China’s Extreme Lockdown Measures


Reposed form Reddit

Former Intel Officials Want Efforts to Break Up Big Tech Stopped – Data Control and Retention of Social Media Partnership Is a National Security Imperative


Posted Originally on the conservative tree house on April 20, 2022 | Sundance

Put this in the tab labeled ‘conclusive proof of prior suspicions.’

Former Obama era intelligence officials, those who helped construct, organize and assemble the public-private partnership between intelligence data networks and supported social media companies, have written a letter to congress warning that any effort to break up Big Tech (Twitter, Facebook, Instagram, Google, Microsoft, etc.) would be catastrophic for the national security system they have created.

[READ LETTER HERE]

Citing the information control mechanisms they assembled, vis-a-vis the ability of social media networks to control and approve what is available for the public to read and review, the intelligence officials declare that any effort to break up the private side of the intel/tech partnership will only result in less ability of the intelligence apparatus to control public opinion.

They willfully admit that open and uncensored information is adverse to the interests of the intelligence state and therefore too dangerous to permit.   They specifically argue, if the modern system created by the partnership between the U.S. government and Big Tech is not retained, the national security of the United States is compromised.  Let that sink in for a moment.

One of their reference citations revolves around Ukraine and the Russia narrative:

“U.S. technology platforms have given the world the chance to see the real story of the Russian military’s horrific human rights abuses in Ukraine, including the atrocities committed in Bucha, and the incredible bravery of the Ukrainian people who continue to stand their ground. Social media platforms are filled with messages of support for Ukraine and fundraising campaigns to help Ukrainian refugees.” (Paragraph 2, Letter)

Keep in mind the “Bucha” narrative is widely disputed by people who have reviewed the western government/media evidence.

There is equal evidence the Bucha narrative was a western intelligence operation, created to give a false impression and generate public support for advanced military operations in Ukraine.

Seeing this public relations effort using the Bucha story as evidence to support their goal of keeping Big Tech isolated from legislative review, only lends more credence to suspicions the Bucha events were a U.S. led intelligence operation (false flag).

Glenn Greenwald has a good take on the granular details behind their letter:

[…] This is where these former intelligence and national security officials come in. While these former CIA, Homeland Security and Pentagon operatives have little sway in the Senate Judiciary and House Antitrust Committees, they command great loyalty from Congressional national security committees.  Those committees, created to exert oversight of the U.S. intelligence and military agencies, are notoriously captive to the U.S. National Security State.

The ostensible purpose of this new letter is to insist that Big Tech monopoly power is vital to U.S. national security — because it is necessary for them to censor “disinformation” from the internet, especially now with the grave Russian threat reflected by the war in Ukraine — and they thus demand that the anti-Big-Tech bills first be reviewed not only by the Judiciary and Antitrust Committees, but also the national security committees where they wield power and influence”… (read more)

Of course, the Fourth Branch of Government would want to get the Senate Select Committee on Intelligence involved.  The SSCI created all of the mechanisms to facilitate the existence of the Fourth Branch of Government.  However, I would take the issue deeper…. and ask readers to see what really worries the intelligence apparatus about the potential breakup of Big Tech.

These are the intelligence people who constructed the model for Jack’s Magic Coffee Shop.

This public-private partnership between the cyber division of the intelligence apparatus and Big Tech social media is where the free coffee comes from.

Twitter, Facebook, Instagram, YouTube and even Google itself, are financially and operationally dependent on the scale of the data processing system that is run by the U.S. government.  The capacity of each of the big social media companies to exist, operate and be financially viable, is dependent on the backbone of interconnected data networking, and massive data processing.

The scale of simultaneous user data-processing is not financially viable without the U.S government subsidizing it.  That’s the free coffee that cannot be duplicated in the private sector by any competing social media company.  That’s the cost and scale system behind the partnership that permits Big Tech to operate.   Ultimately, this is what the intelligence apparatus needs to keep hidden from the American (and global) public.

The biggest of the Big DATA processing is done through a public-private collaboration between Big Tech and Big Government/Intel.

Any private sector entity who attempts to create, or duplicate the scale of social media runs into this cost issue.  It is just too expensive to operate a competing coffee shop without the free coffee.   That’s why the coffee providers are lined up against Elon Musk’s attempt to buy Twitter.

The ramifications of the public discovering Facebook and Twitter social media are only possible with subsidy from government tech architecture are massive.  Essentially, the U.S. government is in control of our social media networking.  That’s the bigger story behind this letter.

These officials are trying to preserve the surveillance system they created.

The public-private partnership is a system for surveillance of the American people through technology.

BACKGROUND – The volume of metadata captured by the NSA has always been a problem because of the filters needed to make the targeting useful. There is a lot of noise in collecting all data that makes the parts you really want to identify more difficult to capture. This admission, along with the admission of collaboration from 2021, puts a social media filtration system in the metadata that circumvents any privacy protections for individuals.

Previously, the Intelligence Branch worked around the constitutional and unlawful search issue by using resources that were not in the United States. A domestic U.S. agency, working on behalf of the U.S. government, cannot listen on your calls without a warrant. However, if the U.S. agency sub-contracts to say a Canadian group, or foreign ally, the privacy invasion is no longer legally restricted by U.S. law.

What was announced in June 2021 was an admission of a relationship with Big Tech along with open intent to define their domestic political opposition as extremists.

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (read more)

The influence of the Intelligence Branch now reaches into our lives, our personal lives through their efforts in social media.

In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it.  Back then, the legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01, the short-sighted legislative reactions opened the door to allow the surveillance state to weaponize.

After the Patriot Act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power. The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the installation of Barack Obama was all about.

The Obama era intelligence team took pre-assembled intelligence weapons we should never have allowed to be created and turned those weapons into tools for radical, political and fundamental change.  The target was the essential fabric of our nation. Ultimately, this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch.  From that perspective, the fundamental change was successful.

It’s all Connected FolksSEE HERE

[…] “The vision was first outlined in the Intelligence Community Information Technology Enterprise plan championed by Director of National Intelligence James Clapper and IC Chief Information Officer Al Tarasiuk almost three years ago.” … “It is difficult to underestimate the cloud contract’s importance. In a recent public appearance, CIA Chief Information Officer Douglas Wolfe called it “one of the most important technology procurements in recent history,” with ramifications far outside the realm of technology.” (READ MORE)

One job…. “take the preexisting system and retool it so the weapons of government only targeted one side of the political continuum.”

References:

Jack’s Magic Coffee Shop – HERE

The Fourth Branch of Government – HERE

Pakistan – Conspiracy or Revolution?


Armstrong Economics Blog/Conspiracy Re-Posted Apr 10, 2022 by Martin Armstrong

The drama playing out in Pakistan is interesting, to say the least. Pakistan’s Prime Minister Imran Khan has been ousted from power after losing a no-confidence vote in his leadership. However, what makes this interesting is that he has previously said he would not recognize an opposition government. Khan has accused that there has been a US-led conspiracy to overthrow him because of his refusal to stand with Washington on issues against Russia and China.

Khan has repeatedly said that Pakistan’s opposition parties are working with foreign powers. He has not been alone in this allegation for members of his party (PTI) also left the building just ahead of the vote, insisting that this has been an international conspiracy. Of course, then the US has said there is “no truth” in these allegations. But certainly, they would never admit to anything anyhow.

The economic crisis in Pakistan is without question grounds for a revolution without a foreign conspiracy.  Khan’s government has been dismissing the no-confidence move against him that began on March 8th, 2022 – which came amid the country’s mounting economic crisis – as a “foreign conspiracy”.  To put this in context, in an unprecedented move on April 3, Pakistan Prime Minister Imran Khan dissolved the General Assembly. Then on April 7, the Supreme Court ruled against Khan and restored the Parliament for a no-confidence vote. Then on April 10th, they moved to oust Kahn from power.

Soaring inflation, devaluation of the currency as the dollar has risen from 152 to 188 since April, massive external debt, and corruption have been the real motivation behind the political chaos. What Kahn has called a foreign conspiracy is not entirely without merit, but it has not been directed at him alone.

Biden’s pledge to end fossil fuels set in motion the rise in energy prices on a global scale. Then he imposed the most draconian sanctions against Russia and has destroyed the world economy showing that now even the SWIFT system has lost all integrity. In fact, Putin has come out and warned that the BRIC countries must now establish their own alternative to SWIFT only further demonstrating what Biden has done is destroyed the world economy.

The soaring energy prices are indeed creating political havoc around the globe and this political uprising in Pakistan is indeed a foreign conspiracy better known as the Great Reset trying to force the entire world GREEN without any alternative in place. The foreign conspiracy is NOT some CIA plot to oust Khan. It is a disastrous scheme for climate change that these people have no idea what they are unleashing upon the entire world. These poorer countries cannot survive with energy prices soaring and incomes that were simply a hand-to-mouth economy. This is WHAT our computer has been showing that we are headed into outright global war and an economic catastrophe that these elitists who think that they can force the world all GREEN in a matter of a few years. This is unleashing worldwide civil unrest on a scale that is unprecedented in human history.

Day Five – The Fourth Branch of Government, The Intelligence Branch


Posted originally on the conservative tree house on July 22, 2021 | Sundance | 98 Comments

When we understand how the Fourth Branch works [See all Previous Outlines], questions about our dysfunctional U.S. modern government are answered. Additionally, the motives and intentions of people inside the institutions start to reconcile. However, before completing the final outline, there is a structural understanding needed about the global intelligence apparatus.

On a global scale – the modern intelligence gathering networks are now dependent on data collection to execute their intelligence missions.  In the digital age nations have been executing various methods to gather that data.   Digital surveillance has replaced other methods of interception.  Those surveillance efforts have resulted in a coalescing of regional data networks based on historic multi-national relationships.

We  have a recent frame of reference for the “U.S. data collection network” within the NSA.  Through the allied process the Five Eyes nations all rely on the NSA surveillance database (U.K, Australia, Canada, New Zealand and U.S.)   The NSA database provides the digital baseline for intelligence operations in defense of our allies.  The portals into the NSA database are essentially an assembly of allies in like-minded ideological connection to the United States.

Unfortunately, there have been some revelations about the NSA database being used to monitor our allies, like in the example of Germany and surveillance on Angela Merkel’s phone.  As long as “the good guys” are operating honorably, allies of the United States can feel confident about having protection from the NSA surveillance of global digital data.  We warn our friends if we detect something dangerous etc.

The U.S. has nodes on communication pipelines to intercept and extract data.  We have also launched hundreds, perhaps thousands, of satellites to conduct surveillance and gather up data.  All of this data is fed into the NSA database where it is monitored (presumably) as a national security mechanism, and in defense of our allies.

However, what about data collection or data networks that are outside the NSA database?  What do our enemies do?  The NSA database is just one intelligence operation of digital surveillance amid the entire world, and we do not allow access by adversaries we are monitoring.  So what do they do?  What do our allies do who might not trust the United States due to past inconsistencies, ie. the Middle-East?

The answers to those questions highlight other data collection networks.  So a brief review of the major players is needed.

♦ CHINA – China operates their own database.  They, like the NSA, scoop up data for their system.  Like us, China launches satellites and deploys other electronic data collection methods to download into their database.  This is why the issues of electronic devices manufactured in China becomes problematic.  Part of the Chinese data collection system involves the use of spyware, hacking and extraction.

Issues with Chinese communication company Huawei take on an added dimension when you consider the goal of the Chinese government to conduct surveillance and assemble a network of data to compete with the United States via the NSA.  Other Chinese methods of surveillance and data-collection are less subversive, as in the examples of TicTok and WeChat.  These are Chinese social media companies that are scraping data just like the NSA scrapes data from Facebook, Twitter and other Silicon Valley tech companies.  [ Remember, the Intelligence Branch is a public-private partnership. ]

♦ RUSSIA – It is very likely that Russia operates their own database.  We know Russia launches satellites, just like China and the USA, for the same purposes.  Russia is also very proficient at hacking into other databases and extracting information to store and utilize in their own network.  The difference between the U.S., China and Russia is likely that Russia spends more time on the hacking aspect because they do not generate actual technology systems as rapidly as the U.S. and China.

The most recent database creation is an outcome of an ally having to take action because they cannot rely on the ideology of the United States remaining consistent as the administrations ping-pong based on ideology….

 SAUDI ARABIA – Yes, in 2016 we discovered that Saudi Arabia was now operating their own intelligence data-gathering operation.  It would make sense, given the nature of the middle-east and the constant fluctuations in political support from the United States.   It is a lesson the allied Arab community and Gulf Cooperation Council learned quickly when President Obama went to Cairo in 2009 and launched the Islamist Spring (Arab Spring) upon them.

I have no doubt the creation of the Saudi intelligence network was specifically because the Obama administration started supporting radical Islamists within the Muslim Brotherhood, and threw fuel on the fires of extremism all over the Arab world.

Think about it., What would you do if you were Saudi Arabia, Egypt, Bahrain, Kuwait, the UAE, Jordan, Oman or Yemen and you knew the United States could just trigger an internal uprising of al-Qaeda, ISIS and the political arm of the Muslim Brotherhood to seek your destruction?

Without a doubt, those urgent lessons from 2009, 2010, 2011 triggered the formation of the Arab Intelligence Network as a network to defend itself with consistency.  They assembled the network and activated it in 2017 as pictured above.

 Israel – Along a similar outlook to the Arab network, no doubt Israel operates an independent data collection system as a method of protecting itself from ever-changing U.S. politics amid a region that is extremely hostile to its very existence.   Like the others, Israel launches proprietary satellites, and we can be sure they use covert methods to gather electronic data just like the U.S. and China.

As we have recently seen in the Pegasus story, Israel creates spyware programs that are able to track and monitor cell phone communications of targets.  The spyware would not work unless Israel had access to some network where the phone meta-data was actually stored.  So yeah, it makes sense for Israel to operate an independent intelligence database.

♦ Summary:  As we understand the United States Intelligence Branch of government as the superseding entity that controls the internal politics of our nation, we also must consider that multiple nations have the same issue.  There are major intelligence networks around the world beside the NSA “Five-Eyes” database.  China, Russia, Saudi Arabia and Israel all operate proprietary databases deploying the same tools and techniques for assembly.

The geopolitical conflict that has always existed has now shifted into a digital battle-space.  The Intelligence Agencies from these regions are now operating as the backbone of the government that uses them, and has become dependent on them.  [<- Reread that].

Once you accept the digital-era intelligence apparatus of China, Russia, Saudi-Arabia, The United States and Israel, are now the primary national security mechanisms for stabilization of government; then you accept the importance of those intelligence operations.

Once you understand how foundational those modern intelligence operations have become for the stability and continuity of those governments…… then you begin to understand just how the United States intelligence community became more important than the government that created it.

What you have just read is the baseline for the next chapter in ¹our series of how the Intelligence Branch has become the superseding branch of the United States government.  This foundational understanding also explains why traditional intelligence “oversight”, which was never structured to end up as subservient to the intelligence system it was intended to oversee, has become useless in controlling or restraining this Intelligence Branch.

Taiwan & the Risks


Armstrong Economics Blog/China Re-Posted Jul 6, 2021 by Martin Armstrong

QUESTION: Mr. Armstrong; I take it you see China retaking Taiwan in the years ahead. I read your latest report. With your expertise, how do you see that unfolding?

Thank you for your guidance

KJ

ANSWER: China would most likely use its DF-16 – a short-range ballistic missile which Taiwan would have extreme difficulting in preventing them from getting through their defense net. They would target all military installations and possibly take out Taiwan’s airports and that would probably be followed by surface troops landing on their shores. China has its H-6 bombers and J-16 fighter jets, which would wipe out its naval force.

China would then launch several rounds of intensive cruise missile attacks, such as the YJ-91 and CJ-10. These would be launched from both land and sea. This would further target all military bases, ammunition depots, communications infrastructure, and key road junctions. If the PLA did not surrender, since the US and Japan will NOT come to their aid,  then they would use artillery strikes from surface ships and land-based rocket forces to annihilate the PLA’s resistance. I suspect they could take Taiwan in less than 2 weeks. They have been conducting major military exercises.

I do not believe that China is interested in wiping out the infrastructure or the means for economic commerce in computers. The question would be that the West will probably then look to create a competitive chip production to prevent reliance on Asia for computer technology.

Chinawood


Posted originally on GrrrGraphics.com on JUL 2, 2021 AT 10:13 PM

Bruce Lee’s daughter harshly criticized Quentin Tarantino for a scene in his movie, “Once Upon A Time In Hollywood.” She said her father was stereotyped in fight scene with Brad Pitt. Tarantino acknowledge her right to criticize, but essentially told the other ‘woke’ critics to take a hike. This was the right thing to do, otherwise the criticism does not end and creativity is destroyed. 

I like Tarantino’s over-the-top revenge movies, but I disagree with the leftist director politically. Still, it’s good to see someone in Hollywood willing to stand up to the woke mob. Bill Maher is another who is pushing back against the humorless hectors who want to shut down comedy and creative freedom throughout America’s entertainment industry. The worst thing is what John Cena did. He delivered a disgusting, groveling, and sniveling apology to the communist Chinese simply because he called Taiwan a country. It is. 

The Chinese Communist Party has become instrumental in funding Hollywood studios and theaters. In exchange they demand editing rights over scripts. Naturally, they remove anything that does not portray the communist Chinese in the best possible light. They will not allow positive comments about the Taiwanese or Tibetans. Both Chinese and American audiences are subjected to Chinese propaganda in movies.

In 2012, the ChiComs successfully influenced a remake of the movie, ‘Red Dawn.’ The Chinese were the invaders in the second movie and the communists can’t stand to be shown as the bad guys. Hollywood didn’t want to lose the large and valuable Chinese audience, so the antagonist was changed to North Korea. The ChiComs still blocked the movie in their country anyway.

It’s not even ironic that China IS the country most likely to stage a ‘Red Dawn’ invasion in America. In fact, it’s already happening. China promotes division in the USA while stealing our military and corporate secrets. They helped the Democrats steal the election for Biden. Their spies are everywhere—in our military, security agencies, Congress, and especially in our colleges. The Chinese are using political correctness and ’woke-ism’ to destroy what’s left of American culture. They especially want to do away with our Second Amendment.

The Chicoms want the USA to self-destruct. This will allow them to invade and take over more easily. China Joe is closely following that script

.—Ben Garrison

Chinese Direct Foreign Investment Declines Sharply


Armstrong Economics Blog/China Re-Posted Jun 18, 2021 by Martin Armstrong

Chinese investment overseas actually scored a 13-year low in 2020 thanks to COVID and the rising tensions of economic uncertainty as the West tries to pressure China to join the Great Reset. Even the pandemic-related travel restrictions curtailed put a huge barrier to foreign investment for China. Most critical has been the fact that Chinese foreign direct investment into Europe came in as a 10-year low in 2020 for the 4th consecutive year-on-year decline.

Our models are projecting a further 3-year decline into 2023 before any temporary low can even form. Moreover, it also appears that there may be the liquidation of Chinese direct investment into Europe going into 2023.

Reported Chinese Defector With Information About Wuhan Lab Possibly Related to Sun Lijun, Former Chinese Deputy Minister of Public Security


Posted originally on the conservative tree house on June 4, 2021 | Sundance | 138 Comments

Red State is reporting on a defector to the Defense Intelligence Agency (DIA) who is presumably giving the U.S. government information related to the leak from Wuhan BioLab.

RED STATE – […] “Sources tell RedState the defector has been with the DIA for three months and that he has provided an extensive, technically detailed debrief to US officials. In DIA’s assessment, the information provided by the defector is legitimate. Sources say the level of confidence in the defector’s information is what has led to a sudden crisis of confidence in Dr. Anthony Fauci, adding that U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) personnel detailed to DIA have corroborated very technical details of information provided by the defector. (read more)

Interestingly, one of the incredibly astute Twitter researchers who focuses on China, “aka Ben“, previously reported on the family of Sun Lijun who defected to Australia in February of last year.  Sun Lijun was the former Chinese Deputy Minister of Public Security who was sent to Wuhan to manage (aka cover-up) the SARS-CoV-2 breakout.  His wife and children fled China during the height of the pandemic spread.

As Ben noted: after Sun Lijun’s family defected to Australia in February 2020, Sun Lijun was arrested by the Chinese Communist Party in April 2020 under the auspices of corruption charges; a familiar way of dealing with those who defy the communist regime.  If the defector identified within the Red State reporting is accurate, the description would align with someone very close to Lijun (likely), if not Lijun himself (less likely).

Ben is always well researched and accurate. We’ll keep watching…

Tiananmen 32 Years Ago Today


Posted originally on the conservative tree house on June 4, 2021 | Sundance | 259 Comments

It was 32 years ago tonight when the Chinese government sent the Mongolian Army into Tiananmen Square to crackdown on the mostly student protestors.

It is against the law in China to recognize today, memorialize the dead, or even speak publicly of this bloody anniversary. Few people know the short and long-term political ramifications to this event which extended far beyond the borders of China.

Many people are familiar with this image:

However, not as many people are as familiar with the wide shot.

That’s some serious courage right there.

The June 4th 1989 anniversary holds a great deal of personal significance for those who witnessed the events.

Few people even know how most of the regular Chinese military refused orders to open fire on the protesting crowd. Hundreds of young Chinese military soldiers actually formed lines around the mostly student activists in an effort to protect them. The Chinese government eventually bypassed the regulars and instructed the Mongolian military divisions who carried out the orders.

No-one really knows how many were killed, and even the families of the fallen were too scared to speak publicly.

Those who were lost live-on in whispered memories of lore.

So many.

So young.

We remember.

…Then the tanks came….

Cold War II—Just How Dangerous Is China?


interview with H. R. McMasterMatt PottingerTuesday, April 13, 2021https://www.podbean.com/media/player/gpny2-100a042?from=yiiadmin&skin=1&btn-skin=102&share=1&fonts=Helvetica&auto=0&download=0&rtl=0

China is a nation with 1.3 billion people, an economy projected to become bigger than the United States’ in just a few years, and a rapidly growing military.  Hong Kong has already fallen under its authority. Meanwhile, Taiwan looms in the distance—with a population of almost 24 million, it’s a technology hub and the world’s leading manufacturer of microchips and other items essential to high tech. What are China’s ambitions toward Taiwan? And if they are ominous, what should the US response to Chinese aggression be? To answer these questions, we’re joined by two experts: former national security advisor (and current Hoover Institution senior fellow) H. R. McMaster and former US deputy national security advisor (and current Hoover distinguished visiting fellow) Matthew Pottinger. They also discuss the Biden administration’s recent diplomatic encounters with China, and which countries might be allies in a conflict with China—and which ones would not be.