#OpThinkTank – Create a group, get equipped with surveillance equipment & monitor politicians & members of the media & intelligence services

—————————————————————————————————————————

Introduction

This article is a simplified version of a complex task to help the general person in the street fight back against the New World Order without fear using scientific methodology as used by companies such as Microsoft, Apple, Facebook, Google, The Police, Intelligence Agencies, the Military and the Government, which they use against you, currently for bad rather than good. Paedophiles also use scientific methodology against children, so this article will also act as a wake up call to those interested. This article will give the general person in the street the general knowledge they can use which costs people thousands of pounds to learn and years of study at university. This article will be written out in the simplest way I can so even those who have very little education can follow and replicate.

Group Work

Within eight weeks a civilian can transform from an undisciplined civilian into a highly disciplined soldier. It only takes one disciplined individual with a little know how to start a team that can branch like a tree to create more teams.

Organization is the hierarchical structuring of men and women into a state so as to offer some sort of disciplined team work capability for whatever purpose. As an example, military organization is hierarchical, a hierarchy is an arrangement of people in which the people are represented as being one above the other. For visualization purposes, I created a simple visualization diagram as an example of a simple team working in a hierarchical structure;

StructureIt is common to refer to the building blocks of a military as commands, formations and units. In a military context, a command is a collection of units and formations that fall under the control of a single officer. In the example provided above that single officer may be the section leader.

Simply put, most armies around the world have a common organizational structure similar to the following stripped down list;

  • Fire and maneuver team – 2 men
  • Fireteam – 4 men
  • Squad – 8 to 12 men
  • Section – 12 to 24 men
  • Platoon – 26 to 55 men

In order to reduce the probability of infiltration by current military and intelligence forces, it may be best to keep your structure small, secret, specialized and manageable rather than large in number, open to everybody, full of soldiers who are jack of all trades, master of none. Once you are satisfied with the structure you have created you can then branch out and possibly increase the size of your team. Better still, you could hand over responsibility of your structure to someone you trust or train them in the simple methodology of how to create a team in a hierarchical structure, like branches of a tree.

In order to work well as a team you need to eat, sleep, train, shower and live as a team. Activities that help build a well disciplined team include, but do not restrict to, such things as building rafts, obstacle courses, marching in formation, hiking, problem solving, learning how your enemy works, shooting in military exercises and learning the ins and outs of your weapons of choice, camping out in the woods, map reading, and other activities that help in bonding. Bonding is important to build trust in one another, to know each others strengths and weaknesses, the last thing you want is someone who is going to run away at the first sign of conflict.

The architecture of the Internet is distributed, it has no central point of failure which was part of its original design, if one part fails, information can simply be re-routed around the effected area and communications can continue as normal.

It may be worth taking lessons from history, pulling ideas from other areas such as the architecture of the Internet. If you decide to put together a team of people for whatever reason, you can then connect up with other teams of people and share knowledge, maybe create a cross country distributed backbone, a network, of like minded people who have similar values. Over time bridges are built and bonds are made, regular group meetings and training sessions will keep everyone on the same page singing from the same hymn sheet. The last thing you want is to find yourself in a situation where lets say a tyrannical government has imposed surprise martial law and the people around you are rushing around in a confused state.

The mentality of repetition used in a factory environment can be borrowed which will help focus minds in a time of crisis. Keep things simple, don’t over complicate, use peer reviewed methodology and science.

Methodology

Project management is the discipline of planning, organizing, motivating and controlling resources to achieve specific goals and meet specific criteria.

A timeline is basically a calender, it is a way of displaying a list of events in chronological order. A timeline is used to plan out a schedule for the duration of the task you wish to under take. At the beginning of your project one of the first things you create is a timeline in a rough format. The timeline is made up of smaller tasks completed one after the other until the completion of your project.

Timelines, Gantt Charts, Lists, story boards, mind maps and other scientific methodologies are easy ways to put your thoughts down on paper so other people can easily digest your thought processes and helps those with forgetful minds because of things like water Fluoridation and Geo-Engineering.

Three very useful methodologies have been taught to me throughout life to carry out certain tasks while carrying out specific projects which include but do not restrict to the following, collectively I have nick named Lucifer methodology.

In Ethical Hacking and Security System Design we use multiple methodologies for information gathering, one easy to remember methodology which can be borrowed is;

  1. Who
  2. What
  3. When
  4. Where
  5. Why
  6. How

In computer Forensics & Intelligence the Intelligence Cycle is the cycle of information processing used in a civilian or military intelligence agency or in law enforcement.

  1. Direction
  2. Collection
  3. Processing
  4. Analysis
  5. Dissemination
  6. Feedback

In computer science we use scientific methodology called the Development Life Cycle to build software which again can be borrowed;

  1. Planning
  2. Research
  3. Design
  4. Development
  5. Testing
  6. Evaluation

Using the mentioned methodologies will help you keep things in order and do things in a tried and tested manner, when times become stressful using methodology will help achieve your goals efficiently.

Surveillance

Surveillance is the monitoring of the behavior and activities of people for the purpose of influencing, managing, directing or prosecuting them. This can include observing from a distance by means of electronic equipment such as cameras, or interception of electronically transmitted information such as Internet traffic or phone calls and it can include simple low technology methods such as human intelligence agents.

In security work, a tiger team is a specialized group that tests an organization’s ability to protect its assets by attempting to circumvent, defeat, or otherwise thwart that organization’s internal and external security.

Surveillance tiger teams should practice on a target or targets with zero risk to start off which will allow you to make mistakes with minimum risk involved. The last thing you want is to be seen by your target and destroy your whole operation before it even gets its feet off the ground.

Surveillance will allow you to see and experience things that other people won’t even be able to comprehend. You can start to build a map of the battle field that you live in, you can see relationships not reported in the media, you can hear conversations about things you’re not supposed to know, you can learn where people live, where they socialize and who with. You can learn about a person by going through their rubbish, you would be surprised just how much data can be gathered from what a person throws away, become good at it you can even make some money from it which will help fund your operation.

Cache

In military special forces, a cache is a collection of objects purposely buried in the ground usually with the intention of later recovery. Whatever information you gather would best be stored in a cache away from your place of residence for safety reasons. Having multiple caches and multiple copies of your data will ensure the safety of the information collected.

Equipment

Equipment will depend on the type of Surveillance you wish to undertake, to keep this document simple for the layperson lets start with a list of simple things you may need to carry out your task;

  1. Transport (Car, Van, Motor Bike)
  2. Navigation Equipment (Sat Nav, Map)
  3. Recording Equipment (Camera, Spy Camera, Dictaphone, Pen & Paper)
  4. Communications Device (Phone, Two-Way Radio)
  5. Binoculars

This is not an exhaustive list as you can see, but it is a list which will set up the neural networks in your brain to start to think for yourself. One thing to note, without you knowing it, I have just created neural networks in your brain without even meeting you.

Distribution

Distribution comes in many forms such as word of mouth, posters, leaflets, telephone calls, social media, personal websites, file sharing, things left in public places for people to stumble upon, as well as others. Distribution is dependent upon the data you wish to share and how you wish to share it, the more sensitive the data the more you have to think about anonymity. What about finger prints, what about DNA, what about meta data, all things you need to take into consideration, think about taking a free part time introduction course in Criminal Psychology. For finger prints wear gloves, for DNA take special precautions, for meta data use computer forensics software specifically designed with anonymity in mind. Use Virtual Private Networks (VPNs) along side Proxy Daisy Chains (PDCs) as well as anonymity software such as the TOR network and I2P. Use public or open wireless networks away from cameras, you can sit outside of many places in a car or van and use their wireless network. Use the latest encryption mechanisms available at your disposal, the most important thing is to think things through and take your time, rushing things leads to mistakes being made, I should know I’ve made a million, you should of met some of my ex girlfriends!

Conclusion

Throughout this brief document you have learned to think about what it takes to start to work as a team to turn the tables on people such as Journalists and Politicians. You have the general idea of how to build a structure with order and discipline which is being used against you. You have been introduced to methodology and planning. Once you snap out of the programming you have been through since birth, once you snap out of the rabbit in headlights shock syndrome, once you pull yourself together after realizing your government have failed you, you can use these easy steps to regain control of your reality from the New World social engineers. Now hopefully you will think about what has been said and start to help change the society we live in before it is too late.

For more in depth manuals on some subjects mentioned and more see the following link;

https://jewishpaedophilia.wordpress.com/2015/08/30/opswindle-be-safe-not-sorry-stock-up-on-canned-food-water-for-stock-market-crash-youve-been-warned/

—————————————————————————————————————————

Learn who created ISIS https://jewishpaedophilia.wordpress.com/2014/12/26/uk-us-and-allies-complicit-in-funding-arming-creating-isil-takfiri-militants-in-iraq-syria/

Learn more about 911 https://jewishpaedophilia.wordpress.com/2014/11/26/911-was-an-inside-job-the-jews-responsible-for-911/

Learn more about human mutilations by alleged Extraterrestrials https://jewishpaedophilia.wordpress.com/2015/03/10/ufoovni-eight-cases-of-human-mutilation-involving-ufos-same-mo-as-animal-mutilations/

Learn about NASA paedophiles being caught downloading child porn and being protected https://jewishpaedophilia.wordpress.com/2015/08/24/optelltale-16-nasa-paedophile-employees-caught-buying-child-porn-from-site-which-showed-three-year-old-toddlers-being-sexually-abused-from-a-criminal-ring-in-eastern-europe-they-escape-prosecutio/

Learn more about the Skull & Bones gay Satanic rituals https://jewishpaedophilia.wordpress.com/2015/08/11/opzion-margaret-thatchers-former-economics-advisor-christopher-story-the-skull-bones-a-multi-generational-gay-paedophile-cult-that-believes-in-the-power-of-death-to-bring-ab/

Learn about the Nazi origins of the European Union https://jewishpaedophilia.wordpress.com/2015/08/04/opzion-margaret-thatchers-former-economics-advisor-christopher-story-hitlers-european-union-a-common-european-currency-a-pan-european-bank-called-europa-bank-and-thus/

Learn about Nazi UFOs https://jewishpaedophilia.wordpress.com/2015/07/14/optelltale-nazi-flying-disk-prototypes-andreas-epp-testimony-eugen-lardy-testimony-adolf-hitler-hermann-gorings-gerti-vogt-maria-orsitsch-lothar-waiz-karl-haushofer-rudolf-von-sebottendo/

Learn more about Satanic/Luciferian bisexual paedophile Aleister Crowley https://jewishpaedophilia.wordpress.com/2015/08/12/opilluminatuspiedpiper-33rd-degree-freemasonic-satanic-jew-aleister-crowley-the-bisexual-paedophile-who-wrote-paedophile-literature-discussing-the-sacrifice-of-children/

Learn more about paedophile child snuff rings https://jewishpaedophilia.wordpress.com/2015/05/07/jewish-paedophiles-and-snuff-movies-the-london-tape-beat-meier-dmitri-vladimirovich-kuznetsov/

View pictures of paedophiles and the royal family https://jewishpaedophilia.wordpress.com/2015/01/16/jimmy-savile-ted-heath-and-queen-elizabeth-ii-pictures/

Learn more about the British police https://jewishpaedophilia.wordpress.com/2015/01/21/how-much-do-you-think-you-can-trust-the-british-police/

Learn more about people trying to murder you and your family https://jewishpaedophilia.wordpress.com/2015/02/05/proof-someone-is-trying-to-damage-the-human-body-brain-and-cause-cancer-to-kill-people-slowly/

Learn more about Freemason paedophile rings https://jewishpaedophilia.wordpress.com/2015/02/04/international-freemason-paedophile-rings-america-britain-france-holland-jersey/

Learn more about the paedophile ring thats been operating inside the British and American intelligence agencies https://jewishpaedophilia.wordpress.com/2015/05/22/opilluminatuspiedpiper-northamptonshire-police-helping-cover-up-unitarian-paedosadist-with-satanic-royal-connections-mp-cyril-smith-scandal-because-of-his-royal-connections-force-said-secur/

—————————————————————————————————————————

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s