At this point in history, anyone who is claiming the U.S. Government is not directly coordinating with social media platforms to shape opinion and cull information adverse to their interests, is being intellectually dishonest. There is simply too much evidence of the intelligence apparatus, specifically the Dept of Homeland Security, being enmeshed with the platforms of Twitter, Facebook, Instagram, Google and Microsoft.
The DHS justifications for the relationship all involve claims of ‘national security’ and domestic terror threats. However, the simple and transparent motivations of the relationship are all political. The DHS terms of “disinformation, misinformation and malinformation” are simply excuses for the platforms to adhere to the demands of the government and censor or remove discussion that is against the interests of those in power. The truth of this is in the sunlight now.
That said, the relationship between the intelligence community and social media is one of mutual benefit. DHS gets to conduct surveillance and control permitted speech in the public square, and in return Big Tech gets assurances of their ability to continue monopolistic enterprise and simultaneously receive subsidies on operational costs. The legislative branch allows this synergy without oversight because the legislative branch is in alignment with the larger ‘national security’ ruse.
Into this mix it is worth revisiting congressional testimony from former Twitter founder and CEO Jack Dorsey on March 25, 2021. The hearing was on “disinformation” [Transcript Link]:
A shared hashing protocol is a form of data system integration. Look at what Dorsey was saying about “Blue Sky” his latest big tech initiative, on March 25,2021.
Now, remember the admissions in July, 2021:
July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.
Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.
Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.
The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (more)
A shared hashing protocol is a form of data system integration.
When The Intercept is talking about portals between DHS and social media, the “shared protocols” is the technical name for the data integration between the U.S. government and Social Media.
Now…. again, keep in mind what Dorsey is saying about his Blue Sky network app for a new inclusive social media platform. A network that would be established with these “shared protocols.” Look carefully at what is written in the Intercept Article about the Intelligence Community engagement:
[…] Intelligence agencies backed new startups designed to monitor the vast flow of information across social networks to better understand emerging narratives and risks. (link)
Jack Dorsey is creating Blue Sky app, a new platform that will connect social media networks and will contain “shared protocols” with the Dept of Homeland Security. Meanwhile, the U.S. intelligence agencies are funding new startup companies to “monitor the vast flow of information across social media networks.”
Do you see it?
Dorsey is creating another Magic Coffee Shop. This one will be called “Blue Sky.” It will contain shared protocols.
Against the previous government relationships established by Dorsey, the financing for this network is almost certainly coming from the U.S Intelligence Community.
Can you see it now?
Last point.
A prediction…..
Considering the multinational corporate relationships already established in this new WEF inspired fascist system,…. and considering that Blackrock and Vanguard are the largest shareholders in most major multinationals…… and considering that Blackrock is embedded in the White House via Tom Donilon…. Watch the multinational corporate advertisers all exit Twitter in an effort to kneecap Elon Musk as they switch to support…. wait for it…. Blue Sky!
A tripwire is now created: If Elon Musk continues to sing the praises of Jack Dorsey, then Musk is either naive to the scheming around him, or Musk is in on the scheme.
Tom Donilon is a deep DC swamp operator and has been for his entire career. Donilon is connected to every tentacle of the Obama and Biden administrations. Donilon is also the Chairman of the BlackRock Investment Institute. We have written about the conflicts {Go Deep Here} and {Go Deep Here}.
Tom Donilon’s literal job description at Blackrock is to “leverage the firm’s expertise and generate proprietary research to provide insights on the global economy, markets, geopolitics and long-term asset allocation,” and in June 2022 the State Dept appointed him as Co-Chair of the U.S. foreign policy advisory board.
Specifically, the Biden administration put Blackrock Investment Institute Chairman Tom Donilon in charge of U.S-China policy.
(STATE DEPT) – Today, Secretary Blinken announced his selections for the U.S. Department of State’s Foreign Affairs Policy Board.
Since its establishment in 2011, the Board has provided independent advice on the conduct of U.S. foreign policy and diplomacy, consistent with each Secretary of State and administration’s evolving priorities for it.
Secretary Blinken has sought to build a diverse board that could advance the Department’s efforts to better root American diplomacy in the needs and aspirations of the American people. With expertise at the intersection of foreign and domestic policy, the Board will focus on the issues of increasing importance to the lives and livelihoods of Americans in the decade ahead, including cybersecurity and emerging technologies, climate and energy, international economics, global health, and strategic competition with the People’s Republic of China. (read more)
It doesn’t matter how sketchy the deep state tentacles are, their motives always come back to money.
There are trillions at stake.
The collusion between Big Tech and the security apparatus is obvious for a much simpler reason:
The federal government never dismantled Big Tech, especially Google, for their monopolistic practices.
And now they are one.
How does he go from National Security Advisor to Obama, to Chairman of BlackRock?
And his wife, Cathy Russell, is Director of the White House Presidential Personnel Office.
Another invaluable bit of research. Thank you, Sundance.
Has anyone done the math on the information generated globally on an hourly basis and the processing needed to parse all of it NRT (let alone store it)? This would include the total volume of information – to include attacks, DoS, DDoS, etc. Just like the AV/Anti-malware systems on your desktops/mobile platforms – shortcuts are needed. Update cycles operate on different timelines. The dirty secret is that an army of people is needed to make it all work. Maybe AI, Quantum can overcome this as well as related energy constraints. The problem space is very complex.
You have to look at system-of-systems from many angles.
Curious that Apple is never mentioned in the list of those companies in bed with the “Deep State”.
Apple(iOS) and Google (Android) provide the platform on which the apps run and connect to the internet (data collection and propaganda dissemination).
They are integral to this because Apple and Google provide the base infrastructure and control how information is shared and collected (APIs). No app gets on unless it conforms.
They are absolutely integral to this along with Windows. They too are monopolies essential to totalitarian control and allowed to exist as such because they serve those governments.
Interesting name. Blue sky is the magic math intangible bloat in a business valuation.
According to Dorsey, Twitter may also make use of Bluesky’s underlying structure. The objective is for Twitter to eventually become a client of the BlueSky standard. Once again, only the illusion of freedom and privacy is given.
Good boy Elon, …Good boy.
Thank you Sundance for that “tripwire” point. I have been saying all along that Elon Musk’s closeness to Dorsey gave me pause, because Dorsey continued to lie about Twitter’s stifling of the New York Post over the Hunter laptop story.
Also Elon saying no to buying Twitter, and the suddenly deciding otherwise right at the point where “Jack” announces his new venture?
Why would Jack need this new thing when Elon was taking over Twitter?
Elons Twitter purchase places him in transparency quicksand. If he doesn’t divulge all the Blue Sky facts then he will put all his assets at risk. It’s sink or survive time for Elon?
No. Twitter has served its purpose. Musk was put there to construct the illusion of choice – of “free speech” while more grand chains are being forged for us over at blue sky. BlueSky will ensure that censorship is enabled across the internet regardless of which app you choose to use.
This is cutting off one’s nose to spite one’s face but burn all media who coordinate with the fed gov to the ground.
Who would have guessed the progressive Party would be the one pushing for media control thru “national security” concerns?
I often wondered how many FBI/DOJ/IRS investigations were launched by a politicians office?
Makes sense. The Progressive Party was born of American Marxism. Along with the Communist and Socialist parties, it was brought under the umbrella of the Democrat Party by FDR.
They were said to have had a saying “Unite now, divide the spoils later”
Be careful, you might be mashing shared data protocol with shared protocol. Get it right or you could be dismissed by those reading your article, that’s all. It also possible by getting it wrong that you can make the wrong assumptions and lead readers in the wrong direction and not add to solving the problem.
They don’t say data, which would imply databases. They was they are using it implies interactive protocol. But this is open source or claims to be so it should be easy to determine what they mean.
It could mean it sends the transmissions to multiple places, it could mean other clients interfacing with a server from a user’s or admins perspective which the latter could support what you are saying but I wouldn’t call it a data protocol as that would imply.
I plan to review this if I can, not that I am some coding expert but I can certainly read and understand what it’s doing.
The shared hash is the mechanism utilized in a larger nefarious intent when in the hands of the DS so, Sundance has identified the threat.
But, you are correct. These are essentially simple concepts but are hard for non-technical people to understand. It is the overall concepts that need to be understood. As you sort it out you can help readers better understand.
At the site linked below, they are broadcasting their thinly veiled intentions. Replace “terrorist threat” with “political opposition” and then it becomes clear.
https://terrorismanalytics.org/
Just spent about 15 mins. there. A few things stood out though there’s much more. Here’s one (1) of them:
“The Terrorist Content Analytics Platform (TCAP), developed by Tech Against Terrorism launched in November 2020 with support from Public Safety Canada“
Money, yes, but someone like Dorsey seems to be succumbing to megalomania and delusions of grandeur as well.
“Dorsey seems to be succumbing to megalomania and delusions of grandeur”
Perhaps two of the traits for which he was recruited, groomed and placed where he is?
What a mess we are in.
One #transhumanist #technocrat, #YuvalNoahHarari, sets up another transhumanist technocrat, #ElonMusk, by making the latter transhumanist technocrat look like a foe of the former transhumanist technocrat. Get it? You are being played.
Technology is never neutral. -John Zerzan or Mark Twain
I think if you did a bit of a deeper dive on who Dorsey is and what he believes you may re-think your hypothesis that he is creating Blue Sky at the behest of the intel agencies.
His “burn rate’ a billion dollars last year. He needed to be kept in business.
“Buying Twitter is an accelerant to creating X, the everything app.”
Those of us with eyes to see and ears to hear saw this one coming the moment they placed Musk in the picture and was seen by many on both sides as some sort of ‘savior’ for free speech in big tech.
The psyop is as evil as it is deep.
So Dorsey was preparing Big Sky before March 2021, while Jack’s Magic Coffee Shop was going strong. Why? On the off chance a bigger billionaire would wrestle Twitter away from him on some later date? Or did they plan to come out of the shadows with the integrated intel/private product and bait Musk into buying the obsolete product?