Dhamma

Monday, June 23, 2025

On the book PsyWar with glossary of the basic terms

 “During the COVID-19 debacle, it is a proven fact that Americans were lied to by a handful of dysfunctional senior federal health bureaucrats who ignored their oaths, silenced dissent, stifled freedom of speech, and dismissed early drug treatments in favor of a mass mRNA “pseudo-vaccine” program. While this never prevented viral infection or halted pandemic progression, it did garner billions of dollars for the participating drug companies.

Marching in lockstep, every American’s right to “Freedom of Speech,” so fundamentally engrained in our constitutional Bill of Rights, was made  a mockery. For physicians, the Freedom of Speech to speak out against the dysfunctional COVID response was twisted into a recognized punishable offense in some states.

As a result, compassionate American medicine, accurate medical research, and the inviolate concept of patient informed consent was effectively destroyed in the United States. Many of our once esteemed national medical associations and colleges, have become nothing more than conduits of “misinformation” espoused by the federal health agencies who now are desperately trying to minimize the injuries and deaths caused by an ill-advised and ineffective mass mRNA vaccination campaign.

How did we arrive here and why has this gone unchallenged? The controversial new book PsyWar is a highly provocative deep dive, which takes the reader through a step-by-step account of how modern communications technology and social media has now been coupled to a biased corporate mass media monopoly. This has created a nightmare of propaganda and censorship that has suppressed the truth of the COVID-19 debacle.

The book outlines the current heroic David/Goliath fight still underway by true physicians, against a small but powerful group of unconstitutionally motivated federal bureaucrats. It is a continuing fight, largely hidden from the American public.

PsyWar is a carefully referenced book with numerous examples that support the authors’ contention that modern cognitive and psychological warfare tools have been employed by the US government as part of a mass formation psychological strategy to mold American opinion. It describes the various tactics used by global governments who now clearly define what is mis-, dis-, and mal-information in the world. It presents often shocking and still controversial histories starting with the 1964 Warren Report, to illustrate the origin of this information control and how modern social media serves as an advocacy conduit used to minimize any set of popular beliefs that the government finds inconvenient.

This book is thought-provoking reading for all Americans who believe that Freedom of Speech is vital for the continuance of our Republic.”

—Dr. Steven Hatfill, pathologist and biological weapons expert, and author of Three Seconds Until Midnight

A PsyWar Glossary

Astroturfing (ergo, fake grass roots) is the practice of masking the sponsors of a message or organization to make it appear as though it originates from  and is supported by grassroots participants. Astroturfing gives organizations credibility by hiding information about the source’s financial or governmental connections. An Astroturf organization is an organization that is hiding its real origins in order to deceive the public about its true intentions.

Asymmetric warfare is a type of war between opponents whose relative military power, strategy, or tactics differ significantly. It often involves insurgents or a resistance movement against a standing army or a more traditional force.

Advocacy journalism is journalism that advocates a cause or expresses a viewpoint with a specific agenda. It is often designed to increase or decrease the Overton window. It is a form of propaganda.

Bad-jacketing. Rumors and gossip meant to disenfranchise and destroy a movement or quell enthusiasm.

Black ops is an abbreviation for “black operations,” which are covert or clandestine activities that cannot be linked to the organization that undertakes them.

Black propaganda falsely claims a message, image, or video was created by the opposition in order to discredit them.

Bot is an automated account programmed to interact like a user on social media. Bots are used to push narratives, amplify misleading messaging, and distort online discourse. The name “bot” came from a shortened version of the name robot.

Botnet is a network of devices infected with malware, controlled by an attacker to launch distributed denial-of-service (DDoS) attacks or spread malware.

Chaos agents are a person or people that purposefully causes chaos or mischief within a group, for their own personal entertainment or as a tool to cause organizational fragmentation. It is a tool often used by intelligence agencies.

(...)

Controlled opposition, disruptors, and chaos agents. Historically, these tactics involve a protest movement that is actually being led by government agents. Nearly all governments in history have employed this technique to trick and subdue their adversaries. However, in fifth-gen warfare, controlled opposition often may come in the form of disruptors and chaos agents. Either “real” people or bots that generate outrageous claims that delegitimize a movement (examples currently may or may not be); “snake venom in the water” or “everyone is going to die who took the vaccine within two years.” Another tactic is placing agents of chaos whose job is to basically disrupt organizations and events. This may also come in the form of “reporters” who assert fake or highly exaggerated news stories, and who most likely are funded by the opposition. “Undermine the order from the shadows” is the tactic here. 

(...)

Cyberstalking involves the use of technology (most often, the internet!) to make someone else afraid or concerned about their safety. Generally speaking, this conduct is threatening or otherwise fear-inducing, involves an invasion of a person’s relative right to privacy, and manifests in repeated actions over time. Most of the time, those who cyberstalk use social media, internet databases, search engines, and other online resources to intimidate, follow, and cause anxiety or terror to others.

Data mining is the software-driven analysis of large batches of data in order to identify meaningful patterns.

Decentralized and highly non-attributable psychological warfare (memes, fake news).

Deepfakes are synthetic media that have been digitally manipulated to replace one person’s likeness or voice convincingly with that of another. Deepfake techniques include using a type of artificial intelligence called deep learning to create convincing images, audio, and video hoaxes.

Deep state is a type of governance made up of potentially secret and unauthorized networks of power operating independently of a state’s political leadership in pursuit of their own agenda and goals.

Denial-of-service (DoS) attack involves overwhelming a system with traffic to exhaust resources and bandwidth.

Distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic to a web property.

DNS Tunneling is the use of a domain name system (DNS) protocol to communicate non-DNS traffic, often for malicious purposes.

(...)

Emotional appeal is a persuasive technique that relies on descriptive language and imagery to evoke an emotional response and convince the recipient of a particular point of view. An emotional appeal manipulates the audience’s emotions, especially when there is a lack of factual evidence.

Fearporn is any type of media or narrative designed to use fear to provoke strong emotional reactions, with the purpose of nudging the audience to react to a situation based on fear. Fearporn many also be used to increase audience size or participation.

Fifth generation (fifth-gen) warfare is using non-kinetic military tactics against an opponent. This would include strategies such as manipulating social media through social engineering, misinformation, censorship cyberattacks, and artificial intelligence. It has also been described as a war of “information and perception.” Although the concept has been rejected by some scholars, it is seen as a new frontier of cyberspace and the concepts behind fifth-generation warfare are evolving, even within the field of  military theory and strategy. Fifth-gen warfare is used by non-state actors as well as state actors.

Flooding is a tactic that manipulates search engine or hashtag results by coordinating large volumes of inauthentic posts. Flooding may also be referred to as “firehosing.”

DoD Military Deception Missions are attempts to deliberately deceive by using psychological warfare to deliberately mislead enemy forces during a combat situation.

DoD Military Information Support Operations (MISO) Missions: Military Information Support Operations (MISO) missions involve sharing specific information to foreign audiences to influence the emotions, motives, reasoning, and behavior of foreign governments and citizens. This can include cyber warfare and advanced communication techniques across all forms of media. In the case of a domestic emergency, MISOs can be used on domestic populations.

(...)

Gatekeeping is a process and propaganda technique of selecting content and blocking information to sway a specific outcome. It is often used in news production to manipulate the people by manipulating the writing, editing, positioning, scheduling, and repeating of news stories.

(...)

Hypnosis is a procedure that guides one into a deep state of relaxation (sometimes described as a trancelike state) designed to characterized by heightened suggestibility and receptivity to direction. Hypnosis can be implemented it in digital media, movies, advertising and propaganda. Trance-like experiences aren’t all that uncommon. If you’ve ever zoned out while watching a movie or daydreaming, you’ve been in a similar trance-like state.

Hypnotic language patterns are used to influence and persuade by employing techniques such as lulling linguistic patterns, metaphor, and emotionally appealing words and phrases. Hypnotic language patterns and propaganda  are connected through the use of persuasive and manipulative techniques to influence public opinion and highlights the powerful impact of language on shaping public perception and behavior.

(...)

Infodemic is the rapid and far-reaching spread of information, both accurate and inaccurate, about a specific issue. The word is a conjoining of “information” and “epidemic.” It is used to describe how misinformation and disinformation can spread like a virus from person to person and affect people like a disease. This use of this technique can be deliberate and intentional.

Inverted totalitarianism is a managed democracy, where economic and state powers are conjoined and virtually unbridled. Regulatory control is superimposed upon the administrative state, and a nontransparent group of managers and elites run the country from within.

Limited hangout is a propaganda technique of displaying a subset of the available information. It involves deliberately revealing some information to try to confuse and/or prevent discovery of other information.

A modified limited hangout goes further by slightly changing the information disclosed. Commercially controlled media is often a form of limited hangout, although it often also modifies information and so can represent a modified limited hangout.

(...)

Mass formation is, in essence, a kind of group hypnosis that destroys individuals’ ethical self-awareness and robs them of their ability to think critically. Mass formation within a population can happen suddenly.

Mass formation psychosis describes the individual under the spell of mass formation. Although this term is not found in the Diagnostic and Statistical Manual of Mental Disorders (DSM-5), it is our opinion that it is just a matter of time before this amendment will be included.

Mass surveillance is the surveillance of a population or fraction of a population. This surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Often specific political groups are targeted for their beliefs and influence.

Modified limited hangout is a propaganda technique that displays only a subset of the available information, that has also been modified by changing some or all of the information disclosed (such as exaggeration or making things up). It is meant to confuse and/or prevent discovery of other information.

Moral outbidding (see purity spiral)

(...)

Nudging is any attempt at influencing people’s judgment, choice or behavior in a predictable way that is motivated because of cognitive boundaries, biases, routines, and habits in individual and social decision-making posing barriers for people to perform rationally in their own self-declared interests, and which works by making use of those boundaries, biases, routines, and habits as integral parts of such attempts. In fifth-gen warfare, nudging can take the form of images, videos, or online messages.

(...)

Operation Mockingbird was organized by Allen Dulles and Cord Meyer in 1950. The CIA spent about of one billion dollars a year in today’s dollars, hiring journalists from corporate media, including CBS, the New York Times, ABC, NBC, Newsweek, Associated Press, and others, to promote their point of view. The original operation reportedly involved some three thousand CIA operatives and hired over four hundred journalists. In 1976, the domestic operation supposedly closed, but less than half of the media operatives were let go. Furthermore, documentary evidence shows that much of Operation Mockingbird was then offshored to escape detection. It is rumored that British intelligence picked up many of the duties of Operation Mockingbird on behalf of the US intelligence community (see the Trusted News Initiative).

Othering is a phenomenon where individuals or groups are defined, labeled and targeted as not fitting in within the norms of a social group. This is a tactic used by the deep state, politicians, and the media. Chaos agents as well as propaganda are used to create a sense of divide. This influences how people perceive and treat those who are viewed as being part of the in-group versus those who are seen as being part of the out-group. This can happen on both a small and very large scale.

Outrage porn, also known as outrage journalism, is a form of media or storytelling that aims to elicit strong emotional reactions to expand audiences or boost engagement.

Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, aimed at stealing sensitive data or installing malware.

Propaganda is a form of manipulation of public opinion by creating a specific narrative that aligns with a political agenda. It uses techniques like repetition, emotional appeals, selective information, and hypnotic language patterns to influence the subconscious mind, bypassing critical thinking and shaping beliefs and values. Propaganda can use a form of hypnosis, whereby putting people into a receptive state where they are more prone to accepting messages.

Psychological Bioterrorism is the use of fear about a disease to manipulate individuals or populations by governments and other organizations, such as Big Pharma. Although the fear of infectious disease is an obvious example, it is not the only way psychological bioterrorism is used. Other examples include propaganda regarding environmental toxins, unsafe drinking water, soil contamination, and climate change risks. Another name for psychological bioterrorism is information bioterrorism.

Psychological warfare involves the planned use of propaganda and other psychological operations to influence the opinions, emotions, attitudes, and behavior of opposition groups.

PsyWar is when psyops is used by governments against a foreign population or even against the citizens of a government (domestically) in a coordinated fashion.

Publicly available raw data and surveys used to sway public opinion by use of memes, essays, and social media posts.

Purity spiral is a form of groupthink where it becomes more beneficial to hold certain views than to not hold them, and more extreme views are rewarded while expressing doubt, nuance, or moderation is punished (a process sometimes called “moral outbidding”). Moral outbidding makes it beneficial to hold specific beliefs than to not hold them. Although a purity spiral often concerns morality, it is about purity.

Ransomware is a type of malware that encrypts a victim’s files and demands payment in exchange for the decryption key.

Realpolitik is political philosophy (or politics) based on practical objectives rather than on ideals. The word does not mean “real” in the English sense but rather connotes “things”—hence a politics of adaptation to things as they are. Realpolitik thus suggests a pragmatic, no-nonsense view and a disregard for ethical considerations. In diplomacy it is often associated with relentless, though realistic, pursuit of the national interest.

Repetitive messaging is a propaganda technique whereby a large number of messages are broadcast rapidly, repetitively, and continuously throughout media without regard for truth or consistency.

Sealioning is a trolling or harassment tactic in online discussions and blogs. It involves the attacker asking relentless and insincere questions or requests for evidence under the guise of civility and a desire for genuine debate. These requests are often tangential or previously addressed and the attacker maintains a pretense of civility and sincerity, while feigning ignorance of the subject matter. Sealioning is aimed at exhausting the patience and goodwill of the target, making them appear unreasonable.

Shadow banning (also known as stealth banning, hell-banning, ghost banning, and comment ghosting) is the practice of blocking or partially blocking a user or the user’s content from some or all areas of an online community. This is done in such a way that the ban is not readily apparent to the user, regardless of whether the action is taken by an individual or an algorithm.

Social credit systems: China’s social credit system is a combination of government and business surveillance that gives citizens a “score” that can restrict the ability of individuals or corporations to function in the modern world by limiting purchases, acquiring property or taking loans based on past behaviors. Of course, how one uses the internet directly impacts the social credit score. This is the origin of the social credit system that appears to be evolving in the United States. Environmental, social, and governance (ESG) metrics are a kind of social credit system designed to coerce businesses—and, by extension, individuals and all of society—to transform their practices, behaviors and thinking.

Social engineering is any manipulation technique that exploits human behavior and error in order to gain access to sensitive or confidential information. Where some scammers would steal someone’s personal information, social engineers convince their victims to willingly hand over the requested information like usernames and passwords. “Nudge” technology is actually applied social engineering.

(...)

Surveillance capitalism is a business model based on the unilateral claim of human private experiences as free raw material for translation into behavioral data. These personal data are then extracted, processed, and traded to predict and influence human behavior. Specific data concerning individuals is the commodity. In this version of capitalism, the prediction and influencing of behavior (political and economic) rather than production of goods and services is the primary product. The economic success of this business model is a major contributor to the profitability of Google, Facebook, TikTok and many other social media companies. The data and tools of surveillance capitalism has been exploited for political purposes by Cambridge Analytica. In many cases the surveillance state and globalist governmental organizations have fused with surveillance capitalism to yield a new form of fascism commonly known as techno-totalitarianism.

Switchboarding describes the federal government’s practice of referring requests for the removal of content on social media from state and local election officials to the relevant social media platforms for removal.

Synergistic use of mixed media to build excitement or to create outrage.

Synthetic media is a term used for the artificial production, manipulation, and modification of data and media, through the use of generative AI and artificial intelligence algorithms for the purpose of misleading people or changing an original meaning. Often referred to as deepfakes.

(...)

Virtue signaling is sharing one’s point of view on a social or political issue, often on social media or through specific dress or actions, to garner praise or acknowledgment of one’s righteousness from others who share that point of view or to rebuke those who do not.

Web crawler, also known as a spiderbot, is an automated Internet program that systematically browses the World Wide Web for specific types of information.

White propaganda is a type of propaganda where the producer of the material is marked and indicated, and the purpose of the information is transparent. White propaganda is commonly used in marketing and public relations. White propaganda involves communicating a message from a known source to a recipient (typically the public or some targeted sub-audience). White propaganda is mainly based on facts, although often, the whole truth is not told.

World Economic Forum (WEF) is one of the key think tanks and meeting places for managing global capitalism and is arguably coherent enough to qualify as the leading global “deep state” organization. Under the leadership of Professor Klaus Schwab, it has played an increasingly important role in coordinating the globalized hegemony of large pools of transnational capital and associated large corporations over Western democracies during the last three decades.

Wrap-up smear is a deflection tactic in which a smear is made up and leaked to the press. The press then amplifies the smear and gives it legitimacy.  Then, an author can use the press coverage of the smear as validation to write a summary story, which is the wrap-up smear.

Yellow journalism is newspaper reporting that emphasizes sensationalism over facts. Advocacy journalists who support government narratives often use it to sway public opinion.

Zero-day exploit is a technique targeting a newly discovered vulnerability before a patch is available.

PsyWor

Enforsing The New World Order

by Robert W. Malone and Jill G. Malone

No comments:

Post a Comment