to be coincidence.
You must understand the basics of Ericksonian hypnosis to see what Obama is doing
Almost nobody realizes what Obama is doing. These techniques are nearly impossible for an untrained person to detect. With the exception of a few trained experts in hypnosis, nobody understands even what to look for. It sounds in every way like ordinary powerful speech.

###

The 280 pages of 1916 Jewish history in USA, earliest listed org was in 1860, the Jews were so well connected, highly organized, promotion of Jewish leadership in all American orgs, non usury benevolence or money was only for Jews, no other religious or social orgs in USA were considered to be relevant. It was and still is a machine. Propaganda, was a job and looking for hirees in several different orgs in USA.
Not surprising, the cities then with the highest number of the Jews are now the most violent black and minority packed cities.
Baltimore, Atlanta, NYC, etc etc

 
Back
Top