Pin It
Feb
28

From WMR British GCHQ uses Tavistock mass mind control techniques in cyberspace

February 26-27, 2014 — British GCHQ uses Tavistock mass mind control techniques in cyberspace

It was only a matter of time. The National Security Agency’s British FIVE EYES partner, the Government Communications Headquarters (GCHQ), has now made common cause with another creation of British intelligence, the Tavistock Institute of Human Relations in London. From the time of its creation in 1921 under the aegis of the British Army’s Bureau of Psychological Warfare to the present time, the Tavistock Institute has been at the forefront of research into and application of targeted and mass mind control techniques. The institute has cooperated with research entities, including the Stanford Research Institute (SRI) and Esalen Institute in the United States, that carry out psychological operations on behalf of the Central Intelligence Agency and Department of Defense.

The latest tranche of PowerPoint slides revealed by NSA whistleblower Edward Snowden shows the similarities between the GCHQ’s Joint Threat Research Intelligence Group (JTRIG)’s Human Science Operations Cell (HSOC). The very name “Human Science Operations” appears yanked right from the operational charter of the Tavistock Institute, which includes the ability to engage in “full spectrum domination” by U.S. and U.K. intelligence services, in other words, the two core members of the FIVE EYES alliance.

What is most alarming about the most recent disclosure of slides marked SECRET//SI//REL TO USA. FVEY [Special Intelligence, Releasable to USA and FIVE EYES] and UK TOP SECRET STRAP is that the FIVE EYES signals intelligence alliance of the United States, Britain, Canada, Australia, and New Zealand are adding psychological operations (psyops) and Tavistock-developed mind control operations to its traditional signals intelligence (SIGINT) role. The blending of SIGINT and human intelligence (HUMINT) as part of cyber-warfare and computer network exploitation (CNE), with little or no actual oversight from legislative oversight authorities, is the closest proof revealed to date that the NSA and its partners have embarked on a policy of instituting “1984” Big Brother controls using the Internet as a primary weapon.

The latest tranche of slides points to a number of deception programs being carried out on the web. These include alias development and masquerading (which includes the employment of “sock puppet” personae already in use by the U.S. military to disrupt and influence the Internet), mass messaging (or spamming) and “call bombing,” propaganda, and “pushing stories.”

These tactics have been refined since the CIA and its George Soros-financed non-governmental organization activist allies brought about the “Arab Spring” overthrow of governments in Egypt, Tunisia, Libya, and Yemen, as well as the bloody civil war in Syria. In Ukraine, the democratically-elected government of President Viktor Yanukovych fell more quickly than either Egyptian President Hosni Mubarak or Libyan leader Muammar Qaddafi simply because the Western corporate media fully cooperated in FIVE EYES efforts to activate armies of sock puppets with aliases who disseminated anti-Yanukovych propaganda and, with the assistance of the global corporate news media, “pushed stories.” In the case of Ukraine, the “pushed stories” were products of CIA, NSA, GCHQ, British MI-6, and Communications Security Establishment Canada (CSEC) propaganda mills working in close collaboration with such intelligence agency fronts as Soros’s Open Society Institute, Freedom House, Hudson Institute, Center for Strategic and International Studies (CSIS), Heritage Foundation, and Demos of the UK.

Tavistock and GCHQ/NSA networks of social control meet up.

Western intelligence agencies “pushed stories” through the use of Twitter, Facebook, Flickr, and YouTube. These applications are part and parcel of GCHQ and NSA Computer Network Information Operations (CNIO). Outside the realm of technological warfare, JTRIG admits that it employs “credential harvesting” against “foreign news agencies.” In fact, spies and provocateurs masquerading as journalists were not only discovered filing phony news reports from Ukraine but also from Venezuela during simultaneous anti-government rioting in that country. Fake journalists were also exposed in Egypt, Thailand, China, and Russia.

Other areas where JTRIG and Tavistock have commonality are the use of “herding” and “group dynamics” to create “group think” among targeted audiences. The quickness by the general population to accept everything written and broadcast about the situation in Ukraine serves as a case in point. Only alternative media provided unbiased facts about what was occurring in Ukraine without the color of intelligence agency propaganda. However, JTRIG has a rapid response mechanism for alternate news reports: it calls for the use of “conspiracy stories” to influence thoughts and behavior. Either alternative news reports are derided as conspiracy theories by the GCHQ and NSA influence operations organizations or the intelligence agencies, themselves, put forward conspiracy stories to muddy the waters.
Tavistock mass mind control techniques have been adopted by GCHQ and its NSA partner for cyber psy-warfare.

Examples of such websites that promote such conspiracy stories with the goal of disrupting news flow are Veterans Today, which described itself as being linked to an intelligence firm called Adamus Defense Group, reportedly based in Zug, Switzerland, and others that mix stories about UFOs with legitimate news stories, including Rense.com. In light of the most recent NSA disclosures, such websites should be seen through jaundiced eyes.
GCHQ and NSA employ UFO “conspiracy stories” against pre-selected targets.

Add websites to the above matrix.

FIVE EYES employment of Tavistock techniques also have the goal of splltting up families, nations, and religions. Civil wars in Libya, Syria, Iraq, the former Yugoslavia, and a potential civil war in Ukraine are all part of the Tavistock game plan as envisaged by MI-6, the CIA, and their SIGINT counterparts.