Forwarded from West Coast News & Discussion
Situational awareness is key... Roving Antifa mobs will seek out easy targets.
Join t.me/prepping4shtf to discuss
Join t.me/prepping4shtf to discuss
Telegram
Prepping for SHTF
Preparedness and real time event analysis for your household disaster planning. Channel is at @furyroad_intel
1 Be respectful
2 Nothing illegal
3 No racism
4 Drops are at :15 and :45 past the hour.
1 Be respectful
2 Nothing illegal
3 No racism
4 Drops are at :15 and :45 past the hour.
Can anybody explain why Michigan Secretary of State Jocelyn Benson is BLOCKING the forensic analysis report of the Dominion voting machines that took place on December 6?!!
https://amgreatness.com/2020/12/11/michigan-ag-and-sec-of-state-block-results-of-forensic-audit-of-22-dominion-machines-in-antrim-county/
https://amgreatness.com/2020/12/11/michigan-ag-and-sec-of-state-block-results-of-forensic-audit-of-22-dominion-machines-in-antrim-county/
American Greatness
Michigan AG and Sec. of State Block Results of Forensic Audit of 22 Dominion Machines in Antrim County
A Northern Michigan judge has allowed Michigan Attorney General Dana Nessel and Secretary of State Jocelyn Benson to block the results of a forensic audit of Dominion machines in Antrim County…
Forwarded from West Coast News & Discussion
This media is not supported in your browser
VIEW IN TELEGRAM
After reports and video of Antifa singling out patriots to attack...an army of over a thousand ProudBoys and supporters take to the streets
Forwarded from Fearless Report
In this moment, China is making the mistake that all empires that have risen & fallen dramatically have made over human history: imperial overreach. Xi Jinping and the CCP was flying under the radar. Now the West has awaken to their nefarious goals. America was a step too far.
— See More
— See More
Twitter
Candace Owens
In this moment, China is making the mistake that all empires that have risen & fallen dramatically have made over human history: imperial overreach. Xi Jinping and the CCP was flying under the radar. Now the West has awaken to their nefarious goals. America…
Forwarded from Rocky Mountain News & Discussion
RFI - REQUEST FOR INTELLIGENCE
Need confirmation through photos or SALUTE reports to validate single source showing military age ethnic Chinese males grouped near or inside a base at Springbrook in Alberta. This is north of Calgary near Red Deer.
Source said — Uncorroborated right now but a piece of intel...
In case it didn't make it here from cangen on /k/ today some anon found a shit load of PLA profiles at an abandoned CAF base in Springbrook Alberta. There's a ton of pictures. Something is fucky.
#China #RedDawn2020 Dec 12 2020
Inbound intel - @ActionableTruth chat or post in the comment thread
Requested by @RockyMountain_Intel
Need confirmation through photos or SALUTE reports to validate single source showing military age ethnic Chinese males grouped near or inside a base at Springbrook in Alberta. This is north of Calgary near Red Deer.
Source said — Uncorroborated right now but a piece of intel...
In case it didn't make it here from cangen on /k/ today some anon found a shit load of PLA profiles at an abandoned CAF base in Springbrook Alberta. There's a ton of pictures. Something is fucky.
#China #RedDawn2020 Dec 12 2020
Inbound intel - @ActionableTruth chat or post in the comment thread
Requested by @RockyMountain_Intel
This segment of American society has a significant connection to both the police force and the military. Simple suggestions that local police, SWAT teams or even the military will be quick to crush such a rebellion are ill-informed on two counts. First, the aforementioned one: In many cases, the military and police who are being sent out are going to be friends, family and intimates of the Hillbilly Viet Cong. What’s more, due to the extensive military experience in this area, many of the foot soldiers of an anti-government rebellion centered in Appalachia would not only just be trained, but also battle-tested. Divided loyalties always play a role in 4GW, and the United States will be no exception.
https://telegra.ph/Asymmetrical-Warfare-and-4GW-How-Militia-Groups-are-Americas-Domestic-Viet-Cong-09-15
https://telegra.ph/Asymmetrical-Warfare-and-4GW-How-Militia-Groups-are-Americas-Domestic-Viet-Cong-09-15
Telegraph
Asymmetrical Warfare and 4GW: How Militia Groups are America's Domestic Viet Cong
Alpine Evader “It is interesting to hear certain kinds of people insist that the citizen cannot fight the government. This would have been news to the men of Lexington and Concord, as well as the Mujahedeen in Afghanistan. The citizen most certainly can fight…
Forwarded from Truth: Harder to Find
This media is not supported in your browser
VIEW IN TELEGRAM
Warriors, Come Out to Play - The Warriors (7/8) Movie CLIP (1979) HD
I’ve sung my death song
I doubt they have
Every day after today is a gift
#committed #diehappy #dieFree
I’ve sung my death song
I doubt they have
Every day after today is a gift
#committed #diehappy #dieFree
Forwarded from West Coast News & Discussion
Media is too big
VIEW IN TELEGRAM
Leigh Dundas On The Effect Of A 2018 Trump Executive Order On The 2020 Presidential Election.
Forwarded from Mid West News & Discussion
This media is not supported in your browser
VIEW IN TELEGRAM
Tonight suggests the last several months of nonstop unrest in DC by Antifa and BLM could have mostly been avoided if police were allowed to do their jobs...
Police are using “new” tactics to successfully thwart long-term conflict and damage
Police are using “new” tactics to successfully thwart long-term conflict and damage
Forwarded from Rocky Mountain News & Discussion
Media is too big
VIEW IN TELEGRAM
Monkey Werx Overwatch SITREP 12.7.20
#Embargo off on troop movement reports
Now we are Plus one week — last Saturday flex exercise details off my embargo for OPSEC
Veteran network confirms the troop movements landing shit tons of jarheads and army grunts at Nellie with the twenty or so C-17s from #Ohio and other spots and c-130s from west #Texas
These weren’t on the flight schedule according to ground crew sources...
https://youtube.com/watch?v=zXbgJx8TuPE&feature=share
@exposingthelies @rockymountain_intel
@eastcoast_intel @midwest_intel @westcoast_intel
#Embargo off on troop movement reports
Now we are Plus one week — last Saturday flex exercise details off my embargo for OPSEC
Veteran network confirms the troop movements landing shit tons of jarheads and army grunts at Nellie with the twenty or so C-17s from #Ohio and other spots and c-130s from west #Texas
These weren’t on the flight schedule according to ground crew sources...
https://youtube.com/watch?v=zXbgJx8TuPE&feature=share
@exposingthelies @rockymountain_intel
@eastcoast_intel @midwest_intel @westcoast_intel
Forwarded from W_Intelligence (OSINT/COINTEL & Disclosure) (WokeIntel)
Media is too big
VIEW IN TELEGRAM
...LET’S MAKE SOME NOISE...
Welcome to the Woke Intelligence OSINT & Disclosure Channel. Sharing OSINT news and disclosure research for discussion.
We've opened up additional regional channels. Join us in chat and share credible sources or be ready to defend source claims.
OSINT Partner Channels
@wokeintelchat
@ActionableTruth
@prepping4shtf
Regional (NEW!)
@westcoast_intel
@rockymountain_intel
@midwest_intel
@eastcoast_intel
Soul
@psychicnetwork
@racoon_corona2
@covid19supportgroup
Rules:
Share credible sources only (OSINT)
Don't share graphic content
No advertising
No trolling
Welcome to the Woke Intelligence OSINT & Disclosure Channel. Sharing OSINT news and disclosure research for discussion.
We've opened up additional regional channels. Join us in chat and share credible sources or be ready to defend source claims.
OSINT Partner Channels
@wokeintelchat
@ActionableTruth
@prepping4shtf
Regional (NEW!)
@westcoast_intel
@rockymountain_intel
@midwest_intel
@eastcoast_intel
Soul
@psychicnetwork
@racoon_corona2
@covid19supportgroup
Rules:
Share credible sources only (OSINT)
Don't share graphic content
No advertising
No trolling
Forwarded from Griffin 777
Reporting methodology part 1:
Witness statements may be handed over to appropriate law enforcement officials when a local intelligence operation reaches that point with a particular target. Law enforcement officials may then use those statements as leads in their own investigation.
(5) Some information, if released immediately, may reveal sources you may wish to protect. As a result, even provable information may need to be approached from a different angle, proving it a second time independently, to protect your sources and methods. This second path can then be safely revealed.
(6) Although the temptation is great to immediately expose lies to the public, sometimes a fruitful approach is to develop the situation around the lie a little more. Or, one may wish to pepper the target with additional confirmation requests to remove the possibility of a later claim of inattention or ignorance. This is what separates a watchdog operation from a local intelligence operation. A watchdog operation simply wants to expose lies as they are found, and like the name implies, results in little more than a nuisance. A local intelligence operation, on the other hand, drives for larger goals, including unraveling entire corruption networks and leading to evidence suitable for prosecution.
(7) Although nothing on this site is to be considered legal advice, an unacceptable strategy is to offer to withhold evidence, or threaten to expose evidence, as a quid pro quo for some action or inaction by the target official. Although law enforcement investigators and prosecutors do this all the time to members of the public, use of information in such a way by your team could be construed as extortion or blackmail. Instead, let your target officials make their own decisions and take their own actions; your team’s role is to sweep up the information leakage from their actions and prepare to nail them into the ground with it. Behavior modification comes into play when officials become afraid to speak or act contrary to the public interest because they know they will inevitably be exposed and ridiculed, and prosecuted for crimes where appropriate. Strict accountability for their actions is not extortion. More on this topic in a future article.
(8) How this information is sorted and handled is a whole article by itself, including the use of off-site electronic storage to prevent it from being lost in criminal or false official raids.
From http://starvingthemonkeys.com/2017/01/19/the-winnowing-of-truth/
See part 2–https://t.me/prepping4shtf/14463
Witness statements may be handed over to appropriate law enforcement officials when a local intelligence operation reaches that point with a particular target. Law enforcement officials may then use those statements as leads in their own investigation.
(5) Some information, if released immediately, may reveal sources you may wish to protect. As a result, even provable information may need to be approached from a different angle, proving it a second time independently, to protect your sources and methods. This second path can then be safely revealed.
(6) Although the temptation is great to immediately expose lies to the public, sometimes a fruitful approach is to develop the situation around the lie a little more. Or, one may wish to pepper the target with additional confirmation requests to remove the possibility of a later claim of inattention or ignorance. This is what separates a watchdog operation from a local intelligence operation. A watchdog operation simply wants to expose lies as they are found, and like the name implies, results in little more than a nuisance. A local intelligence operation, on the other hand, drives for larger goals, including unraveling entire corruption networks and leading to evidence suitable for prosecution.
(7) Although nothing on this site is to be considered legal advice, an unacceptable strategy is to offer to withhold evidence, or threaten to expose evidence, as a quid pro quo for some action or inaction by the target official. Although law enforcement investigators and prosecutors do this all the time to members of the public, use of information in such a way by your team could be construed as extortion or blackmail. Instead, let your target officials make their own decisions and take their own actions; your team’s role is to sweep up the information leakage from their actions and prepare to nail them into the ground with it. Behavior modification comes into play when officials become afraid to speak or act contrary to the public interest because they know they will inevitably be exposed and ridiculed, and prosecuted for crimes where appropriate. Strict accountability for their actions is not extortion. More on this topic in a future article.
(8) How this information is sorted and handled is a whole article by itself, including the use of off-site electronic storage to prevent it from being lost in criminal or false official raids.
From http://starvingthemonkeys.com/2017/01/19/the-winnowing-of-truth/
See part 2–https://t.me/prepping4shtf/14463
Telegram
Griffin 777 in Prepping for SHTF
This is a public chat for risk mitigation planning.
Please post links to content on political solutions and best practices along with relevant information to aid others.
For reporting of threats, oddities or other notes of interest, please refer to SALUTE…
Please post links to content on political solutions and best practices along with relevant information to aid others.
For reporting of threats, oddities or other notes of interest, please refer to SALUTE…
Forwarded from Griffin 777
This is a public chat for risk mitigation planning.
Please post links to content on political solutions and best practices along with relevant information to aid others.
For reporting of threats, oddities or other notes of interest, please refer to SALUTE standards
—
As printed in the United States Marine Corps, School of Infantry, Marine Combat Training Battalion Student Handout:
REPORTING INFORMATION, CS11002, Section 4, Page 228-229:
4. SALUTE Report. The standard format for reporting enemy information is the SALUTE report.
SALUTE is an acronym that stands for Size, Activity, Location, Unit identification, Time, and Equipment. The report body should be brief, accurate, and clear. Facts and opinions are distinguished. If secondhand information is reported, its source is included.
SALUTE reports include all information of value, first bout the enemy, and then about the originator. Messages are printed in block letters. Individual items of information are numbered and separated into paragraphs.
a. Information about the enemy must cover:
(1) Size and/or strength of the enemy.
(2) Actions or activity of the enemy. (Sitting, driving, demeanor such as waiting for someone, lounging, reading)
(3) Location of the enemy and direction of movement. (At restaurant, driving SOUTHBOUND, stationary)
(4) Unit identification. The designation of the enemy unit may be derived from unit markings, uniforms worn, or thorough information provided by enemy prisoners.
(5) Time and date the enemy was observed. (Local Mountain time)
(6) Equipment and weapons observed. (If civilian, laptop, smartphone, notebook or reading a novel, type and color of vehicles)
b. Information about the originator or writer must cover:
(1) Location at the time of enemy observation referenced to an identifiable terrain feature, by map coordinates, by the back azimuth from each of two identified points, or the back azimuth and distance from one known point. (Just an idea of roughly what mile marker on the road, intersections of county roads, etc...)
(2) Intentions of the originator and/or observer. Examples include, remain in position? Continue on the mission?
c. An example of an appropriate SALUTE report posted from a scouting position could be:
(1) Four enemy fighters (Size)
(2) Conducting vehicle-mounted patrol along Route Blue (Activity)
(3) Grid Coordinates 783209 moving east (note next mile marker or county road intersection, place of business etc.)
(4) Part of local Taliban militia (Unit affiliation, if regular forces note unit patches letter or number designations, government agency markings or license plates)
(5) Observed 20020106 at 1545
(6) Wearing traditional clothing and carrying 4 AK-47’s with possible additional weapons in the back of red Toyota pickup truck (Equipment, etc.)
(7) Observer’s location is grid coordinate 780209 (where you were, etc.)
(8) Will remain in position (whatever you’re doing, etc.)
See Part 3 — MAPS and grid references here:
Please post links to content on political solutions and best practices along with relevant information to aid others.
For reporting of threats, oddities or other notes of interest, please refer to SALUTE standards
—
As printed in the United States Marine Corps, School of Infantry, Marine Combat Training Battalion Student Handout:
REPORTING INFORMATION, CS11002, Section 4, Page 228-229:
4. SALUTE Report. The standard format for reporting enemy information is the SALUTE report.
SALUTE is an acronym that stands for Size, Activity, Location, Unit identification, Time, and Equipment. The report body should be brief, accurate, and clear. Facts and opinions are distinguished. If secondhand information is reported, its source is included.
SALUTE reports include all information of value, first bout the enemy, and then about the originator. Messages are printed in block letters. Individual items of information are numbered and separated into paragraphs.
a. Information about the enemy must cover:
(1) Size and/or strength of the enemy.
(2) Actions or activity of the enemy. (Sitting, driving, demeanor such as waiting for someone, lounging, reading)
(3) Location of the enemy and direction of movement. (At restaurant, driving SOUTHBOUND, stationary)
(4) Unit identification. The designation of the enemy unit may be derived from unit markings, uniforms worn, or thorough information provided by enemy prisoners.
(5) Time and date the enemy was observed. (Local Mountain time)
(6) Equipment and weapons observed. (If civilian, laptop, smartphone, notebook or reading a novel, type and color of vehicles)
b. Information about the originator or writer must cover:
(1) Location at the time of enemy observation referenced to an identifiable terrain feature, by map coordinates, by the back azimuth from each of two identified points, or the back azimuth and distance from one known point. (Just an idea of roughly what mile marker on the road, intersections of county roads, etc...)
(2) Intentions of the originator and/or observer. Examples include, remain in position? Continue on the mission?
c. An example of an appropriate SALUTE report posted from a scouting position could be:
(1) Four enemy fighters (Size)
(2) Conducting vehicle-mounted patrol along Route Blue (Activity)
(3) Grid Coordinates 783209 moving east (note next mile marker or county road intersection, place of business etc.)
(4) Part of local Taliban militia (Unit affiliation, if regular forces note unit patches letter or number designations, government agency markings or license plates)
(5) Observed 20020106 at 1545
(6) Wearing traditional clothing and carrying 4 AK-47’s with possible additional weapons in the back of red Toyota pickup truck (Equipment, etc.)
(7) Observer’s location is grid coordinate 780209 (where you were, etc.)
(8) Will remain in position (whatever you’re doing, etc.)
See Part 3 — MAPS and grid references here:
Forwarded from Griffin 777
In our local intelligence operation, we are constantly flooded with raw information. And, the more successful our efforts become, the more sources we are able to recruit, including an increasing number of walk-ins, or volunteer sources. This is one reason we haven’t published much in the past month; sifting through this gigantic and growing pile of leads is a job in itself (1).
Some sources cite a triage process of separating the information into three groups: true, unknown and false. We like to use seven bins instead, which can help move information along, give better guidance to intelligence operations in the field, and assist in vetting sources (2).
These seven categories are detailed below.
Unconfirmed Information
All information starts life as unconfirmed until it can be moved into one of the bins below. Sometimes this happens immediately, but some information wallows here for a while until other information comes in to help move it along. To avoid being misled or misleading yourself, it is essential to immediately tag each piece of new information with a question mark.
Possibly True
Information which appears to be true, possibly by nothing more than intuition or the collation of other information, is tagged as possibly true. Information in this bin is prioritized on the basis of future value if confirmed, with the highest priority elements assigned to other collection operations to obtain additional information to confirm, deny, or develop unexpected new paths of inquiry.
Possibly False
The flip side of possibly true is information which is possibly false. This information undergoes the same sorting, confirmation and operational targeting procedure as its mirror image. Often, information which is false can be more valuable than information which is true, and proving information false reveals a truth all by itself.
The importance of receiving and scheduling false information for appropriate action cannot be overstated. If a public official lies to you about something, there is a reason, and that lie is often the first clue you will get about that hidden reason (3).
Some activists like to call officials on their lies early; we prefer to let them rush down that path for a while to see what else they will call our attention to along the way. Then, when it is time to snap the trap shut on a particular issue, listen for even more lies, or unexpected revelations and cross-blaming, when the squealing begins.
Presumed True
Information which is presumed true is that which any reasonable person, familiar with the available information and the circumstances, would regard as true. However, outside of a military or law enforcement context, this information is not yet publicly actionable. This information is sorted on the basis of the possibility of confirmation, and further collection operations assigned to definitively confirm.
Although we do not go public with information which is presumed true, this information can be used with great effect as a component in a psychological warfare operation. For example, a political humor piece may be laced with presumed true information, without identifying information attached, to ridicule or expose misbehavior. This kind of psychological warfare action will stab directly at the psyche of guilty parties, causing them to squeal louder, attempt to recruit support among their peers, and bringing more of them to your attention.
Presumed False
As with possibly true information, the mirror image of presumed true is information which is presumed false, or that which any reasonable and informed person would regard as false. As with any false information, this category is arguably more important than its counterpart, and is subjected to a similar confirmation and exploitation process. Psychological warfare applications of this information will take the form of “what kind of lies officials may tell” without any particular identifying information attached.
Provably True (next)
Some sources cite a triage process of separating the information into three groups: true, unknown and false. We like to use seven bins instead, which can help move information along, give better guidance to intelligence operations in the field, and assist in vetting sources (2).
These seven categories are detailed below.
Unconfirmed Information
All information starts life as unconfirmed until it can be moved into one of the bins below. Sometimes this happens immediately, but some information wallows here for a while until other information comes in to help move it along. To avoid being misled or misleading yourself, it is essential to immediately tag each piece of new information with a question mark.
Possibly True
Information which appears to be true, possibly by nothing more than intuition or the collation of other information, is tagged as possibly true. Information in this bin is prioritized on the basis of future value if confirmed, with the highest priority elements assigned to other collection operations to obtain additional information to confirm, deny, or develop unexpected new paths of inquiry.
Possibly False
The flip side of possibly true is information which is possibly false. This information undergoes the same sorting, confirmation and operational targeting procedure as its mirror image. Often, information which is false can be more valuable than information which is true, and proving information false reveals a truth all by itself.
The importance of receiving and scheduling false information for appropriate action cannot be overstated. If a public official lies to you about something, there is a reason, and that lie is often the first clue you will get about that hidden reason (3).
Some activists like to call officials on their lies early; we prefer to let them rush down that path for a while to see what else they will call our attention to along the way. Then, when it is time to snap the trap shut on a particular issue, listen for even more lies, or unexpected revelations and cross-blaming, when the squealing begins.
Presumed True
Information which is presumed true is that which any reasonable person, familiar with the available information and the circumstances, would regard as true. However, outside of a military or law enforcement context, this information is not yet publicly actionable. This information is sorted on the basis of the possibility of confirmation, and further collection operations assigned to definitively confirm.
Although we do not go public with information which is presumed true, this information can be used with great effect as a component in a psychological warfare operation. For example, a political humor piece may be laced with presumed true information, without identifying information attached, to ridicule or expose misbehavior. This kind of psychological warfare action will stab directly at the psyche of guilty parties, causing them to squeal louder, attempt to recruit support among their peers, and bringing more of them to your attention.
Presumed False
As with possibly true information, the mirror image of presumed true is information which is presumed false, or that which any reasonable and informed person would regard as false. As with any false information, this category is arguably more important than its counterpart, and is subjected to a similar confirmation and exploitation process. Psychological warfare applications of this information will take the form of “what kind of lies officials may tell” without any particular identifying information attached.
Provably True (next)
Forwarded from Griffin 777
Provably True
This is the highest category of truth, in that it is substantiated by documentation, including audio or video recordings. For non-law-enforcement operations, witness statements are insufficient as these carry no legal weight (4). A signed official statement is the highest standard of truth, not so much in what the statement says, which is often a lie, but that the statement itself was made. Just below a paper document in value is the audio or video recording of something an official said, which is why they hate being recorded. Information at this level can be made public, including identifying information about the guilty parties if desired, with little risk of defamation (5). However, circumstances may dictate using it indirectly for psychological warfare purposes as if it were only presumed true.
Provably False
The mirror image of provably true is provably false, or in our context, an official lie captured for posterity either as a document or a recorded statement. Much of your intelligence operation will drive toward the capstone of a recorded public lie or admission of misbehavior made by an official, or a last-ditch desperate official lie on paper. A false official statement is, by itself, legally actionable as a crime, and often will substantiate violation of RICO laws. As such, a provably false piece of information is the most valuable product of this entire process. As with provably true information, provably false information can be made public with little risk of civil blowback (6). Again, however, your team may wish to use it for psychological warfare purposes in a more limited way in the short term to flush more guilty or colluding parties out of hiding, or to cause would-be supporters to withdraw from the guilty parties once they understand the consequences of supporting criminal behavior (7).
In this article, we’ve laid the foundation for how to classify information and take it along a chain of steps leading to provably true or provably false information (8). In upcoming articles we’ll show some real-world examples of how we’ve used this process to develop raw information into actionable intelligence.
Footnotes:
(1) Then there is actual work-work. Also, a new sheriff has taken office and we’re still dialing in our resources for this development to see which path he chooses. Finally, our attorney is knee-deep in some filings he is working on, so we’ve been putting a lot of brain energy into supporting that. Plus, hey, with the three back-to-back holidays behind us and the big Inaugural bash tomorrow, the local crime and corruption syndicate has caught a breather, too. Sometimes you just have to take time to bask.
(2) Military and law enforcement operations can get by with fewer categories than our local operation can afford. Military operations, especially those in-extremis, can simply shoot or not shoot based on relatively flimsy information. Law enforcement operations, although presumably held to a higher standard of evidence, can lie to witnesses and suspects with impunity, and are often encouraged to do so; most crimes are “solved” by wrangling confessions or coercing plea-bargains, even from the innocent. In a local intelligence operation such as what we are running, you are further constrained by the necessity to avoid both defamation and extortion, which requires operating to a higher standard of truth when going public with information, as well as limits on what you can do with the information you have.
(3) Similarly, having a hidden meeting in violation of open meetings laws, failing to completely and promptly respond to open records requests, or refusing to answer questions during public meetings carries the same weight, in local intelligence terms, as a lie. Any of these should cause the issue at hand to receive a bump in priority.
(4) For our purposes, witness statements fall into the presumed true/presumed false categories, and inform, but do not replace, other collection operations.
This is the highest category of truth, in that it is substantiated by documentation, including audio or video recordings. For non-law-enforcement operations, witness statements are insufficient as these carry no legal weight (4). A signed official statement is the highest standard of truth, not so much in what the statement says, which is often a lie, but that the statement itself was made. Just below a paper document in value is the audio or video recording of something an official said, which is why they hate being recorded. Information at this level can be made public, including identifying information about the guilty parties if desired, with little risk of defamation (5). However, circumstances may dictate using it indirectly for psychological warfare purposes as if it were only presumed true.
Provably False
The mirror image of provably true is provably false, or in our context, an official lie captured for posterity either as a document or a recorded statement. Much of your intelligence operation will drive toward the capstone of a recorded public lie or admission of misbehavior made by an official, or a last-ditch desperate official lie on paper. A false official statement is, by itself, legally actionable as a crime, and often will substantiate violation of RICO laws. As such, a provably false piece of information is the most valuable product of this entire process. As with provably true information, provably false information can be made public with little risk of civil blowback (6). Again, however, your team may wish to use it for psychological warfare purposes in a more limited way in the short term to flush more guilty or colluding parties out of hiding, or to cause would-be supporters to withdraw from the guilty parties once they understand the consequences of supporting criminal behavior (7).
In this article, we’ve laid the foundation for how to classify information and take it along a chain of steps leading to provably true or provably false information (8). In upcoming articles we’ll show some real-world examples of how we’ve used this process to develop raw information into actionable intelligence.
Footnotes:
(1) Then there is actual work-work. Also, a new sheriff has taken office and we’re still dialing in our resources for this development to see which path he chooses. Finally, our attorney is knee-deep in some filings he is working on, so we’ve been putting a lot of brain energy into supporting that. Plus, hey, with the three back-to-back holidays behind us and the big Inaugural bash tomorrow, the local crime and corruption syndicate has caught a breather, too. Sometimes you just have to take time to bask.
(2) Military and law enforcement operations can get by with fewer categories than our local operation can afford. Military operations, especially those in-extremis, can simply shoot or not shoot based on relatively flimsy information. Law enforcement operations, although presumably held to a higher standard of evidence, can lie to witnesses and suspects with impunity, and are often encouraged to do so; most crimes are “solved” by wrangling confessions or coercing plea-bargains, even from the innocent. In a local intelligence operation such as what we are running, you are further constrained by the necessity to avoid both defamation and extortion, which requires operating to a higher standard of truth when going public with information, as well as limits on what you can do with the information you have.
(3) Similarly, having a hidden meeting in violation of open meetings laws, failing to completely and promptly respond to open records requests, or refusing to answer questions during public meetings carries the same weight, in local intelligence terms, as a lie. Any of these should cause the issue at hand to receive a bump in priority.
(4) For our purposes, witness statements fall into the presumed true/presumed false categories, and inform, but do not replace, other collection operations.