When we understand how the Fourth Branch works [See all Previous Outlines], questions about our dysfunctional U.S. modern government are answered. Additionally, the motives and intentions of people inside the institutions start to reconcile. However, before completing the final outline, there is a structural understanding needed about the global intelligence apparatus.
On a global scale – the modern intelligence gathering networks are now dependent on data collection to execute their intelligence missions. In the digital age nations have been executing various methods to gather that data. Digital surveillance has replaced other methods of interception. Those surveillance efforts have resulted in a coalescing of regional data networks based on historic multi-national relationships.
We have a recent frame of reference for the “U.S. data collection network” within the NSA. Through the allied process the Five Eyes nations all rely on the NSA surveillance database (U.K, Australia, Canada, New Zealand and U.S.) The NSA database provides the digital baseline for intelligence operations in defense of our allies. The portals into the NSA database are essentially an assembly of allies in like-minded ideological connection to the United States.
Unfortunately, there have been some revelations about the NSA database being used to monitor our allies, like in the example of Germany and surveillance on Angela Merkel’s phone. As long as “the good guys” are operating honorably, allies of the United States can feel confident about having protection from the NSA surveillance of global digital data. We warn our friends if we detect something dangerous etc.
The U.S. has nodes on communication pipelines to intercept and extract data. We have also launched hundreds, perhaps thousands, of satellites to conduct surveillance and gather up data. All of this data is fed into the NSA database where it is monitored (presumably) as a national security mechanism, and in defense of our allies.
However, what about data collection or data networks that are outside the NSA database? What do our enemies do? The NSA database is just one intelligence operation of digital surveillance amid the entire world, and we do not allow access by adversaries we are monitoring. So what do they do? What do our allies do who might not trust the United States due to past inconsistencies, ie. the Middle-East?
The answers to those questions highlight other data collection networks. So a brief review of the major players is needed.
♦ CHINA – China operates their own database. They, like the NSA, scoop up data for their system. Like us, China launches satellites and deploys other electronic data collection methods to download into their database. This is why the issues of electronic devices manufactured in China becomes problematic. Part of the Chinese data collection system involves the use of spyware, hacking and extraction.
Issues with Chinese communication company Huawei take on an added dimension when you consider the goal of the Chinese government to conduct surveillance and assemble a network of data to compete with the United States via the NSA. Other Chinese methods of surveillance and data-collection are less subversive, as in the examples of TicTok and WeChat. These are Chinese social media companies that are scraping data just like the NSA scrapes data from Facebook, Twitter and other Silicon Valley tech companies. [ Remember, the Intelligence Branch is a public-private partnership. ]
♦ RUSSIA – It is very likely that Russia operates their own database. We know Russia launches satellites, just like China and the USA, for the same purposes. Russia is also very proficient at hacking into other databases and extracting information to store and utilize in their own network. The difference between the U.S., China and Russia is likely that Russia spends more time on the hacking aspect because they do not generate actual technology systems as rapidly as the U.S. and China.
The most recent database creation is an outcome of an ally having to take action because they cannot rely on the ideology of the United States remaining consistent as the administrations ping-pong based on ideology….
♦ SAUDI ARABIA – Yes, in 2016 we discovered that Saudi Arabia was now operating their own intelligence data-gathering operation. It would make sense, given the nature of the middle-east and the constant fluctuations in political support from the United States. It is a lesson the allied Arab community and Gulf Cooperation Council learned quickly when President Obama went to Cairo in 2009 and launched the Islamist Spring (Arab Spring) upon them.
I have no doubt the creation of the Saudi intelligence network was specifically because the Obama administration started supporting radical Islamists within the Muslim Brotherhood, and threw fuel on the fires of extremism all over the Arab world.
Think about it., What would you do if you were Saudi Arabia, Egypt, Bahrain, Kuwait, the UAE, Jordan, Oman or Yemen and you knew the United States could just trigger an internal uprising of al-Qaeda, ISIS and the political arm of the Muslim Brotherhood to seek your destruction?
Without a doubt, those urgent lessons from 2009, 2010, 2011 triggered the formation of the Arab Intelligence Network as a network to defend itself with consistency. They assembled the network and activated it in 2017 as pictured above.
♦ Israel – Along a similar outlook to the Arab network, no doubt Israel operates an independent data collection system as a method of protecting itself from ever-changing U.S. politics amid a region that is extremely hostile to its very existence. Like the others, Israel launches proprietary satellites, and we can be sure they use covert methods to gather electronic data just like the U.S. and China.
As we have recently seen in the Pegasus story, Israel creates spyware programs that are able to track and monitor cell phone communications of targets. The spyware would not work unless Israel had access to some network where the phone meta-data was actually stored. So yeah, it makes sense for Israel to operate an independent intelligence database.
♦ Summary: As we understand the United States Intelligence Branch of government as the superseding entity that controls the internal politics of our nation, we also must consider that multiple nations have the same issue. There are major intelligence networks around the world beside the NSA “Five-Eyes” database. China, Russia, Saudi Arabia and Israel all operate proprietary databases deploying the same tools and techniques for assembly.
The geopolitical conflict that has always existed has now shifted into a digital battle-space. The Intelligence Agencies from these regions are now operating as the backbone of the government that uses them, and has become dependent on them. [<- Reread that].
Once you accept the digital-era intelligence apparatus of China, Russia, Saudi-Arabia, The United States and Israel, are now the primary national security mechanisms for stabilization of government; then you accept the importance of those intelligence operations.
Once you understand how foundational those modern intelligence operations have become for the stability and continuity of those governments…… then you begin to understand just how the United States intelligence community became more important than the government that created it.
What you have just read is the baseline for the next chapter in ¹our series of how the Intelligence Branch has become the superseding branch of the United States government. This foundational understanding also explains why traditional intelligence “oversight”, which was never structured to end up as subservient to the intelligence system it was intended to oversee, has become useless in controlling or restraining this Intelligence Branch.
Support CTH Here
¹The Intelligence Branch exists as a public-private partnership. Now, you also know why Google has targeted CTH. We will keep this website operational for as long as possible…. WHATEVER IT TAKES !
There’s nothing more Inflationary and Ineffective than a massive “Intelligence Community.”
If we take Inflation as the result of non-productive enterprises (or receivers) which add to the Demand but they don’t add to the Supply of useable goods; things become much more expensive.
Ineffectually – throughout the History of Western Civilization espionage was rightly disparaged (that’s why spies don’t have the rights of citizens and can be sent to places like GITMO, or in war they’re not covered under the Geneva Convention) because it creates an ever compounding exercise in futility. It’s the undeniable reality of social contacts and a limitless objective combined with a strategic mission incorporating highly suspect anything-goes philosophies such as “the enemy of my enemy is my friend” or “using double agents” (how do we know they’re not triple agents?). All of it operating in the shadows. Thus everything is in place for the “Intelligence” culture to inevitably become very corrupt and pervasive.
Also there’s the whole ballooning phenomena of the 10’ fence – 11’ ladder, 11’ fence – 12’ ladder, and so on. The whole thing has always been considered utterly ridiculous. Basically you have your society creating spies and not goods and services.
There’s only one valid reason for modern espionage. That’s to detect First Strike Nuclear Capability (or any other weapon of First Strike Total Destruction). All the rest is a complete farse, but it does make for a really good (and extremely zealous) political constituency. It’s zealous because it can be. Our Rights were trampled in its creation so it leverages that against anything which threatens its preservation.
All this stuff flows down hill as predictably as water into a pond, or should I say swamp.
As far as spying on us and their involvement in politics:
Of course they do, we make soft targets. They’re apprehensive to spy on other countries, other countries are full of the same assets. Also they need to be careful about the network, they’re all colleagues (like the international banking network). That’s part of the whole futility of Spy v. Spy and another of the many reasons why espionage was always looked down on until the Nuclear Age. There was only one valid reason for modern espionage. That was to detect First Strike Nuclear Capability.
Also, it’s impossible to have a large “Intelligence Community,” to many eyeballs and mouths. It’s more of a Public Relations Organization for the government. That explains them Leaking like a sieve. The whole thing’s ridiculous.
The NSA for instance was a pure 911 farse; since by far the most effective counter-terrorism measure that could have been implemented was to tighten immigration and travel visas, and not rely on foreign labor; that would be something concrete. Until you’ve done something concrete like that at the stratospheric level all the rest is nothing but a joke.
.
What is farcical is the whole of IC’s BELIEVING they are actually doing anything fruitful.
If TRUTH were their goal to discover, they would KNOW that they are merely pawns in a spiraling whirlwind, positioned to fade out after a few moments of what they, in their minds, term ‘excitement’ in their lives.
I grew up next to a very odd person who so wanted to be a spy. This person’s glee at ‘keeping secrets’ in order to hold some sort of hold over those who did not ‘know the secret’ was, in a word, SICK. And also, an atheist . . .
What an entity that strives to be All-Knowing, All-Powerful, and All-Present, is attempting to do, is to ‘be’ God.
God Help us.
So true about them trying to be all-knowing, all-powerful, and all-present. In fact, most (maybe all) of them belong to a secret society that teaches them that they will one day be gods. Go figure. And as far as people gleefully keeping secrets in order to have something over someone else, that’s part of the aforementioned secret society. I’ve also known some people like this, who expose themselves as sick puppies by gleefully keeping secrets for spite and power.
And then there is the Godzilla DOD which has a budget of $750 billion / year, more than the next 5 nations combined. And it does nothing to protect our southern border, although it excels at CRT and wokeness.
It is now the Trojan Horse for CRT and wokeness.
The IC Community is not beholden to US citizens.
Too much involvement with foreign agencies and “informants”.
The FBI must be downsized to include domestic activities only.
Trump Russia has proven FBI cannot manage this well.
Yes they are. . shut them down and they fracture into glass shards. Unable to work together, and simply become rogue spy’s.
Shut down or eliminated? Temporary shutdowns don’t work. It must be eliminated and not allowed to rise from the ashes. The DOJ and CIA need to go with the FBI. They aren’t doing anything to protect the American citizenry now any way. They are only protecting their own power, greed and thirst for control.
Israel is probably the best at this data gathering because their existence may depend on it. Plus, they have used it to attach bad actors already. It’s a two way street though. You play with them you hang with them.
The Intel groups didn’t do anything advanced to obtain information, instead they did something far more sinister…. They misled and purposefully miseducated ( and stupified) the American Public, so we’d think a phone was a phone, a tablet was a tablet, and a camera was just a camera.
4th amendment says effects. They are illegally dominating us cause we are dumbed down and we assisted them. Treason
There is a common core of technology source across at least: the US, China Inc., Israel and Europe (East and West). That common core is US Silicon Valley and US High Tech.
It was visible even in the 1980-90’s when I did the bulk of my overseas and EXPAT work and again in 2000-2005 when my employer rented me to IBM.
From at least the Clinton Administration and Forward, the start of the true “high tech digital age”, the US Government has been “influenced” to allow export agreements by US High Tech and has hidden allot more under classified INTEL Community budgets. Those agreements include: University Exchanges, Seats on Company Management Boards, Places in Company Research as well as export of manufacturing and development know how. The supporting off-set agreements allow for set-up of foreign subsidiaries across the globe.
The overarching description of the outcome of these agreements is the environment and operational situation described by SD.
The lines between different “national” INTEL Agencies and digital Big Tech across the globe are very blurry at best and likely no longer exist. The Big Money Puppet Masters are using this near integrated system as a prime source of control.
thedoc00 and RF. Do you know of tools to self encrypt and change it at your leisure ( not a service or a tool; something like a Linux for computers but for self encrypt.)
If we purchase a tool or service, the CIA just had to hack that Company. But if it’s personal done/made then the CIA has to hack all of us.
Where does NSA hide data it does not share with 5 Eyes and non-5 Eyes contras listed, above? Or with the US?
not sure if this is the exact site but certainly has the capacity…check out the NSA Storage Site in UT that went online about 5 years ago
It’s not that data is “hidden,” per se, from Five Eyes; it’s that data is compartmented so that some of it is releasable to certain designated parties and a great deal more is not releasable to any non-US party.
NSA is a “vacuum cleaner” of Signals Intelligence (SIGINT) and depending on source, collection method, analytics, etc., SIGINT has many different kinds of designations and restrictions placed on it. A TOP SECRET CODEWORD document just doesn’t go to everyone who has a TOP SECRET CODEWORD clearance — there are other compartmented restrictions that apply. So don’t get the idea that everything at NSA is being shared with everyone else — it’s not!
Likewise, most of NSA’s collection is never analyzed — there is just too much data collected for any group of analysts to properly digest and make sense of it all. Think about it, a combined arms military exercise takes place in Central Russia with 100,000+ troops participating and every conceivable collection method is employed to scoop up all the electronic/communications traffic that is happening during the exercise (this collection is on top of the regular collection assignments to meet national intelligence requirements). Massive amounts of communications traffic is collected for air-, land-, and possibly sea-based assets. It takes a lot of time and effort to assemble the pieces collected, read them all, analyze the seemingly disparate pieces, come to conclusions about the exercise, and report. Some of the reports will be “sanitized” for release to other agencies (possibly including foreign agencies) and other reports will be unsanitized for release to key US decision-makers (JCS and major commands). That’s the whole idea of compartmenting the intelligence and that’s why it’s so naive to think that NSA is just one big data shopping mall for just about any air-breather to use.
the problem with making assumptions about the most highly concealed obfuscated, classified secrets, is that
there is nothing you can depend on to make any assumptions.
it’s secrets…
it’s secret because the data and methods are highly valuable…it’s also secret in another way…as we have observed with evidence to prove it over the years…to hide embarrassing or illegal even criminal actions.
so when we discuss what we might think we know about anything related to Intel gathering, surveillance, and how a d by whom it is shared and conducted…it’s a good policy to consider the worst possible scenarios…because that IS the risk with secrets and secret police societies.
there has never been a single surveillance power or secret police state that did not abuse it’s own citizens… history shows us this truth…it’s too appealing and tempting to not cross the lines…
it also by the very nature of holding deep secrets, the most highly prized commodity that directly projects power and controll…far more valuable than money, votes, and relationships.
people that build these systems to collect data for the surveillance and mining operations understand how value their unique skill sets are…those that create the operations to target surveillance are even more valued…and lastly, that small group who design the operations TO USE THAT INTELLIGENCE as a power.
we can discuss generally, but it’s always proper to assume the worst case scenarios…that capabilities and case use does exceed the public facing rules are may have read here or there.
the US IC infrastructure is massively deep, with zero watchers actually guarding what paths it decides to take.
it’s like hiring someone much more intelligent and capable than you are…sounds good on paper… but what ultimately happens is you can’t even concieve or predict how that person will eventually exceed what you had in mind.
the IC. community is untouchable, because it’s designed that way…and it has very intelligent designed gate keepers to protect how it operates
I’m not qualified to make assertions about any individual in the photo above (the Arab leaders and President Trump with their hands on a lit-from-within-globe), but that photo has always bothered me.
Alternative angel, because your domestic surveillance system was corrupted.
Remember Vegas massacre? What alliance started the same second between America and the middle east ( bin Salman)
Where was PDJT suppose to be the night of the massacre
Every time I see that image I can’t help but think of the ORB in Woody Allen’s SLEEPER.
oh goodness; perfect comparison!
” modern intelligence operations have become for the stability and continuity of those governments”
Or, have they, the intelligence operations, stabilized and ensured their own continuity?
INTEL now focuses on their own continuity via providing their services to the most powerful bidder.
INTEL has to have a purpose to exist. The cooperation with the most powerful provide the purpose and reward.
Arrest the corrupt supreme Court judges, and get the 4th amendment case to it, and get EFFECTS stamped as it’s true definition, and end all legal loophole -tool surveillance
The Pentagon is tracking certain Internet searches including phrases like “the truth about Black Lives Matter.”
https://legalinsurrection.com/2021/07/pentagon-reportedly-tracking-web-searches-including-phrase-the-truth-about-black-lives-matter/
Sarah: You don’t need to search the internet to know the truth about BLM.
You shouldn’t have to not search the Internet either, just to mollify a bunch of brown-nosing, anal-retentive, cardboard cut-out career-worshipping generals, either. Or what the hell are we really fighting for?
Sir.
I am officially a Crazy Old Lady; I occasionally shout out “do you hear me google? You AND the feds ____!” Depending upon what I’m frustrated with at the moment. I know they are listening. When I really want to speak honestly, I leave my phone in the house and go for a walk or sit in the garden; away from any devices.
My kids have no idea about privacy from government.
Apropos of this incredible essay, here is another expose of the corrupt and incompetent FBI.
The one institution that’s responsible for most if not all the terror attacks on US soil.
https://www.frontpagemag.com/fpm/2021/07/how-fbi-failed-america-911-lloyd-billingsley/
YES. For one, the shooting at Marjorie Stoneman Douglas High School, IMO. Then there’s their extremely illegal watchlisting and targeting of innocent Americans via the fraudulent DHS-FBI fusion centers. They’ve ruined literally 1000s of lives, including mine! And it’s all based on lies, bullying, and falsified evidence. Tell me, who are the criminals here?
I felt safer before the Patriot Act was passed.
All Too Much: Because you were.
As Lord Action said, “Power corrupts and absolute power corrupts absolutely”.
But what about were some people are absolutely corrupt even before the get any power?
Yes, those people tend to go into politics or seek employment with the government.
Excellent!
We haven’t yet been able to stop voter fraud, how in the h*ll do we stop this?
Stop using their Intel surveillance downloading/obtaining tools
Thank you SD. The go ogle comment helps me understand the traffic variances on our site. Praying we don’t lose this. It is a Sanctuary for many.
.
The last refuge . . .
China also uses US politicians like Swallowell who is on the intelligence committee while having no intelligence and when he wants some poontang he does bang bang with a Chinese spy like Fang Fang.
To the inherent structural threats posed by the IC to anyone who opposes them must be added a key enabling factor. They are staffed almost monolithically with leftists.
All government jobs are patronage for the left. Not because of law, not because of tradition, but because the left seizes upon them and the GOP has never attempted to stop it with a simple law: government jobs must be staffed in proportion to the political demographics of the country.
Weaponized bureaucracies are only possible if everyone working within them knows with certainty that all their coworkers share their ideology. There are no white hats.
The IC can not be reformed. The only real solution is to abolish them. The risk of doing this is far less than the risk of keeping them. The IC is now the single greatest, single most hostile, and single most effective threat to the liberty and yes life itself of every conservative voter in America.
But remember, the CRT/woke DOD is in the bull pen getting warmed up if needed.
Five or more countries use it too.
We the People should grab control of IC away from bureaurocrats.
The comical side of “Operation Pegasus”, mentioned by SD, is that between 2009-2016 Comrade Obama spied on same EU Governments and Media, including their cell phones.
Not a single angry word or even raised eye-brow over that fact.
Kind of makes you think again about the distribution of the Obamaphones.
With all due respect to President Reagan, how could anyone argue that his biggest mistake wasn’t de-regulating the financial sector. Everybody knew what money was capable of doing in carving its own path and that it was the root of all evil (the most amazing thing about Trump was that he had no big blunders, he didn’t mess anything up).
You have the same thing with the intelligence community; a very very predictable chain of events (and we were all concerned with the Patriot Act the same way we were concerned about Financial De-Regulation).
The problem clearly becomes can you get the toothpaste back in the tube.
World Health, World Trade, etc., equals World Dominance through World Intelligence (Spying).
Thinking about the powerful American intelligence community, I had a few questions lately relating to areas of government I know a little bit about. Sundance noted in an earlier article that the FBI does the vetting for all security clearances. This even includes people at entry levels, for example in organizations like the State Department and Congressional staffers. It also includes defense contractor employees who need clearances. IDK whether it includes the military. Maybe they do their own clearances. However, bottom line is that the FBI has a great deal of control over who gets hired and who advances in the hierarchy.
The CIA competes with the State Department to get the attention of policy makers and shape foreign policy. Maybe the State Department is weak and feckless because the CIA likes it that way. Just their friends in the FBI making certain choices in who is or isn’t accepted into the Foreign Service would help shape the character of the State Department. There are other levers of power that could be used.
The CIA must also be competing with the military Special Forces. Very hush hush, but we know that the CIA has its own special or paramilitary forces and that they have masses of off the books funds to throw around. I wonder how this dynamic is affecting the integrity of the US military.
Homeland Security handles the clearances for FEMA contractors.
One way is to cut off their supply of money.And just where do they get a lot of that??????DRUGS.
Uh, until human trafficking became a bigger $$ biz. Drugs are so 20th century now…
There are so many cleared people in this country, it’s impossible to do a thorough job of background investigations. I don’t believe they’re all leftists. I just think many of these people keep their heads down and their mouths shut to keep their jobs.
The warning; “there can be no expectation of privacy” is a fair and accurate tip-off that any thing posted, downloaded, or purchased on the internet “will be” gathered by any agency or country or persons.
The flying under the radar concept means we fly a little lower.
Hug that terrain.
I’m a simple old man and don’t understand how all this digital-era intelligence apparatus works. I can email and text and that’s about it. What I can deduct from Sundance is that our Intelligence Community is not about protecting We The People but is about protecting the Intelligence Community itself! Not much different than Congress, the Uniparty or the deep state! We just no longer have representative government. The Constitutional representative Republic our brilliant Founders gave us no longer exists. Its all been dissolved before our very eyes the Constitution, the Congress and the Courts by mendacious acts of corruption! The country has been sold out to the highest bidder the ChiComs! I pray it’s not to late to restore our Republic! God help us! Hosanna!
Bubby: Your appreciate you wisdom.
Which is why you MUST fight for 2A.NEVER let them take away your fire-arms.NEVER.
Defund the 4th BOG!
So is the point SD is getting at something like, the intelligence agencies and their mission of data collection are a necessity because of the greater global geopolitical conflict in which other countries implement the same mission of pre-emptive data collection; each intelligence agency cannot simply cease operations, because their government would “fall behind” and be open to attack – as in the case of the “Arab Spring”.
So the intelligence agencies are self aware of their necessity, and consequently have no qualms about partaking in abuses of their systems for profit. Because, noting the above considerations, their mentality even if caught is simply “so what, you caught us abusing our power to make ourselves and our corporate friends hundreds of billions of $. What are you going to do about it? Get rid of us and leave your government and yourselves open to attack by all the other intelligence agencies? You need us, take the bad with the good and shut up.”
I guess we’ll find out for sure in the next part what SD is driving at.
I think it’s similar to saying all the cool kids at each highschool (country) partnered to be the global cool kids and submit each country and subvert each sovereignty thru treason.
If the 4thamendment word EFFECTS can be redefined, then so fcking can the 2nd amendment.
Your first amendment was tresspassed, we felt pain but stayed in place, our 4tg amendment was tresspassed with effects( phone , comp, cam , gps etc) and we slept through it via Terms of Service.
They global branch has tasted the blood of our first and fourth amendment, and are eye’ing our 2nd.
Good afternoon all. Testing my memory here back to the mid nineties. I was late to the whole home computer scene, getting an IMac as my first computer perhaps three or more years after they came out. I seem to recall that originally that if you had AOL, Yahoo, Etc. that you could only send an e-mail to someone on the same network. Only AOL to AOL etc. or only internally within a company. I was with FEDEX at the time. I remember at some point reading that a big hub was going to be built (Virginia?) that would allow e-mailing between the various platforms. Perhaps I’m misremembering but I swear I was thinking at the time that the “hub” was very close to the CIA.
Does anyone else recall any of this?
After eight, what must have seemed hellish years, of fighting the Islamist insurrections fomented by Obama under the direction of Valerie Jarrett, the Trump years must have come as a welcome respite. We witnessed the greatest outbreak of peace in the Middle East in those four short years than we have seen in decades prior. Well, back into the frying pan they go. Israel is certainly feeling lonely to the rational person over there. They have new allies now against a common enemy, however. Russia should be and perhaps one day will become a natural ally of the U.S. That leaves China and Iran basically as the primary threats to world peace and stability imho. And of course, the more common murderers and thieves and doers of wickedness which are easily handled in civilized societies. Ours is getting less civilized by the day, and that is by design.
FTA: “Once you understand how foundational those modern intelligence operations have become for the stability and continuity of those governments…… then you begin to understand just how the United States intelligence community became more important than the government that created it.”
And there’s the rub, the point at which it all runs off the rails.
An analogy recent enough for most of us to understand: during the darkest days of WWII America’s military regularly fought existential battles that could decide America’s fate. It would have been tempting to think of America’s military as having become more important than our civilian government. But that would have been an upside down assessment. No one but the most craven general or admiral would have dared voice such a thought.
Is the police officer more important than the citizen he or she protects? Is the doctor more important than the patient whose life he or she saves? Is the parent who instinctively sacrifices himself to save his child more important than the child?
Selflessness, service, sacrifice, and honor, all devoted to the cause of self-government, once were understood as pinnacles of American character. Sounds like some folks need to get their minds right in order to get their priorities right.
Those values are still out there.
The difficulty is that those very same values are often disparaged by the very organizations that need it most to be successful in the truest sense of the word, to say nothing of fulfilling their intended purposes to that end.
Those values are scarce where they are most needed precisely because they are not appreciated enough or accepted generally by the same.
I interpret that quote as the elected puppets work hard to keep the Intel alive, cause the Intel subverted their own country and ” installed” the puppets to support them to keep the continuity of intelgovernment
How do you control a huge organization that has virtually unlimited resources, operates in utmost secrecy, specializes in surveillance, espionage, sabotage and assassination, and can relatively easy destroy your career and/or make you… ahem… cease to exist?
Old breaches only now revealed. Imagine how much hasn’t been revealed about Chinese hacking… because it’s always “The Russians,” a country with a GDP less than Texas or California, and never the Chicoms. Why? Because the Russians don’t own “our” pols via corporate lobbyists like the Chicoms do.
Chinese state hackers breached over a dozen US pipeline operators
21 Jul 2021
https://www.bleepingcomputer.com/news/security/chinese-state-hackers-breached-over-a-dozen-us-pipeline-operators/
Chinese state-sponsored attackers have breached 13 US oil and natural gas (ONG) pipeline companies between December 2011 to 2013 following a spear-phishing campaign targeting their employees.
The end goal of the attacks was to help China develop cyberattack capabilities that would allow future intrusions to physically damage targeted pipelines or disrupt US pipeline operations.
This was revealed Tuesday in a joint advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI).
“Overall, the US Government identified and tracked 23 US natural gas pipeline operators targeted from 2011 to 2013 in this spearphishing and intrusion campaign. Of the known targeted entities, 13 were confirmed compromises, 3 were near misses, and 7 had an unknown depth of intrusion,” the advisory reads.
I wonder what will happen in Space Force as far as intelligence gathering is concerned?
Space Force could be scary…
The FBI has already boldly gone where no intelligence agency has gone before 🙂
I’d assume it’s monitoring musk and bezos placed satellites in low Earth orbit.
Those are their private tools to be outside of our digital cage 4th branch.
The 4th branch is committing treason and creating our digital cage.
5g fence post, chip tracking (phone, card, car); population subservience vitals checked daily.
Your phone can create a 3d image of your room.
WikiLeaks didn’t release shit. Look closer.
I assume Biden is transferring our secrets to China as fast as his little rickshaw will carry them.
agree 1000%
in exchange for his Vichy status.
“REAL TRUTH: THE SYSYEM IS OUT OF ANYONE’S CONTROL — A FORMLESS AND SHAPELESS PARASITIC MONSTER
It began with technic, rose in the cool fire of cinema and television, blossomed with ‘zero-tolerance’ school policies, cable TV, internet, & video games, and took on a life of its own in the age of big data, social media, ubiquitous devices, and mass surveillance.
Thoughtless and lazy ‘Zero-tolerance’ compliance methodology implemented 20 years ago supposedly to help prevent bullying has grown alongside the kindergarteners it was first designed for — its intellectually irresponsible bureaucratic mindlessness has spread across all of society, infecting institutions everywhere with brain-dead paternalism, ironically turning adults into zombie-like idiots with childish response patterns and transforming organizations large and small into illogical & petty policy tyrants and merciless bullies.
The modern psychopaths who profit most from this transformation by jockeying for position to benefit from proximity to the energy of the process, also accelerate it — using decades of accumulated research, machine learning, ‘big data’, and pervasive surveillance to individualize propaganda to maximally target each recipient’s own psychological profile and personal interests, individually arrange timing and placement for maximum behavioral impact, while censoring and squelching opposition viewpoints, often without the victims even realizing it — all at mass scale.
Those who are in a position to put a stop to it are eliminated by control mechanisms like licensing, professionalism standards, and classification access, repurposed to weed out men with honor & integrity and replace them with those who will betray their sworn oaths or abrogate their responsibilities out of cowardice, fear, conformism, and careerism, and allow unsupported theory to supplant science, rhetoric to replace reason, emotion to override objectivity, and administrative guidelines to determine actions instead of evidence.
Mankind’s institutions and organizations are thus taken over through instruments of financialization, monopolization, perverse incentives, state security agents, cycles of big government spending, special interests funding, and regulatory capture — and citizen complacency.
An important factor in creating the demoralization of self-worth and perceived self-competency is the undermining transhumanist effects of technology-regulated biofeedback loops, ‘dependency-injection’, ‘nudging’, privacy destruction, and cognitive degradation, resulting from human beings essentially ‘implanting’ a networking device onto their person at all times (‘smart’ phones).
This ‘cyborg-like’ attachment has the effect of outsourcing a part of the victim’s identity and thought processes — and thus autonomy — into a connected node of a greater invisible swarming multiagent system, while the victim simultaneously underestimates the power that the external system will influence directly back upon her.
Surveillance capitalism, natsec exploitation, and political corruption have fueled the tech/surveillance ‘monster’, provided it with compartmentalized insulation, and delivered lifecycle processes to enable growth, evolution, and attachment to our ‘body politic’.
Now it has subsumed our markets, our culture, and our governments, transforming our institutions and even human beings themselves into little more than network processing nodes, data input sources, and slaved physical domain control instruments, and turned society into its own power infrastructure and digestion system with security and defense mechanisms to maintain its access to energy currency for processing and growth.
Instead of a ‘superhuman-like’ artificial intelligence, we have been overtaken by a parasitic, swarm hive-mind ‘intelligence’ to which humans and their institutions unwittingly serve as physical instruments; a multiagent system that we are dependent upon, cannot extricate ourselves from, and cannot shut down.”
From patriots.win
Wow. Fascinating piece.
The Matrix is here.
One world government needs one world intelligence apparatus. Is the Five Eyes actually limited, or are there numerous back channels to connect the players? Remember when NK hacked Sony Pictures? We knew it was them because our guys were looking at the same screens as their guys. Radcliffe stated that our IC knew the election was hacked by the CCP, but it was kept under wraps for political reasons. If China is in the WTO, ostensibly to make them more westernized (aka globalized), why wouldn’t they be part of the big eye network?
A: No way. For China to be a part of Five Eyes, they would have to co-opt our entire political class, cause the entire American government to be run for their benefit, infiltrate all our weapons labs and universities and install a sleepy agent in the White House.
Yeah, until they take over our economy and co-opt our manufacturing sector, we have nothing to worry about.
Would it be possible for Gen Flynn to be giving the IC a taste of their own medicine thru Pegasus? I recently viewed a PDF on Telegram… Public Financial Disclosure OGE Form 237e.. Looks like GF sat on the board of OSY (Pegasus) from 5/16 to 1/2017. There are good reasons why he may have sat on the board at OSY… if this is real… Maybe the legacy press is trying to get in front of a much bigger story again… According to GWP.. there are a lot of unanswered questions that the press seems to not know.. See below links to GWP and link to the OGE Form posted on Telegram.. GF knows where the bodies are buried… but perhaps he has more than just knowledge?
https://www.thegatewaypundit.com/2021/07/hey-msm-democrat-surveillance-abuse-us-way-worse-hungary-care/
https://t.me/CodeMonkeyZ/831
It is all so vulnerable. A Carrington event and poof.
I just looked that one up. I had never heard of that 1859 event before.
Absolutely fascinating. Thanks.
“The digital media environment is a space that is configuring itself in real time based on how the algorithms think we will react.
They are sorting us into caricatured, machine-language oversimplifications of ourselves. This is why we saw so much extremism emerge over the past decade.
We are increasingly encouraged to identify ourselves by our algorithmically determined ideological profiles alone, and to accept a platform’s arbitrary, profit-driven segmentation as a reflection of our deepest, tribal affiliations.
Since 2016, we have summoned demons to embody and represent these artificially generated worldviews”
Douglas Rushkoff writing in The Guardian
“This new power is the spawn of an unprecedented convergence: the surveillance and actuation capabilities of of Big Other in combination with the discovery and monetization of behavioral surplus. It is only in the context of this convergence that we can imagine economic principles that instrumentalize and control human experience to systematically and predictably shape behavior toward others’ profitable ends.
Instrumentarian power operates from the vantage point of the Other-One to reduce human persons to the mere animal condition of behavior shorn of reflective meaning. It sees only organisms bent to serve the new laws of capital now imposed on all behavior.
Arendt anticipated the destructive potential of behaviorism decades ago when she lamented the devolution of our conception of “thought” to something that is accomplished by a “brain” and is therefore transferable to “electronic instruments”:
The last stage of the laboring society, the society of jobholders, demands of its members a sheer automatic functioning, as though individual life had actually been submerged in the over-all life process of the species and the only active decision still required of the individual were to let go, so to speak, to abandon his individuality, the still individually sensed pain and trouble of living, and acquiesce in a dazed, “tranquilized,” functional type of behavior.
The trouble with modern theories of behaviorism is not that they are wrong but that they could become true, that they actually are the best possible conceptualization of certain obvious trends in modern society. It is quite conceivable that the modern age – which began with such an unprecedented and promising outburst of human activity – may end in the deadliest, most sterile passivity history has ever known.
Is this to be our home: the automation of the self as the necessary condition of the automation of society, and all for the sake of others’ guaranteed outcomes.”
Shoshana Zuboff, The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Google and Facebook grew exponentially starting around 2007. Did they gain this power by being extensions of the intelligence apparatus?
Sooooo, wishing for a Carrington Event – could be a good thing? Get a true global re-set? Like, tell God your plans and God laughs type of event, take all those digital libraries back to a nice big fat zero event???
Bessie, if that happens on our side of the globe… 70-80% of us could be dead within one year.
Careful what you wish for.
I don’t know, yes, a terrible event, and yes, careful what to wish for, but I kind of remember humanity has been around a lot longer than our novel use of electricity so think that 70-80% number is a tad too high;
it would what, take civilization the world over back what, 100-150 years at most. That would certainly be better than the dystopian future so many here are entertaining.
If we’ve gotten that soft in this country, we got bigger problems to worry about than having some anonymous bureaucrat sitting at a computer screen bored out of their mind so figure why not mess with some people’s computer today for kicks.
We’re outgunned.
Incorrect
We’re out motivated.
CTH,. This supports your China assessment. In 2012-2016, our entire electronic device usage was HARDWARE MANUFACTURED DURING ASSEMBLY to open the device for hack entry.
All gov equip. All
https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies
It is rumored that the CIA was involved in JFK’s assassination. That would have emboldened the CIA. The Internet emerged a few years later.
Operation Assured Voice/Operation Assured Voice-Africa:
Operation Assured voice began in EUCOM, the US European Command. It was an overarching information operations program that was designed to shape all activities in both EUCOM and AFRICOMS areas of responsibility. The objectives were to counter the ideology, propaganda and recruitment efforts of “violent extremist organizations”..[.is this sounding familiar to you, because I swear I am experiencing Déjà vu….]
Operation Assured Voice sought to harness all available knowledge, expertise, and resources to enable the conduct of: Synchronized, coordinated actions and activities to counter violent extremist organization influence; support to US public diplomacy efforts; and measurement of the operation’s overall effectiveness to better direct future activities. Operations were conducted in cooperation with private industry and other US government agencies, such as the Department of State.
In 2009, when Obozo took over the reins of oval office, control of Operation Assured Voice was transferred in totality to AFRICOM where the project was renamed Operation Objective Voice – Africa.
Operation Assured Voice was created as a result of George W’s policy after the 9/11 attack and I’m fairly convinced that in the years leading up to Obozo’s election, the “handbook” used to foment the Islamic Arab Spring and the Capitol Hill “riots” was developed under the direction of the 4th branch of government employing Operation Objective Voice.
Looking forward to reading the next chapter in the series.
Domestic terrorist or exhibitionist jokster?
You decide.
Whomever that person’s lawyer is, would be smart to show that photo in comparison to the mob trying to burn down the Church not too far from the White House and ask the jury – which is the insurrectionist, which is the peaceful protestor?
I just noticed sonething about our Five Eyes partners: They’re pretty much the world leaders in COVID totalitarianism. And while I’m not familiar with the leader in Oz, the others are idiots I wouldn’t trust further than I could throw them
Man has been here before……..Nazi Germany for example.
Where some saw what was coming, saw through the lies, and tried to warn people…..
The young university students who published the “White Rose” pamphlets at great personal risk to themselves
to try to warn their fellow Germans…..
“Therefore every individual, conscious of his responsibility as a member of Christian and Western civilization,
must defend himself against the scourges of mankind, against fascism and any similar system of totalitarianism.
Offer passive resistance – resistance – wherever you may be,
forestall the spread of this atheistic war machine before it is too late,
before the last cities, like Cologne, have been reduced to rubble,
and before the nation’s last young man has given his blood on some battlefield for the hubris of a sub-human.
Do not forget that every people deserves the regime it is willing to endure.” from Pamphlet #1
It cost several of them their lives –trying to open the eyes of their countrymen…..Let us Pray we never reach that point.
Thank you SD and CTH for all you do to open eyes……….
And the steady march continues toward Armageddon…
The Antifa/FBI Coalition – American Thinker
“The FBI and the Capitol Police knew in advance that the demonstration would turn violent.
Yet the head of the FBI’s Washington Field Office, Steven D’Antuono, told reporters that the agency did not have any intelligence suggesting the Trump rally would not be peaceful.
During Senate testimony, Senator Amy Klobuchar suggested that the FBI had not infiltrated these groups. She asked Christopher Wray, “There must be moments where you think if we would have known, if we could have infiltrated this group or found out what they were doing, and that — you have those moments?” Wray did not correct her. The knowledge that there would be violence was based partially on a document acquired by the Norfolk FBI. It asserted, “Be ready to fight. Congress needs to hear glass breaking, doors being kicked in, and blood from their BLM and Pantifa slave soldiers being spilled. Get violent. Stop calling this a march, or rally, or a protest. Go there ready for war. We get our President or we die. NOTHING else will achieve this goal.”
The FBI does not reveal the source of this document. Was it really the work of a Trump supporter?”
Yes. If Chris Wray is a Trump supporter.
The funny thing is, all of Washington knows what we know.
That the Uni-Party Swamp stole the Election from us, including the presidency, the Senate and many others.
That the FBI, Pelosi, Antifa and rogue Capitol Police set a trap to frame us.
That Donald Trump is the true president and Biden is a child-toucher and China whore.
The only game is to keep those facts from the larger public. And they’re losing that game. Badly.
We need a “go deep” On the google has targeted CTH part
When you create an organization like the CIA with billions of unaccountable dollars provided to them year over year, decade over decade. Then with little effort you can find far to many companies owned by the CIA within the border of the U.S. and those they do not own are under their direct influence, like Google.
Some IC organizations have outgrown their value to the American People. JFK, tried to save the CIA as you know, he called for it to be broken up, into a thousand pieces. Like a tumor that has grown to large since then, it must be removed.
i agree.
it simply comes down to who has oversight – no one, or We the People.
Like the drug addict that has become to dependent upon their dealer, they must be separated from their source if the body is to survive. So it can be said for the citizens of the world, they must be separated from their dealers the global banks, corrupt politicians.. If they are to live in peace. The Intelligence Agencies are the enforcement arm of the World Order.