A Data Point to Understanding the DHS Portal Within Twitter is Found in Transcript of Former CEO Jack Dorsey


Posted originally on the conservative tree house on November 1, 2022 | Sundance

At this point in history, anyone who is claiming the U.S. Government is not directly coordinating with social media platforms to shape opinion and cull information adverse to their interests, is being intellectually dishonest.   There is simply too much evidence of the intelligence apparatus, specifically the Dept of Homeland Security, being enmeshed with the platforms of Twitter, Facebook, Instagram, Google and Microsoft.

The DHS justifications for the relationship all involve claims of ‘national security’ and domestic terror threats.  However, the simple and transparent motivations of the relationship are all political.  The DHS terms of “disinformation, misinformation and malinformation” are simply excuses for the platforms to adhere to the demands of the government and censor or remove discussion that is against the interests of those in power.  The truth of this is in the sunlight now.

That said, the relationship between the intelligence community and social media is one of mutual benefit.  DHS gets to conduct surveillance and control permitted speech in the public square, and in return Big Tech gets assurances of their ability to continue monopolistic enterprise and simultaneously receive subsidies on operational costs.  The legislative branch allows this synergy without oversight because the legislative branch is in alignment with the larger ‘national security’ ruse.

Into this mix it is worth revisiting congressional testimony from former Twitter founder and CEO Jack Dorsey on March 25, 2021.  The hearing was on “disinformation” [Transcript Link]:

shared hashing protocol is a form of data system integration.   Look at what Dorsey was saying about “Blue Sky” his latest big tech initiative, on March 25,2021.

Now, remember the admissions in July, 2021:

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (more)

A shared hashing protocol is a form of data system integration.

When The Intercept is talking about portals between DHS and social media, the “shared protocols” is the technical name for the data integration between the U.S. government and Social Media.

Now…. again, keep in mind what Dorsey is saying about his Blue Sky network app for a new inclusive social media platform.  A network that would be established with these “shared protocols.”    Look carefully at what is written in the Intercept Article about the Intelligence Community engagement:

[…] Intelligence agencies backed new startups designed to monitor the vast flow of information across social networks to better understand emerging narratives and risks. (link)

Jack Dorsey is creating Blue Sky app, a new platform that will connect social media networks and will contain “shared protocols” with the Dept of Homeland Security. Meanwhile, the U.S. intelligence agencies are funding new startup companies to “monitor the vast flow of information across social media networks.”

Do you see it?

Dorsey is creating another Magic Coffee Shop.  This one will be called “Blue Sky.” It will contain shared protocols.

Against the previous government relationships established by Dorsey, the financing for this network is almost certainly coming from the U.S Intelligence Community.

Can you see it now?

Last point.

A prediction…..

Considering the multinational corporate relationships already established in this new WEF inspired fascist system,…. and considering that Blackrock and Vanguard are the largest shareholders in most major multinationals…… and considering that Blackrock is embedded in the White House via Tom Donilon…. Watch the multinational corporate advertisers all exit Twitter in an effort to kneecap Elon Musk as they switch to support…. wait for it…. Blue Sky!

A tripwire is now created: If Elon Musk continues to sing the praises of Jack Dorsey, then Musk is either naive to the scheming around him, or Musk is in on the scheme.

Tom Donilon is a deep DC swamp operator and has been for his entire career.  Donilon is connected to every tentacle of the Obama and Biden administrations.  Donilon is also the Chairman of the BlackRock Investment Institute. We have written about the conflicts {Go Deep Here} and {Go Deep Here}.

Tom Donilon’s literal job description at Blackrock is to “leverage the firm’s expertise and generate proprietary research to provide insights on the global economy, markets, geopolitics and long-term asset allocation,” and in June 2022 the State Dept appointed him as Co-Chair of the U.S. foreign policy advisory board.

Specifically, the Biden administration put Blackrock Investment Institute Chairman Tom Donilon in charge of U.S-China policy.

(STATE DEPT) – Today, Secretary Blinken announced his selections for the U.S. Department of State’s Foreign Affairs Policy Board.

Since its establishment in 2011, the Board has provided independent advice on the conduct of U.S. foreign policy and diplomacy, consistent with each Secretary of State and administration’s evolving priorities for it.

Secretary Blinken has sought to build a diverse board that could advance the Department’s efforts to better root American diplomacy in the needs and aspirations of the American people. With expertise at the intersection of foreign and domestic policy, the Board will focus on the issues of increasing importance to the lives and livelihoods of Americans in the decade ahead, including cybersecurity and emerging technologies, climate and energy, international economics, global health, and strategic competition with the People’s Republic of China. (read more)

It doesn’t matter how sketchy the deep state tentacles are, their motives always come back to money.

There are trillions at stake.

Well, Conspiracy No More – Leaked DHS Documents Show Portal Connections Where Govt Officials Backchannel Instructions to Social Media Engineers and Conduct Surveillance


Posted originally on the conservative tree house on October 31, 2022 | sundance

Before getting to the latest revelation/evidence which affirms CTH research for multiple years, let me just remind everyone of the commonsense aspect.  If the Dept of Homeland Security (DHS) was actually doing what I have long said it appeared they were doing, then…

…The databases of the identified social media platforms appear to be integrated with the U.S. intelligence system.  This relationship makes the U.S government a stakeholder in the financial sustainability of the enterprise(s).  Thus, a collaborative effort to financially subsidize the underlying data processing fits the mutual benefit scenario.  ~ Sundance

DHS gets domestic surveillance tools under the guise of ‘national security’.  Meanwhile, massive social media companies get financial offsets for the extreme data processing costs associated with millions of simultaneous users.  That’s the mutual benefit behind “Jack’s Magic Coffee Shop.”  Previously people called it a ‘conspiracy theory‘, I didn’t care, still don’t, it just makes the most sense; Occam’s Razor applies.

Today, all that was almost certain is now brought forth with buckets of evidence showing how social media enterprises have direct portals to DHS to transmit information and receive instructions. It’s a public-private partnership, just like it always appeared.  To quote succinctly, we been knew.

Now before getting all giddy and excited about the documents leaked to The Intercept, proving what CTH has outlined for years, allow me to temper the thirst for immediate I toldyaso’s,   Slow your roll…

Remind yourself when everyone was giddy about getting to see for the first time in history a released ‘top secret’ Title-1 FISA application (Carter Page) and how everyone rushed to review and discuss it without asking the first question(s) first.  We know these are bad actors, so why was it released and who released it?

The same applies here.  We know the change of ownership within Twitter might pose a threat to discovery of government conduct that has taken place inside the enterprise under prior management.  So why is the DHS connection to Twitter, Facebook, Instagram, YouTube etc. and social media being revealed now?  What are their motives, and who is leaking it?  We do not yet know.

As to what is being revealed in the leak, it’s a remarkable affirmation of how the Fourth Branch of Government operates.  Specifically, what CTH has outlined for years about the use of the Dept of Homeland Security, as a political surveillance weapon under the justification of national security.

[The Intercept] – […] Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. According to meeting minutes and other records appended to a lawsuit filed by Missouri Attorney General Eric Schmitt, a Republican who is also running for Senate, discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information.

“Platforms have got to get comfortable with gov’t. It’s really interesting how hesitant they remain,” Microsoft executive Matt Masterson, a former DHS official, texted Jen Easterly, a DHS director, in February.

In a March meeting, Laura Dehmlow, an FBI official, warned that the threat of subversive information on social media could undermine support for the U.S. government. Dehmlow, according to notes of the discussion attended by senior executives from Twitter and JPMorgan Chase, stressed that “we need a media infrastructure that is held accountable.”

“We do not coordinate with other entities when making content moderation decisions, and we independently evaluate content in line with the Twitter Rules,” a spokesperson for Twitter wrote in a statement to The Intercept.

There is also a formalized process for government officials to directly flag content on Facebook or Instagram and request that it be throttled or suppressed through a special Facebook portal that requires a government or law enforcement email to use. At the time of writing, the “content request system” at facebook.com/xtakedowns/login is still live. DHS and Meta, the parent company of Facebook, did not respond to a request for comment. The FBI declined to comment.

[…]  The extent to which the DHS initiatives affect Americans’ daily social feeds is unclear. During the 2020 election, the government flagged numerous posts as suspicious, many of which were then taken down, documents cited in the Missouri attorney general’s lawsuit disclosed. And a 2021 report by the Election Integrity Partnership at Stanford University found that of nearly 4,800 flagged items, technology platforms took action on 35 percent — either removing, labeling, or soft-blocking speech, meaning the users were only able to view content after bypassing a warning screen. The research was done “in consultation with CISA,” the Cybersecurity and Infrastructure Security Agency.

Prior to the 2020 election, tech companies including Twitter, Facebook, Reddit, Discord, Wikipedia, Microsoft, LinkedIn, and Verizon Media met on a monthly basis with the FBI, CISA, and other government representatives. According to NBC News, the meetings were part of an initiative, still ongoing, between the private sector and government to discuss how firms would handle misinformation during the election. (keep reading)

Essentially, the nub of the issue related to the U.S. government telling social media what to remove from the public discussion and what types of information they want monitored.  The social media companies and DHS have a portal between them [EXAMPLE HERE] where these discussions take place.

While there are no specific details as to the human targets of the censoring information, you would have to be obtuse in the extreme not to accept that Donald Trump’s removal from Twitter was one of the larger targeting operations as an outcome of alignment between the activist officials on Twitter and the political officials within the U.S. government [ie. the Fourth Branch].

[…] Intelligence agencies backed new startups designed to monitor the vast flow of information across social networks to better understand emerging narratives and risks.

There it is.

Does anyone need to be beaten with a hammer to accept that “intelligence agencies” funded new subsidiary private sector monitoring networks?

Backed new startups“?  If the U.S. government is going to pay new private sector startup companies to help the intelligence community with social media surveillance, why wouldn’t the same agencies pay to retain the originating system and data processing that establishes the baseline of the data being reviewed?   Please apply common sense.

[…] “The Department has not been fully reauthorized since its inception over fifteen years ago,” the Senate Homeland Security Committee warned in 2018. “As the threat landscape continues to evolve, the Department adjusted its organization and activities to address emerging threats and protect the U.S. homeland. This evolution of the Department’s duties and organization, including the structure and operations of the DHS Headquarters, has never been codified in statute.”

The subsequent military defeat of ISIS forces in Syria and Iraq, along with the withdrawal from Afghanistan, left the homeland security apparatus without a target. Meanwhile, a new threat entered the discourse. The allegation that Russian agents had seeded disinformation on Facebook that tipped the 2016 election toward Donald Trump resulted in the FBI forming the Foreign Influence Task Force, a team devoted to preventing foreign meddling in American elections.

According to DHS meeting minutes from March, the FBI’s Foreign Influence Task Force this year includes 80 individuals focused on curbing “subversive data utilized to drive a wedge between the populace and the government.”

“The Department will spearhead initiatives to raise awareness of disinformation campaigns targeting communities in the United States, providing citizens the tools necessary to identify and halt the spread of information operations intended to promote radicalization to violent extremism or mobilization to violence,” DHS Acting Secretary Kevin McAleenan said in a September 2019 strategic framework.  (read more)

I cannot emphasize the importance of the connections enough.

Surveillance of domestic communication, to include surveillance of all social media platforms, is now the primary mission of DHS.

The information is gathered by social media, funneled by direct portals into the DHS network then distributed to DOJ-NSD and FBI officials as well as the Office of the Director of National Intelligence.   This communication surveillance network is what DHS, created as an outcome of the Patriot Act, is all about.

The four pillars of the Fourth Branch of Government are: DHS, ODNI, DOJ-NSD and the revised/political FBI.  All four pillars were created as an outcome of the Patriot Act. These institutions – as specifically named – represent the domestic surveillance state.  The subsidiary institutions like TSA etc, exist under their authority.  There is no oversight or counterbalance to this system.  The Fourth Branch exists using the shield of “national intelligence” to hide their activity.   Domestic surveillance is done by the intelligence apparatus under one big connected system, operated by the ODNI and DHS.

New York Post – Facebook has been spying on the private messages and data of American users and reporting them to the FBI if they express anti-government or anti-authority sentiments — or question the 2020 election — according to sources within the Department of Justice.

Under the FBI collaboration operation, somebody at Facebook red-flagged these supposedly subversive private messages over the past 19 months and transmitted them in redacted form to the domestic terrorism operational unit at FBI headquarters in Washington, DC, without a subpoena.

“It was done outside the legal process and without probable cause,” alleged one of the sources, who spoke on condition of ­anonymity.

“Facebook provides the FBI with private conversations which are protected by the First Amendment without any subpoena.”

These private messages then have been farmed out as “leads” to FBI field offices around the country, which subsequently requested subpoenas from the partner US Attorney’s Office in their district to officially obtain the private conversations that Facebook already had shown them. (read more)

None of this should be surprising to anyone who has been reading our research about the domestic intelligence apparatus and their connections to the Big Tech platforms.  The largest social media networks are fully compromised by this relationship, and that is exactly why the legislative branch has not done anything to impede (ie. break up) the tech monopoly system that was created.

♦ EXAMPLEJack’s Magic Coffee Shop (Twitter), essentially a global and public commenting system, could not feasibly exist without the support of the U.S. government providing extreme scale data-processing.  Also, specifically because the platform is in a symbiotic relationship with the intelligence apparatus, the IC itself has contracted people working within the platform.

The whole system was admitted in a 2021 Reuters article outlining the networks and their surveillance relationship with DHS.

We have been trying to hammer this issue for a long time, because at the end of this continuum people will eventually be given digital identities.  It’s just the natural outcome if you follow the arc of how this is operating.  Once a digital ID is established, all of your activity is then connected to it and a digital currency system emerges.

♦ 2021, Public-Private Partnership – The modern Fourth Branch of Government is only possible because of a Public-Private partnership with the intelligence apparatus. You do not have to take my word for it, the partnership is so brazen they have made public admissions.

The biggest names in Big Tech announced in June their partnership with the Five Eyes intelligence network, ultimately controlled by the NSA, to: (1) monitor all activity in their platforms; (2) identify extremist content; (3) look for expressions of Domestic Violent Extremism (DVE); and then, (4) put the content details into a database where the Five Eyes intelligence agencies (U.K., U.S., Australia, Canada, New Zealand) can access it.

Facebook, Twitter, Google and Microsoft are all partnering with the intelligence apparatus. It might be difficult to fathom how openly they admit this, but they do. Look at this sentence in the press release (emphasis mine):

[…] “The Group will use lists from intelligence-sharing group Five Eyes adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.”

Think about that sentence structure very carefully. They are “adding to” the preexisting list…. admitting the group (aka Big Tech) already have access to the the intelligence-sharing database… and also admitting there is a preexisting list created by the Five Eyes consortium.

Obviously, who and what is defined as “extremist content” will be determined by the Big Tech insiders themselves. This provides a gateway, another plausible deniability aspect, to cover the Intelligence Branch from any oversight.

When the Intelligence Branch within government wants to conduct surveillance and monitor American citizens, they run up against problems due to the Constitution of the United States. They get around those legal limitations by sub-contracting the intelligence gathering, the actual data-mining, and allowing outside parties (contractors) to have access to the central database.

The government cannot conduct electronic searches (4th amendment issue) without a warrant; however, private individuals can search and report back as long as they have access. What is being admitted is exactly that preexisting partnership. The difference is that Big Tech will flag the content from within their platforms, and now a secondary database filled with the extracted information will be provided openly for the Intelligence Branch to exploit.

The volume of metadata captured by the NSA has always been a problem because of the filters needed to make the targeting useful. There is a lot of noise in collecting all data that makes the parts you really want to identify more difficult to capture. This new admission puts a new massive filtration system in the metadata that circumvents any privacy protections for individuals.

Previously, the Intelligence Branch worked around the constitutional and unlawful search issue by using resources that were not in the United States. A domestic U.S. agency, working on behalf of the U.S. government, cannot listen on your calls without a warrant. However, if the U.S. agency sub-contracts to say a Canadian group, or foreign ally, the privacy invasion is no longer legally restricted by U.S. law.

What was announced in June 2021 is an alarming admission of a prior relationship along with open intent to define their domestic political opposition as extremists.

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (read more)

The influence of the Intelligence Branch now reaches into our lives, our personal lives. In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it. The legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01, the short-sighted legislative reactions opened the door to allow the surveillance state to weaponize.

After the Patriot Act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power. The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the installation of Barack Obama was all about.

The Obama network took pre-assembled intelligence weapons we should never have allowed to be created and turned those weapons into tools for his radical and fundamental change. The target was the essential fabric of our nation. Ultimately, this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch. From that perspective Obama’s “fundamental change” was successful.

It’s all Connected FolksSEE HERE

Musk Begins Releasing Internal Notes from Twitter Execs Highlighting Intent to Hide True “Objectives and Key Results” During Lawsuit


Posted originally on the conservative tree house on October 30, 2022 | sundance

An interesting dynamic begins as Elon Musk takes ownership of Twitter promising increased transparency.  Mr. Musk tweeted out an internal message from Yoel Roth (still employed) to some unknown entity where the head of Safety and Integrity of Twitter tellingly implied the executives in charge were withholding information from Musk and lawyers during the lawsuit.

Yoel Roth is the Head of Twitter Safety and Integrity; his message on 5/17/22 reads, “But also lol if Amir continues to BS me, my escalation route is “Amir’s OKRs [Objectives and Key Results] are entirely based on fraudulent metrics and he doesn’t care and may actively be trying to hide the ball.”  “Literally doing what Elon is accusing us of doing.”  [SOURCE]

Musk forwarded the message publicly saying, “Wachtell & Twitter board deliberately hid this evidence from the court. Stay tuned, more to come …

If the Twitter executives have left a trail of deception from opposition and the subsequent civil litigation during the takeover bid, Mr. Musk could have standing to withhold any exit compensation package, pending new civil litigation as an outcome of these discoveries.  It will be interesting to see how this proceeds.

One thing ideological leftists are known for, is making legal mistakes in their thirst to retain influence.  It would not be surprising to discover a host of internal documentation that would expose any prior deception within the Twitter company and organization.

The power of the people . . .


Posted originally on the conservative tree house on October 9, 2022 | stella

It seems that “voting with your feet” (this time electronically) still works. PayPal, which had announced new “legal agreements” earlier this month, is backing down.

The new agreement, which would have taken effect in early November, attempted to control free speech by its clients. It has since been removed from the PayPal website, but as reported by The Daily Wire:

A new policy update from PayPal will permit the firm to sanction users who advance purported “misinformation” or present risks to user “wellbeing” with fines of up to $2,500 per offense.

The financial services company, which has repeatedly deplatformed organizations and individual commentators for their political views, will expand its “existing list of prohibited activities” on November 3. Among the changes are prohibitions on “the sending, posting, or publication of any messages, content, or materials” that “promote misinformation” or “present a risk to user safety or wellbeing.” Users are also barred from “the promotion of hate, violence, racial or other forms of intolerance that is discriminatory.”

As the contents of the new legal agreement because widely known, droves of PayPal customers began to withdraw their funds and close their accounts. One example:

My opinion? Find another service provider. PayPal may have been the big dog in the market, but they aren’t the only one, and who knows what they will try next. I don’t know anything about this particular company, but here is one of the companies advertising their services:

Musk Twitter Purchase Back on Table, Unfortunately with Plan for Everything App


Posted originally on the conservative tree house on October 4, 2022 | Sundance

The only thing I can do is research and write about it.  With an even stronger degree of certainty than originally expressed, and with all of the subsequent data points falling into alignment with the initial suspicions, the background of Jack’s Magic Coffee shop remains unchanged. {Go Deep}

Six weeks ago, the Twitter security ‘whistleblower’ came forward to congress.  The whistleblower is a former technology expert who came from within the research farm of DARPA, the Defense Advanced Research Projects Agency.  Peiter “Mudge” Zatko, is a well-known cybersecurity expert who left government work, entered the public world, and eventually became the head of Twitter security, reporting directly to the CEO. {Go Deep}

According to a recent SEC filing [LINK HERE], Elon Musk is now back to supporting the purchase of Twitter as the first step in creating the “everything app.”

{{{sarcastic voice}}} Gee, what could this be about?  I mean what could go wrong?….  We already know the infrastructure of Twitter’s operational database is tied into portals with the Dept of Homeland security {citation}, and now Musk wants to use that central infrastructure to create an all-inclusive “everything app”?

The bigger risk to the surveillance state is discovery that Twitter and the U.S. intelligence community are in a public-private partnership. The Dept of Homeland Security has access by design, not flaw.  How the stakeholder media are reporting on the issue shows the nature of the risk, (emphasis mine):

[…] The scathing disclosure, which totals around 200 pages, including supporting exhibits — was sent last month to a number of US government agencies and congressional committees, including the Securities and Exchange Commission, the Federal Trade Commission and the Department of Justice. The existence and details of the disclosure have not previously been reported. CNN obtained a copy of the disclosure from a senior Democratic aide on Capitol Hill. The SEC, DOJ and FTC declined to comment; the Senate Intelligence Committee, which received a copy of the report, is taking the disclosure seriously and is setting a meeting to discuss the allegations, according to Rachel Cohen, a committee spokesperson. (link)

How would it damage the U.S. government if previous claims about the Chinese government having access to all user data on TikTok, are shown to be exactly identical to the U.S. government having access to all user data on Twitter?

Let that question settle in for a few moments, because that is exactly what I have been alleging since, well, 2011, when the U.S. State Dept first collaborated with Twitter in a joint public-private partnership to use the platform as a communication tool exploiting the Arab Spring uprising in Egypt, Libya and beyond.

The issue of Jack’s Magic Coffee Shop is an issue of financial viability.  The business model of Twitter just doesn’t exist as a free social media discussion platform while running the ultra-expensive data processing system needed for millions of simultaneous users.  A global chat that requires exponential database responses as an outcome of simultaneous users is just ridiculously expensive. {Go Deep} However, if the computing system and massive database were being subsidized by the U.S. government, then the viability of the ‘free coffee‘ business model makes sense.

“Cloud computing is one of the core components of the strategy to help the IC discover, access and share critical information in an era of seemingly infinite data.” … “A test scenario described by GAO in its June 2013 bid protest opinion suggests the CIA sought to compare how the solutions presented by IBM and Amazon Web Services (AWS) could crunch massive data sets, commonly referred to as big data.” … “Solutions had to provide a “hosting environment for applications which process vast amounts of information in parallel on large clusters (thousands of nodes) of commodity hardware” using a platform called MapReduce. Through MapReduce, clusters were provisioned for computation and segmentation. Test runs assumed clusters were large enough to process 100 terabytes of raw input data. AWS’ solution received superior marks from CIA procurement officials”… (MORE)

♦ Legal Stuff – The issue of American citizen privacy and U.S. constitutional limits against the government listening in on communication is functionally obsolescent.  The Foreign Intelligence Surveillance Act (FISA) prohibits communication intercepts on U.S. citizens without a valid search warrant.  However, if a U.S. citizen is engaged in a conversation with a foreign person, all privacy restrictions are essentially gone. [Insert example of Michael Flynn taking to Russian Ambassador Sergey Kislyak here]

Your phone calls can be intercepted by the government from the foreign side of the call.  The govt can freely monitor the calls that involve foreign actors.  The only rule is that your privacy must be maintained. If the foreign actor is in communication with a U.S. citizen, the U.S. citizen must be “minimized” or not identified in any intercept.

However, what happens when the phone call is on a community line that is connected, and visible, to the entire world?   That’s the benefit of social media monitoring from a surveillance perspective. It is from that opaque and unresolved archaic legal perspective that surveillance authority of social media platforms, by the U.S. intelligence community, exists.   Now you see why the SSCI is taking an interest in the Twitter whistleblower, classic risk mitigation.

Hopefully, you can also see why the 200-page whistleblower document was leaked, by a Democrat staffer, to the Washington Post and CNN.

CNN defends the equity interests of the U.S. State Dept., and WaPo defend the Intelligence Community (CIA, DHS, etc).

Within the narrative as constructed you will note, “Zatko further alleges that Twitter’s leadership has misled its own board and government regulators about its security vulnerabilities, including some that could allegedly open the door to foreign spying or manipulation, hacking and disinformation campaigns.”

If the relationship between Twitter and the U.S. intelligence community is a public-private partnership, why would Twitter want to shut down the portals given to the Dept of Homeland Security?

Answer, they wouldn’t… Ergo the response from Twitter to the whistleblower complaint is (emphasis mine), “What we’ve seen so far is a false narrative about Twitter and our privacy and data security practices that is riddled with inconsistencies and inaccuracies and lacks important context.

Put another way, the “lacks important context” is the nature of the security risk, which is structural to the relationship between the intelligence community and the platform.  See how that works?

The integration between Twitter and the United States Intelligence Community has been hiding in plain sight:

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (more)

A shared hashing protocol is a form of data system integration.  The databases of the identified social media platforms are integrated with the U.S. intelligence system.

…. And now Musk wants to integrate an “everything app”?

Follow the bouncing ball and you enter the world of the comprehensive surveillance state.   But if you don’t do anything wrong, you’ve got nothing to fear right?  Insert example of non-vaccinated repercussions, Canadian truckers and Dutch farmers here.  Then add a digital identity, digital currency, energy resource apportionment and social equity.  Where do you end up?

All I can do is research and write about it.

Even the influential members of the ‘Rebel Alliance‘ used to think I was crazy….  Not any longer.

.

.

….Me Right Now

Tucker Carlson and Harmeet Dhillon Discuss Facebook Suppression of Hunter Biden Laptop Story


Posted originally on the conservative tree house on August 25, 2022 | Sundance

During a segment on his broadcast this evening, Fox News host Tucker Carlson interviewed Center for American Liberty founder and lawyer, Harmeet Dhillon about how Facebook censored and supressed he Hunter Biden laptop story just before the 2020 election. {Direct Rumble Link} – WATCH:

.

Interesting, Facebook CEO Mark Zuckerberg Implies FBI Told Platform to Intercept Hunter Biden Laptop Story


Posted originally on the conservative tree house on August 25, 2022 | Sundance

During a discussion with Joe Rogan, Facebook CEO Mark Zuckerberg was asked about the removal of content, specifically citing the example of the pre-2020 election Hunter Biden laptop story.  In his response Zuckerberg says the background context is important because the FBI came to Facebook and told them Russian disinformation was about to drop, just before the New York Post article was published.

This discussion comes on the heels of an FBI whistleblower approaching the Senate Judiciary Committee with evidence the Washington DC field office was specifically working to coverup any discoveries around the Hunter Biden laptop (per Chuck Grassley).   Add the Zuckerberg statement to the whistleblower claim and the resounding implication is the FBI taking advanced proactive measures to stop information they deem adverse to the interests of democrats.  The issue surfaces at 05:00 of the video below.  WATCH (prompted):

.

Twitter Whistleblower Surfaces Presenting Challenge for U.S. Surveillance State, Enter CNN and The Washington Post


Posted originally on the conservative tree house on August 23, 2022 | sundance 

The background story behind Jack’s Magic Coffee Shop takes an interesting twist today, as a whistleblower deep inside the Twitter technology side of the platform begins to outline what CNN calls, “a threat to its own users’ personal information, to company shareholders, to national security, and to democracy.”

This discussion is where it becomes critical to remember the nature of stakeholders in media.

CNN is the national media firm protecting the interests of the U.S. State Dept.  The Washington Post is the national media firm protecting the interests of the U.S. intelligence apparatus.  The latest Twitter whistleblower information originates in,.. wait for it… “an explosive whistleblower disclosure obtained exclusively by CNN and The Washington Post.”

The whistleblower is a former technology expert who came from within the research farm of DARPA, the Defense Advanced Research Projects Agency.  Peiter “Mudge” Zatko, is a well-known cybersecurity expert who left government work, entered the public world, and eventually became the head of Twitter security, reporting directly to the CEO.

Peiter “Mudge” Zatko is now saying the background technology of Twitter is vulnerable to manipulation.  I’m not going to go into the granules of what Mudge is outlining, instead I prefer to focus on the bigger picture, a scenario we have been outlining for quite a while that could, emphasize *could*, become very explosive, especially considering the legal challenges between the social media platform and Elon Musk.

The nub of the bigger story is essentially that the database of Twitter, and likely other social media platforms, is integrated with the U.S. intelligence system.  The database of Twitter is not necessarily vulnerable to hacking by outside entities, although that is the framework used by media reporting this whistleblower issue.

The bigger risk to the surveillance state is discovery that Twitter and the U.S. intelligence community are in a public-private partnership. The Dept of Homeland Security has access by design, not flaw.  How the stakeholder media are reporting on the issue shows the nature of the risk, (emphasis mine):

[…] The scathing disclosure, which totals around 200 pages, including supporting exhibits — was sent last month to a number of US government agencies and congressional committees, including the Securities and Exchange Commission, the Federal Trade Commission and the Department of Justice. The existence and details of the disclosure have not previously been reported. CNN obtained a copy of the disclosure from a senior Democratic aide on Capitol Hill. The SEC, DOJ and FTC declined to comment; the Senate Intelligence Committee, which received a copy of the report, is taking the disclosure seriously and is setting a meeting to discuss the allegations, according to Rachel Cohen, a committee spokesperson. (link)

How would it damage the U.S. government if previous claims about the Chinese government having access to all user data on TikTok, are shown to be exactly identical to the U.S. government having access to all user data on Twitter?

Let that question settle in for a few moments, because that is exactly what I have been alleging since, well, 2011, when the U.S. State Dept first collaborated with Twitter in a joint public-private partnership to use the platform as a communication tool exploiting the Arab Spring uprising in Egypt, Libya and beyond.

The issue of Jack’s Magic Coffee Shop is an issue of financial viability.  The business model of Twitter just doesn’t exist as a free social media discussion platform while running the ultra-expensive data processing system needed for millions of simultaneous users.  A global chat that requires exponential database responses as an outcome of simultaneous users is just ridiculously expensive. {Go Deep} However, if the computing system and massive database were being subsidized by the U.S. government, then the viability of the ‘free coffee‘ business model makes sense.

“Cloud computing is one of the core components of the strategy to help the IC discover, access and share critical information in an era of seemingly infinite data.” … “A test scenario described by GAO in its June 2013 bid protest opinion suggests the CIA sought to compare how the solutions presented by IBM and Amazon Web Services (AWS) could crunch massive data sets, commonly referred to as big data.” … “Solutions had to provide a “hosting environment for applications which process vast amounts of information in parallel on large clusters (thousands of nodes) of commodity hardware” using a platform called MapReduce. Through MapReduce, clusters were provisioned for computation and segmentation. Test runs assumed clusters were large enough to process 100 terabytes of raw input data. AWS’ solution received superior marks from CIA procurement officials”… (MORE)

♦ Legal Stuff – The issue of American citizen privacy and U.S. constitutional limits against the government listening in on communication is functionally obsolescent.  The Foreign Intelligence Surveillance Act (FISA) prohibits communication intercepts on U.S. citizens without a valid search warrant.  However, if a U.S. citizen is engaged in a conversation with a foreign person, all privacy restrictions are essentially gone. [Insert example of Michael Flynn taking to Russian Ambassador Sergey Kislyak here]

Your phone calls can be intercepted by the government from the foreign side of the call.  The govt can freely monitor the calls that involve foreign actors.  The only rule is that your privacy must be maintained. If the foreign actor is in communication with a U.S. citizen, the U.S. citizen must be “minimized” or not identified in any intercept.

However, what happens when the phone call is on a community line that is connected, and visible, to the entire world?   That’s the benefit of social media monitoring from a surveillance perspective. It is from that opaque and unresolved archaic legal perspective that surveillance authority of social media platforms, by the U.S. intelligence community, exists.   Now you see why the SSCI is taking an interest in the Twitter whistleblower, classic risk mitigation.

Hopefully, you can also see why the 200-page whistleblower document was leaked, by a Democrat staffer, to the Washington Post and CNN.

CNN defends the equity interests of the U.S. State Dept., and WaPo defend the Intelligence Community (CIA, DHS, etc).

Within the narrative as constructed you will note, “Zatko further alleges that Twitter’s leadership has misled its own board and government regulators about its security vulnerabilities, including some that could allegedly open the door to foreign spying or manipulation, hacking and disinformation campaigns.”

If the relationship between Twitter and the U.S. intelligence community is a public-private partnership, why would Twitter want to shut down the portals given to the Dept of Homeland Security?

Answer, they wouldn’t… Ergo the response from Twitter to the whistleblower complaint is (emphasis mine), “What we’ve seen so far is a false narrative about Twitter and our privacy and data security practices that is riddled with inconsistencies and inaccuracies and lacks important context.

Put another way, the “lacks important context” is the nature of the security risk, which is structural to the relationship between the intelligence community and the platform.  See how that works?

The integration between Twitter and the United States Intelligence Community has been hiding in plain sight:

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (more)

A shared hashing protocol is a form of data system integration.  The databases of the identified social media platforms are integrated with the U.S. intelligence system.

So, what is the angle here?  Peiter/CNN’s objective is to support Musk‘s part of the legal argument. That support helps Elon Musk exit from Twitter deal. That exit allows Twitter/IC to return to surveillance operations and intel gathering with exposure risk removed. That’s Peiter’s objective.

I shall leave on a happy note, which highlights the nature of the risk:

After this article was initially published, Alex Spiro, an attorney for Musk, told CNN, “We have already issued a subpoena for Mr. Zatko, and we found his exit and that of other key employees curious in light of what we have been finding.” (LINK)

Hello, fellas…

.

Now, for the pantomime, and to showcase the need for extreme control by the narrative engineers.  Notice how the directors of the CNN segment use alternative actors to shape the context of what Mr. Peiter “Mudge” Zatko is saying.  This is classic intelligence community media tradecraft.

Notice what is expressly attributed to Mudge in his own words, versus what is implied toward Mudge from alternative voices and faces that appear.  Once you see the strings on the marionettes, you can never return to that moment in the performance when you did not see them.  WATCH:

How an Obsession with SAFETY Leads to Mental Illness & Tyranny – Academy of Ideas


After Skool Published originally on Rumble on April 23, 2022 

This video was made in collaboration with Academy of Ideas. They create videos explaining the ideas of history’s great thinkers in order to help supply the world with more knowledge, to empower the individual, and to promote freedom. Please check out their youtube channel for more brilliant content. https://www.youtube.com/c/academyofideas or visit their website to learn more https://academyofideas.com/

This video explores some of the philosophies which examine the prioritization of safety. What happens when we value safety above all other values? I hope you all enjoy!

Order After Skool prints and clothes here – after-skool.creator-spring.com
Get the After Skool Kid’s Book – Why Don’t Country Flags Use The Color Purple? – https://www.amazon.com/Dont-Country-F
Get in touch via https://www.afterskool.net/
Please support on Patreon – https://www.patreon.com/AfterSkool
Follow our IG: https://www.instagram.com/afterskool100/
Or check out the After Skool NFT collection https://opensea.io/collection/after-s

CDC Stops Reporting Cruise Ship COVID Outbreaks


Armstrong Economics Blog/Corruption Re-Posted Jul 21, 2022 by Martin Armstrong

The Centers for Disease Control and Prevention (CDC) will no longer report COVID outbreaks on cruise ships. Per the CDC’s website:

“As of July 18, 2022, CDC’s COVID-19 Program for Cruise Ships is no longer in effect. CDC will continue to publish guidance to help cruise ships continue to provide a safer and healthier environment for passengers, crew and communities going forward.”

Clearly, this is an attempt to hide the fact that the vaccinated are spreading and contracting COVID, possibly more frequently than the unvaccinated. Nearly all cruise liners have required staff and passengers to be “fully vaccinated” before boarding. Yet, there are countless stories of COVID outbreaks on ships with 100% vaccination rates. So the cruise industry lost over $63 billion between 2020 and 2021 for absolutely no reason.

The CDC still recommends that vacationers take a COVID test before boarding and adhere to all their guidelines. The agency now claims that the liners simply have access to their guidance and they no longer need to control the situation. In reality, they cannot explain why ships containing fully vaccinated passengers and staff are experiencing outbreaks. Answer: THE VACCINE DOES NOT WORK!