“The conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our country.” Edward Bernays, Propaganda
There really is an information war, and you are right in the middle of the battlefield. Are you ready?
Sure, we are being surveilled, watched, listened to, wiretapped, and subliminally messaged – but what do I care as long as I have the Internet of Things to do my regal bidding?
Your every move, query, keystroke, like, phone call, message, and digital choice is creating your own personalized “dark profile” that can be used against you not only for commercial purposes but to literally program your thinking.
Once your “dark profile” is created, it can be used against you to manipulate your life in ways that are unimaginable, intervening in finances, work, social life, and the political realm simultaneously.
Government documents admit to heinous “digital crimes” against all Americans with 100% surveillance through all “devices” with microchip processors.
You are more than just being “watched”; your very thoughts (neural networks) are being manipulated.
It is each internet user’s duty to learn about these cyber-programs of manipulation and to be on guard! Ignorance and apathy will not protect you.The Anonymous Patriots have been asked to recap the methods that broadcasters use to control people through televisions, radios, cell phones, and computers. We have written prior Citizens’ Intelligence Reports on these important topics. Here, we update and refresh our intelligence report on the many weapons that are being used to “dumb” people down enough to accept political, military, and corporate propaganda without questioning the nonsense, lies, and post-truth politics that spew forth from every propaganda, corporate, main stream media outlet.
Warning: Do not read this article if you are not ready to confront evil in some of its very ugly forms. The military/corporate warlords are engaged in a battle to steal your willpower, your hard-earned income, and your political opinion. They want to turn them into never-ending commercialism, banal and immoral entertainment, and post-truth politics that are frankly not believable without the subliminal messaging and overt mind-control.
They are attempting to control human thinking until “free thoughts” are wiped-out. The cyber-war is actually a fight for control of your soul and spirit, and the weapons being used against us are in our very own hands at the end of our fingertips, and in our home, workplace, and environment, blaring from every television, computer, and radio.
We must learn the methods of our enemies so that their tricks, scams, and mental manipulation can have no power over our soul and spirit and the human right to have “free thought” without being controlled by the overlords of technology.
Ready or Not – The Battle Has Begun
A new technological revolution is taking place and each person on the internet will be affected. Many will fall prey to this information weapon that will be used against us to control our lives. For those on social media like Facebook, or those that have bought into using the Internet of Things, your life is about to change radically as you believe you are becoming more “free” by the machines that serve you, when in fact, you have willingly become imprisoned through the internet.
The more you participate in the automatic information fed directly to your machines that have personalized your news, entertainment, business, and “life-patterns”, the more you will think you are free and fully informed. But in fact, you will be limited by what your pattern-of-life generates as your individualized algorithms as a mechanical virtual world which will be created around you and becomes your personalized “digital prison” that you happily accept because it seems like a digital heaven to you.
Have you been lolled into dreaming sleep yet? You will be.
Your new digital prison is being created for you every time you do an internet search, click a like button on Facebook, type a word into your computer, choose something to watch on TV, or even speak a word into your phone. Every speck of “information” that you participate in is used to make your personalized digital life-pattern profile – your “dark profile.”
Even your bank account and everything you spend a digital penny on is being gathered in an NSA program called Marina that knows so much about you that when you get into your car on a day you have a weekly appointment, your phone “pings” in the route and distance to your destination automatically.
Your phone can also activate the controls of all your devices that can be connected to the Internet of Things. As you approach your house with your phone, your garage door opens automatically as the lights in the house come on and the house alarm is turned off while your coffee maker brews a coffee and your TV comes on to your usual show as the heating pad in your easy chair turns on to your favorite setting. There is no end to the “machine intelligence” support you can get from mechanically augmented reality.
Not enough for you? Then put on your 3-D visor and enter your self-created virtual reality world where it feels you are free to do as you please – seemingly, a type of virtual freedom.
Can you see where this is going in the future? The future is here today because all the things just described have already been created and are ready to be offered to every American with an internet connection and the money to upgrade to the new Google called Alphabet. Eric Schimdt, the CEO of Alphabet has bragged about this new system that he says is ready to go.
Whether you know it or not, what is described above is already happening on a commercial level and soon will escalate to an overt military level while the innocent internet user is lulled into believing that they are simply having fun. Since most American businesses have some component on the internet, the military weaponization of the internet may be as powerful as the threat of global nuclear annihilation.
Just imagine if the internet were turned off tomorrow for good – permanently, never to return. Most of what we think of as modern life would end and many people would never recover. Economies would collapse, wars would rage, and children wouldn’t know what to do or what to think.
We need to see the internet and its “wonders” for exactly what they are – weapons of mass social manipulation. When we can see the evil plans of those who have advanced this technology without the moral compass necessary to guide such powerful tools, then perhaps we can change these innovations from weapons into the information tools we initially believed they were intended to be. Information was supposed to free humanity, not imprison it in a virtual world where education is replaced by entertainment, religion is replaced by consumerism, and the real world in replaced by virtual reality.Modern life would collapse because the weapon of the internet already has control of modern life.
Weaponization of the Internet
Taxpayers of the United States, through the CIA’s advanced research and development company In-Q-Tel, funded the open source program that became Facebook, Google, Intel, Apple, and Microsoft. These companies have weaponized these devices and systems against the citizens of the world.
Once the Silicon Valley high-tech “dummy” companies are established by stooges chosen for their willingness to incorporate military “back doors” into all their products, the NSA/CIA/FBI uses the information gleaned from those companies to surveil every American through every devise that broadcasts a signal – cell phone, computer, television, or any devise on the Internet of Things.
Intelligence agencies can simply type in a query and access the metadata collected from every digital devise on the internet or that uses wi-fi or cell phone towers. This information is then used to target individuals for consumerism and/or U.S. Department of Defense intelligence collection. If an internet user is targeted, there are hundreds of ways to attack the user and manipulate his/her buying habits, personal life-pattern choices, and even the way the user thinks.
The object of the intelligence is simply to control the user. Social networks on the internet are military experiments in social manipulation, what the military calls PSYOPS – or psychological operations.
One of the NSA programs used to gather the Internet metadata is XKeyscore, a secret computer system first used by the National Security Agency (NSA) for searching and analyzing global Internet data, which it collects on a daily basis.
It enables almost unlimited surveillance of anyone anywhere in the world. The NSA’s databank of collected communications allows its analysts to listen to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future. XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects data.
Another component of NSA data collection is a program called Marina that is a database and analysis toolset for intercepted internet metadata. The database stores metadata up to a year. The Marina metadata application tracks a user’s browser experience, gathers contact information/content and develops summaries of the target and of the more distinguishing features and can look back on the last 365 days’ worth of metadata seen by collection system, regardless whether or not it was tasked for collection. The stored metadata is mainly used for pattern-of-life analysis.
Once the data is collected and can be queried and targeted, the data is then stored in an NSA program called Sentient World Simulation. This program is developing billions of individual nodes (prisons) to reflect every man, woman, and child.
US persons are not exempt because metadata is not considered data by US law (section 702 of the FISA Amendments Act).
It will be a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information. SWS provides an environment for testing Psychological Operations (PSYOPs), so that military leaders can develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners (US citizens).
SWS also replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers can predict how individuals and mobs will respond to various stressors.
These three programs, XKeyscore, Marina, and Sentient World Simulation create some of the environments which intend to imprison and control those who willingly enter the digital virtual reality of the internet. The internet is a WARZONE according to the people who created and weaponized it. Notice that the description of SWS says that even “neutrals” are the target of these systems. No one is safe from the surveillance, monitoring, targeting, and attacks of Facebook, Twitter, Google and Alphabet.
Just look how President Donald Trump is using Twitter as a weapon against the Main Stream Media. There is a battle for information and every person is in the middle of the battle whether they like it or not. The only question is whether you will be manipulated or not, which unless you are a hermit, you will be manipulated. So the real questions is – to what extent?
The largest domestic military exercises in US history happened in 2015. They were entitled: “Jade Helm 2015 – Mastering the Human Domain.” This title of the exercises should indicate to you where the US military is focusing its time and energy these days – on US citizens. It also clearly tells us what the intent of the US military is – to Master the Human Domain.
DARPA’s Dark History
In 2001, under the Total Information Awareness Program, President Bush had secretly authorized the NSA’s domestic surveillance of Americans without court-approved warrants. This was also the year that the Bush administration drew up its Information Operations Roadmap. Describing the internet as a “vulnerable weapons system,” Donald Rumsfeld’s Information Operations roadmap advocated that Pentagon strategy “should be based on the premise that the Department of Defense will ‘fight the net’ as it would an enemy weapons system.” The US should seek “maximum control” of the “full spectrum of globally emerging communications systems, sensors, and weapons systems,” advocated the document.
As of 2006, the CIA’s SAIC (Science Applications International Corporation) had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as Trailblazer. Core components of Total Information Awareness were being quietly continued under new code names. The new surveillance program was then fully transitioned from DARPA’s jurisdiction to the NSA.
Thus, 100% illegal surveillance was, and now is, possible.Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the “front” for a DARPA sponsored company. DARPA and In-Q-Tel keep the encryption codes and build in backdoors so that they can always control the military weapons that have been released into the corporate world for public use. According to DARPA and In-Q-Tel, innovation and technological advances must first be a weapon that can be controlled by its makers – the military.
Richard ‘Dick’ Patrick O’Neill, founding president of the Pentagon’s Highlands Forum
The Highlands Forum (controls DARPA-In-Q-Tel) directed the creation of weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a “bugged” microprocessor inside. Intel microprocessors are found in most of our “private” digital devices and are, in fact, collecting “intelligence” for the Department of Defense, CIA, and NSA.
DARPA/In-Q-Tel and the Highlands Forum drive the process of continuous war, from creating the devices that control all nuclear weapons to incubating the technologies that created the Internet, Intel micro-processers, Cisco routers, Google search engines, Facebook-like social networks, the Internet of Things, cell phones, Microsoft software, MacAfee security software, and all other commercial and military warfare devices using their source code.
US Patent Office Works For DARPA/In-Q-Tel
Over five thousand patents have been legal confiscated (stolen) by the US patent office and give to DARPA/In-Q-Tel for further development and weaponization. Once the patent is used to create a prototype, it has encrypted back-doors installed then it is given out as open source material for corporations and individuals to bring to the market place. If an inventor of a patent that is confiscated by the US Patent Office tries to continue work on the patent, that inventor may end up in jail. There are US patent laws permitting the government to steal and suppress any new technology (and imprison the inventor) which threatens “national security.”
For more detail on the corruption of the US Patent Office, please see our blockbuster report here:
FACEBOOK UNMASKED: HOW THE WORLD’S MOST RELEVANT ENTREPRENEUR WAS SCREWED BY ZUCKERBERG
Once DARPA had created the ARPANET and it proved to be extremely effective, routers were created that could handle exchanges between systems and computers. In 1998, virtually every internet exchange went through a Cisco router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system that allows a hacker to use a backdoor that was supposed to be available only to law enforcement agencies.
The intruder could hi-jack the Cisco device and use it to spy on all communications passing through it, including the content of e-mails, leaving products vulnerable to attack, particularly ubiquitous software programs like those produced by Microsoft. This backdoor puts millions of customers and their private information at risk and jeopardizes the security of electrical power facilities, public utilities, and transportation systems.
Intel (In-Q-Tel) Inside
Inside every Intel microprocessor is a smaller processor that lets Intel – who works for the Department of Defense – control every aspect of your computer remotely no matter what encryption codes you use. All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC through a second physical processor embedded within the main processor which has its own operating system embedded on the chip.
It is advertised as something that will allow IT professionals to remotely troubleshoot a PC. Intel’s latest x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine (ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary. Even an encrypted hard drive can be monitored and controlled by the “processor within the processor” that already has your encryption key. There is more than just the NSA monitoring your calls, emails, and transmissions — there is Intel “Inside” your computer.
Intel collects “intelligence” but it also provides a “back door” to control, or “turn off” your computer at will, just like it has been demonstrated that Cisco routers have a “back door” open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem used for securing unauthorized remote access to a computer.
See our detailed citizens intelligence report on Intel here:
DARPA VADER AND THE EVIL INTEL EMPIRE INSIDE UNCOVERING THE DOD SITH LORDS THAT CONTROL YOUR LAPTOPIn-Q-Tel is Warfare Technology
In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum (Group). The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIA’s In-Q-Tel in the development of high-tech network-based cyber-warfare.
In-Q-Tel contracts almost all its work through SAIC (Science Applications International Corporation) that changed its name to Leidos in 2013. Leidos is among the top 10 largest defense contractors in the U. S. and has a symbiotic relationship with the NSA and U. S. intelligence agencies.
The Highland Forum, DARPA, and In-Q-Tel are a secret multi-national high-tech think tanks for inventing and the control of innovations that can be turned into weapons. Military and information technology experts gather at the Highlands Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of “network-centric warfare” which is now a top concern of the military and the corporations that serve it.
The US intelligence community funded, nurtured and incubated Google as a military weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC), Google was one among a group of private sector start-ups co-opted by US intelligence to control information warfare.
In 1994, two PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application built upon the source code given to them by DARPA/In-Q-Tel. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.
The NSA needed to control and monitor digital information, particularly the data flowing over the Internet. The government can “command” that any company must turn over that information, and it does so as part of the NSA’s Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.
Under Google’s terms of service, the company advises its users that it may share their “personal information” with outside organizations, including government agencies. Essentially, the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information.
Let’s take a closer look at the Highland Forums. The description below is taken from their website:No one checks whether DARPA inventions are moral, ethical, or humane. All military inventions, even if they advertise them as helpful, are weaponized.
Highland Forums Program Description Overview
The CIA’s – In-Q-Tel, SAIC, and Leidos
In 1998, the CIA identified technology as a top strategic priority, and set out a bold and radical plan to create a new venture that would help increase the agency’s access to private sector innovation. In-Q-Tel was chartered in February 1999 by a group of private citizens at the request of the Director of the CIA and with the support of the U.S. Congress. In-Q-Tel was tasked with building a bridge between the intelligence community and a new set of technology innovators. Eventually, In-Q-Tel evolved into the Science Applications International Corporation (SAIC).
Leidos, a joint spin-off of Science Applications International Corporation (SAIC), is an American defense company headquartered in Reston, Virginia, that provides scientific, engineering, systems integration, and technical services. Leidos works extensively with the Department of Defense (4th largest DoD contractor FY2012), the Department of Homeland Security, and the United States Intelligence Community, including the NSA, as well as other US government civil agencies and selected commercial markets. On September 27, 2013, SAIC changed its name to Leidos and spun off a $4 billion government services and information technology company, which retains the name Science Applications International Corporation.
In March 2001, SAIC defined the concept for the NSA Trailblazer Project. Trailblazer was a continuation of the earlier ThinThread program which was a project that the NSA pursued during the 1990s. The program involved wiretapping and sophisticated analysis of the resulting data. ThinThread was dismissed and replaced by the Trailblazer Project, which lacked privacy protections. A consortium led by SAIC was awarded a $280 million contract to develop Trailblazer in 2002.
Trailblazer was intended to develop a capability to analyze data carried on all communications networks. It was specifically intended to track entities using cell phones and e-mail. In 2002, NSA contracted SAIC for $280 million to produce a “technology demonstration platform” for the agency’s project, a “Digital Network Intelligence” system to analyze data carried on computer networks.
Cyberspace – A New Operational Domain
In 2011, the United States Department of Defense named cyberspace a new operational domain. The cyberspace domain provides critical capabilities that enable the military to conduct operations in all domains (Land, Sea, Air, Space, and Cyberspace). The US Cyber Command and the Military Services are working to integrate the cyberspace domain with the other operational domains in order to conduct military command and control and achieve “national security” objectives. To effectively integrate cyberspace operations, DoD requires situational awareness of the Mission, Network, and Adversary based on analysis of operational data to make timely and effective decisions.
NSA Cyber-kinetic AttacksIt is official, every time you are on the internet, you are in a cyber war-zone as defining by the US Department of Defense. You are considered a “hostile actor” until neutralized.
The military has for years been developing offensive capabilities, giving it the power not just to defend the US but to assail its foes. Using so-called cyber-kinetic attacks, the NSA and its forces now have the capability to physically destroy an adversary’s equipment and infrastructure, and potentially even to kill. The NSA has concluded that such cyber weapons are as crucial to 21st-century warfare as nuclear arms were in the 20th.