It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Perception management is a term originated by the US military. The US Department of Defense (DOD) gives this definition:
Actions to convey and/or deny selected information and indicators to foreign audiences to influence their emotions, motives, and objective reasoning as well as to intelligence systems and leaders at all to influence official estimates, ultimately resulting in foreign behaviors and official actions favorable to the originator's objectives. In various ways, perception management combines truth projection, operations security, cover and deception, and psychological operations.
The US government already has checks in place to dissuade perception management conducted by the state towards domestic populations, such as the Smith-Mundt Act of 1948, which "forbids the domestic dissemination of U.S. Government authored or developed propaganda... deliberately designed to influence public opinion or policy".
The National Defense Authorization Act for Fiscal Year 2013 amended the Smith–Mundt Act and the Foreign Relations Authorization Act of 1987, allowing for materials produced by the State Department and the Broadcasting Board of Governors (BBG) to be released within U.S. borders and striking down a long-time ban on the dissemination of propaganda in the United States.
He was also receptive to the point that Kit, Hal, etc. wouldn't enjoy continued contracts/security clearances if they were working against the gubmint in trying to force some disclosure.
Bosley sounds like a nice guy but my suspicion is that if he's not knowingly spreading disinformation, then he is at least unknowingly spreading it.
I already talked about this before: I believe the gatekeepers of the truth - whatever it may be - disinform their own people. Just because people like Doty or Bosley are in the AFOSI, or other intelligence agencies, doesn't mean they know everything an organization, or "the government," knows. Whatever the truth may be it's not only highly classified but also on strict need-to-know basis. So what people like Doty or Bosley think they know, or believe, I think it's either disinformation or myths and lore passed down from agents to agents.
That's why I don't adhere to the view that suggests that because someone is/was a government agent and is talking about UFOs, they necessarily know what they're talking about, or are purposely spreading disinformation and part of the cover up. There is a middle ground.
the connections discussed here are so complex, we're not talking about network of spider webs- it sounds more like molecular biology to me.
I hope someone will come up with some charts for folks like me who more easily process information via visual aids!
DARPA is soliciting innovative research proposals in the areas of (1) quantitative analysis of narratives, (2) understanding the effects narratives have on human psychology and its affiliated neurobiology, and (3) modeling, simulating, and sensing-especially in stand-off modalities-these narrative influences. Proposers to this effort will be expected to revolutionize the study of narratives and narrative influence by advancing narrative analysis and neuroscience so as to create new narrative influence sensors, doubling status quo capacity to forecast narrative influence.
"Stories exert a powerful influence on human thoughts and behavior. They consolidate memory, shape emotions, cue heuristics and biases in judgment, influence in-group/out-group distinctions, and may affect the fundamental contents of personal identity.
It comes as no surprise that these influences make stories highly relevant to vexing security challenges such as radicalization, violent social mobilization, insurgency and terrorism, and conflict prevention and resolution. Therefore, understanding the role stories play in a security context is a matter of great import and some urgency," DARPA stated. "Ascertaining exactly what function stories enact, and by what mechanisms they do so, is a necessity if we are to effectively analyze the security phenomena shaped by stories. Doing this in a scientifically respectable manner requires a working theory of narratives, an understanding of what role narratives play in security contexts, and examination of how to best analyze stories-decomposing them and their psychological impact systematically."
1. To survey narrative theories. These empirically informed theories should tell us something about the nature of stories: what is a story? What are its moving parts? Is there a list of necessary and sufficient conditions it takes for a stimulus to be considered a story instead of something else? Does the structure and function of stories vary considerably across cultural contexts or is there a universal theory of story?
2. To better understand the role of narrative in security contexts. What role do stories play in influencing political violence and to what extent? What function do narratives serve in the process of political radicalization and how do they influence a person or group's choice of means (such as violence) to achieve political ends? How do stories influence bystanders' response to conflict? Is it possible to measure how attitudes salient to security issues are shaped by stories?
3. To survey the state of the art in narrative analysis and decomposition tools. How can we take stories and make them quantitatively analyzable in a rigorous, transparent and repeatable fashion? What analytic approaches or tools best establish a framework for the scientific study of the psychological and neurobiological impact of stories on people? Are particular approaches or tools better than others for understanding how stories propagate in a system so as to influence behavior?
The label “cognitive” in the title and elsewhere in this report is used in the broad sense. Unless otherwise noted, it refers to the cognitive sciences in general and comprises psychological and physiological processes underlying human information processing, emotion, motivation, social influence, and development. It includes contributions from all directly related disciplines, including the behavioral and social sciences, neurogenetics, proteomics, philosophy, mathematics, computer science, and linguistics.
The technology being applied to determine psychological state could even be derived from an incomplete model of brain function as long as it had sufficient predictive power to accomplish the desired goal. For instance, one would not need a complete model of brain function to construct a brain–computer interface that could improve the self-piloting capabilities of unmanned air vehicles. But the tolerance for error will be much less if a technology is used to determine whether an individual is lying about an act of treason, because the consequences of an error will be greater.
The committee believes that it is critical to fully understand the relationship between neurophysiological markers and actual mental states when the application is the detection of deception..
…Mind reading typically refers to the capacity (imparted by an external mechanism—that is, some form of technology) to determine precisely what an individual is thinking or intending, whether or not the individual is willing to communicate that state of mind. As discussed below, to “read” minds scientists must understand how minds really work to come up with a technology that is of real use, and there are several formidable barriers to…
Other questions raised by controlling the mind: How can we make people trust us more? What if we could help the brain to remove fear or pain? Is there a way to make the enemy obey our commands?
…However, the types of experiments being done may be more telling than the type of equipment needed. The same equipment might be needed for medical and for disruptive neuropsychopharmacological experiments. It could be asked, What types of experiments are being done?
How are the experiments being controlled and monitored, and why were they chosen? How would human experimentation be conducted outside accepted informed-consent limits?
In developing the methodology, the committee considered the end user (analysts and predictors of the behaviors of individuals and groups), the data available to them, the desired output, and the unique aspects (if relevant) of neuroscience research. Intelligence analysts were available for consultation throughout the project in order to ensure that the methodology was realistically applied, given the limitations of the data sets.
An important issue for cognitive neuroscientists concerns efforts to determine whether a person is reporting a true experience or one that is false but believed. In the last decade, there have been innumerable research efforts designed to distinguish true from false memories.
Earlier work examining behavioral differences between true and false memories revealed that group differences were sometimes found (for example, more sensory details in true-memory reports) (Schooler et al., 1986). However, the statistical group differences did not enable reliable classification of any particular memory report as to its authenticity.
Some work with neuroimaging has attempted to locate differences in the brain that might reveal something about true and false memories. The goal of much of the work has been to demonstrate that true and false memories have different neural signatures...
The allure of such research has been so great that considerable effort is likely to be devoted in the future to the neurophysiology of false memory. Despite some progress, we are far from being able to use neuroimaging techniques to tell us about the veracity of particular memories…
…A notable exception can be found in the work of Okado and Stark (2005), who examined true and false memories in the context of a misinformation experiment and thus studied richer false memories. Misinformation studies show how readily memory can become skewed when people are fed misinformation…
Richard McNally and his collaborators (McNally, 2003) studied people who had very rich, although likely false, memories of alien abduction have been studied. One study explored whether people who believe they have been abducted exhibit heightened physiological reactivity (heart rate and skin conductance) that occurs commonly in patients who have posttraumatic stress disorder (PTSD) when they think about their traumas.
The “abductees” studied had experienced apparent sleep paralysis and hypnopompic hallucinations, which are vivid dreamlike hallucinations that occur as one is waking up, such as seeing figures hovering near their beds. Most had recovered memories with such techniques as guided imagery and hypnosis. Some of the recovered memories involved sexual intercourse with aliens or having sperm extracted for breeding purposes. Their physiological reactions were similar to those seen in PTSD patients who listen to audiotaped scripts of their traumas. Thus, expressed emotion is no guarantee that a memory is true.
reply to post by noeltrotsky
I'm practically certain the "personal fame and money on the UFO circuit" can be excluded as one of the motivations for people like Kit Green.
...is the fact that we actually know of someone that asked for Kit Green's clearances to be revoked.
That person so happened to have been the Director of Security, Counterintelligence and Special Program Oversight for the Air Force. The same Air Force that, according to Kit Green, wouldn't talk to him and his people about UFOs.
But apparently no one else thinks that's an "important point."
IsaacKoi: There used to be a social mapping website that you could input a name or names…
If you refer to Col. Hennesy and the following StarPod article, then I think the reason Hennesy was pissed is clear and had more to do with Doty first, then the claim allegedly made by Green that Doty did NOT fail the lie detector test as originally asserted. As such it would seem to have no bearing on noeltrotsky's argument.