Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Search
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Men In Black
(section)
Page
Discussion
English
Read
Edit
Edit source
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
Edit source
View history
Move
General
What links here
Related changes
Special pages
Page information
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Tools of the Trade - Architects of Denial == Whoever or whatever the Men In Black are, their goal of suppressing information and denying knowledge of NHI is accomplished using a variety of tools. When managing government and military insiders, they have powerful tools available that by default do not generate activity in the public space. Unlike an arrest or outright disappearance, the revocation of a security clearance or degredation of status among one's peers is difficult to measure and report on. Given the sensitive nature of some of this work, its also very difficult to pin down and prove to anyone but the person at the receiving end of it. === Disinformation Campaigns/Information Warfare === Disinformation is a broad topic among the even broader topic of information warfare. For the purpose of UFO research, disinformation involves the deliberate creation and release of false information (documents, AV, sensor, etc) for the purpose of eliciting some tactical goal. This often includes portions of legitimately sensitive material in order to "hook" the reader in and sell the lie, according to AFOSI Special Agent Richard Doty. Disinformation is a technique that is used to bring about a goal, overall this is known as information warfare, or the weaponization of information to deny, deceive, disrupt, degrade or destroy our understanding/comprehension/discovery/dissemenation of UFO material. === Suppression === Suppression in this context refers to preventing an individual from speaking out by threat or actual use of coercive tactics. This could be ridicule, spreading rumors at work, psychological intimidation tactics or worse. Ruining a reputation that took a whole career to build has no price tag, nor is it insurable. === Administrative Terrorism === Administrative Terrorism is a term coined by whistleblower David Grusch. He used it to refer to the government's objective of maintaining secrecy at all costs, as a vehicle or means by which they further this objective. Although an overlap exists with this and "suppression" activities, it is generally far more severe. Grusch referred to people involved in driving incidents, being physically harmed or even murdered in some cases. === Secret Surveillance Warrants (FISA 702) === [[File:NSA-X-Keyscore-slide-001.jpg|thumb|X-Keyscore is one of the tools used to prosecute FISA 702 warrants against surveillance targets. According to whistleblowers, even mentioning the codeword IMMACULATE CONSTELLATION would trigger automatic surveillance under a warrant issued by a secret FISA court.]] According to Michael Shellenberger, some programs are so sensitive that mentioning them in public can trigger automatic FISA 702 surveillance warrants. FISA 702 warrants are secretive court orders first exposed by whistleblower Edward Snowden in 2013 when he outted a littany of NSA secret spy programs. === Unacknowledged Special Access Carve-outs === Another method used to hide UAP data from the military/government officials tasking the collection assets is through the use of highly classified programs that create bottlenecks. By creating bottlenecks in the official channels this data transits along its course from asset -> tasking official, the architects of UAP-secrecy can effectively gatekeep. By depriving the military intelligence enterprise of this information, they are denying the entire defense ecosystem the ability to recognize, monitor, counter and catalog UAP. One such example of this type of program is [[Immaculate Constellation]], an Unacknowledged SAP intended to intercept high fidelity intelligence about UAP collected by tasked and untasked US platforms. === Deceptive Indications & Warnings === A subset of highly classified techniques designed to fool a system or individual into obscuring the source of an action or deceiving the intended audience as to the actor's intent. This is commonly referred to as a "false flag" - one such prominent instance being Operation Northwoods.
Summary:
Please note that all contributions to Ikwipedia are considered to be released under the Creative Commons Attribution-ShareAlike (see
Ikwipedia:Copyrights
for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource.
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Toggle limited content width