AGENT X
KUBARK COUNTERINTELLIGENCE INTERROGATION
Thu Oct 20, 2005 19:22
64.140.159.91

 

KUBARK COUNTERINTELLIGENCE INTERROGATION

http://www.parascope.com/articles/0397/kubark06.htm

-------------------------------------------------


Cheney 'Cabal' hijacked foreign policy

By Edward Alden in Washington

Vice-President Dick Cheney and a handful of others had hijacked the government's foreign policy apparatus, deciding in secret to carry out policies that had left the US weaker and more isolated in the world, the top aide to former Secretary of State Colin Powell claimed on Wednesday. Continued
http://www.informationclearinghouse.info/article10684.htm



I. Introduction

A. Explanation of Purpose

This manual cannot teach anyone how to be, or become, a good interrogator. At best it can help readers to avoid the characteristic mistakes of poor interrogators.

Its purpose is to provide guidelines for KUBARK interrogation, and particularly the counterintelligence interrogation of resistant sources. Designed as an aid for interrogators and others immediately concerned, it is based largely upon the published results of extensive research, including scientific inquiries conducted by specialists in closely related subjects.

There is nothing mysterious about interrogation. It consists of no more than obtaining needed information through responses to questions. As is true of all craftsmen, some interrogators are more able than others; and some of their superiority may be innate. But sound interrogation nevertheless rests upon a knowledge of the subject matter and on certain broad principles, chiefly psychological, which are not hard to understand. The success of good interrogators depends in large measure upon their use, conscious or not, of these principles and of processes and techniques deriving from them. Knowledge of subject matter and of the basic principles will not of itself create a successful interrogation, but it will make possible the avoidance of mistakes that are characteristic of poor interrogation. The purpose, then, is not to teach the reader how to be a good interrogator but rather to tell him what he must learn in order to become a good interrogator.
CLICK:
http://www.parascope.com/articles/0397/kub_i.htm

Secrets, Evasions and Classified Reports

The CIA leak case isn’t just about whether top officials will be indicted. A larger issue is what Judith Miller’s evidence says about White House manipulation of the media

By Michael Isikoff and Mark Hosenball

The lengthy account by New York Times reporter Judy Miller about her grand jury testimony in the CIA leak case inadvertently provides a revealing window into how the Bush administration manipulated journalists about intelligence on Iraq’s nonexistent weapons of mass destruction. Continue
http://www.informationclearinghouse.info/article10692.htm

The interrogation of a resistant source who is a staff or agent member of an Orbit intelligence or security service or of a clandestine Communist organization is one of the most exacting of professional tasks. Usually the odds still favor the interrogator, but they are sharply cut by the training, experience, patience and toughness of the interrogatee. In such circumstances the interrogator needs all the help that he can get. And a principal source of aid today is scientific findings. The intelligence service which is able to bring pertinent, modern knowledge to bear upon its problems enjoys huge advantages over a service which conducts its clandestine business in eighteenth century fashion. It is true that American psychologists have devoted somewhat more attention to Communist interrogation techniques, particularly "brainwashing", than to U. S. practices. Yet they have conducted scientific inquiries into many subjects that are closely related to interrogation: the effects of debility and isolation, the polygraph, reactions to pain and fear, hypnosis and heightened suggestibility, narcosis, etc. This work is of sufficient importance and relevance that it is no longer possible to discuss interrogation significantly without reference to the psychological research conducted in the past decade. For this reason a major purpose of this study is to focus relevant scientific findings upon CI interrogation. Every effort has been made to report and interpret these findings in our own language, in place of the terminology employed by the psychologists.

This study is by no means confined to a resume and interpretation of psychological findings. The approach of the psychologists is customarily manipulative; that is, they suggest methods of imposing controls or alterations upon the interrogatee from the outside. Except within the Communist frame of reference, they have paid less attention to the creation of internal controls -- i.e., conversion of the source, so that voluntary cooperation results. Moral considerations aside, the imposition of external techniques of manipulating people carries with it the grave risk of later lawsuits, adverse publicity, or other attempts to strike back.
http://www.parascope.com/articles/0397/kub_i.htm

The fix is in

By Chris Floyd

If anyone in the White House is actually indicted and convicted for the high crime of exposing the identity of an undercover agent -- in wartime, no less -- they will certainly be pardoned when George W. Bush finally limps away from the steaming, stinking, blood-soaked ruin of his presidency. Nobody will do any hard time; in the end, the whole sick crew will simply pass through the golden revolving door into the lifetime gravy train of corporate grease and right-wing lecture-circuit glory. Continued
http://www.informationclearinghouse.info/article10695.htm

TURN ON YOUR SPEAKERS:
http://www.charlesgoyette.com/archive/media/2005-10-20-Charles-02.mp3

Combined hardware/information techniques

* Feedback pathways. An important aspect of psychological warfare is to have a feedback path to the victim. (This is like a control signal in dynamical systems theory.) The feedback path may be used covertly to manipulate the victim, the victim may become aware of it on his or her own, or the victim may be purposely made aware of it.

Harassers often want victims think their harassers have control over them. To know they are being watched. This can help induce psychological trauma and regression in the victim. [According to the KUBARK interrogation manual, "All coercive techniques are designed to induce regression."] A feedback path can alert the victim that he is being manipulated. This can be done by telephones ringing or fax machines. It can be done with sophisticated mind control methods. It could even be done in newspapers if some person or agency knew the newspapers the victim reads and could influence their content (e.g. the final cointelpro link below).

But the internet is a fairly new medium that fits this bill perfectly if the subject reads newsgroups. In a simple example, you cancel a person's post and then post your own article hinting that you have done it. (Incidentally, psychological torturers can pretend to have caused anything they are aware of having happened.) The person gets angry, but they may not be sure, and if they accuse the tormentor they are ridiculed. (Always try to goad the victims into doing things in public that will discredit them.)

When the hardware is expanded to include home surveillance and mind control techniques, the effects can be magnified immensely.

Can anyone truly doubt that these techniques have been extensively studied and documented by our government? The stonewall of denial fights for every inch of ground, no matter how trivial. People will still deny obvious, documented (cointelpro) things like this to delay having to deny the next step of the chain ("Yes, maybe they studied it but they would never test it on Americans [they did], and they surely are not still doing it today [they are].")

Secret agencies are still arms of the federal government.

cointelpro:
http://www.cs.virginia.edu/~alb/misc/infowarDistraction.html
 

Main Page - Friday, 10/21/05

Message Board by American Patriot Friends Network [APFN]

APFN MESSAGEBOARD ARCHIVES

messageboard.gif (4314 bytes)