Seal of the C.I.A. - Central Intelligence Agency of the United States Government (Photo credit: Wikipedia) |
CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information. Who would want to be an American with friends like that?

Occupy Corporatism
In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.
David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”
Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.

The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore.
Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:
• Finances
• Stock transactions
• Business deals
• Foreign military
• Diplomatic secrets
• Legal documents
• Personal civilian communications

At the same time the NSA spy center was being constructed, Attorney General Eric Holder new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.
http://occupycorporatism.com/cia-sponsored-trolls-monitor-internet-interact-with-users-to-discredit-factual-information/
2 comments:
Attractive element of content. I simply stumbled upon your blog and in
accession capital to assert that I get in fact enjoyed account your weblog posts.
Any way I'll be subscribing on your augment or even I achievement you access persistently quickly.
Also visit my web site - old holborn
Hey there, I think your blog might be having browser compatibility issues.
When I look at your blog in Ie, it looks fine but when opening in Internet Explorer, it has some overlapping.
I just wanted to give you a quick heads up!
Other then that, superb blog!
my web site :: mac baren
Post a Comment