FAIR USE NOTICE

FAIR USE NOTICE: The information and materials used on this blog, i.e. articles, videos,etc., may contain copyrighted (© ) material the use of which has not always been specifically authorized by the copyright owner. Such material is made available to advance understanding of ecological, political, human rights, economic, democracy, scientific, moral, ethical, and social justice issues, spiritual, religious, etc. It is believed that this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior general interest in receiving similar information for research and educational purposes. For more information go to: /http://www.law.cornell.edu/uscode

Monday, May 30, 2022

My response to Les Fridman's video : Oliver Stone: Vladimir Putin and War in Ukraine

 



My response to Les Fridman's video :

Oliver Stone: Vladimir Putin and War in Ukraine | Lex Fridman Podcast #286


Putin did not make a mistake in going into Eastern Ukraine. He wanted the Donbass Region to remain within Ukraine and Ukraine to remain neutral. Neutral is a line in the sand that he will not tolerate to be crossed. He sees it as Russia's survival as a sovereign nation He has waited 8 years for Ukraine to implement the Minsk agreements that they signed.which was the necessary condition for the separatist groups in the Donbas Region to agree to remain within Ukraine. But we did not want the Minsk agreement to be implemented. just as we do not want to negotiate for peace. We do not want a neutral Ukraine because we do not want to coexist with Russia. We want to subjugate and dominate them. It would not have been the right decision to surrender the Donbass Region because we will not stop. It would not have been the humane decision either because the Nazi controllers of Ukraine HATE the Russian Ukrainians. They want to kill them and will kill until there is not one iota of resistance left. They have been executing a genocidal ethnic cleansing in Eastern Ukraine for the last 8 years. So Putin finally recently recognized the 2 republics who declared their autonomy in 2014. They have been asking for Putin's help for years and now he has gone into the Donbass Region to help them and to get rid of the Nazi Azov battalion that has been fighting and killing them for years and he has taken out a few of OUR biolabs as he goes. Putin is defending Russia and the Eastern Ukrainians. We left him no other choice!


Friday, May 20, 2022

A RELEVANT BLAST FROM THE PAST: Epoch Times Infographics Connects the Dots:Collusion, Sedition,Treason...

 

A BLAST FROM THE PAST BUT STILL RELEVANT

A Treasure Trove of Info from The Epoch Times


https://throughthelookingglassnews.wordpress.com/2018/02/10/the-epoch-times-connects-the-dots/


THE EPOCH TIMES CONNECTS THE DOTS: Infographics Series on the COLLUSION, SEDITION, and TREASON of the Obama-Legacy Administration DOJ and FBI: “The Uranium One Scandal,” “Beyond the Memo,” and “The Insurance Policy”


The Epoch Times has come out with three infographics in the last month that do a great job connecting the dots on the Department of Justice – FBI – FISA Memo tip-of-the-iceberg.

Each infographic is accompanied by an article that provides some explanation about what’s going on in each of these highly detailed diagrams. Jasper Fakkert and Joshua Philipp at have released a video on the topic, further weaving the web of the obvious collusion, sedition, and treason of many high ranking members of Obama’s administration.

Links below will take you to The Epoch Times where you can explore their site and see why you should add it to your list along with Zero HedgeThe Conservative Tree HouseBlacklisted News, and The Gateway Pundit.

EPOCH_TIMES_URANIUM_ONE_FINALFinal_Memo_EpochTimes-1Fusion-GPS-Map_The-Epoch-Times

Infographic: The Uranium One Scandal

How President Barack Obama and Secretary of State Hillary Clinton aided Russia’s quest for global nuclear dominance

In 2010, the Obama administration granted approval to Russia’s atomic agency, Rosatom, to acquire a majority stake in Uranium One. The deal was controversial because the Canadian mining company at the time controlled 20 percent of all uranium mining capacity in the United States.

Given the national security implications, the deal required approval by the Committee on Foreign Investment in the United States (CFIUS), which included the State Department, then headed by Hillary Clinton.

Russia had well announced its plans to corner the global uranium market as a way to exert political control over other countries. As early as 2006, Russia announced it would spend $10 billion to grow Russia’s global uranium production capacity by 600 percent.

Uranium is a key component for nuclear weapons as well as nuclear energy. A July 2011 report from the U.S. Energy Information Administration revealed that American nuclear power plants relied on imports for 92 percent of their uranium supply. Twenty-three percent was imported from Russia.

So why did President Barack Obama and the State Department headed by Hillary Clinton approve the deal that weakened America’s security and energy independence?

The Epoch Times, using public sources, including the book “Clinton Cash” by Peter Schweizer, has mapped out the connections and events related to the Uranium One acquisition by Russia.

It shows that while the State Department under Hillary Clinton was considering approving the deal, as part of the CFIUS approval process, Russia and key stakeholders in the deal paid millions to the Clinton Foundation.

Bill Clinton himself traveled to Moscow just months before the deal was approved to meet with Vladimir Putin. Clinton was also paid $500,000 for a speech he gave in Moscow by Renaissance Capital, an investment firm with an interest in the Uranium One deal and ties to Putin.

EPOCH_TIMES_URANIUM_ONE_FINAL(Click on image to enlarge map)

The FBI at the time was aware that the Russian authorities had staged a large-scale operation to blackmail and extort U.S. companies connected to uranium production and transportation.

The agency also had a well-placed source working in the uranium industry that provided extensive evidence of bribery and corruption.

However, the investigation was killed in 2015 by FBI Director James Comey, and the key informant was given a gag order and prevented from talking to Congress by Obama’s attorney general, Loretta Lynch.

That gag order was lifted by Attorney General Jeff Sessions last year, and three congressional committees interviewed FBI informant William Campbell on Feb. 7.

He revealed how the Russian government used an American lobbying firm, APCO, to funnel millions of dollars to the Clinton Foundation’s Global Initiative, The Hill reported on Feb. 7.

In December, Attorney General Jeff Sessions had announced it is revisiting evidence obtained by the FBI in an investigation into the Uranium One Deal.

On Jan. 12, the DOJ unsealed an 11-count indictment of a former co-president of a Maryland-based transportation company for his alleged role in the bribery of a Russian official connected to Russia’s State Atomic Energy Corporation.

Check out their current perspective on this topic at THE EPOCH TIMES.

Epoch Times Investigation: Beyond the Memo

An investigative report based on the memo, a declassified FISC report, and public records on how the Trump team was spied on

THE EPOCH TIMES  |  Jasper Fakkert and Joshua Philipp  |  February 2, 2018

A declassified House Intelligence Committee memo reveals how the unverified Fusion GPS dossier—opposition research paid for by Hillary Clinton’s presidential campaign and the Democratic National Committee (DNC)—was used by the FBI and Department of Justice (DOJ) to obtain a FISA surveillance warrant to spy on Donald Trump presidential campaign volunteer Carter Page.

The memo details how the Foreign Intelligence Surveillance Court was intentionally left in the dark about the source of the allegations that led it to approve the spy warrant in October 2016.

It reveals that top FBI and DOJ officials signed off on the initial warrant and three subsequent renewals, including President Donald Trump’s deputy attorney general, Rod Rosenstein.

In one instance, the FBI and DOJ used a Yahoo News article based on the Trump dossier as evidence to extend its FISA warrant, despite the unverified information having come from the same source.

The memo does not reveal how the FISA warrant was subsequently used.

The Epoch Times used additional sources, including a declassified top-secret report of the Foreign Intelligence Surveillance Court to paint a fuller picture of the apparent abuse of power.

After the initial FISA warrant was approved, dozens, if not hundreds of so-called unmasking requests were made by senior members of then-President Barack Obama’s administration.

It also opened the floodgates to a number of intelligence leaks to media organizations, which served to turn public opinion against Donald Trump.

Continuing well after Trump was elected, the spying and leaking raise serious concerns about apparent efforts by the Obama administration, the DNC, and the Clinton campaign to prevent Trump from being elected and to delegitimize him once he was in office.

Final_Memo_EpochTimes-1

Check out their current perspective on this topic at THE EPOCH TIMES.

Fusion GPS and the ‘Insurance Policy’ to Prevent Trump From Becoming President

A graphic showing the web of connections related to the Trump dossier

THE EPOCH TIMES  |  Jasper Fakkert and Joshua Philipp  |  January 18, 2018

How did a piece of opposition research, described by former FBI Director James Comey as both “salacious and unverified,” become the driving force behind the allegations that Trump colluded with Russian authorities?

Research conducted by The Epoch Times, using public sources, shows a web of connections related to the dossier reaching the highest levels of the FBI, CIA, and the Obama administration.

Paid for by the Clinton Campaign and the DNC, and produced by Fusion GPS—whose other clients include the Russian government—the dossier appears to have been the basis for the FBI’s investigation into Donald Trump.

Fusion-GPS-Map_The-Epoch-Times(Click on the map to see it in full)

The FBI used the dossier, in part, to obtain a FISA warrant to spy on Trump’s team, according to national security reporter Sarah Carter. Two of President Barack Obama’s top officials also surveilled the communications of Trump’s team, both before and after the elections.

The unverified allegations in the dossier were also actively spread to media organizations, both by Fusion GPS as well as other key players involved, to cast a shadow over Trump’s run for president and his presidency.

Text messages obtained by the Department of Justice (DOJ) inspector general show high ranking FBI officials discussing an “insurance policy” to prevent Trump from becoming president.

The connections presented raise many questions, including the following: Why was the FBI so willing to accept the allegations made by Fusion GPS? And what did Obama obtain in monitoring the communications of Trump, the opponent of the candidate he supported?

These matters are currently under investigation by the House Permanent Select Committee on Intelligence, the DOJ inspector general, and possibly special counsel Robert Mueller.

Check out their current perspective on this topic at THE EPOCH TIMES.

EPOCH_TIMES_URANIUM_ONE_FINALFinal_Memo_EpochTimes-1Fusion-GPS-Map_The-Epoch-Times

Follow the Money Connect the Dots Q

Deck of Cards FBI



THE SUMMER OF 1963: Speeches from 2 great men, JFK and MLK, Jr.

 

The History of the Civil Rights struggle in our nation has had many pivotal moments in its timeline.But for me, the Summer of 1963 stands out as one of the most defining and pivotal moments.  It was finally beginning to be obvious that the tide was turning in this long struggle and the hard fought battles began to see successes come at a faster rate than ever before.   There are those who would disagree but for many of us it was in this summer that we could see that a true change was taking place and it was beginning to show in the consciences, attitudes and hearts of the country. America was discovering her soul. 

============================================

Speeches from 2 great men, JFK and MLK, Jr.  

2 great advocates of civil rights,

Each of whose lives were cut short precisely because they were good men!


THE SUMMER OF 1963

First this happened on June 11, 1963.

George Wallace Tries to Stop the Integration of U of Alabama

https://www.youtube.com/watch?v=a0WBQsRskc8


 On that same night , President Kennedy came on TV and addressed the nation. 

Some say it was his finest moment. 

It was definitely a historic speech. 

He spoke bluntly. He spoke truth. And it was from the heart!


President John F. Kennedy's Civil Rights Address 

JUNE 11 1963

https://www.youtube.com/watch?v=7BEhKgoA86U


Finally in August of that same year Martin Luther King, Jr. gave his historic 'I Have A Dream' speech on the steps of the Capital in Washington DC during the historic 'Million Man March'

Martin Luther King - I Have A Dream Speech - August 28, 1963

https://www.youtube.com/watch?v=smEqnnklfYs

Thursday, May 12, 2022

Darpa's :Lifelog ends Facebook Begins on the same day -Zuck and his Chinese wife

 If you know about Q and/or Q'anon only from the MSM  then you probably think what they programmd you to think= that it is a BUNCH OF CRAZIES WHO BELIEVE IN CRAZY CONSPIRACY THEORIES. Your 1st reactiion may negative and and you completely dismiss it out of hand. . That was the purpose of all the hits pieces

 if  you can get past that bias., (forget Q is even mentioned )  then I think  you will find that this article and site is full of interesting infographics. Just take a few seconds and see if any of these graphics  are about something that interests you. I think you will be pleasantly surprised! 😲 

Feel free to skip the next 3 paragraphs  about my perspective on Q and and scroll down to the article!

======================================================

I followed Q and these forums for a long time and this is how I would describe it from my experience.     Q would post a series of questions that would end up being a part of a narrative and we would run off an try to find the answers to the questions and try to see how they fit into a narrative. At first it just seemed like we were learning a bunch of random facts but eventually  a bigger picture and certains understanding begin to emerge that would itself inspire more avenues of research . As people shared what they discovered bigger and bigger pictures would emerge. What we learned f Basically what it really was,  (and still is to a lesser degree because research continues) was a worldwide network of anonymous researchers researching various types and areas of corruption  and schemes on a global scale. Hundreds of thousands of people and sometimes even millions researching at the same time. all around the world.  There were no local public records that we could not get access to anywhere in the world. There is much truth to be found there. People worked together to 'connect the dots' on many issues. Of course there are all kinds of people and you can find some crazy stuff there too but the crazy stuff is not followed by many. It dooesn't get much attention so its easy to avoid much of it. But you always have to discern and decide for yourself what ideas and conclusions have merrit. How much supporting data has been found and whether it says what people  think it says. It is always best to research for yourself to corroborate some explanations before simply accepting them. 

You can learn a lot about influencial people and  what happens behind the scenes, what kinds of things happening in one place are also happening in other places around the world ; And you begin to understand how it  may relate on a global scale. You can begin to make much more sense of what is going on in the world.  It is a good thing to be able to get diffent people's perspective from anywhere in the world and all around the world!

it is kind of like crowdsourcing  research on a wide variety of topics



ALTERNATIVE & OBJECTIVE NEWSGLOBAL ORGANIZED CORRUPTIONOFFICIAL NARRATIVE DISSONANCERED PILLSSHADOW CIVIL WAR

QAnon: Q’s Unfolding Nine Part Series [ 2 of 9 ]: Facebook and their Executives are DIRECTLY FROM DARPA’S “Cancelled” LIFELOG PROJECT; BIG DATA = CIA / DOD; Who is Mark Zuckerberg and HIS CHINESE WIFE?

2 Votes


On March 6 Q began a nine part series with Drop 2984 and followed up that evening with Part 2 in Drops 2988 through 2991.

The first two parts have had to do with Facebook being a full-out DARPA / DOD / CIA project called LIFELOG that was ‘canceled’ on February 4, 2004, the very same day Facebook launched. Many of the people involved in LIFELOG made the lateral move over to Facebook.

After all, would you have joined Facelog, er, Lifebook, or whatever, if you KNEW it was a CIA program DESIGNED TO TRACK EVERY SINGLE THING YOU DID, INCLUDING YOUR HEART RATE AND FOOT STEPS?

This article will compile the nine part series to include the related interim drops.

PART 1

FACEBOOK IS A CIA PROJECT CALLED LIFELOG.
LIFELOG WAS “CANCELED” THE DAY FACEBOOK LAUNCHED.

Q!!mG7VJxZNCI
FB RETURNING TO THE NEWS.
LIFELOG (DARPA) ENDS > FB BEGINS
LIFELOG (DARPA) TEAM TRANSFER > FB
WHAT (DARPA) TEAM MEMBERS PAST/PRESENT WORK FOR FB?
WHAT DIVISIONS?
LOCATE (3) PUBLIC.
(9) TOTAL (6_NON PUB).
BUILDING 8 EXPOSED (HERE) WHEN?
[4-11-18]
*THINK SCRAMBLE [OFFLINE SCRUB] POST XBOX/PS CHAT LOGS DROP*
[MS SHUTDOWN IMMEDIATELY POST DROP]
BUILDING 8 NEWS RELEASE “RESTRUCTURING BUILDING 8” RELEASE?
[12-14-18] > RIP
https://techcrunch.com/2018/12/14/facebook-restructures-building-8-separating-projects-into-reality-labs-and-portal-groups/📁
RIP = FALSE
REORG = TRUE
CHINA-CHINA-CHINA
CHINA-CHINA-CHINA
[OPEN ACCESS – PAY FOR PLAY]
LAWS WHICH PREVENT C_A OPERATIONS INSIDE HOMELAND?
BULK DATA COLLECTION_NSA_HOMELAND?
BULK DATA COLLECTION_C_A_HOMELAND?
HOW DOES THE C_A AVOID LAW TRIGGER RE: UMBRELLA_SPY_HOMELAND?
FACEBOOK [CHINA_BUILDING 8]
GOOGLE [CHINA_DRAGONFLY]
TWITTER [US_LEG_TRACK]
FACEBOOK TRACK USER GPS, VOICE & TEXT?
GOOGLE TRACK USER GPS, VOICE & TEXT?
TWITTER TRACK USER GPS?
[PHONE_PAD_MICROPHONE_ALGO_EMBED]
ALL FOR MARKETING PURPOSES AS PUBLICLY DISCLOSED?
WHO HAS ACCESS TO BULK TRACK DATA?
WHO HAS ACCESS TO BULK DATA?
IF NSA HAS ABILITY TO ‘ABSORB’ DATA STREAM UT IN-HOUSE TOOLS, DOES C_A HAVE ABILITY TO ‘COLLECT’ DATA STREAM FROM ‘FUNDED”NETWORKED’ OFFSHOOTS [BIG TECH]?
OFFSHOOTS NECESSARY TO AVOID C_A BREACH OF US DOMESTIC LAW?
AMAZON SERVER/CLOUD CONTRACT?
AMAZON_SERVER/CLOUD_ROUTE_DATA 1-99 DOMESTIC?
C_A TASKED W/ GATHERING AND ANALYZING INFO ON FOREIGN GOVS + INDIVS? SIGINT – COV
NSA TASKED W/ GATHERING AND ANALYZING INFO ON A GLOBAL SCALE (INCLUDING DOMESTIC)? SIGINT – COV
WHAT FORMER US PRESIDENT WAS C_A DIRECTOR?
http://www.thedrive.com/the-war-zone/25241/george-h-w-bush-saved-the-cia📁
THINK C_A [BRENNAN] AUTH SPY CAMPAIGN US SENATE UNDER HUSSEIN.
THINK C_A INSTALL CAMPAIGN US HOUSE & SENATE INFILTRATION.
[PART 1 OF 9]
Q

 

PART 2

FACEBOOK = DARPA’S LIFELOG = DOD / CIA

Q!!mG7VJxZNCI

Define ‘Lifelog’ [DARPA].
“an ontology-based (sub)system that captures, stores, and makes accessible the flow of one person’s experience in and interactions with the world in order to support a broad spectrum of associates/assistants and other system capabilities”. The objective of the LifeLog concept was “to be able to trace the ‘threads’ of an individual’s life in terms of events, states, and relationships”, and it has the ability to “take in all of a subject’s experience, from phone numbers dialed and e-mail messages viewed to every breath taken, step made and place gone”.

Define ‘FB‘.
The Facebook service can be accessed from devices with Internet connectivity, such as personal computers, tablets and smartphones. After registering, users can create a customized profile revealing information about themselves. Users can post text, photos and multimedia of their own devising and share it with other users as “friends”. Users can use various embedded apps, and receive notifications of their friends’ activities. Users may join common-interest groups.
Compare & Contrast.
DARPA senior employees > FB?
DARPA TERMINATES PROGRAM FEB 4, 2004.
FB FOUNDED FEB 4, 2004.
DARPA = FB
Q

 

Q!!mG7VJxZNCI
Logical thinking.
Did DARPA complete build/code (tax-payer funded) ‘LifeLog’ program?
After completion, was there fear the public wouldn’t accept the adoption if known it was DoD/C_A backed?
Do you believe people would join a platform knowing it was under the control of the C_A and FED GOV?
No.
How do you lure the masses into entering all their personal info and private messages (i.e. their LIFE LOG) onto a new platform?
Do you make it cool?
How did FB ‘supposedly’ start and launch?
Ivy league only?
Develop a trend and/or following?
How do you keep the project running w/o ‘public’ taxpayer funds? [DoD reported LifeLog was TERMINATED to Congress/Senate OS]
Define ‘Black Budget’.
Did HWOOD push?
Do people follow the ‘stars’?
Competitors systematically attacked (myspace) to prevent comp?
THE LARGEST ‘COLLECTIVE’ SOCIAL MEDIA PLATFORM IN THE WORLD (BILLIONS LOGGED) IS OWNED AND OPERATED (COVERTLY) BY THE CENTRAL INTELLIGENCE AGENCY OF THE UNITED STATES OF AMERICA.
The More You Know.
Q

 

Q!!mG7VJxZNCI
>>5550547
Expand your thinking.
If covertly operated [data accessible to project designators] would they attempt to prevent any type of GOV regulations from being imposed?
Expand your thinking further.
Why was MZ chosen as CEO (public figure) tasked to expand growth?
Family tree of MZ?
Who is the wife of MZ?
Family tree of wife?
Why won’t CHINA allow FB?
Situational awareness?
Do they know it’s an individual collection asset program being covertly operated by the C_A?
Do they know it’s been expanded to tap into the microphone of any device for listening and bulk data collection?
Do they know it’s been expanded to tap into the GPS router of the device for RT tracking?
Do they know it’s been expanded to tap into the camera function of the device in order to view/record all target designators?
Q
Q!!mG7VJxZNCI
[2 of 9] complete.
Q

RELEVANT INTERIM POSTS

GOOGLE = NSA / CIA

Q!!mG7VJxZNCI
https://qz.com/1145669/googles-true-origin-partly-lies-in-cia-and-nsa-research-grants-for-mass-surveillance/📁
[DARPA>GOOG]
Re-review past drops.
Major steps underway to challenge these control pockets.
Q

 

SNOWDEN, RUSSIA, AND CHINA

Q!!mG7VJxZNCI
https://www.iqt.org/our-history/📁
Why did @Snowden only engage and attack the NSA?
If @Snowden really cared about privacy/citizenship awareness, why didn’t he expose the C_A‘s main programs?
@Snowden was priv to DARPA, IQT, and NSA SURV / COV programs.
Why did @Snowden only focus on NSA?
Where did @Snowden work prior to NSA?
ASK YOURSELF A VERY SIMPLE QUESTION, WOULD YOU RELEASE (GO LIVE) TO THE PUBLIC ACROSS THE MEDIA ALL HIGHLY CLASSIFIED MATERIAL (NSA) ……………PRIOR TO…………..GETTING TO YOUR END DESTINATION?
OR, WOULD YOU LOGICALLY TRAVEL TO YOUR END DESTINATION, THEN RELEASE PUBLICLY?
WAS RUSSIA THE PLANNED LOCATION?
WHY RUSSIA?
WHY DID CHINA (HKG) LET HIM OUT OF THE COUNTRY?
WAS THERE A ‘RED’ SECURITY ALERT PUT OUT TO PREVENT PASSPORT TRAVEL ACROSS ALL NATIONS?
WHY DID CHINA GRANT ACCESS TO TRAVEL W/ THE BLOCK IN PLACE?
WHY RUSSIA?
RUSSIA RUSSIA RUSSIA
Q

 

ZUCKERBERG GOES INTO PANIC MODE WHEN CALLED OUT BY Q

Q!!mG7VJxZNCI
Anonymous
>>5552746
kek, Q.MZ gets called out and immeadiately panics.Really nothing to see here… /s
>>5552800
Other articles prior to posts.
Privacy push to cover for past/future ‘exposure’ issue re: data release non_marketing.
There is no privacy.
There is no way to turn off (even through app deletion) their ability to extract info.
How is that possible for a ‘supposed’ non_gov entity?
Phone co’s involved?
Phone_wipe resolve?
Q

STANDING BY PART 3

! Kermit Rain Waiting on Q Be Like MEME! QAnon Anon Q Clock Woman at Work Staring WAITING BE LIKE! Remember to Take Your Red Pill QAnon Anon Q Clock SCREWED Red Pill Birth Control


Google’s True Origin Partly Lies in CIA and NSA Research Grants for Mass Surveillance

Two decades ago, the US intelligence community worked closely with Silicon Valley in an effort to track citizens in cyberspace. And Google is at the heart of that origin story. Some of the research that led to Google’s ambitious creation was funded and coordinated by a research group established by the intelligence community to find ways to track individuals and groups online.

The intelligence community hoped that the nation’s leading computer scientists could take non-classified information and user data, combine it with what would become known as the internet, and begin to create for-profit, commercial enterprises to suit the needs of both the intelligence community and the public. They hoped to direct the supercomputing revolution from the start in order to make sense of what millions of human beings did inside this digital information network. That collaboration has made a comprehensive public-private mass surveillance state possible today.

The story of the deliberate creation of the modern mass-surveillance state includes elements of Google’s surprising, and largely unknown, origin. It is a somewhat different creation story than the one the public has heard, and explains what Google cofounders Sergey Brin and Larry Page set out to build, and why.

But this isn’t just the origin story of Google: It’s the origin story of the mass-surveillance state, and the government money that funded it.

Backstory: The intelligence community and Silicon Valley

In the mid 1990s, the intelligence community in America began to realize that they had an opportunity. The supercomputing community was just beginning to migrate from university settings into the private sector, led by investments from a place that would come to be known as Silicon Valley.

The intelligence community wanted to shape Silicon Valley’s efforts at their inception so they would be useful for homeland security purposes.

A digital revolution was underway: one that would transform the world of data gathering and how we make sense of massive amounts of information. The intelligence community wanted to shape Silicon Valley’s supercomputing efforts at their inception so they would be useful for both military and homeland security purposes. Could this supercomputing network, which would become capable of storing terabytes of information, make intelligent sense of the digital trail that human beings leave behind?

Answering this question was of great interest to the intelligence community.

Intelligence-gathering may have been their world, but the Central Intelligence Agency (CIA) and the National Security Agency (NSA) had come to realize that their future was likely to be profoundly shaped outside the government. It was at a time when military and intelligence budgets within the Clinton administration were in jeopardy, and the private sector had vast resources at their disposal. If the intelligence community wanted to conduct mass surveillance for national security purposes, it would require cooperation between the government and the emerging supercomputing companies.

To do this, they began reaching out to the scientists at American universities who were creating this supercomputing revolution. These scientists were developing ways to do what no single group of human beings sitting at work stations in the NSA and the CIA could ever hope to do: gather huge amounts of data and make intelligent sense of it.

A rich history of the governments science funding

There was already a long history of collaboration between America’s best scientists and the intelligence community, from the creation of the atomic bomb and satellite technology to efforts to put a man on the moon.

The internet itself was created because of an intelligence effort.

In fact, the internet itself was created because of an intelligence effort: In the 1970s, the agency responsible for developing emerging technologies for military, intelligence, and national security purposes—the Defense Advanced Research Projects Agency (DARPA)—linked four supercomputers to handle massive data transfers. It handed the operations off to the National Science Foundation (NSF) a decade or so later, which proliferated the network across thousands of universities and, eventually, the public, thus creating the architecture and scaffolding of the World Wide Web.

Silicon Valley was no different. By the mid 1990s, the intelligence community was seeding funding to the most promising supercomputing efforts across academia, guiding the creation of efforts to make massive amounts of information useful for both the private sector as well as the intelligence community.

They funded these computer scientists through an unclassified, highly compartmentalized program that was managed for the CIA and the NSA by large military and intelligence contractors. It was called the Massive Digital Data Systems (MDDS) project.

The Massive Digital Data Systems (MDDS) project 

MDDS was introduced to several dozen leading computer scientists at Stanford, CalTech, MIT, Carnegie Mellon, Harvard, and others in a white paper that described what the CIA, NSA, DARPA, and other agencies hoped to achieve. The research would largely be funded and managed by unclassified science agencies like NSF, which would allow the architecture to be scaled up in the private sector if it managed to achieve what the intelligence community hoped for.

“Not only are activities becoming more complex, but changing demands require that the IC [Intelligence Community] process different types as well as larger volumes of data,” the intelligence community said in its 1993 MDDS white paper. “Consequently, the IC is taking a proactive role in stimulating research in the efficient management of massive databases and ensuring that IC requirements can be incorporated or adapted into commercial products. Because the challenges are not unique to any one agency, the Community Management Staff (CMS) has commissioned a Massive Digital Data Systems [MDDS] Working Group to address the needs and to identify and evaluate possible solutions.”

Over the next few years, the program’s stated aim was to provide more than a dozen grants of several million dollars each to advance this research concept. The grants were to be directed largely through the NSF so that the most promising, successful efforts could be captured as intellectual property and form the basis of companies attracting investments from Silicon Valley. This type of public-to-private innovation system helped launch powerful science and technology companies like Qualcomm, Symantec, Netscape, and others, and funded the pivotal research in areas like Doppler radar and fiber optics, which are central to large companies like AccuWeather, Verizon, and AT&T today. Today, the NSF provides nearly 90% of all federal funding for university-based computer-science research.

The CIA and NSAs End Goal

The research arms of the CIA and NSA hoped that the best computer-science minds in academia could identify what they called “birds of a feather:” Just as geese fly together in large V shapes, or flocks of sparrows make sudden movements together in harmony, they predicted that like-minded groups of humans would move together online. The intelligence community named their first unclassified briefing for scientists the “birds of a feather” briefing, and the “Birds of a Feather Session on the Intelligence Community Initiative in Massive Digital Data Systems” took place at the Fairmont Hotel in San Jose in the spring of 1995.

The intelligence community named their first unclassified briefing for scientists the “birds of a feather” briefing.

Their research aim was to track digital fingerprints inside the rapidly expanding global information network, which was then known as the World Wide Web. Could an entire world of digital information be organized so that the requests humans made inside such a network be tracked and sorted? Could their queries be linked and ranked in order of importance? Could “birds of a feather” be identified inside this sea of information so that communities and groups could be tracked in an organized way?

By working with emerging commercial-data companies, their intent was to track like-minded groups of people across the internet and identify them from the digital fingerprints they left behind, much like forensic scientists use fingerprint smudges to identify criminals. Just as “birds of a feather flock together,” they predicted that potential terrorists would communicate with each other in this new global, connected world—and they could find them by identifying patterns in this massive amount of new information. Once these groups were identified, they could then follow their digital trails everywhere.

Sergey Brin and Larry Page, computer-science boy wonders 

In 1995, one of the first and most promising MDDS grants went to a computer-science research team at Stanford University with a decade-long history of working with NSF and DARPA grants. The primary objective of this grant was “query optimization of very complex queries that are described using the ‘query flocks’ approach.” A second grant—the DARPA-NSF grant most closely associated with Google’s origin—was part of a coordinated effort to build a massive digital library using the internet as its backbone. Both grants funded research by two graduate students who were making rapid advances in web-page ranking, as well as tracking (and making sense of) user queries: future Google cofounders Sergey Brin and Larry Page.

The research by Brin and Page under these grants became the heart of Google: people using search functions to find precisely what they wanted inside a very large data set. The intelligence community, however, saw a slightly different benefit in their research: Could the network be organized so efficiently that individual users could be uniquely identified and tracked?

This process is perfectly suited for the purposes of counter-terrorism and homeland security efforts: Human beings and like-minded groups who might pose a threat to national security can be uniquely identified online before they do harm. This explains why the intelligence community found Brin’s and Page’s research efforts so appealing; prior to this time, the CIA largely used human intelligence efforts in the field to identify people and groups that might pose threats. The ability to track them virtually (in conjunction with efforts in the field) would change everything.

It was the beginning of what in just a few years’ time would become Google. The two intelligence-community managers charged with leading the program met regularly with Brin as his research progressed, and he was an author on several other research papers that resulted from this MDDS grant before he and Page left to form Google.

The grants allowed Brin and Page to do their work and contributed to their breakthroughs in web-page ranking and tracking user queries. Brin didn’t work for the intelligence community—or for anyone else. Google had not yet been incorporated. He was just a Stanford researcher taking advantage of the grant provided by the NSA and CIA through the unclassified MDDS program.

Left out of Googles story

The MDDS research effort has never been part of Google’s origin story, even though the principal investigator for the MDDS grant specifically named Google as directly resulting from their research: “Its core technology, which allows it to find pages far more accurately than other search engines, was partially supported by this grant,” he wrote. In a published research paper that includes some of Brin’s pivotal work, the authors also reference the NSF grant that was created by the MDDS program.

Instead, every Google creation story only mentions just one federal grant: the NSF/DARPA “digital libraries” grant, which was designed to allow Stanford researchers to search the entire World Wide Web stored on the university’s servers at the time. “The development of the Google algorithms was carried on a variety of computers, mainly provided by the NSF-DARPA-NASA-funded Digital Library project at Stanford,” Stanford’s Infolab says of its origin, for example. NSF likewise only references the digital libraries grant, not the MDDS grant as well, in its own history of Google’s origin. In the famous research paper, “The Anatomy of a Large-Scale Hypertextual Web Search Engine,” which describes the creation of Google, Brin and Page thanked the NSF and DARPA for its digital library grant to Stanford. But the grant from the intelligence community’s MDDS program—specifically designed for the breakthrough that Google was built upon—has faded into obscurity.

Google has said in the past that it was not funded or created by the CIA. For instance, when stories circulated in 2006 that Google had received funding from the intelligence community for years to assist in counter-terrorism efforts, the company told Wired magazine founder John Battelle, “The statements related to Google are completely untrue.”

Did the CIA directly fund the work of Brin and Page, and therefore create Google? No. But were Brin and Page researching precisely what the NSA, the CIA, and the intelligence community hoped for, assisted by their grants? Absolutely.

The CIA and NSA funded an unclassified, compartmentalized program designed from its inception to spur something that looks almost exactly like Google.

To understand this significance, you have to consider what the intelligence community was trying to achieve as it seeded grants to the best computer-science minds in academia: The CIA and NSA funded an unclassified, compartmentalized program designed from its inception to spur the development of something that looks almost exactly like Google. Brin’s breakthrough research on page ranking by tracking user queries and linking them to the many searches conducted—essentially identifying “birds of a feather”—was largely the aim of the intelligence community’s MDDS program. And Google succeeded beyond their wildest dreams.

The intelligence communitys enduring legacy within Silicon Valley

Digital privacy concerns over the intersection between the intelligence community and commercial technology giants have grown in recent years. But most people still don’t understand the degree to which the intelligence community relies on the world’s biggest science and tech companies for its counter-terrorism and national-security work.

Civil-liberty advocacy groups have aired their privacy concerns for years, especially as they now relate to the Patriot Act. “Hastily passed 45 days after 9/11 in the name of national security, the Patriot Act was the first of many changes to surveillance laws that made it easier for the government to spy on ordinary Americans by expanding the authority to monitor phone and email communications, collect bank and credit reporting records, and track the activity of innocent Americans on the Internet,” says the ACLU. “While most Americans think it was created to catch terrorists, the Patriot Act actually turns regular citizens into suspects.”

When asked, the biggest technology and communications companies—from Verizon and AT&T to Google, Facebook, and Microsoft—say that they never deliberately and proactively offer up their vast databases on their customers to federal security and law enforcement agencies: They say that they only respond to subpoenas or requeststhat are filed properly under the terms of the Patriot Act.

But even a cursory glance through recent public records shows that there is a treadmill of constant requests that could undermine the intent behind this privacy promise. According to the data-request records that the companies make available to the public, in the most recent reporting period between 2016 and 2017, local, state and federal government authorities seeking information related to national security, counter-terrorism or criminal concerns issued more than 260,000 subpoenas, court orders, warrants, and other legal requests to Verizon, more than 250,000 such requests to AT&T, and nearly 24,000 subpoenas, search warrants, or court orders to Google. Direct national security or counter-terrorism requests are a small fraction of this overall group of requests, but the Patriot Act legal process has now become so routinized that the companies each have a group of employees who simply take care of the stream of requests.

In this way, the collaboration between the intelligence community and big, commercial science and tech companies has been wildly successful. When national security agencies need to identify and track people and groups, they know where to turn – and do so frequently. That was the goal in the beginning. It has succeeded perhaps more than anyone could have imagined at the time.


Image result for darpa meme

181122 Facebook Privacy Disasters181122 Facebook Privacy Disasters2

181101 Nest recording

 

181219 Facebook Shared Private Messages with FAANGs

 

190114 Secret Service Agents show up at door for Online Comments

190218 Big Data AI can figure if you're cheating HL

190303 Your Phone is Recording and Using Everything you say

190306 NSA SAYS it's shutting down PRISM HL

CaptureApple provides US Government Information

 

Chineses Smart Suits for Students GPS Tracking

 

Singapore Air has a DEACTIVATED Camera pointing at every seat

Singapore Air UNITED DELTA AMERICAN has a DEACTIVATED Camera

Singapore Air UNITED DELTA AMERICAN has a DEACTIVATED Camera2

 

DZA6Vr5VAAEwnOZ.jpg