Unmasking the Disruptors in UFO/Conspiracy Research (Part 1)
By James Bartley © 2002
To be forewarned is to be forearmed. The thesis of this treatise is that certain individuals within the UFO, paranormal and conspiracy research fields are often used, wittingly or unwittingly, to control and manipulate others.
We hope the information in this treatise can spare others the grief and misery that comes from interacting with controlling and manipulative people. Sometimes this sort of disruption can last for an extended period of time. If the person doesn't learn from these experiences, he or she may be disrupted again and again by different people throughout their lives.
An understanding of how the disruptors and controllers work in the paranormal research community can save people literally years of suffering. This is no exaggeration.
It is incumbent upon you, the truth seeker, to be able to instantly identify the types of individuals you encounter either at a UFO Conference or more problematically, online.
If you were to ask all of the people involved in UFO, paranormal or conspiracy related investigations what their motivation for doing this kind of work is, very often their response will be something along the lines of wanting to "to help others" better understand these critical issues. Unfortunately, experience has shown that many of these "do gooders" in the UFO, paranormal and research community are expert at sowing acrimony and suspicion WITHIN the research community. The disruptors may also spread disinformation and pro-alien propaganda. Some are outright perpetrators hiding behind the facade of a spiritual guru or an "anti-new world order" persona. There are other types of disruptors and manipulators. It is absolutely essential to recognize ALL of them for what they are and not get taken in by their never-ending deceptions and manipulations.
These disruptors and disinformation artists will use real or contrived “academic” or “spooky” backgrounds to establish their “bona fides” within the research field they want to ingratiate themselves into. There are many gullible and naive people who attend UFO, paranormal and conspiracy conferences that take at face value anything told to them by someone with an Intelligence or academic background.
Now take a close look at the UFO Research community and notice how many investigators have either a personal or family connection to the Military/Intelligence community or the aerospace/defense industry. The list is endless. Some of the ones who like to play "big shot researcher" make much of their past Military or Intelligence background, as if it serves as a pedigree for UFO Wisdom.
One such researcher built up his "bona fides" by investigating a well-known crash retrieval case and now years later, he has transmogrified into a debunker of alien abductions.( And with a Ph. D. no less!) I remember when this guy wrote novels. My how the worm has turned.
My colleagues and I take a dim view of his understanding of the alien abduction syndrome. I've always suspected he was "on a leash" anyway since he had somehow managed to find so many first and second hand witnesses to this major event over such a short period of time. I'm satisfied that he had help finding these witnesses. Once he'd established himself as a "serious UFO investigator" with a major crash retrieval investigation under his belt, his case officer decided to move him into the field of alien abductions as a debunker. He was ex Air Force but all the other branches of the service, including the CIA are represented within the UFO research community. This particular individual doesn't have any psychic or astral capabilities that others in the UFO/paranormal field are known to have. He merely represents a type of disinformation artist who used his credentials as ex Air Force Intelligence to get his foot in the door. His was an example of a long-term penetration. It may not have started that way but it sure as heck turned out that way.
But this guy is probably just a disinformation artist and opportunist. The real disruptors seem to target certain individuals who often as not, tend to shy away from any publicity. Their targets seem to be people who have certain identifiable attributes and characteristics which may or may not be apparent to the disruptor.
In the Vietnam War the media often spoke of "Search and Destroy" missions carried out by U.S. infantry units. For the purposes of this paper, "Search and Disrupt" would probably be a more apt description because disruption is the least you will experience if you allow some of these people into your life. We have developed profiles on the various types of disruptors one is likely to encounter in the paranormal research field. (See Part 2-The Essence of Control) Once the readers familiarize themselves with the warning signs, breaking off contact with the potential disrupter is child's play.
What we are doing is conducting a form of cosmic spy catching. This is Cosmic Counterespionage 101. The "Tradecraft" of intelligence and counterintelligence, as well as special operations has been taken to another level due to the inherent capabilities that some MILABs and project people have, as well as the known or suspected technological capabilities of the deep black intelligence agencies. This information should not be “new” to any investigator of alien abductions, MILABs, mind control or the paranormal.
Today abductees, MILABs and MK ULTRA related project people have a whole plethora of challenges and disadvantages that most people, even within the so-called "research community"--could never dream of. But I believe in turning disadvantages into advantages. The learning curve comes at a price and not many people are willing to pay that price. Again, our motives are to spare the honorable, truth seekers years of betrayals, suffering and grief caused by not being “forearmed”.
UNMASKING THE DISRUPTORS
The method used by the disruptors is a modern extension of what "surface level" intelligence and security services have indulged in for years through their control of human assets. The deep black intelligence and security services as well as non-human beings have utilized the propensity and innate need of certain humans TO CONTROL others as an operational asset or tool. In effect these human assets act as surrogate controllers on behalf of the beings or agencies that control them. If you have spent any amount of time in the UFO or Paranormal/Conspiracy research community, you have already met some of these people.
Alien Abductees, Military Abductees (also known as MILABS. A term coined by Dr. Helmut Lammer) and people involved in deep black projects are subjected to various methods of control and manipulation. Before describing in detail the various categories of "disruptors", we will first describe some of the methods utilized by "surface" intelligence agencies to first isolate an individual, and then, depending on the intelligence agencies’ agenda, proceed to destabilize, disrupt, indoctrinate and ultimately control a targeted person. There are two basic ways to do this.
Colonel Oleg Maximovich Nechiporenko, author of " Passport To Assassination: The Never-Before-Told Story of Lee Harvey Oswald by the KGB Colonel Who Knew Him” reveals that the family unit has always been used as an "anchor" to keep human intelligence assets under control.
The family unit is the most basic control mechanism in the intelligence and black ops world. There are countless variations on this theme of using ones own close family members, relatives and friends of the family, to keep someone under surveillance and or control. The layperson must understand that some people are literally born into the spook world. We'll just use the intelligence community as an example.
It’s common knowledge that CIA members tend to socialize only amongst their own kind and date and marry one another. This keeps everything "in the family." Children born from these unions are often raised in a society of clannishness, secret keeping behavior and elitism. This is a just "surface" type espionage and black ops. We're not even talking about Mind Control and high technology programs.
Some family members will be kept under surveillance for most of their adult lives depending on what their parent's and parent's friends had been involved in and what they themselves know from their own observations. Through no fault of their own many people have to live in that kind of culture.
A childhood growing up in an aerospace, defense industry, NASA, CIA or Military/Intel family is fundamentally different from someone who wasn't born into that lifestyle. Children in the former category, especially military dependants, may live nomadic lifestyles, traveling with their family to each new posting or assignment given to one or both of the parents. The adults the child is exposed to are often part of the intelligence/defense industry milieu. The children are often treated by military doctors or government appointed ones. Sometimes they are left in state or government run daycare centers and pre-schools. Keep all this in mind as we develop more of our concepts.
Within the intelligence community, "Sheep-dipping" is the process in which an active duty military person is transferred from his parent military command into a paramilitary unit, bureaucratic division or front organization of the CIA. It’s not quite Temporarily Attached Duty (TAD) or Secondment as the British call it. But it’s similar. The military person provides a particular expertise or capability that is sought after by the CIA. The military doesn't want to be seen providing the expertise nor does the CIA want it known that they have hired a military person, so the individual is oftentimes put to work by his new employers in civilian clothes, OR...he or she could still wear a military uniform, but do so in a covert and deniable role with absolutely no overt connection to the country or government of his origin.
Even if a sheep dipped military operative's earthly remains are found by a hostile nation there will be no dog tags, personal effects or tattoos that would provide any clues as to who sent him or her on the mission.
In a sense we see the same type of scenario involving multigenerational cult bloodline families. The latter provides a ready-made source of programmable individuals who can disassociate and be made to forget particular memories. (See Fundamentals of Trauma Based Mind control http://www.alienlovebite.com/… ) This satisfies the requirement for covert deniability. Some of them have usefulness as operational assets either physically, astral or both. The rituals some of them have been subjected to can establish demonic strongholds within the individual which further prevents reintegration and healing.
Individuals coming from this kind of family background can then be "sheep-dipped" into deep black CIA and or Military Intelligence ops with or without the connivance of the person's family. Whilst in a mind controlled or a frequency modulated astral state, people from bloodline families can be utilized to carry out a whole gamut of black ops and enterprises, and do so under a bewildering variety of operational covers or alter personalities. They have latent paraphysical capabilities and in many cases have already been psychologically fragmented into a number of programmable compartments by the controllers and programmers within their own families.
THE PENETRATION AGENT
The other basic type of control manifests itself in the form of the "Penetration Agent." For comparative purpose we will now discuss how "the perfect stranger" can come into ones life and thoroughly disrupt and manipulate an unsuspecting person. We became interested in this subject after we had observed time and again how manipulated people (under either human or non-human control) targeted specific individuals (often of the opposite sex) or groups of people for purposes of control and manipulation.
At the very least these controllers can sow a tremendous amount of confusion and chaos into the life of the targeted person in an attempt to completely disempower them and make them lose faith in themselves.
The following is a "surface level" example drawn from the annals of espionage history. It is an example of how an "outsider" could come into the life of a targeted individual and attempt to control or "suborn" that person to advance a particular agenda.
The term "Romeo Agents" came into use during the Cold War. East German Spymaster Marcus Wolf came up with the idea to send handsome spies into West Germany to seduce single female secretaries who happened to work in sensitive West German Government Agencies.
Wolf and his spy service the HVA enjoyed considerable success in what was later known as the "secretaries offensive." The plan was devastatingly simple: Send in handsome spies to befriend and ultimately develop a romantic relationship with a single older lonely woman. Ideally this woman would work in a sensitive West German Government agency.
During the initial part of the sexual relationship the Romeo agent and his control determine the best psychological approach to use on the woman when the subject of her active espionage comes up. At first the Romeo agent asked the secretary to bring something innocuous and unclassified home from work such as a trade journal or an economics study.
During this entire process a psychological profile is built up about the secretary. Vulnerabilities and weaknesses are identified and subsequently exploited. Some women that have been compromised in this fashion have passed classified secrets to her East German boyfriend because they were IN LOVE and wanted to do anything to please them. So the woman's own emotions is used against her.
Or conversely, let’s say the woman becomes outraged upon learning that the romance was a set up and categorically refuses to commit espionage. In these cases, a little more "persuasion" may be applied in the
form of photos and movie films of the woman having sex with her erstwhile lover. She may also be shown photos of herself handing over "documents" (the innocuous stuff she brought home from work) to her "boyfriend" either indoors, on a park bench or wherever else the exchange had taken place. The women are often frightened into believing that they will be denounced to the security services of their own country as traitors and spies if they do not cooperate and commit espionage.
There are myriad ways to suborn these secretaries once they've engaged in a relationship with the Romeo agent. To be sure, the latter is an extreme example of a "perfect stranger" or "Romeo agent" coming into a woman's life and turning it upside down.
But the confusion and disempowerment that some women suffer as a result of interacting with male controllers is just as real and painful as what those West German women endured. Rather than force a female abductee, milab or project person to commit espionage, all the male controller has to do is keep the woman in a perpetual state of confusion and misery and he has served his purpose. He has prevented the woman, at least temporarily, from beginning the recovery process. What outsiders might mistake as simple dysfunctionality and co-dependency on the part of the woman and a lack of interpersonal skills and control issues on the part of the male can be a facade for something else entirely. The seeming banality of it makes it all the more insidious.
THE ENCOURAGING MESSAGE PART
An esprit de corps or 'élan which motivated the various national resistance movements against Nazi occupation needs to take root amongst spiritual warriors today. In his classic work "Resistance: European Resistance to Nazism 1940-1945" M.R.D. Foot pointed out how Europeans found myriad ways to resist the nazi occupiers. Resistance didn't necessarily entail guerrilla warfare or intelligence gathering. It included diverting critically needed German supplies to the wrong destination. French railroad employees did this kind of thing quite often.
When the rail cars arrived in the eastern front, instead of finding cold weather clothing, the German quartermaster personnel would find hot weather clothing that should have been sent to North Africa or elsewhere in the Mediterranean. Anything that disrupted the Nazis plans and timetable for conquest was a form of resistance. The key was not to be seen as an anti- Nazi.
Too many people today are afflicted with the "chicken little" syndrome. These people (well meaning or otherwise) are spreading defeatism and victimization throughout the Internet and the lecture circuits. This defeatism attracts others who are similarly inclined and pretty soon you have the proverbial bullfrogs chorus of people spreading the gospel of hopelessness and victimization. Identifying the individuals who make up such "interest" (read dissident) groups is compulsory for the security services of this formerly great republic.
This is spiritual warfare we are engaged in. Much of the efforts of the Draconians, reptilians and minions of the Lower Archons (See" Hypostasis of the Archons” in the Nag Hammadi Library -James Robinson edition) will be dedicated towards preventing you, the truth seeker, from fully integrating your own experiences and learning from them. Whether you realize it or not, many of you reading this are spiritual warriors in your own right. And the forces of evil, including manipulated researchers and "do-gooders" in the paranormal field, will be arrayed against you.
(Part 2) By Eve Lorgen