| 
			  
			  
			  
			  
			Discerning Alien DisinformationPart 3
 
			21 October 2008 
			  
			The Nature of Disinformation
 Disinformation is the most potent tool for manipulating mass 
			consciousness.
 
			  
			While there is no shortage of innocent misinformation 
			stemming from logical fallacies, wishful thinking, false 
			assumptions, selective evidence, and outright ignorance, the 
			difference is that disinformation intentionally exploits these 
			weaknesses to shape the beliefs and actions of targeted audiences.
 Disinformation is especially successful when its core agenda is 
			bundled in the sincere convictions of disseminators who have their 
			own vested interests for believing and defending it. For instance, a 
			cold and calculating intelligence may engineer a disinformation 
			package which is then propagated through a naive individual who 
			finds it so appealing to his ego identity and emotional security 
			that he will do everything to defend it. This allows a small and 
			unseen group of disinformers to work through a vast body of 
			unsuspecting vectors who sincerely believe in what they are doing.
 
 Disinformation also uses selective truths to support false 
			conclusions. Good reasoning may proceed from false premises, 
			fallacious twists of logic are used, or reasoning is discouraged 
			altogether and the conclusion is asked to be taken on emotional 
			appeal or the authority of its purported source.
 
			  
			Disinformation has 
			no problem throwing strategic gambits, revealing genuine but 
			convenient truths to make its case if the payoff is bigger than the 
			sacrifice. 
			  
			  
			Discerning Disinformation
 
 Discerning disinformation is tricky business. It amounts to 
			performing a mental biopsy on the pathological underpinnings of a 
			suspect source. It helps to have a well-honed intuition that can 
			detect pretense, after which critical thinking zeroes in on the 
			exact problem. The problems tend to be false assumptions, ignored 
			counterexamples, logical fallacies, and ulterior motives.
 
 More specifically, alien disinformation plays to these common 
			psychological vulnerabilities:
 
				
					
					
					lazy thinking
					
					ego insecurities and 
			the desire to be special
					
					naive optimism that leads good intentions 
			down a dangerous path
					
					greater respect for credibility and authority 
			than personal discernment and intuition
					
					wishful thinking
					
					desperation for answers and consequent lowering of standards
					
					wonderment at amazing but superficial appearances to the point of 
			gullibility
					
					desire for escapism out of sheer 
					boredom 
			
			Since the goal is to influence opinion, the best disinformation is 
			concise, slick, and persuasive. It maximizes credibility by taking 
			whatever form of authority the target respects most and is careful 
			to dispel suspicions that the source is doing it for fame or 
			financial gain. It is false to assume that if someone risks 
			publishing revelatory information without asking anything in return, 
			he must be sincere; on the contrary, what disinformation asks for in 
			return is belief in its half-truths.
 The best disinformation so tidily packages its deceptions that the 
			containing story can be impressively concise, charming, 
			entertaining, and easy to follow. It goes beyond mere logical 
			fallacies and employs hypnotic techniques to massage the targeted 
			mind into accepting the payload. These manipulation tactics are 
			nothing exotic.
 
			  
			Psychological warfare specialists, street magicians, neurolinguistic programmers, and advertisers make regular use of 
			them in their professions.
 Disinformation must ideally exploit the deepest desires, 
			insecurities, and blind spots of the target, which necessarily vary 
			by audience type. The originators of disinformation therefore use 
			different methods and sources to appeal to different audiences. In 
			the case of individuals used as unwitting agents of deception, their 
			selection depends on how easily their weaknesses allow them to be 
			hooked into performing that function and how well their strengths 
			are suited to playing on the weaknesses of the audience.
 
			  
			In this way 
			a chain of influence reaches the audience via an intermediary who 
			has the added appeal of being skilled and respected.
 
			  
			  
			Avenues of Disinformation
 What follows is an exploration of several avenues for alien 
			disinformation and why they are convenient and effective.
 
			  
			This 
			should indicate just how easily the fringe research community and 
			general public can be misled by sources they trust if they fail to 
			take into consideration the possibilities discussed below.  
			  
			These 
			same avenues can also be outlets for truth, so my aim is not to 
			universally discredit these sources, but rather point out their 
			potential shortcomings.
 
			  
			The Channeler 
				
					
					
					Summary:  
					
					
					Channeling involves one or more individuals allowing 
			themselves to be used by unseen intelligences who communicate 
			information through them. This includes the use of ouija boards, 
			mediumistic trance states, automatic writing, and conscious 
			verbalization of intuitive impressions.    
					Pendulum dowsing, muscle 
			testing, scrying, and crystal gazing may also allow such 
			communication. The channeled sources may claim to be anything 
			ranging from aliens to angels, deceased persons to demonic beings, 
			famous individuals in history, time travelers, other dimensional 
			entities, the subconscious, and impersonal archetypes.
					
					Strength of Source: 
					 
					Discarnate entities, alien beings, and advanced 
			human military factions can transmit verbal and visual information 
			remotely, whether electromagnetically or telepathically. They also 
			have limited ability to induce paranormal phenomena, predict the 
			future, and arrange synchronistic events by which they can prove 
			their existence and overwhelmingly awe the target into submission. 
					   
					This exploits the logical fallacy that truth of existence somehow 
			equates to existence of truth, which ignores the possibility that a 
			real source can provide bogus information where it counts. These 
			demonstrations of faux omniscience, omnipotence, and precognition 
			rule out that the source is just a fabrication of the
					
					channeler, but 
			do not prove that the source being channeled is necessarily being 
			truthful.
 Channeling also affords deceptive sources complete anonymity and 
			freedom to fabricate an identity and back story. Channeling is 
			therefore highly customizable to the weaknesses of the targets. The 
			same source can change identities repeatedly to whatever sounds most 
			authoritative.
 
					
					Weakness of the Vector: 
					 
					Establishing and maintaining a connection 
			requires mental dissociation so that the source can come through 
			clearly without restriction by the conscious mind of the channeler. 
			This amounts to a relinquishing of freewill, and a manipulative 
			entity may abuse this offer by sinking roots into the mind of the 
			channeler, deeper than it could otherwise.    
					In worst cases this can 
			lead to possession, where the channeler not only transmits 
			disinformation during specified sessions, but becomes a walking 
			extension of the negative entity, serving an agenda in broader ways. 
					   
					Conscious abandonment over the channeling process may also grow into 
			habitual abandonment of discernment and critical thinking, whereby 
			the channeler simply accepts and relays what is transmitted after 
			having been won over with convenient but trivial truths.
					
					Strength of the Vector: 
					 
					Being just the messenger frees a channeler 
			from having to personally defend the information received. The 
			source is likewise freed from always having to back up its claims by 
			virtue of its self-proclaimed authority and various specious 
			excuses.    
					Through channeling, disinformation is given unlimited 
			creative latitude, taking bold and direct expressions since claims 
			that are too far-fetched for other audiences will readily be 
			accepted by channeling enthusiasts. If especially entertaining and 
			fascinating, source and channeler rise to cult or celebrity status, 
			which adds to the authority factor that overrides critical thinking.
					
					Weakness of Audience: 
					 
					Since channeling is perceived by rationalists 
			as a dubious means of investigation, it appeals more to people who 
			pride themselves on being open minded and not fettered by the 
			limitations of cold intellect.    
					But there is a fine line between 
					open 
			mindedness and gullibility, and those who would replace rather than 
			complement reason with intuition leave themselves vulnerable to 
			logical sleights of hand, emotional manipulation, wishful thinking, 
			and other forms of subjectivity.    
					Channeled disinformation would play 
			upon these weaknesses. 
			  
			Remote Viewer 
				
					
					
					Summary:  
					
					
					Remote viewing uses rigid protocols to psychically gather 
			information about a target with minimal subjective bias. Several 
			remote viewers may tune into the same target and receive similar 
			impressions, which are then analyzed afterward to construct an 
			accurate assessment of the target.    
					The U.S. military is publicly 
			known to have explored remote viewing as an intelligence gathering 
			method. More recently, various researchers have used remote viewing 
					to probe the nature of the alien presence.
					
					Strength of Source: 
					 
					As in the case of channeling, alien and advanced 
			human disinformers can transmit information remotely through natural 
			or artificial telepathy. Remote viewers, even entire teams, are thus 
			open to having their psychic line spliced by such disinformers and 
			fed misleading impressions.
					
					Weakness of Vector: 
					 
					The greatest weakness is assuming that remote 
			viewing success is measured by its signal to noise ratio, which 
			ignores the possibility of a strong but counterfeit signal. Even 
			with subjectivity eliminated, what remains is no guarantee of being 
			truthful.
					
					Strength of Vector: 
					 
					Remote viewing has a reputation for being rigid, 
			objective, even scientific. Some of its practitioners have worked 
			for the military, others have respectable academic backgrounds. All 
			this gives it an air of credibility and authority that can augment 
			any disinformation disseminated through it.
					
					Weakness of Audience: 
					 
					Remote viewing appeals to open minded 
			individuals who value objectivity and scientific procedure. Although 
			it is more hard-edged than channeling, when used for disinformation 
			the apparent objectivity is just better window dressing for the same 
			deception.    
					That the public military has experimented with remote 
			viewing and successfully gathered intelligence on targets in nations 
			without psychic defenses does not mean remote viewing alien targets 
			is equally reliable.    
					Disinformation passed through remote viewers 
			disseminates deceptive ideas under the guise of strict objectivity. 
			
			Insider / Whistleblower
 
				
					
					
					Summary:  
					Insiders are members of secret societies, military 
			projects, or government agencies who are privy to non-public 
			information. For various reasons, insiders may leak some of this 
			information to the public. Often they do it anonymously, perhaps 
			through third party contacts on the outside who can vouch for their 
			identity but keep it confidential while relaying the information. 
					   
					They may also speak openly without hiding their identity, but then 
			tend to be careful about not revealing more than they are allowed. 
			Some self-claimed insiders are casually upfront and detailed, 
			seemingly holding nothing back.
					
					Strength of Source: 
					 
					Insiders work within highly controlled, 
			compartmentalized, and monitored environments as demanded by the 
			secret nature of their work. They are therefore in close proximity 
			to high level sources of disinformation who have immediate access to 
			them, particularly sources stationed above them in the hierarchy. If 
			the source is an advanced military faction, the covert nature of the 
			military network allows personnel to be abducted and mind programmed 
			as necessary to create unwitting disinformation vectors.    
					Personnel 
			may also be tested, monitored, and recruited into becoming skilled 
			disinformation operatives, whether fully aware of their mission to 
			deceive, or given a convincing cover story and some fake but noble 
			sounding reason to leak “important” information to the public. 
					   
					Some 
			may even be shown misleading evidence and documents and stealthily 
			nudged into becoming whistleblowers, thereby disseminating the 
			deception with full conviction that they are somehow undermining 
			their superiors when they are actually carryout out their 
			intentions.
					
					Weakness of Vector: 
					 
					Insiders gain increasing levels of security 
			clearance by demonstrating a need to know, passing tests of 
			allegiance and usability, signing secrecy oaths, giving away 
			personal rights, and agreeing ahead of time to the punishments for 
			breaking these oaths. Secretive networks have numerous methods for 
			ensuring that security stays intact including monetary incentives, 
			blackmail, threats to livelihood, hypnotic mind control, and 
			selecting only highly manageable and obedient candidates for 
			recruitment.    
					Personnel are only told what they need to know to do 
			their jobs, which often includes false but plausible stories to 
			compel their cooperation. Compartmentalization makes it difficult 
			for an insider to compare notes with others to detect disinformation 
			fed to him by superiors. Despite having secret knowledge, insiders 
			are still woefully in the dark concerning information beyond their 
			clearance level.    
					Compartmentalization keeps the bigger picture out 
			of sight, and without that context insiders may not always detect 
			disinformation in what they have already been told.
					
					Strength of Vector: 
					 
					Anyone who is verifiably on the “inside” is 
			venerated for being in so privileged and qualified a position, and 
			for being courageous and generous enough to risk leaking precious 
			information to the public.    
					This bestows upon their words great 
			credence because what they say amounts to expert witness testimony, 
			words by those who are in a position to know. Of course this 
			appearance of authority creates the perfect vehicle for seeding 
			disinformation.    
					Secrecy oaths and national security laws are also 
			good excuses for dodging certain inconvenient questions and adding 
			an atmosphere of intrigue.
					
					Weakness of Audience: 
					 
					Compartmentalization and secrecy laws prevent 
			the public from more thoroughly investigating insider claims by 
			barring them from accessing evidence under wraps, documents still 
			classified, and witnesses unwilling to risk their lives. Much of 
			what insiders say must be taken on the basis of their credibility. 
					   
					If they can prove their credentials, that impresses many, but 
			insiders are secured an influential voice if their story is also 
			conveniently corroborated by leaked documents and intriguing photos 
			that pander to the audience’s assumptions, questions, and 
			desperation for confirmation.
 Audiences are guaranteed to be duped if they fail to rule out the 
			possibility of the insider being a disinformer regardless of his 
			credentials, especially if his claims are supported by forged photos 
			and documents supplied by the well-equipped and connected network 
			sponsoring him.
   
					The best that audiences can do is look for errors 
			and contradictions in his claims, and more importantly, make a 
			probabilistic assessment of his integrity based on the angle behind 
			his claims and whom it would benefit most. 
			
			Public Official
 
				
					
					
					Summary:  
					Public officials include elected or appointed members of 
			political and religious institutions, usually those with special 
			titles and credentials who are situated in respected positions of 
			leadership.
					
					Strength of Source: 
					 
					Disinformers hold a great advantage of 
			influencing through a highly visible figurehead without themselves 
			being seen. They can be among his personal advisors, programmed or 
			recruited associates who are planted close to him to sway his 
			beliefs and decisions, secret organizations from which he 
			periodically receives instructions, or alien factions abducting and 
			programming him into adopting their goals.    
					These sources can easily 
			blackmail the official, exploit his naïveté, offer incentives of 
			money and power for obedience, and tell/show him whatever “truth” 
			shocks him into cooperating.
					
					Weakness of Vector: 
					 
					The official is first and foremost a public 
			figure whose loss of reputation and popular support spells the end 
			of his career. He can therefore be threatened with character 
			assassination, real assassination, or bribed with promises of 
			personal and institutional advancement and protection.    
					Being a 
			public official can be so time-consuming that time for personal 
			independent research and thorough contemplation is limited, which 
			may make him dependent on advisors for condensed briefings and 
			recommendations. This makes for reliance on potential sources of 
			disinformation and an overall lack of discernment concerning matters 
			beyond his expertise.  
					  
					His prominence as a public figure may also 
			make him too much of a liability to be given the real truth, so he 
			may be barred from higher security clearances unless he has an 
			absolute need to know.    
					And unless he has intelligence, allegiance, 
			and power that surpass his role as public official, he is 
			expendable.
					
					Strength of Vector: 
					 
					Officials are decision-makers, opinion leaders. 
			If their reputation is intact, their words hold sway over public 
			opinion. They can influence public opinion to hijack democracy, 
			advancing private agendas under the protection of majority vote. 
					   
					Officials can also invoke the power and reverence of the 
			institutions they represent, like a church official declaring some 
			political agenda as being in the will of God.
					
					Weakness of Audience: 
					 
					The audience in this case is the general 
			public, the least discerning audience of all. Typically speaking, 
			the public has blind respect for authority, is easily impressed by 
			credentials, and lacks the knowledge and context to properly 
			evaluate they are told — especially if they are told disinformation 
			concerning fringe subjects like aliens. This is simply the fact of 
			statistical averages.    
					The mainstream public has a need for security, 
			stability, and certainty, which authorities are obliged to provide, 
			though not without political motivation.    
					Should public officials, 
			with full sanctioning by their affiliated institutions, reveal the 
			existence of aliens, the shock to mass consciousness and ensuing 
			clamor for answers and assurance allows these same officials to also 
			unload a torrent of gladly received disinformation concerning alien 
			motivations and identities. 
			  
			
			Academic 
				
					
					
					Summary:  
					Academics include credentialed doctors, scientists, 
			professors, theologians, analysts, and other highly educated 
			specialists whose research and presentations methods are formal, 
			systematic, and sophisticated. Those involved in researching various 
			facets of the alien phenomenon may have degrees useful to their 
			facet of study.    
					They typically cite other academics to boost their 
			own credibility, drawing their conclusions by surveying the relevant 
			literature and collating authoritative viewpoints into a generalized 
			observation somewhat enhanced by their own original research.
					
					Strength of Source: 
					 
					Since the intellectual capabilities and 
			strategic value of an academic can be inferred without difficulty 
			through his credentials, reputation, and publications, a broad pool 
			of candidates may be monitored to select who is most qualified to be 
			groomed into a disinformation vector.  
					  
					Academics who refuse to 
			cooperate and become liabilities can be eliminated, either through 
			murder or smearing of character.
 
					Alien and military factions can also corrupt the relied-upon data 
			pool by inserting decoy data, say through abductees programmed with 
			screen memories that portray a false picture of alien motivations. 
			In that case, without suspecting the possibility of deception, an 
			academic will accept the decoy at face value and inject its contents 
			into his works.    
					And even if he suspects it, his suspicions cannot be 
			voiced without risking his credibility by appearing paranoid.
					
					Weakness of Vector: 
					 
					The need to preserve reputation and appear 
			reasoned, cautious, and formal can lead to an agnostic timidity that 
			keeps the academic from taking those creative leaps of thinking 
			necessary to penetrate the depths of a mystery. It also discourages 
			him from acknowledging sources of information that do not meet the 
			standard of his peers despite containing critical pieces of the 
			puzzle.    
					Additionally, it is no secret that universities are as much 
			indoctrination and filtering devices as educational institutions, 
			and those who most successfully pass through that filter have 
			demonstrated programmability and a willingness to obey the rules and 
			pander to group consensus.    
					And so despite having a sharp intellect, 
			the potential lack of individualism and astute intuition can make a 
			renowned academic gullible to the grandest of deceptions, especially 
			those endorsed by his respected peers and academic superiors.
					
					Strength of Vector: 
					 
					The primary strength of an academic is his level 
			of sophistication, in the sense of being cultured and refined. But 
			sophisticated does not necessarily mean discernment, as it could 
			mean being a sophisticated rationalizer and disinformer, hence a 
			master sophist.    
					Further, academics are automatically endowed with 
			credibility due to their credentials and often work in positions of 
			influence and advisement. Credibility and sophistication together 
			lead to effective debunking of truths and verification of lies.
					   
					They 
			can also function as role models in the fringe community, spreading 
			an infectious attitude of myopic agnosticism to those most in need 
			of the opposite.
					
					Weakness of Audience: 
					 
					For some audiences, academics are epitomes of 
			objectivity and respectability who are beyond reproach, especially 
			groups of academics in agreement with each other.    
					The most skeptical 
			audiences will listen to academics more than other types of 
			disinformation vectors. They may find the disinformation to be more 
			plausible than the truth because at least the it fits their 
			unrealistic assumptions and comes from an assumedly incorruptible 
			source.    
					The job of an academic disinformer would be to make an 
			intricate case for a deceptive agenda while marginalizing contrary 
			truths as not meeting the standards of plausibility and credibility. 
			  
			Abductee / Contactee 
				
					
					
					Summary:  
					
					
					Abductees and
					
					contactees are people who have had direct 
			contact with alien beings. Abductees are taken from their familiar 
			surroundings and brought into the abductor environment where they 
			undergo various procedures. Contactees have conscious participation 
			in the interaction and become spokespersons for their alien 
			contacts.    
					Not all contactees are necessarily abductees, nor are all 
			abductees necessarily contactees, but the two categories overlap 
			since contactees get abducted and abductees can be groomed into 
			consciously facilitating an alien message.
					
					Strength of Source: 
					 
					Abductors have direct access to the abductee in 
			an environment they control. Various alien and military factions 
			have the ability to create false memories, scan the mind and auric 
			vibrational signature to analyze weaknesses and biases, use 
			posthypnotic mind programming techniques to install subconscious 
			commands, employ telepathic or implant-generated persuasion, monitor 
			their subjects from afar, stage false confirmation through garish 
			coincidences, and construct exquisite lies and rationalizations. 
					   
					They can scan the population and the probable futures of interesting 
			individuals to select those who are most suitable to their aims, and 
			through logistical and hyper-dimensional advantages give customized 
			attention to the ones chosen.
					
					Weakness of Vector: 
					 
					The greatest weakness of an abductee or 
			contactee is knowing less about himself than what his contacts or 
			abductors know. They have backdoor entrances to his mind and can 
			perform manipulations that stealthily influence his thoughts and 
			impulses. Unless he is aware of that possibility and guards against 
			it, it is pretty much inevitable.
 Abductees and contactees may feel alienated from society due to 
			having uncommon and unbelievable experiences, thus seeing themselves 
			as different from others. If hitched to ego, this can degenerate 
			into feelings of privilege, superiority, or specialness which serve 
			as hook points for the abductors to compel allegiance.
   
					Their 
			identity may become so heavily invested in being the contactee of a 
			particular alien group that any suggestion of dishonest motivations 
			by their alien contacts is subconsciously interpreted as an attack 
			upon their very identity, which naturally provokes an irrational 
			defense mechanism.
 Some may simply give up, feeling overpowered by superior 
			intelligences with superior technology, and in a psychotic attempt 
			to salvage the situation turn into willing and zealous cooperators 
			per Stockholm Syndrome.
 
					
					Strength of Vector: 
					 
					Real abductees and contactees exude plenty of 
			sincerity and conviction in recounting their firsthand experiences 
			with aliens. Their candor can be disarming to undiscerning 
			audiences.    
					Abductees who document their experiences may have 
			audiovisual, medical, or testimonial evidence that they are indeed 
			being abducted, and that alone piques people’s curiosity about what 
			they learned in the presence of assumedly real aliens.
					
					Weakness of Audience: 
					 
					Like in the case of channelers, contactees can 
			become the center of personality cults, playing the role of 
			intermediaries between the audience and their alien idols like a 
			prophet or pontiff intermediating between worshippers and the 
			divine. It is the abductee and contactee’s proximity and direct 
			interaction with mysterious aliens that boosts the credibility of 
			whatever disinformation is vectored through them.
 The targeted audience consists of abductees searching for answers, 
			researchers of the abduction phenomenon looking for inside 
			information on alien motivations, and people wishing they themselves 
			could be contacted by aliens.
   
					Disinformation appeals to their 
			private longings and blind spots, taking what little they know 
			toward false conclusions and satisfying their ego along the way. 
			  
			Hypnotist 
				
					
					
					Summary:  
					The hypnotist is trained to guide a client into achieving 
			altered states of consciousness deep enough to access the 
			subconscious. The hypnotic trance is one of high suggestibility and 
			dissociation. Abduction researchers commonly accept hypnosis as an 
			investigative tool to help their subjects recover abduction memories 
			made inaccessible by having been in an altered state of 
			consciousness during the abduction, or by abductors installing 
			screen memories and posthypnotic commands to forget.    
					Hypnotized 
			subjects can also be used for remote viewing, exploring past and 
			future probable lives, and as passive instruments for channeling 
			other beings.
					
					Strength of Source: 
					 
					Alien and military factions can install multiple 
			layered screen memories in abductees, stage misleading abduction 
			scenarios, and remotely jack into a hypnotized subject’s mind to 
			speak through him while he is unconscious.
					
					Weakness of Vector: 
					 
					Hypnotists may be in over their heads when 
			dealing with disinformation sources coming through their clients. If 
			they are unaware that screen memories can lurk beneath deeper screen 
			memories, they may only penetrate the decoy screen and accept the 
			next one as likely truth. Same with staged abductions, where what is 
			recalled is indeed what was experienced, but the experience itself 
			was staged for the abductee as a diversion.    
					And if the hypnotized 
			person becomes an instrument through which a disinformer can 
			directly speak, then the hypnotist is in live contact with someone 
			or something that can play to his weaknesses.
					
					Strength of Vector: 
					 
					The information retrievable through hypnosis is 
			fascinating, entertaining, and often verifiable. This gives it wide 
			appeal and respect in the fringe research field. It may also be used 
			by academics as a research supplement to expand their data pool. 
					   
					Like in the case of channeling, because what is said cannot always 
			be verified, disinformation can be as creative and fantastic as 
			desired.
					
					Weakness of Audience: 
					 
					Disinformation rides the assumption that what 
			is retrieved through hypnosis, if not fabricated by the subject or 
			induced by the hypnotist through leading questions, is very likely 
			the truth. Once again, this is the fallacy “if not subjective and 
			false, then objective and true,” which ignores the possibility of 
			objective deception.    
					In ordinary cases where there are no deceptive 
			intentions involved, hypnosis can indeed be reliable. But the trust 
			and respect hypnosis earns by the reliable cases should not be 
			blindly transferred to potentially disinformative cases. 
			  
			
			Direct Messages 
				
					
					
					Summary:  
					Messages to the public may appear to come directly from 
			aliens without a middleman.  
					  
					This includes:
					
					Strength of Source: 
					 
					Any alien or military group with sufficiently 
			advanced technology can create crop circles, take over television 
			signals, broadcast radio signals from space, and use anonymous human 
			proxies to distribute carefully written messages to the world. 
					   
					Their 
			abilities greatly exceed what the casual hoaxer can pull off, which 
			they use to their advantage to make the messages seem beyond hoaxability and thus authentic.
					
					Weakness of Audience: 
					 
					If the audience really believes the message 
			comes from aliens, they will be intrigued and take the message as a 
			sincere declaration of alien intentions.    
					The message may take an 
			authoritative tone, take the form of responses to messages we 
			ourselves have sent into space, appeal to ethical memes like 
			concerns over global warming, overpopulation, or government 
			corruption, tantalize the intellect with feigned crypticism, or 
			prime the audience for future deceptions by giving key future dates 
			and prophecies. The audience must truly be convinced aliens are 
			sending urgent messages to the world so that the content of the 
			message influences their opinion about the nature of these aliens 
			and what must be done.    
					Disinformation sent via direct messages aim 
			to distort public awareness of alien motivations and influence the 
			audience into supporting certain actions and values that are 
			beneficial to an agenda. 
			As can be seen, disinformation uses a variety of 
			methods to target a 
			variety of audiences.
 Audiences include:
 
				
					
					
					The general public who would prefer stability and security over 
			disquieting truths
					
					Spiritual and New Age types who succumb to wishful thinking and 
			emotionalism
					
					Intellectuals whose limited reasoning follows from flawed premises
					
					Counter-cultures whose fascination with the bizarre outweighs 
			their interest in truth
					
					Factualists who only accept evidence fitting their subjective 
			standards of credibility
					
					Political activists who would support false solutions to combat 
			true injustices
					
					UFO buffs who hungrily swallow crumbs of disinformation for its 
			sensational nature
					
					Abductees whose identities are invested in being liaisons between 
			humans and aliens 
			Methods include: 
				
					
					
					Appealing to blind respect for authority
					
					Appealing to false and limiting assumptions
					
					Appealing to emotional biases
					
					Appealing to a need for safety, security, and certainty
					
					Appealing to the ego’s desire for identity and specialness
					
					Appealing to boredom through tantalizing and entertaining stories
					
					Appealing to skepticism to ridicule the truth
					
					Appealing to mental lassitude by presenting an overly simplistic 
			picture
					
					Offering a false outlet for good intentions
					
					Using logical sleights of hand
					
					Forcing a choice between two equally false opposites
					
					Providing misleading evidence
					
					Staging artificial corroboration through seemingly independent 
			sources 
			How can one tell if a source is peddling disinformation and not just 
			innocently expressing a differing opinion?  
			  
			It is true that people 
			can unwittingly pass on half-truths after having bought into them, 
			but the question concerns the ultimate source of those ideas. The 
			answer is that the intentionality behind disinformation gives its 
			flaws a pointed direction.  
			  
			In other words, the flaws are too clever 
			and directional to be unintentional, bearing the signature of crafty 
			intelligence beneath its projected guise of innocence. 
			  
			  
			Leaderless Conspiracy
 
 At the same time, it must be emphasized that an agenda can be 
			carried out through seemingly opposing elements, whereby the 
			illusion of outward disunity and independence cloaks the underlying 
			order.
 
 Therefore the conspiracy isn’t as organized as one would think 
			because those beneath the capstone of the pyramid of control may 
			seemingly act on their own. They may be at odds with each other, 
			mutually suspicious or contemptuous, independently carrying out 
			their own agendas and acting on their own unique ideologies.
 
			  
			But 
			like swimmers drifting down a river together despite moving 
			independently relative to each other, these vectors of 
			disinformation may oppose and cancel each other in the superficial 
			sense yet still have a common direction that advances the highest 
			unseen agenda.
 There is no need for coordination among lower elements of a 
			conspiracy if a broad range of carefully designed causes initiated 
			earlier produce cascading effects that cleverly converge at the 
			right time. For human conspirators this would require an incredible 
			level of foresight, but foresight and hindsight are interchangeable 
			for interdimensional forces operating outside linear time who have 
			no problem scanning the timeline for the right points to target.
 
 So while different streams of disinformation and misinformation 
			appear to contradict each other in the details, it is their common 
			direction and combined synergy that matter. One must examine the 
			ultimate consequences to discern the ultimate motives.
 
			  
			This I will 
			do in the next part by providing and analyzing numerous examples of 
			alien disinformation.
 Back to Contents
 
			  |