I have established military and intelligence community contacts which have provided me with invaluable assistance in bringing the public the truth about many issues that may have remained hidden. In some instances, these sources are known to the public (eg Scott Bennett, Vance Davis). In most instances, they prefer to remain in the shadows as much as possible. However, they are keenly aware that they could be discovered so most play by the same set of protocols.
To understand the kind of revelations, based upon revealed intelligence information, that people like Steve Quayle, Doug Hagmann and myself engage in, one must first understand that all intelligence information roughly falls into two categories: (1) Open source in which classified and sensitive information can be found if one only knows where to look. This includes segment of government documents and often on the internet; and, (2) Top secret documents and/or first-hand witness observations in which somebody is going to prison if it is discovered that they are the leak. Occasionally, I get information from confidential sources that is highly classified. Normally, these sources are “one and done” and they dispense their information and disappear, never to be heard from again. These sources are not to be taken at face value because the “set-up factor” risk is very high and one can be discredited very easily. In these cases, I always try to link the information to known facts and open source intelligence which would confirm the information. However, people like myself live in the world of open source information. And if the truth be known, any of you could do what I do. However, this job would be impossible, without access to established contacts who can point a reporter in the direction of the truth. Also, experience teaches reporters like myself where to look for confirming information. And when one works in the arena that I do, one’s experience allows one to see the clearly emerging patterns.
In the case of the New World Order, they are surprisingly repetitive regarding their goals and methods. In a sense, I have their playbook. This whole process has become a cottage industry. In this regard many of us in the media, who work this side of the street for data, will evaluate reasonable sounding intelligence information which is grass roots (i.e. anecdotal). With the advent of the Internet, open source information is becoming increasingly timely and accurate. In fact, Steve Quayle even created his “Q-Alerts” page regarding this phenomenon and many of the revelations have led to stories of importance.
As previously stated, confidential sources will often reveal their most classified information by pointing me in the direction of confirming open source information. Although this process takes different forms, it is almost always the same. The person wants to tell a confidential story, so they point to the tip of the iceberg that they can safly reveal because it is open source. Then it is up to me to start gathering confirming evidence. The source gets to tell the story and they don’t go to prison. However, after I release the story, my Internet will go down, my radio show will be knocked off its two simultaneous satellites and my phone will go down.
One might be wondering why I just spent several hundred words revealing how I get 80% of my intelligence information. The answer is simple. The scenario I am going to present in my next article is a new chapter in the planned destruction and occupation of America. In order that the reader can best evaluate the usefulness of the information and its personal applicability to their lives, it helps to understand how the information was obtained, as much as I can reveal without “burning sources”.
The hardest part about intelligence information, other than vetting the intelligence source, and the existence of possible ulterior motives connected to the release of information, is the connecting of dots and trying to establish a time frame for what is coming based upon what is already known.
Why am I revealing this very small broad-brush information? Because I believe that our American political events are so fluid and, in some cases, so dangerous, that anyone with any persistence and desire will stumble upon open source intelligence information which could prove valuable in terms of exposure to stop the event, or to predict where an event is headed.
The major pitfall that people like myself have to worry about is the clever disinformation agent. Disinfo is designed to lead a reporter to a wrong conclusion that the sourse hopes will lead to the publication of a story that is false but serves a political agenda. In other words, all reporters run the risk of being used by believing false information.
The disinformation process works pretty much the same way in each and every case the intent is the same. The disinfo agent will offer interesting and unavailable information to gain the trust of the reporter/public and this usually accounts for about 90% of the story, which is factual. However, the unknown 10% of the story, the goal of the disinfo comes into play and leads one to a faulty conclusion. How common are disinfo agents? I once reported that DHS hired 18,000 of these people to troll the Internet. Avoiding disinfo is a major challenge for many in the Independent media. The closer one is to the truth, the more likely that they will experience the disinfo trolls.
In the next article, Part Two, of this series, I am presenting a scenario for the takeover AND occupation of America.
I have been extensively reporting on a two-phase plot to bring America down. I have referred to this as a Red Dawn invasion. Because I have stepped back and taken an objective look at this threat, combined with new information, I have concluded, that we are actually under a four-phase threat of being conquered and occupied and I am stunned as to how far along this plot is.
The explanation of how I typically gather and evaluate intelligence information should prove useful as the public and my colleagues evaluate my conclusions in Part Two.
For more stories like these, visit The Common Sense Show
FOR A LIMITED TIME ONLY
CLICK HERE TO FIND OUT MORE- USE THE COUPON CODE “5COMMON” TO TAKE 5% OFF
Source Article from http://feedproxy.google.com/~r/DaveHodges-TheCommonSenseShow/~3/znPuM_FlSZw/