The Vault 7 Wikileaks material was released. To no small surprise to us, the story is that CIA survelliance technology has “some how” made its way into the hands of so far undisclosed “third parties”, which is code for the Crime Syndicate. From Wikileaks:
-the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.
The Intercept put out quite an article that everyone should read carefully, avoid skimming. The piece describes algorithms designed to spot an “insider threat” and artificial intelligence (AI) that will sift through large data sets. Over the last decade, the CIA’s In-Q-Tel has made a number of public investments in companies that specialize in scanning large sets of online data.
Thirty-eight previously undisclosed companies are receiving CIA In-Q-Tel funding. The research focus that stands out is social-media mining and surveillance. You can go to the companies and look over the officers and people involved. I can’t possibly do that justice, but it suffices to say that these private data-mining and surveillance firms are rife with foreign and Judaic-sounding names.
Before describing the game being played here, understand that my worldview holds that a super powerful Crime Syndicate is behind this. Government intelligence, law enforcement and judiciary agencies are infiltrated with their moles. These agencies are primarily there to serve and be looted by this Luciferian Syndicate and do not serve the public in the least. Regular readers know that I consider this arrangement much worse than even the most cynical can imagine.
Also, you don’t have to be a rocket scientist to know that an algo is garbage-in, garbage-out and only as good as the program. Depending on how it is programmed, the Tooth Fairy could be a threat and the AI could be operating in a completely fabricated “Alice in Wonderland” world.
In such a world, terrorist “threats” are about 95% scams and a way to rally public and political support for the psychotic Crime Syndicate to gain more control. The whole scheme also presumes that real terrorists just willy-nilly communicate on the Internet via Twitter, Facebook, et al so as to offer chances to “tip off” law enforcement.
This is ludicrous on its face when one considers that in the 19th and 20th centuries, terrorists successfully and routinely hit high-value targets (people in authority) and rarely low-value targets (innocent civilians). And they did so without any electronics whatsoever. The idea that social media using alleged terrorists today randomly hit low-value public targets has “false flag” and “hoax” written all over it.
The purveyors and scamsters of this data mining technology can scan this blog and presumably determine my name and point of view, and learn that I consider them criminals and liars.
But what do they do with this viewpoint? Put me on a list and call me names? Administer a heart attack? Treat it as a “threat”, or simply conclude some people are waking up and some (pyjama people) are asleep? Well, they can rest assured that from my vantage point the masses are by and large comatose. Frankly, I think this tracking of awareness is about 90% of what this is all about. That and finding ways to compromise and control people.
In fact, one company, Geofeedia, markets its ability to track activist protests on behalf of both corporate interests and police departments. Geofeedia, touts its research into Greenpeace activists, student demonstrations, minimum wage advocates, and other political movements.
The article quotes Lee Rowland, a senior staff attorney with what’s left of the American Civil Liberties Union, as saying, “When you have private companies deciding which algorithms get you a so-called threat score, or make you a person of interest, there’s obviously room for targeting people based on viewpoints.”
Another firm, PATHAR’s product, Dunami, is used by the FBI to “mine Twitter, Facebook, Instagram and other social media to determine networks of association, centers of influence and potential signs of radicalization,” according to an investigation by Reveal. “Radicalization.” There’s that garbage-in, garbage-out term again.
So let’s go through the article. The algos will (to paraphrase) license stream-of-consciousness ramblings on social media and spot trends for hedge funds among “other clients.” WTF? Translation: Spying for Crime Syndicate types.
Another fairy tale put forth is that it “monitors conditions for journalists,” meaning it monitors Twitter to spot “gang incidents” and threats to reporters. First off, journalists today do little more than read releases from the Crime Syndicate. This also presumes journalists need protection because they do “serious investigations” and thus can be “gang targeted.” Gang targeting by the Crime Syndicate operatives is more likely. Real journalists get no protections.
Skim this Huntington Post article and you will see they are “quietly working with public safety officials with the aim of detecting potential criminal or terrorist activity bubbling up on Twitter before it happens.” Again, we are asked to believe there are nitwits dumb enough to plot online and in the open. Give me a fucking break. What a sham.