Post by chris on Oct 5, 2006 3:41:47 GMT -5
Ok being that we live in a secret society here are some terms and methods we should be aware of in order to maintain that security.
1) A Black Bag Job or Black Bag Operations is a covert entry action undertaken by a police force or intelligence agency. A black bag job should not become known to its target, so violence or confrontation are to be avoided.
Reasons for a black bag job include planting surveillance equipment and finding and copying documents, computer data or cryptographic keys.
The term comes from the black bags formerly used by intelligence services to carry the equipment required for such operations.
So what that means to me is that we need to do security sweeps of the con-cilium houses and also the hallows on a regular basis...there are those that want our information and we need to protect ourselves. Scanning and scrutinizing on the regular is of up most importance.
2) Blowback is a term now broadly used in espionage to describe the unintended consequences of covert operations. Because the public generally is unaware of secret operations, the consequences transpire as a surprise, apparently random and without cause, and blowback results.
In its strictest terms, blowback was originally informational only and referred to consequences that resulted when an intelligence agency participated in foreign media manipulation, which was then reported by domestic news sources in other countries as accepted facts. In looser terms, it can encompass all operational aspects. In this context, it can thus mean retaliation as the result of actions undertaken by nations. The phrase is believed to have been coined by the CIA, in reference to the shrapnel that often flies back when shooting an automatic firearm.
What this means to me is that we are going to engage in security protocols...they will fail and we will need to be able to handle these security breaches. Of course I agree with the guardians that it is best if we do not operate with the profane or Vulgar magics but the actions of others is out of our control we cannot be everywhere at every time. So cozy up with the media learn how to protect the society by covering up breaches of the veil our lives depend on it.
3) A burn notice is an official statement issued by one intelligence agency to other agencies. It states that an individual or a group is an unreliable source of information or has become an unreliable source.
It is important to remember where you have received false information from and to mark these individuals with a notice to others you work with...otherwise this false information will lead to false leads and waste time instead of dealing with the issues these individuals are distracting us from.
4) A canary trap is a method for exposing an information leak, that involves giving different versions of sensitive information to each of a group of suspects and seeing which version gets leaked.
example : Each summary paragraph has six different versions, and the mixture of those paragraphs is unique to each numbered copy of the paper. There are over a thousand possible permutations, but only ninety-six numbered copies of the actual document. The reason the summary paragraphs are so lurid is to entice a reporter to quote them verbatim in the public media. If he quotes something from two or three of those paragraphs, we know which copy he saw and, therefore, who leaked it. They've got an even more refined version of the trap working now. You can do it by computer. You use a thesaurus program to shuffle through synonyms, and you can make every copy of the document totally unique.
By making sure that each copy of the document differs slightly in its wording, if any copy is leaked then it is possible to determine who 'sang'.
This example is how you can use steganography as an offensive weapon in a security leak. The steganography principle has many uses and can lead to personal transcendence if you apply it to your own soul...can you break the code of what your super ego is trying to get your Id to accomplish and how your Id is sabotaging your super ego?
5)Dangle is a term used in intelligence work to refer to an agent of one intelligence agency or group who pretends to be interested in defecting or turning to another intelligence agency or group.
The goal of a dangle is to convince the second or foreign intelligence agency that they have changed loyalties by offering to act as a double agent. The dangle then feeds information to their original agency and/or gives disinformation to the second or foreign intelligence agency.
There are those of our enemies who would feign a change of heart or abuse at the hands of their organization. Possible defectors need to be scanned as to their intentions nothing less than ritual magic must be used in this endeavor because they will use every means necessary to obfuscate their fraud.
6) a honeypot or honeytrap is a trap set to capture, kill or compromise an enemy agent using sex as the lure.
There are many ways in which the technique can be used to gain advantage. If the target is genuinely attached to the person who seduces them, information can be obtained over a long period — the target may trust his or her lover enough to reveal secrets, or may even change their allegiance due to their emotional attachment. Even if the target does not deliberately give information to their lover, the lover may accidentally be given opportunities to obtain it themselves. A long-term relationship is not necessarily the goal, however — the technique can also be used to blackmail those who later regret their actions. Incriminating photographs can be an effective tool of coercion, for example. Sometimes, the technique is nothing more than a means of getting the target to lower their guard so that they may be captured or killed, or getting them to go to a location where this is more easily accomplished.
The most common employment of this technique is by women, either female intelligence agents or (if the purpose is simply to obtain material for blackmail) prostitutes. Some intelligence agencies, particularly in the Soviet bloc, are alleged to have specially cultivated agents for this purpose. Not all traps are carried out by women, however — sometimes, women are ensnared by male agents, and sometimes, same-sex traps are used. (The latter were particularly effective during times, or in countries, where homosexuality was taboo, and the very fact that an agent was homosexual was material suitable for blackmail). Quite often, alcohol is involved, as any inhibitions the target has will be reduced.
Hey Mort remember that illusion I gave you that pissed you off so much? You told me that was an abuse of my power and that I was "Fucking " with you. I try to hammer out weaknesses when I see them. Remember Love is a drug a chemical reaction that happens in the brain that releases endorphins. Through determination of will and Steadfastness to the cause this can be overcome. When we get into relationships to people outside of the society we should do background checks on them with a complete security sweep. This should be done without argument with as much information about the lover divulged by the society member as possible. Our lives depend on it.
7) False flag operations are covert operations conducted by governments, corporations, or other organizations, which are designed to appear as if they are being carried out by other entities. The name is derived from the military concept of flying false colors; that is, flying the flag of a country other than one's own.
When we uncover a leak or if we have conflict with another society we need to verify that that information came from the group it appears to. No free rides, we have to be thorough, no need to be played as a pawn.
8) Official Cover is a term used in espionage to refer to an operative who assumes a position in an organization with diplomatic ties to the government he or she is working for.
An official cover operative is granted a set of governmental protections, and if caught in the act of espionage he/she can request diplomatic protection from his/her government. In other words, Official cover operatives are agents officially recognized by their country. In contrast, non-official cover (NOC) refers to an operative who assumes a position with no ties to their government, and whose actions are officially disavowed by that government.
There is no such think as far as our society goes as far as I know no other society would offer us diplomatic immunity. Though we could use "rogue" agents to infiltrate other societies and then when we are reprimanded for this rogue agents actions disavow their connection to us. This official cover could be granted to outsiders with the express purpose of misleading them as to our numbers, capabilities and holdings.
9) A sleeper cell is a cell of sleeper agents that belongs to a large national or terrorist organization. The cell "sleeps" (lies dormant) inside a population until it decides to act.
Sleeper cells have risk assessment levels ranging from Low to Urgent and may or may not act on its own, collectively as a hive mind, or under instruction and when directed, can be directed at a local, regional, national or international level.
Low Risk cells would be disorganized, untrained, unsupported, disaffected individuals with no special skills, no special knowledge, no access and no training but some open source information collection and discussion interests that might lead to collective action. Appropriate surveillance might include data mining and filters.
Medium Risk cells would be semi-organized, paramilitary or military trained, peer supported, disaffected or criminal groups or gangs with some special skills, some special knowledge, some ability to gain access, some training and some covert source collection abilities plus a history of protesting or demonstrating against presumed grievances and/or, vandalism and/or petty crime which may have resulted in some prison gang contact with radical or extremist ideologies. Appropriate surveillance might include data mining and behavioral analysis.
High Risk cells would be organized, military trained, funded and supported, ideological groups with special skills, special knowledge, opportunistic access, training, covert source collection abilities plus no history of protesting or demonstrating against presumed grievances. Appropriate surveillance might include total information awareness, communications and control surveillance and disruption, covert observation and preemptive strike preparedness.
Urgent Risk cells would be self actualizing, covert military, well funded and supported, non ideological groups with a wide range of special skills, special knowledge, virtually unlimited inside access, elite training, sophisticated covert source collection abilities including counter surveillance skills, plus no history, or record of presence. An appropriate level of surveillance is impossible
What is important to note about the Urgent risk category is that the society would fall into this category if the government found out about us. So Fucking this up is not an option. We have a history on this planet that transcends time and space...we need to make sure that this information does not leak to any level of government. PERIOD. We also need to categorize other societies actions in this manner. Are they capable of what threat level and we need to continue surveillance of them when we find them. There is a flip side of this thought what is it?
10) A stay-behind operation is when a country places secret operatives or organizations in its own territory, for use in the event that the territory is overrun by an enemy. If this occurs, the operatives would then form the basis of a resistance movement, or would act as spies from behind enemy lines. Small-scale operations covered only small areas, but larger stay-behind operations envisaged entire countries being conquered
It is always good to have a fall back plan and if you enter into territory you have just acquired after an arduous battle it would do you well to make sure the people near you are not stay behind operatives.
11) The strategy of tension (Italian: strategia della tensione) is a way to control and manipulate public opinion using fear, propaganda, disinformation, psychological warfare, agents provocateurs, false flag terrorism actions and even terroristic actions.
I believe this strategy is already in place by the seers of the throne, the abyssal bombs being a prime example of it...when you are exposed to the media look for their influence and never rest in exposing their plots...never.
mandorla
any thoughts or considerations? hmmm?