twitter | Interesting long thread from the Last Refuge
(1) The FBI is the codependent agency for Antifa.
(2) Homeland Security (DHS) is run by U.S. Intel agencies under the umbrella of the ODNI office.
(3) Nina Jankowicz works for U.S. Intelligence.
(4) "Disinformation" is information adverse to the interests of U.S. Intel.
(2) Homeland Security (DHS) is run by U.S. Intel agencies under the umbrella of the ODNI office.
(3) Nina Jankowicz works for U.S. Intelligence.
(4) "Disinformation" is information adverse to the interests of U.S. Intel.
(5) Big tech social media companies operate on joint access databases of the U.S. govt.
(6) As a result of #5, tech data processing costs are essentially subsidized.
(7) FB, Insta, YouTube, MS, Google, and all tech platforms operating on AWS are connected to intel.
(6) As a result of #5, tech data processing costs are essentially subsidized.
(7) FB, Insta, YouTube, MS, Google, and all tech platforms operating on AWS are connected to intel.
(8) Twitter as a private company is adverse to this preestablished relationship.
(9) ODNI office as well as DHS, DOJ and FBI domestically have self-interest in blocking Musk.
(10) Starlink presents problem for pre-established ISP control nodes for internet traffic surveillance.
(9) ODNI office as well as DHS, DOJ and FBI domestically have self-interest in blocking Musk.
(10) Starlink presents problem for pre-established ISP control nodes for internet traffic surveillance.
(11) Senate Select Committee on Intelligence (SSCI) is well aware of this relationship between U.S. Intel and Social media.
(12) Current network of U.S. surveillance state is authorized by congress through SSCI notification.
(13) National Security shields prevent disclosure.
(12) Current network of U.S. surveillance state is authorized by congress through SSCI notification.
(13) National Security shields prevent disclosure.
(14) Current surveillance system has been active for ten full years.
(15) Budget is hidden by using Ominibus and Continued Resolutions.
(16) Retaining opaque budgeting is why Congress stopped using ordinary budgetary processes.
(17) Last federal budget passed Fiscal Year 2008
(15) Budget is hidden by using Ominibus and Continued Resolutions.
(16) Retaining opaque budgeting is why Congress stopped using ordinary budgetary processes.
(17) Last federal budget passed Fiscal Year 2008
(18) Expanded data processing and social media user metadata required massive expansion of data library.
(19) Funding for expansion delivered in federal infrastructure spending.
(20) Federal broadband expansion covered expenses for expanded server library and data processing.
(19) Funding for expansion delivered in federal infrastructure spending.
(20) Federal broadband expansion covered expenses for expanded server library and data processing.
(21) U.S. citizen data is all inclusive.
(22) Two-factor authentication sold under auspices of user security, was critical USIC developmental tool.
(23) U.S. Digital Identity database already exists.
(24) Database and geolocation used in J6 investigation is simple example of use.
(22) Two-factor authentication sold under auspices of user security, was critical USIC developmental tool.
(23) U.S. Digital Identity database already exists.
(24) Database and geolocation used in J6 investigation is simple example of use.
(25) Current emphasis for future network expansion is facial recognition program to put it all together.
(26) China is approximately 5 years behind U.S. development of surveillance state.
(27) Huawei operation was/is to identify technology behind U.S. system and replicate.
(26) China is approximately 5 years behind U.S. development of surveillance state.
(27) Huawei operation was/is to identify technology behind U.S. system and replicate.
0 comments:
Post a Comment