It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Blackmail Techniques of Control and Manipulation.

page: 1
5

log in

join
share:

posted on Nov, 11 2010 @ 01:58 AM
link   
The control grid of TPTB use subtle tactics, and espionage to influence members of the public into compliance.

Such tactics include infiltration of the subjects social circles with "Freinds" for the purposes of informaiton gathering, Theft, and subtle forms of manipulation.

Commonly, Bugging devices are planted (through breaking and entering) into the subjects Home, Work, Car, Phone, Computer, etcetera, in order to gather information that can be later used to blackmail these individuals into compliance, OR Destroy their credibility in a public light.

Some noteworthy examples include Former President John F Kennedy:

It is commonly rumored that JFK was having an extramarital affair with Marylin Monroe, and that this performance was a WARNING to the president to shame him into silence.



This sort of clandestine information gathering techniques are used extensively to gain control of individuals, and positions of power THROUGH these individuals, in addition to silencing dissent, and destroying the targets credibility in the eyes of the public.

This includes common clandestine activities such as "Gang Stalking", that was recently revealed by the "Examiner" as an $80 billion dollar covert operation against U.S. Citizens, and Foreign nationals both inside and outside the United states.

www.abovetopsecret.com...

These activities, combined, form an almost insurmountable obstacle to Real change in the Current Status Quo, as Blackmail often shames the subjects of these attacks into compliance, through fear of their "Secrets" being revealed, as in the Case of Kennedy... His Affair with Marylin Monroe, that if revealed publicly, would have torn his marriage asunder, and destroyed his political career.

The same tactic was also used on Former President William Clinton, with the Monica Lewinsky scandal.

Using secret, and disguised surveillance equipment (Like a monitoring device disguised as a lipstick canister) to gather Damning evidence against the subjects of their attacks.

And then using this evidence to prevent the subject from continuing future dissent, or Destroying their political careers, in effect, Silencing them.




Also, This interview with Kay Griggs, (Wife of a Marine Core Colonel George Grigs.) exposes the institutionalized blackmail inherent to the Control structure of TPTB, and the Western World.



Google Video Link


More information (or alternate links to the interview) can be found on youtube by searching for "Kay Griggs"

These are the methods used to force compliance of our politicians, Industrialists, and other affluent leaders of society to submit to the plans of the powers that Be, and their quest for total Dominaiton.

-Edrick (Happy Birthday)



posted on Nov, 11 2010 @ 03:07 AM
link   
Very interesting and informative post. It is a shame that threads that have no direction get more attention than ones like these.



posted on Nov, 11 2010 @ 03:53 AM
link   
I have often wondered whether TPTB get certain people involved in pedophilia in some type of initiation ritual and video it so that it can be used against them later on if they don't play the game.

They all have to keep dirt on each other to make sure they don't stab each other in the back.



 
5

log in

join