Dr Robert Malone, leading Covid vax critic has been exploring the psycho-political warfare tactics used by the system, which includes the government, Big Pharma, their investors, and the chattering class such as academics who sell all of this. He has concluded that what occurred with the vax mandates and the devious strategies to get the vast majority of the human race subjected to an experimental gene therapies, is 5th generational warfare, of which a psy-ops is but a part. According to these theorists, 5th generation warfare involves much more than kinetic aspects, but is a war of the mind. It is about controlling narratives and what is thought, so that by a kind of intellectual judo, people are defeated, and enslaved without the usual physical means. Done right, they do not even know that they have been enslaved until it is too late, which is certainly what happened with the genetic experiment of Covid. We saw this with the Covid narrative, which has been held until very recently, now with some retreats as the mainstream media are slowly letting bits of the scam out. As they do, the main players are retreating, saying that they never said that people should take the vaccine, with Justin Trudeau being one recent example. But, he did say this, and is on record as doing so. In the future, all such records will no doubt be eliminated in the brave new world the elites are creating.
https://rwmalonemd.substack.com/p/psywars
“Congratulations. You and the rest of the world have managed to survive the largest, most globally coordinated psychological warfare operation in the history of mankind: the COVIDcrisis. During this period, on a daily basis, we had to experience the US Government and many western nations deploying highly refined, military-grade fifth generation warfare technologies and PsyWar weapons against their own citizens. For those who avoided the genetic vaccine jabs, which are now proven to be neither safe nor effective in preventing infection, replication, or spread of SARS-CoV-2, and do not prevent disease or death attributed to COVID-19 disease, you deserve a medal for your ability to see through the fog of information warfare. For those, like me, who trusted the FDA and took the initial jabs only to suffer the adverse effects of same, perhaps a purple heart for being wounded in battle is in order. For the millions of battlefield dead, the excess mortality documented by Ed Dowd and so many others, a moment of silent mourning is in order. Then there are the countless children, who have endured masking and social distancing in school for years on end. How do they recover developmentally? How do we ensure that this never happens again?
This essay focuses on how to stop the military grade psyops from happening on a global or even national scale in the future. Or at the very least, how to learn to not be a target of these techniques and to be able to use them yourself to fight back “against the machine”. Because governments are currently planning for the next “pandemic” (“Plandemic?”) and they have no intention of scaling back their weaponized public health policies, which are being used to control us all. And this control is not just limited to COVID-19 policies; the ability to control populations through the use of psy-ops and 5th-gen warfare is just too tempting for governments and international organizations (such as the United Nations and The World Economic Forum), to not deploy in the future. The use of military-grade PsyWar methods on civilian populations to alter election outcomes, to weaponize fear, and to influence or control (literally) all information, beliefs and emotions of civilian populations is just to lucrative and enticing for those who subscribe to the logic that the ends justify the means.
So, what is fifth generation warfare and why does it matter?
“The deliberate manipulation of an observer’s context in order to achieve a desired outcome.”
"The basic idea behind this term [fifth-generation warfare] is that in the modern era, wars are not fought by armies or guerrillas, but in the minds of common citizens."
(from the: The Handbook of 5GW: A Fifth Generation of War Abbott, 2010)
5th-Gen warfare is an extension of Asymmetric and Insurgent Warfare strategies and tactics, whereby both conventional and unconventional military tactics and weapons are incorporated and deployed, including exploitation of political, religious and social causes. This new gradient of warfare uses the internet, social media and the 24-hour news cycle to change cognitive biases of individuals and/or organizations. It can be conducted by organized or unorganized (ergo decentralized) groups; it may be led by nation states, non-nation state actors and organizations, non-governmental organizations or even individuals. A key characteristic of 5th Gen warfare is that the nature of the attack is concealed. The goal is to disrupt and defeat opponents by creating new cognitive biases.
The most effective 5th-Gen warfare strategies employed by those lacking integrity are not purely based on pushing false narratives, mis- dis- or mal- information. The most effective strategies mix truth with fiction, and act to increase confusion and disorder in the thoughts and minds of those being targeted, so that they are not sure what or whom to believe.
“The very nature of Fifth Generation Warfare is that it is difficult to define.”
(“Handbook of 5GW”, Abbott, 2010).
Some have written that the term 5th-Gen warfare should only be applied to those opponents with fewer resources (asymmetric warfare), but this is not consistent with current practice. Large and small governments, transnational corporations, globalist non-governmental organizations (such as the Bill and Melinda Gates Foundation) and the UN, WTO, WHO and their affiliates which seek to govern world affairs, and even ordinary citizens have learned how effective the 5th-Gen toolkit is, and deploy 5th-Gen warfare tactics to their advantage.
“Any sufficiently advanced technology is indistinguishable from magic”
-Arthur C. Clarke.
With this chapter (essay), my goal is to teach the reader how to begin to recognize 5th-Gen warfare tactics and to learn to use these tools for him or herself in surviving the “information warfare” they are being subjected to. Only after realizing the broad scope of what is being done to all of us can each of us begin to master these methods and become truth warriors in the 5th Gen battles that lie ahead.
Just to be clear, the concept of 5th generation warfare as being traditional “warfare” is not accurate. When the term “war” is applied, the concept of a physical war as a battle for territory using kinetic weapons looms large. This is not the case with 5th-Gen warfare.
For my own use, I find the term fifth-generation psyops or PsyWar as more accurately characterizing what is currently happening across the world-wide web. 5th-gen warfare is a more general term. When a collaborative or synchronized 5th-Gen psyops program is being referred to, then I will use that term when appropriate.
There is also the small point that although “5GW” or 5G warfare is commonly used, this term can often confuse those first encountering 5th-Gen warfare terminology, who may confuse 5th Gen warfare with 5G communication technologies (cell phone tower tech). For this reason, I avoid using the “5GW” acronym. This may all seem esoteric, but words and definitions matter.
The “Handbook of 5GW” (Abbott, 2010) defines fifth generation warfare as:
- A war of information and perception
- Targets existing cognitive biases of individuals and organizations
- Creates new cognitive biases
- Is different from classical warfare for the following reasons:
- Focuses on the individual observer / decision maker
- Is difficult or impossible to attribute
- Nature of the attack is concealed
Below is a general summary list of common 5th-Gen warfare weapons, tactics, and technologies:
- Misinformation (Data Driven)
- Deepfakes are audio and visual media in which a person in an existing image or video is replaced with someone else's likeness. With AI, even matching audio voiceovers can be generated. While the act of creating fake content is not new, deepfakes leverage powerful techniques from machine learning and artificial intelligence to manipulate or generate visual and audio content. It is predicted that deep fakes will soon be so real, that even “experts” will be unable to tell the differences. Digital certificates (or footprints) are being developed to differentiate real from fake media
- Cyberattacks
- Honeypots (not the sexual entrapment kind). Honeypots mimic typical victim-targets of cyberattacks, such as vulnerable networks or individual email accounts. A “honeypot” can be used to attract, detect, and thereby deflect hacks from potentially vulnerable high-value systems or targets.
- “Social engineering.” Social engineering is any manipulation technique that exploits human behavior and error in order to gain access to sensitive or confidential information. Where some scammers would steal someone’s personal information, social engineers convince their victims to willingly hand over the requested information like usernames and passwords. “Nudge” technology is actually applied social engineering.
- Social media manipulation (Data Driven)
- Decentralized and highly non-attributable psychological warfare fake/deepfake information (memes, fake news, planted stories). Often elements of truth will be woven into the narrative, to confuse and change the biases of the individual(s) being targeted. Evolving GPT-based “artificial intelligence/machine learning”-based information technologies can be deployed to generate convincing deepfake documents and videos, but it is already trivial to construct fake “tweets” and other forms of disinformation and then distribute these fakes into social media discussions. This will eventually require development of methods to differentiate fake from real documents, but until that time it will continue to be “viewer beware” as chaos agents and disruptors generate and distribute synthetic disinformation via a wide range of methods.
- Controlled opposition, disruptors and chaos agents. Historically, these tactics involve a fake protest movement that is actually being led by government agents- otherwise known as false-flag operations. Nearly all governments in history have employed this technique to trick and subdue their adversaries- going back at least as far as Sun-tzu and his classic monograph titled “The Art of War”. However, in 5th-Gen warfare, controlled opposition often may come in the form of disruptors and chaos agents. Either “real” people or bots that generate outrageous claims intended to delegitimize a movement (examples currently may (or may not be); “snake venom in the water” or “everyone is going to die who took the vaccine within two years”). Another tactic is the placement of agents of chaos (chaos agents) into key positions within otherwise legitimate organizations or “enablers” of protest movement leaders. The job of the chaos agents is to disrupt organizations and events. This may also come in the form of “reporters” who assert fake or highly exaggerated news stories, and who most likely are funded by the opposition. “Undermine the order from the shadows " is the tactic here.
- Bad jacketing, cyberstalking, gang stalking, flash mob and Astro-turf organizations are common tools used by organizations or agents deploying 5th-gen warfare tactics and strategies.
- Mass surveillance, including “data fusion” operations which integrate social media, other cyber surveillance tools, and high resolution geospatial tracking and imaging technologies (such as cell phone and “gorgon stare” technologies).
- Open-source intelligence. Open-source intelligence (OSINT) is the collection and analysis of data gathered from open sources (covert and publicly) to produce actionable intelligence.
- Tracking surveillance software (such as COVID trackers and cell phone keyword searches).
- Commercially available social media analytics.
- The use of publicly available raw data and surveys to sway public opinion by use of memes, essays and social media posts.
- Grey and dark market data sets. A grey market or dark market data set is derived from the trading of information through distribution channels that are not authorized by the original manufacturer or trade mark proprietor.
- Commercially available Satellite / SA imagery
- Commercially available Electromagnetic intelligence
- Cryptographic backdoors. This is any method that allows an entity to bypass encryption and gain access to a system. Often these are placed purposefully but sometimes an unintentional “backdoor” can be located, allowing a system to be hacked.
- Open-source encryption/ DeFi (decentralized finance)
- Community technology. Community technology is the practice of synergizing the efforts of individuals, community technology centers and national organizations with federal policy initiatives. This may include the use of broadband, cell phones, information access, radio, education and economic development.
- Low-cost Radios that can escape normal surveillance techniques.
- Traditional protest tools combined with 5th-gen warfare. An example would be a large rally combined with social media tools to create synergy or opposition for a movement.
- The synergistic use of mixed media to build excitement or to create outrage.
- Decentralized leadership or leaderless movements that use the above technologies.
So, although the list is extensive, the truth is that only a subset of these tools are readily available to poorly resourced individuals and groups. However, these groups may compensate for the deficit by leveraging popularism.
The asymmetric warfare battlescape
Asymmetric warfare is a conflict in which the opponents' resources are uneven or not balanced. When it is the people against a government or governmental policy, the people may have numbers behind them, but typically fewer technology, financial, and physical assets (vehicles, kinetic weapons, intelligence gathering capabilities). Late 20th century (Viet Nam, for example) and the current 21st century (Taliban, Al-Qaeda et al) warfare clearly demonstrates that by coordinating their efforts, very effective asymmetric battlefield campaigns can be deployed by forces and organizations that confront more powerful opponents which otherwise have strategic and tactical advantages in terms of first through third-generation warfare technology.
The good news is that some of the most effective 5th-Gen warfare tools are the ones that cost the least. Decentralized and highly non-attributable psychological warfare and community synergy are two methods that can be utilized by individuals and groups to make a difference.
Another recent example of the use of 5th-Gen warfare in an asymmetric battlefield involves activists being able to shift the general narrative about COVID-19 vaccines to acknowledge that post-COVID vaccination myocarditis occurs in athletes and children. In this example, when a new case is identified, posts and media are shared both openly and via semi-private direct message to influencers. The information about the victim is spread and often goes viral throughout the world-wide web. These posts reach not only those who already believe that there is a problem, but those who are unaware of the myocarditis adverse events.
The counter strategy deployed by main stream media/big tech in response to this activity was swift. Their response included clamping down via censorship, shadow banning of posts, videos and influencers. Even direct messaging can be targeted by governments or big tech intent on controlling the narrative. There are examples of T-Mobile not forwarding DMs during the pandemic relating to messages contradicting the approved COVIDcrisis narrative. Unfortunately, at the operational heart of these anti-free speech policies we often find agents of the US government.
Astroturf organizations are fake grassroots-based citizen groups, non-profits or coalitions that are typically created by or funded by corporations, political interests, public relations firms or even the government. These are designed to create the impression of widespread support of a platform or position. These fake groups are used to mislead the public that there is widespread support for the views being promulgated.
The Epoch Times has recently published an article based on whistleblower evidence that the United States Government, Centers for Disease Control and Prevention, has used its congressionally-approved non-profit (called the CDC Foundation) to contract with at least one company to perform cyberstalking and gang stalking attacks (via astroturf organizations) on licensed physicians accused of spreading misinformation about COVID public health policies including genetic vaccines (“CDC Partners With ‘Social and Behavior Change’ Initiative to Silence Vaccine Hesitancy”, The Epoch Times, April 7, 2023 https://www.theepochtimes.com/cdc-partners-with-social-and-behavior-change-initiative-to-silence-vaccine-hesitancy_5175172.html). These attacks included getting physicians banned from social media platforms like Twitter, having physicians fired from their employment and convincing state and medical specialty boards to retract licenses and specialty certifications.
So now, according to the Epoch Times, we have the CDC Foundation, which receives funding from a wide range of donors including the likes of Merck, Pfizer, PayPal, Fidelity, Blackrock, the Imperial College of London, Emergent Biosolutions, the Robert Wood Johnson Foundation (as in J&J) and so many other major corporate and state donors, which has been funding Cyberstalking and “Gang Stalking” of licensed physicians. Cyberstalking is both a federal crime and a crime in many states. This article documents (via FOIA-ed emails) a large number of social media physician and scientist influencers involved in this project to cyberstalk and gang stalk physicians who spoke counter to the COVID narrative regarding pseudo-mRNA vaccines, mandates, lockdowns and masks.
Cyberstalking involves the use of technology (most often, the Internet!) to make someone else afraid or concerned about their safety. Generally speaking, this conduct is threatening or otherwise fear-inducing, involves an invasion of a person’s relative right to privacy, and manifests in repeated actions over time. Most of the time, those who cyberstalk use social media, Internet databases, search engines, and other online resources to intimidate, follow, and cause anxiety or terror to others. (From the “Cyberstalking Research Center)”
Gang Stalking is a form of Cyberstalking or Cyberbullying. Apparently, unproven accusations of physicians spreading “misinformation” were considered by the CDC Foundation sufficient for engaging in state-sponsored Cyberstalking. What does this weaponized term “misinformation” actually refer to? Misinformation in the context of current public health is defined as any speech which differs from the official statements of the World Health Organization or local health authorities (ergo CDC, FDA, NIH). So, any physician who says, writes or highlights opinions or information which differs from the (current) CDC position is defined as spreading misinformation. Disinformation is such speech which is provided for political purposes.
A tactic utilized by the World Economic forum (WEF) uses influencers and social media to exploit the non-scalable nature of the internet and social media. The WEF has enlisted almost 10,000 “global shapers” to help spread their messaging. The “global shapers” are a group of high-profile young people that volunteer for the WEF to share and create enthusiasm for the WEF agenda worldwide. This agenda includes visions for a new world order based on transnational corporations working together with the UN, effective climate change solutions through agenda 2030 and stakeholder capitalism. This messaging is particularly compelling to younger people, who view many of the global shapers as heroes. Understanding 5th-Gen warfare is critical is fighting effectively in this battlespace of minds, ideas and memes.
With a 5th-Gen warfare campaign, it is easy to get involved. Just follow the social media posts, news stories from alternative sources, trends and jump in! Anyone can play. Just be aware that a false flag operation often does more harm than good.
Because the US government (or WHO, or WEF) identifies and censors messaging content from alternative sources, the messages and keywords must change rapidly in asymmetric 5th-gen warfare. These actors enjoy a tactical advantage with their automated censoring and shadow banning apparatus. Therefore, it is often necessary to misspell words and phrases, or in the case of video, use slurring or blanking out words to get past the automated censors.
The focus on decentralized action, of a leaderless battlespace, effectively forces those that seek to advance and insert a false narrative into susceptible minds to play “whack-a-mole”. With many autonomous actors working in a decentralized fashion, there is no one target to attack. In this case, as one person is taken down, another rises. This is where being a “shape shifter” is adaptive. Be ready to change social media platforms, handles, email accounts, etc. This is how I survived and thrived when de-platformed from Twitter, Facebook and Linked-in and defamed by almost every single mainstream media corporation.
It can be helpful to keep a separate identity from your social media accounts. Use emails that aren’t tied to your personal affairs for social media.
But we also have to be smart. Which is to say don’t be stupid. For instance, don’t play that quiz game based on your name and date of birth, don’t respond to emails that need personal information, etc. No Nigerian Prince is going to send you millions of dollars. So, learn to recognize pfishing and other strategies employed by con artists as well as government affiliated entities and astroturf organizations.
Challenge authority when it is wrong. Don’t allow yourself to be bullied. Don’t give up, and don’t get depressed. Don’t get angry and don’t resort to ad hominems. (personal attacks).
We are fighting for now is not only medical freedom but for our individual sovereignty. For preventing ourselves and our children from becoming indentured servants to self-appointed centralized global masters of the Universe.
5th-gen warfare tools are just too seductive for large entities not to use. Do not expect these tactics to stop. The digital spying will continue to be relentless. Look up and learn about the “Pegasus” and “Pegasus II” spyware, and let yourself think through what that means to you in a practical sense, and how you chose to respond to these threats.
Our job is to understand the terrain, the tools and the tactics.
The term for 5th-Gen warfare is war. This is not a “nice” game, with rules that we all agree to. There are no rules in 5th-Gen warfare, only tactics and strategy. Nothing is “fair”, and your mind, thought and emotions are the battlefield.
That said, I chose to have a set of ethical boundaries for myself, and expect those that I work with to adhere to a similar moral code.
I stand by my ethics. I don’t lie. I don’t cheat and I don’t break the law. I seek to maintain personal integrity, and respect others, and act to heal and build community wherever I can. If I break these rules for myself, I will never be able to claim victory.
- This is a war for my mind, your mind, our children’s minds, and our collective minds.
- Stay true. Stay sovereign.
- Don’t be a victim. Be a 5th-Gen warrior for truth, and for the sake of our children, and for their children.
- Never forget, the Truth is like a Lion. Set it free, and let it defend itself.