You are Here:
Tools used to actually create&enforce fake L/R paradigms for social control

Author (Read 125 times)

0 Members and 1 Guest are viewing this topic.


Effie Trinket

  • Awakened
  • **
  • 59
How do you dupe people into supporting Barack H Obama, and then dupe the "opposite" group to support Donald J. Trump? (by using the tools below):

How do you get people to rally behind the latest politician? (by using the tools below):

How do you know WHAT PUSHES PEOPLES BUTTONS?  (by using the tools below):

WHY is everyone so 'stupid' that they can never wake up?  Because the tools being used below are in in-your-face illustration of exactly the extent to which THE DECK IS STACKED against you.

How do you create NEW fake paradigms, like "populist", "alt-left", "alt-right"?  (by using the tools below):

How do you create elaborate narratives like wholesale 'replacements' for Al-Qaeda like 'ISIS', replete with manufactured histories and storylines?

Why do people keep believing lies, and lies within lies?  Because you are being surveilled and data-mined, and AI systems are adjusting themselves based on HOW YOU ARE RECEIVING, RESPONDING, AND REACTING TO the propaganda that you are expected to act upon, and then takes all that into account to create NEW propaganda that it calculates has the best likelihood of keeping the public completely discombobulated and to instill apathy (you want to give up, because YOU ARE BEING OVERWHELMED by these systems of thought-steering, emotion-steering, control).
Adaptive Multi-modal
Data Mining and Fusion
For Autonomous Intelligence Discovery

Edward J. Wegman, Ph.D.
Yasmin H. Said, Ph.D.
October 23, 2007

Problem Description

• Consider the plight of an analyst, who is faced with multimedia sources that stream in data constantly.

• Data can be structured text, unstructured text, voice, images, and video.

• The data likely are not English language; the data are likely to be massive in scale; the data are streaming.

• Our premise: The analyst needs a system tool to integrate, filter, and present to the analyst for his or her consideration
the data that are most likely to be useful.

• The tool should be a query system that must operate transparently and without significant human fine tuning.

When you are running a corporate fascist state and, in your paranoia, you have the need to watch and read the email, voicemail, websites, documents, pictures, videos etc., of EVERYONE who could possibly represent a THREAT to your POWER, (and, let's face it, that would be most of humanity), you have a BIG PROBLEM.

You've perfected the art of spying on everyone - you get the data in any number of ways, but...

Once you've grabbed all of this data, how can you efficiently 'read' it, 'interpret' it, and put it through analysis, without requiring any human intervention? This data is worthless unless you can tell who your enemies are ... where they are and what they're saying!!! (Enemies are EVERYWHERE ... OH MY GOD!!!)

Let's see what they did to solve this problem....

Outline of System

Here's the system as the data is being fed in from different sources...
Note the sources:

Speech Audio:
  Intercepted phone calls
  Recorded conversations


Internet chat records

And what they don't specifically mention on this diagram, but what is absolutely included is:
news websites
personal websites
social networking websites
you tube and other video websites
etc. etc. ad infinitum...

What's up with this two-mode computation... hmmm...

They are trying to assign a 'value' to the source (person, website, social networking site) of the incoming data.
Once they assign a value, they will be able to assign it a relative importance vs. the other sources of data.

Weighing the importance of the site is very important to the parsing of the data received from the site;
when looking at that data vs. the millions of other data streams coming into the 'system' ...
in this example, we see that the number of individuals participating in the site is important;
and the number of "adjacent" individuals (think "friends" on facebook) is another important marker.

Parsing the incoming data: TEXT

New Directions

• The term-term block model matrix will associate words that are used in the same way
    – We conjecture this will be a way to automatically create synonyms

• The document-document block model matrix will associate documents that are similar …
   an automated clustering mechanism

Streaming Documents

• Functionality Desired
   – Process streaming text documents.
      • Vector space representation of a document.
      • Streaming documents imply evolving lexicon.
         – Recursive computation of document frequency.
   – Use evolving lexicon.
      • Track evolving sense of documents.
      • Introduce new query terms.
      • Classify new documents.

Adaptive Multi-modal
Data Mining and Fusion
For Autonomous Intelligence Discovery
Edward J. Wegman, Ph.D.
Yasmin H. Said, Ph.D.
October 23, 2007


The above represents what could be described as the 'end product' of this data parsing system. These are a collection of screen shots that would be presented to a HUMAN who may need to make the final decisions about the information.  It is various displays of the condensed collection of weighted data that show the summary of potential 'bad things' for the NWO paranoids. To get to this, there are a few steps that you can see below.  These will outline the various systems of compression used to come up with the final 'list' of suspect information.

   Text processing is usually performed on a fixed corpus of text
   What to do in the case of news articles or weblogs or even research articles when you want to examine them in time?

For a detailed example of how to do something
simple with text (using R and MDS), see

Measuring Similarity between documents

Translation: One way to look at this is that it is a process is one where the content of a specific doc (let's say an article on Ukrainian Pneumonic Plague) is parsed... and compared to another article with similar trigger words ("Ukraine" or "Pneumonic" or combination).
This is a way to distinguish between two separate articles with the same keywords, or a single article printed in two or more separate publications.

Document Frequency for a Changing Corpus

Translation: This is a step where the actual key words are counted in each document; and each document that contains the key words ("Ukraine" or "Pneumonic" or combination) is counted. The value of the document is affected by the frequency of key words. So a document with 10 instances of the words is more valueable (has a greater weight) than a doc with one instance).

Maintaining the Changing Lexicon

Translation: They keep track of the number of times a specific key word shows up in the 'collection' of information. Like frequency within a specific text stream, the frequency of the keyword within a collection of text streams is very important.  Maintaining the "lexicon" is their way to clean house when some words become stale, and others emerge).  (You can imagine this happening in the lexicon now, as "H1N1" replaces "Avian Flu" as the disease of choice for NWO propagandists).

Parsing the News....

Google News Data Set

Approximately 350 articles per day
70 each in the 5 categories:
World, US, Business, SciTech, Health
Each article (an HTML file) is parsed
and then further cleaned
The cleaning algorithm isn’t perfect
It is difficult to extract only the article body and
not advertisements, links to other articles, etc.

Notice they chose "Google News" as the example. LMAO! A good NWO Choice.
The Infowars site, and the prison planet forum must give the AI software a run for it's money:


Streaming News

Note: Instances of weighted information are displayed in a scatter diagram; color coded to the (in this case) google news example above. I suspect that any dot's 'outside' the acceptable range would be targeted for censorship.

A Graph Model
  * A graph model is used to represent a dynamic corpus of text
  * Differs from methods that act on a fixed corpus
  * Vertices represent topics and evolve as the document stream changes

Graph Model

represent topics – accumulations of similar articles

Each node has an associated set of words and counts of those words from articles that have been assigned to the node

A new article gets assigned to the node to which it is most similar (cosine similarity)

If it is less than τ similar to any node, it initializes a new node or resets an existing node

Notice the use of the word "node" in reference to an information source .. website or online news organization. That word is used in discussions about "Network Centric Warfare" - where a 'node' is a potential target. Nodes connected to other nodes are useful tools for the NWO; they can find the source node, take it out, and debilitate the 'adjacent' or associated nodes. This is something you can read more about here:
Burn in hell NWO, the underpinnings of your operations have been exposed!
And here: Leaderless Resistance - Fighting "Network Centric Warfare" Principals

Articles assigned to one node over time

* Build a graph of order 200 on news from January 2006

 * Display the articles assigned to one node over time

 * Display the high weight words in the node over time

The above chart illustrates how the frequency of specific words (like "hamas", "pakistan", "symantec", etc.) is shown in the graph as darker boxes of grey. The more often a word appears in the parsed text, the darker the box of grey. This is the visual display of 'weighted' words.

One display of words with high frequency is seen in this image above: the more frequent the word appears, the larger the size of the type display. Click on a specific word that you see (in this example, clicking on the word "Face" in the screen above, would bring up the following in the screen below:

And the 'summary' of all articles; with highlighted keywords; weighted by importance is here:

PsyOp Internet Battle for Hearts, and Minds
Posted on January 1st, 2010 by David-Crockett

Sancho Jones
January 1, 2010

The Internet revolution has changed the face of our planet. Over the last 20 years there’s been a complete transformation of the way we live, conduct business, and share information. In the same amount of time, information technology has helped bring countless atrocities committed by governments, and global corporations into view. We’ve seen the rise of groups like “We Are Change”, and birthing of the “Truth Movement”; which has kicked off a viral, and grassroots information wave. The Internet’s been in many regards a saving grace of mankind, and in the same likeness the greatest threat to the establishment!

Recently, we had the Global Warming talks in Copenhagen; they were a failure! What else could come from the exposure of emails showing fudged data on Global Warming? Nothing is what. Climate Gate[1] changed what would have been global “Cap, & Trade” agreements, and other carbon tax legislation from an assured victory at Copenhagen, to an embarrassment. Al Gore decided it’d be better not to show up at all, after having to run from angry mobs, and being pelted by snow balls due to the leaks. The only thing that came of the conference, was a poor attempt at “saving face” through a non binding resolution.

Those hiding behind governments, and global corporations have long known the necessity of owning the Hearts, and Minds[2] of the people; in order to further their agendas. We’ve learned catchy phrases which embody the techniques. Some of these would include; “Divide, and Conquer”, “Smoke, & Mirrors”, “Order out of Chaos”, “Problem, Reaction, Solution”. Through the usage of these tools, perceptions can be changed, and goals can be accomplished. The US Govt. has actively sought to win the Hearts, and Minds of people openly since the Cold War.

During the height of the Cold War, and Civil Rights movement, the FBI created COINTEL[3]; which is an acronym of various programs the US Govt. used to deal with both issues. The methods used in COINTEL were inline with the techniques mentioned above. The overall goal was to control the information, and/or distort it so as to crush all legitimate opposition to the US Policy, or Hegemony of the time. This propaganda machine officially ended, but from the information presented below, it looks as though it is going stronger than ever before; and the Internet is the new battle ground.

There is subversion being committed across the World Wide Web on an ever increasing basis. The mainstream media has been very active in the shaping of our feelings, and thoughts, from the bottom up to meet current policy. We’ have MSM Journalists self censoring for advancement, or towing the party line. We see corporate MSM censorship through management, Government censorship of the MSM, and all culminating into supporting policies, such as war[4]. A recent article regarding a book by Nick Davies called, “How the spooks took over the news”, delves into how the world governments will insert stories at the community level, several years before a given agenda is needed.

“For the first time in human history, there is a concerted strategy to manipulate global perception. And the mass media are operating as compliant assistants, failing both to resist it and to expose it.”

“The sheer ease with which this machinery has been able to do its work reflects a creeping structural weakness which now afflicts the production of our news. I’ve spent the last two years researching books about falsehood, distortion and propaganda in the global media.”[4]

In the USA, we have several groups designated to shape, and alter perceptions. The U.S. Army Civil Affairs, and Psychological Operations Command (Airborne)[6], or USACAPOC(A), consists of 40 Army Reserve units, or around 10,000 soldiers, who are stationed across the USA, are among many leading the mission of COINTEL. They have two main components, Civil Affairs, which is largely made up of lawyers, judges, physicians, bankers, health inspectors, fire chiefs,[7] or other professionals who can deal directly with the Civil nature of shaping a communities perception. The other portion is Psychological Operations; both operate by sword, deed, and word to alter Hearts, and Minds.

Another tactic being used in the U.S. is to actually pay operatives to create havoc, or to further the fury of an average person, so they will attempt an act associated with a criminal, or terrorism element. Hal Turner is an example of an operative employed by the US Govt. to further agendas, and policies. In his own words,”I was not some street snitch”[8]; in fact in his own words,”I was a deep undercover intelligence operative”. According to the FBI,”Special Agent Stephen Haug wrote that “[Turner’s] value outweighs the discomfort associated with source’s rhetoric. Source’s unique access provides important intelligence which, if lost, would be irreplaceable.” Another FBI memo cited that Turner “has proven highly reliable and is in a unique position to provide vital information on multiple subversive domestic organizations.”[8] Note the words subversive domestic organizations.

Do you feel left out, or would you like to get in on the gravy train; while at the same time selling out your fellow man? The US Govt. with 5 million US Dollars is promoting, and paying bloggers, texters, and building websites across the Middle East, and North Africa![9] The official purpose is to spread ideologies, and learning to embrace others ideas. Of course through the wreaking putrid of the rhetoric comes the truth; it’s to promote US Democracy through the Arab world. I can read the websites now,”Freedom is the freedom to comply with The Patriot Act!”

Countries like Israel implement direct subversion, or disinformation as well. [10]“Israel’s Foreign Ministry is hiring students and demobilized soldiers who will work around the clock writing pro-Israeli responses on Internet websites all over the world…. presenting themselves as ordinary surfers…

This is in addition to the existing Israeli volunteer internet task forces & propaganda applications like Megaphone & GIYUS – a chief Israeli propagandist is interviewed below….

“Our people will not say: ‘Hello, I am from the policy-explanation department of the Israeli Foreign Ministry and I want to tell you the following.’ Nor will they necessarily identify themselves as Israelis. They will speak as net-surfers and as citizens, and will write responses that will look personal but will be based on a prepared list of messages that the Foreign Ministry developed.”[10]

Amongst the many groups on the Net fighting the struggle for Israel, is the Jewish Internet Defense Forces[11]. From their homepage,”leading the fight against antisemitism, and terrorism on the web, coordinating concerned citizens around the globe, and promoting jewish pride, knowledge, and unity.” A striking quality about any of these different groups, or the controlled MSM, who are sent out to propagandize the Hearts, and Minds of the people, is that they always cite Anonymous sources, or don’t cite who the “officials” are who said “what”. These kinds of propaganda articles are now common place[12].

Other countries around the world are implementing strategies to combat the information wave of the Internet; which is destroying their hold on the Hearts, and Minds of people worldwide. Australia’s Government has instituted their new Cyber Security Strategy[13]. It’s goals are of course always painted in a nice shiny, and clean picture. They’ll be focusing on legitimate cyber crimes, and of course they’ll have to monitor *possible* terrorist activities. They have created their own Computer Emergency Response Team, or CERT as the main crime fighter; the program will begin operation January 2010, and will coordinate their activities with other National CERT’s across the globe to combat Internet crimes, or as is becoming abundantly clear, to infiltrate, and use propaganda to halt the Information revolution.

The saying goes something like, if at first you don’t succeed, then try, try again; right? Well, that’s exactly what the US Govt. is doing. The FBI now is installing super spyware on people’s personal computers. They are using “Computer, and Internet Protocol Address Verifiers”, or CIPAV to infiltrate personal computers, or systems, download all files, and upload to government servers in Virginia[14] It sounds somewhat “1984ish”, but imagine with everything covered so far, and taking into context what COINTEL did by replacing words, or meanings, imagine what they can upload to your own computer without the users ever knowing.

It’s not just the FBI with their fancy CIPAV, but the actual giant Internet companies who’ve been bought out are complicit with this ever increasing war for our Hearts, and Minds; through information. Google is catering to the CIA, NSA, FBI, and to most other Government agencies by offering the tools necessary to scavenge stored data, and other electronic media. They are also offering a closed “Intellipedia, a Wikipedia knock off for spooks.[15] Not only Google, but most US social networks have been caught selling private chats, photos, and emails to Governments.

The Internet is proving to be a real hassle for the corporate, and government elites. Leaked evidence that Yahoo is selling all documents for a given user to the U.S. Government for between $30 to $80 has surfaced recently. Not only are they selling the contents of what we feel is our private area, but also the IP addresses of where we sign on.[16] This is not limited to Yahoo, and Google, but again spans the innertubes of the Internet. The U.S. Federal Government, and other government’s are actively trying to not only use subversive means to control information, but also to mark those who present a problem; apparently so as to isolate them in the future.

It’s a massive amount of data to be stored, and would almost seem impossible. However, we must remember the U.S. Govt., and the Federal Reserve print money 24 hours a day. They are building Fusion Centers across the country, and implementing computer systems such as Maincore. In Utah, the “National Security Agency is constructing a colossal $1.9 billion information storage center at Camp Williams which could be considered a power trip. But it’s not the sort of power trip that keeps civil libertarians lying awake at night. No, this power grab is for the stuff of Thomas Edison and Nikola Tesla — the juice needed to keep acres of NSA supercomputers humming and a cyber eye peeled for the world’s bad guys.”[17] The problem is, that what the government considers as the bad guys is becoming the average American people, and in a hurry!

The deal is that people behind, or in control of governments, and global corporations realize the Internet is the one single threat that can create over night awareness into their ominous plans. They are attacking it, and people who are spreading information at every turn. Besides the leaks of Climate Gate, or Personal Data Gate, now there is the Secret Copyright Gate![18] See exert below:

“* That ISPs have to proactively police copyright on user-contributed material. This means that it will be impossible to run a service like Flickr or YouTube or Blogger, since hiring enough lawyers to ensure that the mountain of material uploaded every second isn’t infringing will exceed any hope of profitability.

* That ISPs have to cut off the Internet access of accused copyright infringers or face liability. This means that your entire family could be denied the internet — and hence to civic participation, health information, education, communications, and their means of earning a living — if one member is accused of copyright infringement, without access to a trial or counsel.

* That the whole world must adopt US-style “notice-and-takedown” rules that require ISPs to remove any material that is accused — again, without evidence or trial — of infringing copyright. This will be a disaster in the US and other countries, where it provides an easy means of censoring material, just by accusing it of infringing copyright.

*There will be mandatory prohibitions on breaking DRM, even if doing so for a lawful purpose (e.g., to make a work available to disabled people; for archival preservation; because you own the copyrighted work that is locked up with DRM) Visit link for full text.”[18]

Welcome to the world of the DMCA’s, and censorship![19] They are creating these treaties in combination with other censorship policies designed to limit access to undesirable websites; of course the policy maker’s will decide what is “undesirable”[20], or which websites aren’t fit to help foster the correct environment for the people in their country. It goes back to the beginning of this article; it is about winning, controlling, or owning the Hearts, and Minds of the people. Without owning those, the people behind the corporations controlling the policy makers who run governments cannot succeed. The Internet will be turned shortly, or the attempt will be made to turn it into an Orwellian hell of pay per click, or pay by minute. Followed with skewed, and distorted information.

It will take all of us to stop these people from censoring the Internet in their battle to win control our hearts and minds.
This ties in to a post made a year ago:

Once again, from the same workshop, 'Behavioral Influences Analysis Center (BIAC) Workshop', held in March 2008 at Air University.

This presentation was made by the Carnegie Mellon University group, CASOS.

I'll just let the images do the talking:

Inferring Adversary Intent & Estimating Behavior

From Raw Source Data to Simulation

Dynamic Network Analysis: Automap/ORA/Dynet
Annual Tools/Computational Approaches/Methods Conference

March 19, 2008
US Air Force Behavioral Influences Analysis (BIA) Center

Terrill L. Frantz
Carnegie Mellon University

Center for Computational Analysis of Social and Organizational Systems

BTW: I want to emphasize this here - there was a reason why they made Al-Qaeda (this CIA Arab Legion masquerading as a bunch of ragtag fundamentalist terrorists) the enemy of the 21st century - one reason:


Previously, wars were symmetrical - wars were between nationstates or two opposing superpowers. SYMMETRY means - you know what to expect - your adversaries will be soldiers of a given country, and you pretty much know the rules and what to expect.

Now that you have supposed 'terrorists' and 'sleeper cells' - all of a sudden the enemy is de-centralized - there's no Al-Qaeda HQ so to speak - they can be anywhere. And they form independent social networks and they can use 'ideas'/'memes' to 'influence' others to join their ranks. And because the military's entire infrastructure was based on fighting a symmetrical threat, this 'enemy' all of a sudden justified the need for upgrading all systems so that they could meet 'asymmetrical warfare'.

See how they have perfectly mapped this Al-Qaeda archetype onto the general public? People in the 'mass' are 'asymmetrical' - they only form a bond through ideas, and social networks. So they need to regulate all that all under the pretense that there is a global enemy out there that operates by the same guidelines.

This should be pointed out more - because this explains in a nutshell why this entire War on Terror is really a War on the Public.
Now, my new addition to the above (remember this quote from the WKJO documentary "How does one become an 'anti-terrorism expert?


An Application of Bayesian Networks to Antiterrorism Risk
Management for Military Planners

Survey on Big Data for Counter Terrorism

Automated Computational Inference Engine for Bayesian Source Reconstruction: Application to
Some Detections/Non-detections Made in the CTBT International Monitoring System

Imperial College London Department of Computing
A framework for modelling and reasoning about Lone Actor Terrorism

Ontology Based Modeling and Visualization of Social Networks for the Web




  • Global Moderator
  • Mega InfoWarrior
  • *****
  • 501
 At th e time I posted that first article, in 2009, I didn't know about the public-private development happening between In-Q-Tel and the CIA: the project that would later be known as Palantir.

Because Palantir grabs "big data" and presents it to their customers in a user-friendly interface, that allows them to view in any context.

Read this:
Palantir developed code that enables rendering all of that big data into manageable pieces...
They developed at least two main software applications, "Gotham" and "Metropolis" -- and they did this development in a public/private partnership with In-Q-Tel (CIA)... now this private corporation is marketing this software to other countries, including the UK intelligence agencies, and to private industry. Profits go back to Palantir (not to the taxpayers who funded this public/private partnership.)

Excellent article here;

Sam Biddle
February 22 2017, 6:06 a.m.

DONALD TRUMP HAS inherited the most powerful machine for spying ever devised. How this petty, vengeful man might wield and expand the sprawling American spy apparatus, already vulnerable to abuse, is disturbing enough on its own. But the outlook is even worse considering Trump’s vast preference for private sector expertise and new strategic friendship with Silicon Valley billionaire investor Peter Thiel, whose controversial (and opaque) company Palantir has long sought to sell governments an unmatched power to sift and exploit information of any kind. Thiel represents a perfect nexus of government clout with the kind of corporate swagger Trump loves. The Intercept can now reveal that Palantir has worked for years to boost the global dragnet of the NSA and its international partners, and was in fact co-created with American spies.

Peter Thiel became one of the American political mainstream’s most notorious figures in 2016 (when it emerged he was bankrolling a lawsuit against Gawker Media, my former employer) even before he won a direct line to the White House. Now he brings to his role as presidential adviser decades of experience as kingly investor and token nonliberal on Facebook’s board of directors, a Rolodex of software luminaries, and a decidedly Trumpian devotion to controversy and contrarianism. But perhaps the most appealing asset Thiel can offer our bewildered new president will be Palantir Technologies, which Thiel founded with Alex Karp and Joe Lonsdale in 2004.


“He who passively accepts evil is as much involved in it as he who helps to perpetrate it. He who accepts evil without protesting against it is really cooperating with it.”
Martin Luther King Jr.


Effie Trinket

  • Awakened
  • **
  • 59
This is the PDF that squarepusher had found and screencapped images from but his links haven't worked for some time, so here are 11 of the 47 pages of this document:

Oh wait, this is years before Snowden.  I don't know about you but this looks actually more damning than any info he made public, and it's not even classified, it's publicly available.  Oops, just more proof that Snowden is a controlled-release military industrial complex asset not really releasing anything that's actually damaging to the MIC, but rather serves to desensiztize the public instead of truly educate.

Hey wait, what is a private university doing spying on people's emails?  I thought only the government did that?  Where did they get this authority from?  Hmm, maybe they're above the government?  Hmm, you don't say?

Look at this, the perfect means to keep track of your FBI/CIA/NATO false flag terror suicide bombers, and keep track of their lies/narratives so they can sound really, really, really, convincing on the news.

Translation of this next image:  "Who's going to be our next puppet dictator that we install after we false flag attack our target country, install our Palantir tracked ISIS killers?"

Doesn't this look like it would be useful in managing the narratives like the fake left vs Trump?  How much do you want to be Rachel Maddow's, Wolf Blitzer's, Sean Hannity's scripted MSM reports are aided in some way by this very software?

Oh look, wouldn't this be an amazingly useful tool to create completely fabricated narratives about non-existent threats, and keep track of your lies in a huge database so you can keep building off of it for decades, making people think it's all really real?

Remember what George Webb said (paraphrasing): "You can also use Palantir to keep track of terrorists." (In other words, YOUR terrorists that you manage with these types of surveillance-social network-mapping tools.

"Computational Modeling of Cultural Dimensions in Adversary Organizations."  In case you didn't get the memo: 
"Adversary" means 99.99% of the population.

"DNA application to counter-narcotic investigations related to marijuana."--???.......



#1 Trouble Maker

  • InfoWarrior
  • ***
  • 240
HOLY ACADEMICS BATMAN!    Let me get my slide rule out just to keep up with this Tavistock upper grad social engineering stuff.  :P 
For All You People Who Live Outside the Big Island Known As USA, A Gift For You From Us in The USA  ENJOY!
Where were YOU in 62?



  • Rat Catcher (retired)
  • Administrator
  • Mega InfoWarrior
  • *****
  • 2445
HOLY ACADEMICS BATMAN!    Let me get my slide rule out just to keep up with this Tavistock upper grad social engineering stuff.  :P

As I've been coding since about 1978, it gives me a different perspective.

I think "how would I code that", and since I've got the odd decade of experience it sees through the sheer hubris of these lunatics. Just for arguments sake, before you accept delivery, the software must meet agreed series of tests. Now considering the amount of data fed into such a system, good luck with manually checking the results. If you think about going through the sample test emails and so on to check the system works, it should become obvious that testing such a system is rather problematic.

In the end, they will say it probably, possibly, maybe works.

I also damn sure you could not deploy such a system effectively against criminals and terrorists, who use enctyption . . . like duhhh

The only people such systems can monitor are the innocents, the utterly naive.

Plantair . . . Ptech . . . in the end, by accident they are sticking together something that has nefarious uses or abuses. They are also pioneering new software engineering, so like that ain't trivial. If you look through some of the anti-illuminati materials, you'll find they are doing Agent Orientated Programming, which is all new... Its also frightening, and leaves me at a loss how to possibly begin to explain.

Are there any readers who have ever learnt to program ?

<?php echo "Hello world!"; ?>
We are all running on Gods laptop.
The problem is the virus called the Illuminati.



  • Rat Catcher (retired)
  • Administrator
  • Mega InfoWarrior
  • *****
  • 2445
The shortest explanation :

Diz iz owz Facebook ownz you slave
We are all running on Gods laptop.
The problem is the virus called the Illuminati.


#1 Trouble Maker

  • InfoWarrior
  • ***
  • 240
I finally got through this thread and in reality, this analytics on we humans, is only the tip of the iceberg. The tracking is in real time and fed into 'Colossus' (The 'Watson' the public doesn't see) to control the future of man kind through 'predictive modeling'. 
"Freedom Is An Illusion"

BTW- @1:11 Check out the 'iconography' in this 1970 flick.  The all seeing eye in a pyramid and on the side of the monitor, a pentagram looking star.  You just can't get away from this stuff. 

For All You People Who Live Outside the Big Island Known As USA, A Gift For You From Us in The USA  ENJOY!
Where were YOU in 62?


Tsul 777

  • Newbie
  • *
  • 9
Oops, just more proof that Snowden is a controlled-release military industrial complex asset not really releasing anything that's actually damaging to the MIC, but rather serves to desensiztize the public instead of truly educate.


Isn't it the whole goal of these controllers to dupe the masses? ES was the lead in to placate the fringe truther's in my book. Let the average citizen "believe" that they were somehow privy to some "classified info" that put them ahead of the game and to what end? What did the common joe do with this "newfound knowledge?" Farkall as we all are painfully aware. Big Bro just informed the peeps that he was watching and listening for real under the guise of ES's "Whistleblower" revelations. I watched the Putin-Stone interview but how much weight could you really put into that vis a vis his take on the whole affair? If there were a group of untouchable globalists out there, wouldn't they see to it that whistleblowers anywhere would be extinguished lest they reveal their sinister plots? I think the opposite is true and that these dupes are dangled to foment more division even amongst our paltry gang that are trying to view the bigger picture. Computer programs that learn to discern dissent from simple thought broach upon the unthinkable. How far does it go before even a particle of humanity stands up? Simple words on a PC screen will never invoke the masses.....something more is needed to awaken even the "sheep" among us. Remember the left/right? Now it's the alt-left/alt right and a couple more ideologies thrown in for good measure. What? I believe the PTB have unleashed the "beast" according to plan, and have effectively even divided the so called "truth movement". Why have they even called it that? To further divide and conquer.... smell familiar? Why would so called "truther" and "conspiracy theorist" even be included in the same sentence? Sorry to ramble but I read everything posted by #Number One and most of the exhausting research posted by EG. Their insight gives me pause to pursue all of this and hopefully come to some kind of conclusion of thought about the sense of it all. I continue to delve deeply and though I might not contribute my opinion or facts pertaining very much and remain a "lurker", I am constantly training my own mind to the complexities of the overall "dupe".

Social Engineering is a phenom that is as real as that latest app that suddenly appears on your phone. It's free along with the control factor that everyone has accepted as a part of everyday life. Every time you log on you are being sliced and diced and evaluated. This practice is in itself invasive but we merrily go along. Linux is safer than Windoze? C'mon really? Nothing online is safe in our current world..... didn't our saviour Snowden tell us in so many words? The puzzle expands at an ever increasing rate but isn't that part of the plan too? So much to disseminate but so little time........

I am politically agnostic and proud of it.


Effie Trinket

  • Awakened
  • **
  • 59




Effie Trinket

  • Awakened
  • **
  • 59

Our Privacy on Social Media: The subtlety of Cyber Espionage?

07/10/2015 di Chrystel Papi

Throughout the reign of social networking, where smartphone revolutions and start-up uprisings thrive, the value of our encircling reality has transcended its traditional meaning. The poignant laws of updating a status, of sharing a location, or even of publishing a modified picture regulate our daily incentives, dressing reality with a newfound virtual significance.

The personal details concerning the most rudimentary aspects of our life, such as our birth date, email and home addresses, phone numbers, educational and job attainments, or even religious associations, have become available in the virtual sea of online material. Social networking platforms have transformed into a direct source of the most private information converting Facebook, Twitter, YouTube and a host of other portals into treasured channels of intelligence acquisition. Already in the United States there are entire intelligence infrastructures, such as the Open Source Center in Virginia, dedicated to social-media tracking operations. Intelligence analysts are tasked with filtering and examining millions of Facebook messages, chat logs, tweets, statuses, and other data.

As supported by the Associated Press, this exaggerated focus on social media backtracking was sparked by the 2009 Iranian election protests, when numerous Iranian protesters flooded twitter with outright contestations for the electoral results that had reinstated Mahmoud Ahmadinejad in power. At a first glance it would appear that social media is merely used as a tool that gathers information, a way to keep governments updated on worldwide public opinion. For instance, ever since the legitimization of gay marriage, the adoption of Facebook’s “rainbow profile picture” has provided a source for a global judgment poll. Consequently, sifting through the collective dispositions of organizations across the World Wide Web is supposedly necessary in order to disclose countless political distresses: what are societies discerning in Egypt? How fragile is China’s political stability? What is overwhelming American citizens? If one desires to be exceptionally optimistic, the underlying immorality for privacy violation could be overshadowed by national security concerns. The end would then justify the means.

However, in spite of such “benevolent” intentions, numerous recent studies have revealed the use of social media by intelligence agencies for other, subtler, ends. The exploitation of extracted information is uncovered by Global Research in Army of Fake Social Media Friends to Promote Propaganda, Pentagon Seeks to Manipulate Social Media for Propaganda Purposes, and Social Media: Air Force ordered software to manage army of Fake Virtual People. The report has demonstrated how the data gathered from Social Networks, especially from Facebook and Twitter, actually serves worldwide advertising interests. A bluntly outright and advanced global cyber espionage enterprise, existing for the sake of creating a widespread of fake identities that undertake covert operations in the name of universal propaganda.

Is this the end that justifies such dissolute means? Consider the simplicity with which any amateur internet user is able to research photographs of people’s residences, track their location at any given time, steal private email account credentials, or gather information on someone’s family or friends. Fake identities can be forged, real identities attacked and stolen. What is truly under threat, international security or rather our own personal security? It is of no surprise that many Internet users are worried about the amount of private information that swirls on the Web, and are ready to condemn current laws for not being sound enough. Today, everyone and anyone can potentially become the hunted target of an attack, and, tragically, it is possible to learn the weaknesses of any prey.


Powered by EzPortal