The background story behind Jack’s Magic Coffee Shop takes an interesting twist today, as a whistleblower deep inside the Twitter technology side of the platform begins to outline what CNN calls, “a threat to its own users’ personal information, to company shareholders, to national security, and to democracy.”
This discussion is where it becomes critical to remember the nature of stakeholders in media.
CNN is the national media firm protecting the interests of the U.S. State Dept. The Washington Post is the national media firm protecting the interests of the U.S. intelligence apparatus. The latest Twitter whistleblower information originates in,.. wait for it… “an explosive whistleblower disclosure obtained exclusively by CNN and The Washington Post.”
The whistleblower is a former technology expert who came from within the research farm of DARPA, the Defense Advanced Research Projects Agency. Peiter “Mudge” Zatko, is a well-known cybersecurity expert who left government work, entered the public world, and eventually became the head of Twitter security, reporting directly to the CEO.
Peiter “Mudge” Zatko is now saying the background technology of Twitter is vulnerable to manipulation. I’m not going to go into the granules of what Mudge is outlining, instead I prefer to focus on the bigger picture, a scenario we have been outlining for quite a while that could, emphasize *could*, become very explosive, especially considering the legal challenges between the social media platform and Elon Musk.
The nub of the bigger story is essentially that the database of Twitter, and likely other social media platforms, is integrated with the U.S. intelligence system. The database of Twitter is not necessarily vulnerable to hacking by outside entities, although that is the framework used by media reporting this whistleblower issue.
The bigger risk to the surveillance state is discovery that Twitter and the U.S. intelligence community are in a public-private partnership. The Dept of Homeland Security has access by design, not flaw. How the stakeholder media are reporting on the issue shows the nature of the risk, (emphasis mine):
[…] The scathing disclosure, which totals around 200 pages, including supporting exhibits — was sent last month to a number of US government agencies and congressional committees, including the Securities and Exchange Commission, the Federal Trade Commission and the Department of Justice. The existence and details of the disclosure have not previously been reported. CNN obtained a copy of the disclosure from a senior Democratic aide on Capitol Hill. The SEC, DOJ and FTC declined to comment; the Senate Intelligence Committee, which received a copy of the report, is taking the disclosure seriously and is setting a meeting to discuss the allegations, according to Rachel Cohen, a committee spokesperson. (link)
How would it damage the U.S. government if previous claims about the Chinese government having access to all user data on TikTok, are shown to be exactly identical to the U.S. government having access to all user data on Twitter?
Let that question settle in for a few moments, because that is exactly what I have been alleging since, well, 2011, when the U.S. State Dept first collaborated with Twitter in a joint public-private partnership to use the platform as a communication tool exploiting the Arab Spring uprising in Egypt, Libya and beyond.
The issue of Jack’s Magic Coffee Shop is an issue of financial viability. The business model of Twitter just doesn’t exist as a free social media discussion platform while running the ultra-expensive data processing system needed for millions of simultaneous users. A global chat that requires exponential database responses as an outcome of simultaneous users is just ridiculously expensive. {Go Deep} However, if the computing system and massive database were being subsidized by the U.S. government, then the viability of the ‘free coffee‘ business model makes sense.
“Cloud computing is one of the core components of the strategy to help the IC discover, access and share critical information in an era of seemingly infinite data.” … “A test scenario described by GAO in its June 2013 bid protest opinion suggests the CIA sought to compare how the solutions presented by IBM and Amazon Web Services (AWS) could crunch massive data sets, commonly referred to as big data.” … “Solutions had to provide a “hosting environment for applications which process vast amounts of information in parallel on large clusters (thousands of nodes) of commodity hardware” using a platform called MapReduce. Through MapReduce, clusters were provisioned for computation and segmentation. Test runs assumed clusters were large enough to process 100 terabytes of raw input data. AWS’ solution received superior marks from CIA procurement officials”… (MORE)
♦ Legal Stuff – The issue of American citizen privacy and U.S. constitutional limits against the government listening in on communication is functionally obsolescent. The Foreign Intelligence Surveillance Act (FISA) prohibits communication intercepts on U.S. citizens without a valid search warrant. However, if a U.S. citizen is engaged in a conversation with a foreign person, all privacy restrictions are essentially gone. [Insert example of Michael Flynn taking to Russian Ambassador Sergey Kislyak here]
Your phone calls can be intercepted by the government from the foreign side of the call. The govt can freely monitor the calls that involve foreign actors. The only rule is that your privacy must be maintained. If the foreign actor is in communication with a U.S. citizen, the U.S. citizen must be “minimized” or not identified in any intercept.
However, what happens when the phone call is on a community line that is connected, and visible, to the entire world? That’s the benefit of social media monitoring from a surveillance perspective. It is from that opaque and unresolved archaic legal perspective that surveillance authority of social media platforms, by the U.S. intelligence community, exists. Now you see why the SSCI is taking an interest in the Twitter whistleblower, classic risk mitigation.
Hopefully, you can also see why the 200-page whistleblower document was leaked, by a Democrat staffer, to the Washington Post and CNN.
CNN defends the equity interests of the U.S. State Dept., and WaPo defend the Intelligence Community (CIA, DHS, etc).
Within the narrative as constructed you will note, “Zatko further alleges that Twitter’s leadership has misled its own board and government regulators about its security vulnerabilities, including some that could allegedly open the door to foreign spying or manipulation, hacking and disinformation campaigns.”
If the relationship between Twitter and the U.S. intelligence community is a public-private partnership, why would Twitter want to shut down the portals given to the Dept of Homeland Security?
Answer, they wouldn’t… Ergo the response from Twitter to the whistleblower complaint is (emphasis mine), “What we’ve seen so far is a false narrative about Twitter and our privacy and data security practices that is riddled with inconsistencies and inaccuracies and lacks important context.”
Put another way, the “lacks important context” is the nature of the security risk, which is structural to the relationship between the intelligence community and the platform. See how that works?
The integration between Twitter and the United States Intelligence Community has been hiding in plain sight:
July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.
Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.
Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.
The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (more)
A shared hashing protocol is a form of data system integration. The databases of the identified social media platforms are integrated with the U.S. intelligence system.
So, what is the angle here? Peiter/CNN’s objective is to support Musk‘s part of the legal argument. That support helps Elon Musk exit from Twitter deal. That exit allows Twitter/IC to return to surveillance operations and intel gathering with exposure risk removed. That’s Peiter’s objective.
I shall leave on a happy note, which highlights the nature of the risk:
After this article was initially published, Alex Spiro, an attorney for Musk, told CNN, “We have already issued a subpoena for Mr. Zatko, and we found his exit and that of other key employees curious in light of what we have been finding.” (LINK)
Hello, fellas…
.
Now, for the pantomime, and to showcase the need for extreme control by the narrative engineers. Notice how the directors of the CNN segment use alternative actors to shape the context of what Mr. Peiter “Mudge” Zatko is saying. This is classic intelligence community media tradecraft.
Notice what is expressly attributed to Mudge in his own words, versus what is implied toward Mudge from alternative voices and faces that appear. Once you see the strings on the marionettes, you can never return to that moment in the performance when you did not see them. WATCH:
So many fake accounts pushing opinions one direction or another, I’m so glad it’s finally getting talked about
New-York – you’ve still got time !
New York polls open from: 6am – 9pm
Endorsement – Nicole Malliotakis
So every person removed from Twitter is in effect removed by our government…in violation of our first amendment of free speech.
I wonder what a class action lawsuit brought by a coalition of banned users would do toward shining even more light onto this issue.
You mean like President Trump?
Alex Berens0n likely has the best chance of winning a suit like this since he has evidence of the White House contacting Twitter to have him banned.
Find a Constitutional-minded MAGA attorney to do it pro bono with a public donation fund set up to finance it. I’d would donate in a skinny minute.
That’s (a Class Action) already happening — Jeff Landry AG Lousiana on American Thought Leaders:
https://link.theepochtimes.com/mkt_app/this-is-the-government-colluding-with-big-tech-ag-jeff-landry-on-the-first-amendment-lawsuits-hes-leading_4632683.html
Yup! Our elite leadership thinks democracy is a threat to democracy.
It really does come down to that, doesn’t it? But the whacko Left is blind to it!
The accounts are still there. Sometimes I’ll click on a twitter link at work and it will bring up my suspended account page.
I asked them to delete my account after they cancelled me. Seems like they did.
Alex Berenson says the WH asked Twitter to remove his posts
Alex Berenson: White House Demanded Twitter ‘Kick Him Off Platform’
https://www.nationandstate.com/2022/08/13/alex-berenson-white-house-demanded-twitter-kick-him-off-platform/
And our congressional representatives will do nothing about it.
The entire construct of our Constitution nulled by our own government and they LAUGH among themselves while sipping drinks on our dime.
El Rushbo always called Twitter a cess pool.
99.7% right.
Sure could use him now.
Yet look how many self-described conservative patriots apparently cannot just stop supporting our enemies by continuing to use it.
The addiction is strong.
“Twitter, and likely other social media platforms, is integrated with the U.S. intelligence system. The database of Twitter is not necessarily vulnerable to hacking by outside entities, although that is the framework used by media reporting this whistleblower issue.”
The US Intelligence System IS an outside entity. It is foreign to everything we recognize as American.
And it will not stand, Praise God!
I’d ‘like’ this, but I don’t want my neighbors disturbed at 6am by a SWAT caravan.
I don’t care if mine are woken up…so I “liked” it!
Allow me to do it for you.
Come on Mrs. Jones, we are all on the “Watch List.”
Me and Mrs Jones
We got a thing going on
We both know that it’s wrong
But it’s much too strong…
Billy Paul 1973
So many things in this country are just downright depressing. Glad I got 60 good years out of it.
Every year growing up we celebrated Independence Day delighted at what we believed was a free and liberty loving exceptional nation. Now I’m depressed for being so gullible and naïve. I’m now thinking that Washington’s term in office was probably the only one in our history that was like what we believed.
Feeling ya, Zo. That red pill…
You/We got your sixty years of being able to enjoy life because patriots who came before you gave their blood sweat and lives. Now is our time to stand up and do what needs to be done. Whatever it is that you can do, do it. America is in the position it is in because Americans became fat lazy and complacent, and allowed sick evil people to corrupt every institution that made this country great. Do you understand that?
I’m not just talking to you, and apologize if I’m coming off as harsh.
Take a stand, joint a march, talk to as many people as you are able and inform them to the realities you have come to accept as truth. Unbearably sad, hard to contemplate truths. We stand close to a time when we could lose everything we have come to accept as being an American. All of it could be gone, so before you decide to pack it in and thank God for the time you’ve had, think off all the millions of people around the world who have never for one instant felt the kind of hope for the future that we once had. That could be our reality as well, and it could be here in the blink of an eye.
Excellent and echoes many similar posts I have made but apparently a very great many who call themselves “patriots” can not even be slightly inconvenienced, much less actually DO something to help push back, even if as easy and simple as being a poll watcher or being one of the pitiful few who ever attend local government meeting or hearings.
Twits Got caught with their pants down.
Yeah, how did Musk’s stock accumulations just scoot by?
United Nations Recruited Over 100,000 ‘Digital First Responders’ to Push Establishment COVID Narrative
https://www.globalresearch.ca/united-nations-recruited-over-100000-digital-first-responders-push-establishment-covid-narrative/5790860
WEF Hires Millions of ‘Info Warriors’ To Delete the Internet of Alternative Views
https://newspunch.com/wef-hires-millions-of-info-warriors-to-delete-the-internet-of-alternative-views/
An army of psyops operatives.
Warfare over your minds.
You will love Big Brother before the end, Comrade. /s
Herein lies the problem. WHO exactly is the puppeteer? A true traitorous conspiracy.
Pretty sure Klaus Schwab knows.
And he likely is on a first name basis with whomever that is.
Derp State.
Strongly suspect substantial Chinese influence, they’ll want their money’s worth after all, but they could be hiding behind their WEF suicide puppets . . .
We’re gonna need a bigger asteroid.
PRC is just another player in the game and they are not happy about it
the old world power elite as always…they construct organizations and structure to shield themselves from direct discovery but they are the “man behind the curtain”
And we helped fund it with our tax $$
The CNN reporters literally shaped this as a hacking concern and that the employees have too much control over the platform instead of the language from Mudge, where he is describing something much more sinister. Will we ever be privy to his report without a CNN filter?
Of course.
Right here.
Take out social media and you give the corporatist “grea4t reset” WEF crowd a mortal wound. And they know it.
Or merely stop supporting it by continuing to even use it. Very few here and elsewhere appear able to resist the addictive pull though.
So much damage has been done. I wonder if those responsible will be held accountable.
Granny said “don’t hold your breath”
The number of people who need to be held accountable is in the tens of thousands, if not the hundreds of thousands, just in this country.
How about millions who keep using these platforms of our mortal enemies. Such accountability begins with “us.”
Obviously very few here and elsewhere are willing to be honest and admit it.
Is this why the Twitter management owns no stock in twitter? They knew that it could go down the drain if sunlight ever hit it.
Frankly, Twitter ‘stock’ is not really stock, IMHO.
seems like there’s a lawsuit in here somewhere…
Hush money?
Yup, they knew their numbers were all fudged and that it could never be a profitable company.
What’s sad is many Americans don’t think it’s a problem the government is spying on them.
Just go and ask people, they will say they haven’t done anything wrong.
Because no one knows history.
And not taught in schools…and that generation, now is ‘uninformed’….along with being way too far separated by time, from the leaked horrors of the Soviet Union.
They are getting their first lesson right now.
Comment of the month.
WSB: This is a big part of the problem.
Those who do know history are dismissed as “conspiracy theorists”
Prob the same 30% who approve of Biden presidency. No worries!
Trump didn’t do nuffin either.
They think the govt is keeping them safe..look how many people bought into the co vid lie??
The Swamp is wide & deep!
Nothing our corrupt government does comes as a surprise anymore (sigh).
It’s 7:25 CDT & Dan Crenshaw is still a booger-eating-moron!
So Big Brother gets bigger with every Sundance post! What isn’t the IC using to spy on us We The People or control what we can see, know or talk about? How is all this Constitutional? How can we end it?
Well, for starters, do NOT purchase a Roomba.
Or LED lightbulbs.
You are not kidding.
Big Brother Surveillance State has long been a threat to our way our way of life, but I certainly didn’t expect that the overwhelming majority of people would gleefully sign up for it.
Puke
This is deep state saying “here is your free pass Elon, you are out, we will pick up the pieces and keep our totalitarian toy.”
However, let me simply say to all of this that: “this is why I have never used ‘social media.'” And I never will. Even in the nascent days of “IRC = Internet Relay Chat” from which Twitter, in particular, developed, I spent no time “chatting.”
Today, I personally believe that these “mega-social media companies” have actually developed their “empires” mostly based on … fraud. They have actually defrauded everybody at once: their customers, their advertisers, and even(!!!) the Federal Government.
They claim that you have “thousands,” or even “millions(!),” of “followers,” hanging off of your every word. They claim that advertisers have access to “millions of eyes.” And, they claim that the Feds can – without further effort – watch over everything just by latching-on to their [expensive …] “information teats.”
And yet, who(!) is saying this, and how(!!) do you know?
Well, “lo and behold,” there is no independent source of information at all: only the data which the company “reports” (sic …) about “itself.” From this point forward, I suspect that you can do the math . . .
“Given that fraud is obviously so easy, what should you fully expect to have occurred?” Duh!! 🤦♂️
I now believe that it will very soon be proved what people like Elon Musk already suspect: that these companies have “been playing both ends against the middle” for a very, very long time.
“If it sounds too good to be true – it is.”
“What Fools these Mortals be!” – Puck.
So was the Mercer money invested into Parler no good for the intel community? Is that why AWS shut it down? Then what does that mean for GETTR and Truth Social since they are up and running?
Are you not on a social media ? I have not doubt whatsoever there are eyes on this site.
Why would he go to those propaganda outlets . How could he not know that CNN and the Washpost will do everything in their power to discredit him.
Why is Zatko coming forward now? Musk is about to expose Twitter’s fake account problem. But hey, let’s find a way to point the finger way over there, towards foreign actors attacking Twitter’s domestic accounts. Then, well maybe Twitter is so risky we shut it down completely just like we should’ve shut down TT.
This whole episode looks like choreography to me.
All the world’s a stage,
And all the men and women merely players
Choreographed to support Musk and stop the purchase.
Twitter quietly goes back to doing what Twitter has quietly done.
I can’t see anyone shutting down Twitter as long as TikTok is still available.
Got a text message from Twitter(never used it or want to) asking if a phone number being used was legitimate. Never saw the number. Just deleted it. Anyone know what’s up with this?
“Welcome to VOIP = Voice Over IP.” Anyone from anywhere can send a voice-message or a text-message that appears to originate from anywhere else. Simply ignore it.
Sound advice when the spoofing of IPs/phone numbers is common practice.
Someone is trying to use your phone number for an account?
It’s likely an account holder did not want to put in their own phone number and just made one up.
Most likely trying to determine if your number is a legit number so they can sell it to spammers. Do not open. Delete the unopened text.
Your move, Elon.
Lol
I think this s on topic if you think about it.
The Conflict Between The West And Russia Is A Religious One
11398 Views August 23, 2022
by Emmet Sweeney for the Saker blog
The war currently underway in Ukraine, which pits Ukraine as a proxy for the collective West against Russia, is primarily an ideological or religious one, with Russia representing what is left of Christian Europe, and “the West” representing a totalitarian ideology that abhors religion in general and Christianity in particular. This statement may sound strange, given the fact that some Westerners – though fewer every day – still see “the West,” (basically Europe and North America) as Christian, and Russia as Communist, or crypto-Communist. But this is no longer the case, and has not been for some considerable time. In fact, the thirty years that have passed since the fall of the Berlin Wall and the end of the Soviet Union, has seen a complete reversal of roles; the collective West is now a totalitarian and aggressively anti-religious power-block that seeks to export its anti-Christian and anti-human ideology onto the rest of the world. And Russia is loathed by the West’s ruling elite precisely because it has resisted this process and moreover has gone in the opposite direction: having once been an active proponent of “scientific materialism” and atheism, Russia has reverted to its Orthodox Christian roots and has rolled back the more pernicious policies and attitudes of the Soviet era…………………..
https://thesaker.is/the-conflict-between-the-west-and-russia-is-a-religious-one/
Actually, if you spend time reading the scholarly articles at sites such as thepostil dot com – which is an on-line imprint of St. Augustine Press – you will soon discover the wholly-unpleasant and blood-soaked truth about “Ukraine.” You will discover a history of racial hatred which literally dates back to a grandson of Genghis Kahn.
You will understand why Western Ukranians are currently raining artillery fire upon Eastern Ukranians(!), even while(!!) the Russian invasion is going on and unrelated(!!!) to it! You will understand why Zelensky recently (once again) outlawed the speaking of Russian. “This is actually nothing new.”
The articles on this site might each require more than an hour to read and absorb. Yet they are written by authors with impeccable military, diplomatic, and academic credentials.
You will very soon understand that “this present circumstance” does not date back “[less than …] a hundred years,” but quite literally thousands.
Therefore: please regard the “[brown T-shirt] costuming” of this media figure no more than you should have regarded the similar “[hoodie] costuming” of “Zuk.”
Ukraine is re-modeling itself, back into a Communist sh*thole.
So, Sundance. Should I stop following your twitter account? Your exchanges with the Santibots is often my highlight of my afternoons.
I must admit his brutal culling of that crowd is a delight to behold!
What a gagme 🤮 he (DS) turned in to…
My brother used to edit raw video for the ABC late news for the local city station. He once showed me the raw footage, then the edited version that aired. Basically, he was paid to make the interviewer’s subject say the opposite of what was actually said. The biggest trick is to shuffle the order of the words. How do they do that? Some things to look for…
This is like what Sundance says about seeing the strings on the marionettes. That experience for me occurred in the late ’80’s. I’ve been unable to not see them in any interview since. It’s also how I knew Ross Perot was right to not interview with 60 minutes without a clock with a second hand displayed behind him. He also could see the strings.
Remember the foreign war interviews with hurt kids? And the raw video from a spectator that showed the kid walk behind the CNN set on the street that made it look like she was a war victim? After this, you’ll look for those things…
Now, each of you will have another tool in your toolkit showing you how often MSM lies… and you’ll likely find it’s actually more than you believed it was.
I had first-hand evidence about lies when I experienced the 2009 Tea Party rally in Washington.
The park police told us their estimate was 1.5 million.
When I got back home the entire Pravda media was counting us as “a few hundred thousands.”
I was there with 40 other patriots from my area in north Georgia.
We need a repository of those tools…a secure place to teach and explain them.
The boom is off the rose. Hoping that what happened to you (when you started seeing the edits) will happen to the public at large.
Back in the late 80s I was watching a Network News Cast. For some reason I flipped over to another network. They had the same story. It was one of those rare news days when nothing big was happening. I got curious and started flipping back and forth. The first FOUR stories on these two networks dealt with the same news item. And they were really standard news, nothing important at all. There was NO REASON for both networks to have the same news stories in the same order.
It was one of those moments when you realized that two major networks had collaborated to present the exact same news stories.
There was a time where I did that slot, flip between ABN, NBC and CBS.
Big news days push aside normal programming.
Slow news days usually had variations in the order of common topics and one unique topic on each station.
It was some time afterwards when I heard Rush describe how that happens. The day starts out with all of them looking at the NY Slimes for the news of the day. After the Slimes, it is the Wa Poo. With a few minor rags thrown in as afterthoughts. WSJ, LA Slimes, etc.
All of that was very long ago. Rush kept that line going even after ownership changes and Twitter became the place to post the slime and poo.
it is easy to tell because the same story has the same scripted dialogue delivered by the talking heads
Social Media is one giant honeypot for the government.
And our mortal enemies who love the fact so many “patriots” cannot seem to break their addiction and keep using it in spite of the manipulation and control by our enemies.
JJH, I get your point, thx
See you on the barricades.
Megalomaniac leaders will have us all wearing PURPLE NECKTIES before long, replacing jackboots as a sartorial signifier of groupthink.
I’d sooner wear hemp.
Or (even the magical N95) masks…..
Looking at the huge amount of resources, both human and tech, along with the number of agencies and NGOs involved in this vast information collection process, one wonders how anything can be intelligently collated, except maybe via key words like patriot, nationalist and such. It would still be overwhelming. Especially given how totally inept our government manages everything they touch.
Distributed computing and cloud storage for starters.
After the first Gulf War, it was found Saddam had a number of Sony Playstations networked together. He could not get the computing power he needed, so they worked around it. By paralleling the playstations together, they created their own distributed computing system for use in artillery/missile calculations.
This computer clustering has been around for years, and Zatko seems to touch on it. Rocks clustering is one type using Linux where a system is set up as a head unit, and any additional systems are nodes. The head unit hands off whatever needs to be done to whatever node is least busy.
Twitter is an Intel weapon used against normal people everywhere.
It’s not just a tech company…It’s the engine behind a weapon.
If the Intel agencies and government are using and dictating it’s policies that makes Twitter a government contractor.
They will claim it’s their national defense in the same way it’s their democracy.
Everyone who’s not in their vampire club is not protected by national defense ex. See the border. It’s national defense for the Cthulu worshippers only.
Nor are normal people in their democracy ex. See the BS fortifying votes.
Only the Cthulites get those privileges to protect their new “Tower of Babel”.
They have said this many times…
It’s definitely a weaponized apparatus used to sway people’s opinions most notably around election time and racial issues, which always tilt brainwashed dolts to vote Democrat. It’s also used to make leftist celebs seem more popular than they really are. Then you get people like the Clinton’s using their lower rung associates to do business deals with these same leftist celebs to earn side cash below the radar.
I love the Lovecraftian references
The only way to correct this situation is replace the RINO’s on the Senate Intelligence Committee. This will take years because they serve for 6 years and as one is primaried out, Mitch or his replacement, Thune, will just appoint another Decepticon from their ranks. I really think this one party concept with a left branch and a right branch has been 100 years or more in the making. It may take that long to correct it. Trump won’t be able to do it, with only 4 more years and opposition to everything he wants to enact from the left branch and the right branch and roadblocks set by the 4th leg of government, he can only continue to bring it into the sunlight. God please help this great nation.
I think a visit to precinctproject.com is in order.
It surely can’t go back to the time where the parties were actually changing and or dying with new parties arising in their place.
The Civil War and its aftermath probably did a lot to cement the two parties into permanence. And that permanence grew into a period of political machines organized around corruption. The corruption learned to hide itself better since then.
What strikes me most is the dominance of the Dem side of the coin. That was an FDR achievement. Even with control of all elected branches, the Republicans are treated as second class denizens of the swamp.
There have been major changes in who votes for each party since FDR, but I would focus on him with the Military Industrial Complex he built and Truman with the CIA. Eisenhower, Truman’s successor was already complaining about their power.
In many ways, our current Corporatist/Fascist Big Government is grown on this foundation. But the end of the Cold War truly did foretell the end of history. America’s history. The end of America as we knew it.
We grew a Big Government with Big IC and War machines to protect us. Now we need protection from all three.
“aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.”
And as we’ve seen from the FBI, this certainly includes parents at school board meetings.
Assertions that can become explosive when exposed to deceit and fictions.
Yes—those wascally (Elmer Fudd-speak for you younger Treepers) evil “MVE” (militia violent extremists in DHS parlance) are as hard to find as Sasquatch.
Is it possible for a partisan judge overseeing the Musk/Twitter issue to seal the court proceedings to protect the Fourth Branch from public scrutiny?
Sighting “national security” or some nonsense?
That would confirm government involvement.
It looks like they are trying to create a poison pill that nukes the deal to avoid Derp State exposure.
“It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.”
Five Eyes is not going to give Big Tech this for nothing.
And yet, just look at all the so-called conservatives and patriots, on just CTH alone for that matter who obviously just cannot be without Twitter in their lives.
Pretty sad.
SMH
You have a listening device that you can talk on right? You’re on the internet right now right?
If you want true privacy ditch your cell phone and computer otherwise you are under surveillance.
If you took a clot shot with bioluminescent Luciferase blood trackers you will be surveilled nomatter what you do.
The next step is ‘smart buildings’ that track everyone within them. Why do you suppose they want to demo all the buildings in Manhattan? Does anybody really think that’s about retrofitting them with ‘green’ building materials?
Think again.
Precisely!
Perhaps. I think there are substantial differences in your comparison.
Be that as it may, my main concern is not so much privacy—As a retired Marine, firearms dealer, owner of a firearms training school, owner of many NFA weapons, a LEO, flying the Gadsden, Confederate, USMC and American flags at my farm gate, member of 4 tea parties etc. I am not really concerned about “privacy” since I am already on so many lists of the feds.
My point about continued use of (anti) social media like FB and Twitter is rather that it is giving direct aid and comfort to our mortal enemies as well as exposing those addicts to it to the blatant as well as the subtle propaganda of those enemies.
It is also telling how many of these addicts get offended when this is pointed out and raise all manner of excuses (“know your enemies,” “I am not addicted—I can stop any time I want” etc. etc.) when the fact remains we are doing the bidding of the same tech oligarchs that have made it clear they want us all dead.
If nothing else, we Americans are quite spoiled and pretty much unwilling to do anything to push back if it means any inconvenience to our lifestyles.
And you just outed yourself without being on twitter.
You apparently missed my point—I am not concerned with being “outed” as I was “outed” long before the whole (anti) social media addiction.
Do try to keep up.😀
“After the January 6 insurrection, Zatko was concerned about the possibility someone within Twitter who sympathized with the insurrectionists could try to manipulate the company’s platform, according to his disclosure.”
And check out the photos they took of this dude for that CNN story. Lol
For the record…
“Zatko Did Not Kill Himself”
Note that “content” hashes have been common instrumentation for antivirus and antimalware products for a long, long time. What the Reuters article misses is that sharing requires a common hash algorithm (assuming the sharing is simplified by not using a keyed hash which would necessitate a key management system) – as Sundance points out. In and of itself, it would not be unusual for firms to share hashed content – it’s part of the cybersecurity “ecosystem”. The specific purpose of the shared hashes (in the detect, respond, resolve paradigm) is detection. Again, nothing unusual here. What Sundance may be suggesting is that there is metadata that accompanies the shared hashes which is being integrated into a larger surveillance/intelligence back-end system (or systems). It is worth adding that there must also be some up front logic for what is hashed in the first place for subsequent sharing – what is/who determines the basis for this decision?
Oddly, it brings to mind some of the weirdness of circumstances surrounding the death of one of the founders of Kaspersky (was it?) a few years back.
You thinking of McAfee?
Must be that one I was thinking of.
As this entire incestious relationship between government and big tech gets some exposure I can’t help but think about Edward Snowden. He should be an American hero, but instead he’s a wanted criminal. His book
“Permanent Record” got the short shrift at the time.
Everything he saw, was concerned about and wrote about regarding the American Intelligence Agencies was 100% correct. It has since that time grown exponentially worse. We’re on the verge of losing our very freedoms and way of life because of this.
I can honestly say I don’t blame the Russians and Putin and many other nations for their fear of American government treachery. I am too…….
All true – but he broke the law.
Reporting that our government broke the Constitution.
Convenient law.
No. Actually releasing attack oriented apps.
But the larger framework is interesting. You work in the classified arena you sign commitments and are committed to regulations that cover the handling of that classified information. Snowden violated those regs/laws.
So, are we introducing caveats to rule of law even though the intent of a law may be suspect?
The present regime break multiple laws daily
So? Is your inference then that you can break the law with impunity? That that course of action is ethical?
In former times I would have totally agreed with you.
However, as we should have learned from the gradual “new normal” morphing of Germany into the 3rd Reich and in most other totalitarian contexts, there comes a point where one has to then ask whether it is “moral” to obey certain laws.
This occurs where, as we have increasingly seen in recent decades and continue to see, we know laws are passed that are contrary to both God’s law and our Constitution and where a government is facially acting against the Constitution and has effectively abrogated the rule of law as well as equal justice under the law.
Roger that.
Kinda moves everything on all sides to the same meeting place: ends justifying means.
So you believe that any law made by the State is always to be obeyed? In other words, there is no Higher Authority to whom we owe obedience?
I side with this view, shared by many of our Founders:
“Now all acts of legislation apparently contrary to natural rights and justice … must be in the nature of things, considered as void. The laws of nature are the laws of God, whose authority can be superseded by no power on earth. A legislature must not obstruct our obedience to him from whose punishments they cannot protect us. All human constitutions which contradict His laws we are in conscience bound to disobey. Such have been the adjudication of our courts.” George Mason, as argued in Robin v. Hardaway, Virginia General Court, 1772.
This does not make sense. The IC is setting around, listening to all the conversations taking place on Twitter. Just the way it was designed, with the U.S. government paying for the platform. Now you have Peiter “Mudge” Zatko complaining about security.
What if you wanted to make money off of a large computer platform and so long as you were making money. You didn’t care what they did.
You can monitor all the users on the platform and look for information important to you, and it will cost. So who is getting paid – under the table. Is Peiter concerned about an audit. And it’s time to leave.
Peiter’s objective is to support Musk’s part of the argument.
That exits Musk from Twitter.
That exit allows Twitter/IC to return to surveillance with risk removed.
That’s Peiter’s objective.
Maybe. The problem with Musk is he’s a bit unpredictable and really annoying to anyone who is trying to choreograph something. Like that kid who is dressed like a tree in the school play but keeps pretending he’s a horse.
Sundance….are you sure?
I’ve been in a meeting with this guy (and others with a similar profile). There’s a certain ambiguity that surfaces that centers on trust (given their backgrounds – specifically early forays into questionable pursuits). The implied assumption here is that Mudge is acting on purely political motivations. I wouldn’t be so sure of that. Again, having met these sorts of individuals I find they are attracted to the tech resources the gov’t can throw at them, the implied absence of legal hounding and, of course, the healthy renumeration. In short, the motive isn’t so much political as financial.
Agree on one level: anyone who has been immersed in the cyber biz for a long time understands that cybersecurity is a cash cow – and will remain so. One just has to look at the flow of former gov’t cyber types (very senior and their “support” teams/alliances) into corporate America in various roles (cybersecurity leads, R&D specialists, boards of directors, Federal “liaison”, etc.) or forming their own companies. While incessantly virtue signaling on Linkedin it nevertheless reflects a strategy as old as the hills – capitalizing on contacts and assisting the shaping of policy the favorably impacts the bottom line. Maintaining clearances, polygraph currencies, NSA certifications, etc., is very rewarding over the long haul.
Lots of unanswered questions, but the one thing that’s clear: Twitter’s in deep doo-doo.
Why did Mudge come forward? Maybe just revenge and sour grapes. Or maybe altruism, as he claims.
Or maybe to sabotage the Musk acquisition. As “Just Me” says below: This is deep state saying “here is your free pass Elon, you are out, we will pick up the pieces and keep our totalitarian toy.”
Maybe Mudge thinks twitter’s alleged fraud is about to be exposed and he wanted to be at the head of the ‘immunity line’.
Maybe Mudge had a spiritual awakening.
Maybe Mudge has a grudge.
Maybe Sundance is dropping more than hints all over this thread . . .
I think Sundance got a whiff of something that is there, but doesn’t know beyond that.
There’s no altruism involved, and Musk is no hero
Well spotted!
“Mudge” came forward because someone offered him some money.
I’m curious if you get a phone call from a foreign country and even if you don’t answer the phone or it just goes to voicemail does this allow the government to spy on you? I wonder how this works because they might be behind the call just so they can spy on you.
Am I reading to much into this? The days of putting blind trust in government ethics is long gone.
What’s to stop them from setting up robocalls to every line in America from overseas, and opening the door themselves?
Once that phone call hits an answering machine or voice mail, it is then stored by the NSA. Depending on who or where it’s from, or up to their own discretion, the answer is ‘yes’.
Once that phone call, even unanswered except by voice mail or machine, is recorded by the NSA, it can then be ‘queried’ by individuals, or in the case of Trump, outside contractors, some without the required clearance.
“… because they might be behind the call just so they can spy on you.”
In some cases, absolutely ‘yes’.
I think the real question is, why would you think these aforementioned Communist Run social media and MSM companies, aren’t the one’s really controlling our intelligence agencies.
Perhaps not because the Derp State is much older and even more tentacled than they.
Inclined to believe what I read elsewhere today, this dude is CIA.
Looks like.
Definitely not an act of altruism.
“AWS’ solution received superior marks from CIA procurement officials”…”
Yes they did and why ? Here’s what people don’t understand about “The Cloud”. For those that are not IT proficient, the cloud is basically a virtual ( fake ) envirinment, where companies and inviduals run applications and store data.
So why would the CIA give Amazon ( AWS – Amazon Web Services ), a high mark ? Because the clould is virtual, fake, it’s not real. What is “real” is the ‘disk farms’ that the virtual environment operates off of, physical hard drives.
Who has access to the “physical” disks that the cloud is built on ? Amazon and Amazon only. Who is Bezos associated with ? Rhetorical question.
What I’m saying is, why would I need to access data for a company, through their application, when I can take a back door and retrieve it directly from the physical disk ?
I do freelance work, database, mySQL and Oracle, many companies fall for the Marketing gimmick of AWS, the whole “You only pay for what you use …” line of crap. I have yet to work on a database application or SQL that uses AWS, and the servers don’t reside in Northern Virginia. Every time I ‘ping’ a database or server, the IP always comes back as Virginia, maybe coincidence.
You can see where I’m going with this …
“Your phone calls can be intercepted by the government from the foreign side of the call. The govt can freely monitor the calls that involve foreign actors.”
The opposite is also true. Every single piece of information that comes from “outside” the United States into the United States is scooped up by the NSA and stored in that massive data center in Utah, phone calls, emails, online activity, etc.
I don’t live in the United States, I live in Thailand, there even use to be an NSA listening station about 300 km from I live, in the area of the “Black Sites” that the CIA use to have setup here, and no this is not a conspiracy theory. Trump’s CIA director Gina Haspel even ran one of the Black sites here in Thailand, google it.
The area here for the CIA ( MI6 there as well ) Black Sites is called Udon Thani, I believe the NSA was somewhere in an area called either Khalisan or Khon Kaen.
I don’t post anything on this site, or send any email, or make any phone call that I don’t want the US Intel apperatus storing in their data centers somewhere.
they are also likely to be proxied to areas in
baltimore
boston
dallas
and a specific city in california that I will not mention (yet).
“and a specific city in california that I will not mention (yet).”
I’m guessing the Bay Area somewhere, use to live there, back in the ‘good’ days …
Was thinking the same thing as well, but still have not come across a proxied AWS server or database, there are ways to tell, but again, may just be coincidence …
When I worked for the DoD, the guy in the cube next to me, and myself, would to be amazed at how many “hops” an email would take to get from him ( 3 feet away ) to me.
We calculated something like 15,000 miles ( roughly ) for the both of us to communicate by email to one another.
Data doesn’t hop around like a bunny rabbit.
I was told by an 811 employee surveying a fiber conduit boring operation,
“You wanna see 5 black suburbans descend on you out of nowhere? Cut a main AT&T fiber trunk.”
That’s what we thought too, then when we traced it, we couldn’t figure out why certain IP’s were showing up in the route. We were thinking why is this going to “place x” before it comes back here ? Just thought it was rather “odd”, nothing malicious or anything like that, we were on a secure network.
The only thing we could figure out was something to the extent of verification and validation of the receivers and senders and making sure the content didn’t have any dirty words in it.
“You wanna see 5 black suburbans descend on you out of nowhere? Cut a main AT&T fiber trunk.”
Very true indeed.
berkely
there are ways to mirror all traffic and not have ip or meta added to the prime. A useful illustration of how this might be accomplished is to read how russia, china and the US “read” undersea communications and also satellite. “one does not necessarily have to be physically connected to a network” to spy and collect on it.
as another poster below mentioned, att trunks and fusion centers have been doing this for a very long time. You will never see the traffic altered.
it is precisely how NSA operates on a global scale. There will NEVER be any crumbs indicating NSA spying and collection.
But we understand how and where these special access facilities operate.
DARPA says it all
We are all PsyOp Targets Now.
Not just “now.”
This has been the case for many decades.
EXCLUSIVE LEAK: Government architectural plans have been sent to The Counter Signal, revealing Trudeau’s sinister plans to install firearms armouries for a militarized Climate Police Force.
The Ministry of Climate Change is building a new facility that will be home to a firearms armoury, interrogation rooms, biological labs, media relations offices, “controlled quiet rooms,” and intelligence facilities. Why do they need this?
https://thecountersignal.com/exclusive-leak-trudeau-installing-weapons-armouries-interrogation-rooms-for-ministry-of-climate-change/
Saw France was creating a climate army too. Looks like an EU thing. Maybe THAT’S what the IRS is doing?
Isn’t the logical fallout that America Firsters should exit ALL social media? Everyone is being bombarded by propaganda bots. It’s actually pretty easy to see when you look at tweet replies. I imagine its the same at Facebook. Shouldnt we just refuse to play?
Some may suggest that this is another red herring.
A tip of the iceberg of the surveillance, presented as if it is a reveal that our government will proceed to handle properly.
Like the shots: A few myocarditis deaths acknowledged, to create the illusion that the government is upholding their duty to protect us.
Mudge was one of the OG hackers. Part of the L0pht bunch back in the day. A white hat.
on a positive note: the hours following the ransacking raid at MAL by the FBI, truth social EXPLODED to the highest number of unique visits and engagements.
THE PEOPLE are aware and they are not looking away.
It is my genuine desire that Elon Musk, note simply acquire twitter, but that the current legal suit *(he recently subpoenas the former twitter CEO, jack), expose that the “bots” are not simply virtual but intentionally created and allowed by twitter…and then we can discovery exactly what entities are flooding these bots, controlling them, and establish what the purpose of these bots are.
My opinion of bots consists of two goals:
Elon is angling to expose the bot and spam fraud. I am not convinced (yet) he is prepared to take on the matter of the corrupt state psyops and political fraud element. Thus far, he has been engaged in the acquisition angle using the bot and spam misrepresentations to find a more rational and fair deal price. It would be very interesting to pay very close attention to what actions (or not) that he takes as the investigative efforts OF MANY are looking into this area of corrupt central state direct influence into the twitter universe.
This will be a moment where we can evaluate more clearly just exactly what Elon Musk stands for, what he is willing to take a risk and fight over. We already know he has the interest in re-creating twitter to a more profitable and sane social media company. However, if he does not realize that his acquisition will be subject to terms set by the secret police spy state, he soon will.
WE WILL MAKE SURE HE IS AWARE WITH FACTS AND NOT INNUENDO.
And then we will find out much more about the true Elon Musk.
In an ideal scenario, the corrupt central state, threatened by exposure, backs out of twitter, quitely, twitter acccepts that there are bots and spam fraud and elon gets a better deal and can work to make the platform more open and transparent for ALL VOICES…not just the voices we prefer. BUT ALL OF THEM.
the answer to the debate over free speech…
is MORE FREE SPEECH.
God Bless America
also important to note: the whistleblower was working with “whistleblower aid” LONG BEFORE elon musk was involved or even considered acquiring twitter.
this is important to understand because there are many assumptions being made that this whistleblower is somehow working and operating to benefit Elon Musk.
also very important to notice:
Also, notable hacker with the Cult of the Dead Cow & founder/co-founder of L0pht Industries and I think these guys found one of the earlier DNS exploits. His name is “mudge”…
I can’t believe Twitter hired him after their 2020 hack and then fired him for picking holes in their security
can you? /S
Every problem is connected to being able to use technology. Today we voted in Florida and can’t know precisely the real totals. The computer technology is only partly understood by Geeks who spend their life learning how it works. Meanwhile we use these same machines, with its computer parts, to choose who makes the laws. France uses paper ballots and has a system to count them. They are able to announce winners within hours after the polls close. Meanwhile we put our ballots into a machine and haven’t a clue how the machine woks. Of course they can’t rig the machines just as th can’t hack into bank accounts or many other supposedly secure things. Machines must go.
I agree that technology creates a social and cultural divide between those that have access and knowledge and those who do not.
But make no mistake….election fraud does not require technology. There are so many ways to steer an election to a end result.
take france for instance..you example: does anyone really believe that macron is that popular and won the election? Take the same question and apply it to trudy up in the great north oh canada.
the point is that election fraud IS GOING TO HAPPEN no matter if tech is used or purple thumbs and paper ballots and positive ID checks. This is the world we live in: people cheat bigly to steal political power.
technology is just yet another means to pull it off.
but we also know there are some limits to cheating..
alas, who knew: cheney lizzard does down in flames and hageman wins. And so many other MAGA candidates that have won thus far.
I will be clear: I was more than just shocked to see these successes. I have serious doubts the corruptors would allow these MAGA reps win seats. Yet, they did.
So we can make some adjustments to our perceptions: the corruptors have a limit to the level of cheating they can apply.
But we can never relax on this issue. EVER! even if we go back to paper ballots and purple thumbs.
The best thing American can do is to reform the voting requirements. positive ID’s …no exceptions…clear up the registrations…that’s always been a hot mess and ripe for fraud. NO mailing address, shit out of luck…no po boxes allowed. No more mail in ballots. You show up, you vote. no muling….these are things that need to be done regardless if “technology is used to process votes”.
I am sure we can all think of the long list of reforms needed to provide election security.
the question that must never be forgotten: what is YOUR REP doing to pass voting reforms?
Call and ask them…find out what the goal is and when to expect to see state laws change.
APPLY PRESSURE.
God Bless America