• Beyond Blue Beam
    ByWindlander October 23, 2024
    Hello readers, welcome back to another episode of Beyond Blue Beam. We continue our journey into the realms of mystery and intrigue. Is it fiction or is it reality? “Red is grey and yellow white but we decide which is right and which is an illusion” (The Moody Blues). You decide! Share your thoughts in the comments. Also, please feel free to add whatever other information you have to add to the article in the comments. Meanwhile, relax and enjoy the read.

    Today, we embark on another thrilling journey through time, space, and possibly even different realities. As usual, buckle up for an intriguing exploration of diverse topics.

    We begin our journey with information regarding the Dulce, Arculeta Mesa Underground Base.

    Dulce

    One of our very close contacts has personally been to the Dulce Base location on 3 occasions back in the 1990s.

    He spoke with locals of the Native American Apache tribe. The cashier at the local convenience store in Dulce told him that the aliens have been seen on several occasions and their ships are seen flying over the Mesa frequently. They don’t think much about it. “Just go to the local school on the way to the mesa and check out the students. There are many alien-human hybrids attending class. It’s nothing unusual for us locals.” Unfortunately, this was in mid-July and the school was closed for summer vacation.

    “When you go to the base of the Mesa you can see the granite rocks everywhere that seem to have been partially melted by some type of intense heat. There was a battle there in 1979. Phil Schneider has said he was involved in the battle. There is a very eerie feeling around the area, like death. The Forestry Service has a sign posted that says ‘there was a 17k acre fire here in 1979.’ The area around the base of Arculeta Mesa looks more like a small tactical nuke blast.”

    1979 Firefight at Dulce Base



    Philip Schneider 1995 Lecture Dulce Base Alien Battle



    Dulce Underground Base, New Mexico

    From a report by Dr Michael Salla, exopolitics.org

    http://www.phils.au/dulce-underground-base/

    We are adding 2 more videos pertaining to the Dulce Base:

    NSA Kunia Regional Security Operations Center, Hawaii

    The NSA Kunia Regional Security Operations Center (RSOC), also known as the Kunia Tunnel, is an underground intelligence facility located in Oahu, Hawaii. Originally built during World War II to protect military equipment, the tunnel now serves as a secure hub for signals intelligence (SIGINT) and information security (INFOSEC) operations. Managed by the NSA, the center monitors communications, radar signals, and other electronic data from the Asia-Pacific region, making it strategically significant for U.S. intelligence efforts. It also plays a key role in protecting U.S. government communications from cyber threats.

    Kunia RSOC is a joint operation involving personnel from various branches of the U.S. military, including the Army, Navy, Air Force, and Marines. Its primary mission is to gather and analyze foreign communications, providing crucial intelligence for national security. The facility’s location and capabilities make it essential for tracking military activities, diplomatic exchanges, and emerging cyber threats in the Asia-Pacific, although it has also been linked to broader controversies about global surveillance and privacy concerns, highlighted by whistleblower revelations.

    Alien Intervention – They are coming.

    This may be connected to and used in Project Blue Beam?

    Ex-Pentagon Insider on How UFO’s Work and Why the Government is Disclosing Information

    The Egyptian Obelisk

    In the center of St. Peter’s Square in the Vatican, there stands a 40-meter-high Egyptian obelisk. Erected in the square in 1586 by order of Pope Sixtus V, it has a rich and eventful history. Interestingly, at the very top of this ancient monument is a curious depiction: an Egyptian pharaoh kneels before a figure seated in a chair with a large round head, remarkably resembling an alien in a spacesuit. This strange imagery fuels speculation and intrigue, adding a mysterious layer to the already historic obelisk.



    The Holographic Fan

    The Holographic Fan is a unique display technology that creates 3D images that appear to float in mid-air using the principle of Persistence of Vision (POV). It works by attaching strips of RGB LEDs to the fan blades, which are controlled by a specialized unit that lights them up in rapid succession. As the fan spins, it produces a seamless, full picture, giving the illusion of a 3D object hovering in space. This technology pushes the boundaries of visual display, offering mesmerizing, dynamic images in a way that captivates the viewer.

    All Disney Celebrities Are Clones

    This Is Now Public Knowledge

    A doctor at a Disney engineering lab admits to cloning and begins preparing the clones to fulfill Disney’s objectives.

    Who else that is not human is walking among us?

    We come near to the end of our journey this week with episode 2 part 3 of the Annunaki/Enki story.

    THE LOST BOOK OF ENKI EPISODE 2 PART 3

    The UFO Videos

    1. A Large UAP releases a smaller craft. Location unknown

    2. 3 light orbs seen over Australia. October 2024

    3. Strange Shaped UFO seen over Canada. October 2024

    4. 2 light ships seen over Iran. Merge together and disappear in what looks like a portal with an explosion. October 5, 2024

    5. A mother ship partially cloaked and hovering. seen in the midwestern USA. October 2024

    6. Pulsating orb seen over Monterrey, Mexico. October 2024

    7. A very unusual UAP anomaly seen over Southern California October 2024.

    Can one of the readers explain what this is?

    End of Transmission >>>>>>>>>

    https://benjaminfulford.net/beyond-blue-beam-31/

    https://donshafi911iamthefaceoftruth.blogspot.com/2024/10/beyond-blue-beam-by-windlander-october_27.html
    Beyond Blue Beam ByWindlander October 23, 2024 Hello readers, welcome back to another episode of Beyond Blue Beam. We continue our journey into the realms of mystery and intrigue. Is it fiction or is it reality? “Red is grey and yellow white but we decide which is right and which is an illusion” (The Moody Blues). You decide! Share your thoughts in the comments. Also, please feel free to add whatever other information you have to add to the article in the comments. Meanwhile, relax and enjoy the read. Today, we embark on another thrilling journey through time, space, and possibly even different realities. As usual, buckle up for an intriguing exploration of diverse topics. We begin our journey with information regarding the Dulce, Arculeta Mesa Underground Base. Dulce One of our very close contacts has personally been to the Dulce Base location on 3 occasions back in the 1990s. He spoke with locals of the Native American Apache tribe. The cashier at the local convenience store in Dulce told him that the aliens have been seen on several occasions and their ships are seen flying over the Mesa frequently. They don’t think much about it. “Just go to the local school on the way to the mesa and check out the students. There are many alien-human hybrids attending class. It’s nothing unusual for us locals.” Unfortunately, this was in mid-July and the school was closed for summer vacation. “When you go to the base of the Mesa you can see the granite rocks everywhere that seem to have been partially melted by some type of intense heat. There was a battle there in 1979. Phil Schneider has said he was involved in the battle. There is a very eerie feeling around the area, like death. The Forestry Service has a sign posted that says ‘there was a 17k acre fire here in 1979.’ The area around the base of Arculeta Mesa looks more like a small tactical nuke blast.” 1979 Firefight at Dulce Base Philip Schneider 1995 Lecture Dulce Base Alien Battle Dulce Underground Base, New Mexico From a report by Dr Michael Salla, exopolitics.org http://www.phils.au/dulce-underground-base/ We are adding 2 more videos pertaining to the Dulce Base: NSA Kunia Regional Security Operations Center, Hawaii The NSA Kunia Regional Security Operations Center (RSOC), also known as the Kunia Tunnel, is an underground intelligence facility located in Oahu, Hawaii. Originally built during World War II to protect military equipment, the tunnel now serves as a secure hub for signals intelligence (SIGINT) and information security (INFOSEC) operations. Managed by the NSA, the center monitors communications, radar signals, and other electronic data from the Asia-Pacific region, making it strategically significant for U.S. intelligence efforts. It also plays a key role in protecting U.S. government communications from cyber threats. Kunia RSOC is a joint operation involving personnel from various branches of the U.S. military, including the Army, Navy, Air Force, and Marines. Its primary mission is to gather and analyze foreign communications, providing crucial intelligence for national security. The facility’s location and capabilities make it essential for tracking military activities, diplomatic exchanges, and emerging cyber threats in the Asia-Pacific, although it has also been linked to broader controversies about global surveillance and privacy concerns, highlighted by whistleblower revelations. Alien Intervention – They are coming. This may be connected to and used in Project Blue Beam? Ex-Pentagon Insider on How UFO’s Work and Why the Government is Disclosing Information The Egyptian Obelisk In the center of St. Peter’s Square in the Vatican, there stands a 40-meter-high Egyptian obelisk. Erected in the square in 1586 by order of Pope Sixtus V, it has a rich and eventful history. Interestingly, at the very top of this ancient monument is a curious depiction: an Egyptian pharaoh kneels before a figure seated in a chair with a large round head, remarkably resembling an alien in a spacesuit. This strange imagery fuels speculation and intrigue, adding a mysterious layer to the already historic obelisk. The Holographic Fan The Holographic Fan is a unique display technology that creates 3D images that appear to float in mid-air using the principle of Persistence of Vision (POV). It works by attaching strips of RGB LEDs to the fan blades, which are controlled by a specialized unit that lights them up in rapid succession. As the fan spins, it produces a seamless, full picture, giving the illusion of a 3D object hovering in space. This technology pushes the boundaries of visual display, offering mesmerizing, dynamic images in a way that captivates the viewer. All Disney Celebrities Are Clones This Is Now Public Knowledge A doctor at a Disney engineering lab admits to cloning and begins preparing the clones to fulfill Disney’s objectives. Who else that is not human is walking among us? We come near to the end of our journey this week with episode 2 part 3 of the Annunaki/Enki story. THE LOST BOOK OF ENKI EPISODE 2 PART 3 The UFO Videos 1. A Large UAP releases a smaller craft. Location unknown 2. 3 light orbs seen over Australia. October 2024 3. Strange Shaped UFO seen over Canada. October 2024 4. 2 light ships seen over Iran. Merge together and disappear in what looks like a portal with an explosion. October 5, 2024 5. A mother ship partially cloaked and hovering. seen in the midwestern USA. October 2024 6. Pulsating orb seen over Monterrey, Mexico. October 2024 7. A very unusual UAP anomaly seen over Southern California October 2024. Can one of the readers explain what this is? End of Transmission >>>>>>>>> https://benjaminfulford.net/beyond-blue-beam-31/ https://donshafi911iamthefaceoftruth.blogspot.com/2024/10/beyond-blue-beam-by-windlander-october_27.html
    0 Comments 0 Shares 8821 Views
  • The Cyber Threat Intelligence League
    Claudio RestaJanuary 18, 2024

    VT Condemns the ETHNIC CLEANSING OF PALESTINIANS by USA/Israel

    $ 280 BILLION US TAXPAYER DOLLARS INVESTED since 1948 in US/Israeli Ethnic Cleansing and Occupation Operation; $ 150B direct "aid" and $ 130B in "Offense" contracts
    Source: Embassy of Israel, Washington, D.C. and US Department of State.

    There is a vast plan for global censorship by US and British military contractors:



    US military contractor Pablo Breuer (left), UK defense researcher Sara-Jayne “SJ” Terp (center), and Chris Krebs, former director of the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS-CISA)

    – Documents received by investigative journalists Michael Shellenberger, Alex Gutentag and Matt Taibbi from an anonymous but “highly credible” whistleblower reveal new details about how the US censorship industrial complex – a network of more than 100 government agencies, private companies, universities and organizations non-profit – seeks to control and criminalize “wrong thinking”.
    – The documents describe how modern digital censorship programs were created and the various roles of the military, US intelligence agencies, civil society organizations and commercial media.
    They also describe the methods and techniques used, such as the creation and use of “sock puppet” accounts to spy on and direct online discussions and propagate desired narratives, and the discrediting of dissidents “as a necessary prerequisite for requiring censorship in their comparisons.”
    – Documents show that the weaponization of the financial sector originated with the Cyber Threat Intelligence League (CTIL), which specifically sought to get banks to “cut off financial services to individuals organizing gatherings or events.”
    – CTIL files also show that there was a clear intent to circumvent the First Amendment by outsourcing censorship to the private, non-governmental sector. According to the informant, “the ethic was that if we get away with it, it’s legal.”

    Documents received by investigative journalists Michael Shellenberger, Alex Gutentag and Matt Taibbi from an anonymous but “highly credible” whistleblower reveal new details about how the US censorship industrial complex – a network of more than 100 government agencies, private companies, universities and non-profit organizations – regulates and criminalizes “wrong thinking”.


    as Ursula Van der Leyen, the president of European Commission since 2019,

    stated at the WEF in Davos on January 17th, 2023 similar censorship are the most urgent and necessary policies (!) and will be implemented everywhere

    They describe the activities of an “anti-disinformation” group called the Cyber Threat Intelligence League, or CTIL, which officially began as a volunteer project of data scientists and defense and intelligence veterans, but whose tactics over time appear to have been absorbed into multiple official projects, including those of the Department of Homeland Security (DHS).

    The CTI League documents provide missing answers to key questions not addressed in the Twitter Files and Facebook Files. Together, they offer a complete picture of the rise of the “anti-disinformation” industry, or what we have called the Censorship Industrial Complex.”

    The documents describe how modern digital censorship programs were created and the various roles of the military, US intelligence agencies, civil society organizations and commercial media.

    They also describe the methods and techniques used, such as the creation and use of “sock puppet” accounts to spy on and direct online discussions and propagate desired narratives, the discrediting of dissidents, and the deliberate weaponization of the financial industry against them .

    According to the whistleblower, the CTIL was also involved in the creation of a counter-disinformation project to “avoid a repeat of 2016”, a reference to Brexit and Donald Trump’s surprise victory in the elections, two situations in which the democratic processes have actually won.

    As Jimmy Dore noted, it wasn’t about preventing the circulation of false information.

    It was about ensuring that no political outsider could ever enter the Oval Office again.

    The instruction to prevent a repeat of 2016 was a direct call to undermine, if not eliminate, the process of free and fair elections.

    Importantly, the documents admit that censorship efforts against Americans must be carried out by private sector partners, because the government does not have “legal authority” to do so.

    The new series of documents and videos reveals that 2019 was a pivotal year for the censorship industrial complex. According to Public, it was then that “US and British military and intelligence contractors, led by a former British defense researcher, Sara-Jayne ‘SJ’ Terp, developed the blanket censorship framework.”



    These contractors became co-leaders of CTIL, whose original founders were a former Israeli intelligence official, Ohad Zaidenberg, the person responsible of Microsoft security Nate Warfield, Chris Mills, another Microsoft security official, and Marc Rogers, the head of security operations at the hacker convention DEF CON.

    According to media reports , these highly trained and in-demand professionals have made the altruistic decision to offer their services to help billion-dollar hospitals with their cybersecurity, for free and with no strings attached. It wasn’t a believable cover story then, and it certainly hasn’t gotten any better.

    Within a month of CTIL’s founding in March 2020, this supposedly entirely volunteer group had grown to 1,400 “invitation-only” members in 76 countries and entered into an official partnership with Cybersecurity and Information Security Agency (CISA) of the United States Department of Homeland Security. As reported by Public:

    Parallel censorship agencies

    In spring 2020, CISA also created the Election Integrity Partnership (EIP) – a consortium composed of the Stanford Internet Observatory (SIO), the University of Washington’s Center for an Informed Public, the Atlantic’s Digital Forensic Research Lab Council and from Graphika (a social media analytics company) – and outsourced what would otherwise have been illegal and unconstitutional censorship.

    During the 2020 election cycle, EIP and CISA worked with the State Department’s Global Engagement Center (GEC) and the DHS-supported Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) to influence and monitor political discussions online. EIP coordinated the removal of unwanted content using a real-time chat application shared by DHS, EIP, and social media companies.

    At the same time, CTIL monitored and reported anti-blockade views on social media. A “law enforcement” channel was created specifically to spy on and monitor social media users posting anti-lockdown hashtags. CTIL even kept a printout detailing their Twitter biographies.

    According to Public, the CTIL has also “engaged in offensive operations to influence public opinion, discussing ways to promote ‘counter-messaging,’ co-opting hashtags, diluting unfavorable messaging, creating sock puppet accounts, and infiltrating private groups by invitation.” In February 2021, the EIP was renamed the Virality Project, at which point its censorship focus shifted from elections to COVID-related issues.

    Government infiltration and takeover

    Although CTIL member Bonnie Smalley responded to a Public question by saying that CTIL has “nothing to do with the government,” the evidence shows otherwise. At least a dozen government employees working with DHS, the FBI, and CISA were also active members of CTIL.

    According to the whistleblower, CTIL’s goal “was to become part of the federal government.” Terp’s plan called for the creation of “MisinfoSec communities” that would include the federal sector, and documents show that this goal was achieved. In April 2020, Chris Krebs, then director of CISA, also publicly announced the agency’s partnership with CTIL.

    The audience continues:“The documents also show that Terp and his colleagues, through a group called the MisinfoSec Working Group, which included Renee DiResta, head of research at the Stanford Internet Observatory, created a censorship, influence and counter-disinformation strategy called

    Adversarial Misinformation and Influence Tactics and Techniques (AMITT).

    SJ on X: "AMITT (Adversarial Misinformation and Influence Tactics and Techniques) includes the left-of-boom misinformation activities that are often missed by other analyses, where ”left of boom” covers activity before an incident

    They wrote AMITT by adapting a cybersecurity framework developed by MITER… Terp then used AMITT to develop the DISARM framework, which the World Health Organization then used to “counter anti-vaccination campaigns across Europe.”

    A key component of Terp’s work through CTIL, MisinfoSec and AMITT has been to bring the concept of “cognitive security” to the fields of cybersecurity and information security…

    The ambitions of the 2020 pioneers of the censorship industrial complex went far beyond simply requiring Twitter to place a warning label on tweets or blacklist individuals.

    The AMITT framework calls for discrediting people as a necessary prerequisite for requiring censorship of them. Invite influencers to train to spread messages. And he invites us to try to convince banks to cut financial services to individuals who organize demonstrations or events.”

    The arming of the financial sector was born with the CTIL

    Now we know where this financial sector weapon comes from. It originated with the CTIL, which hspecifically sought to induce banks to “cut financial services to individuals who organize rallies or events”.

    Clearly, as my case and that of many others demonstrates, even banks and online payment processors have been tricked into cutting off services to people who simply expressed opposing views. It’s not just demonstration organizers who are being targeted.

    Under the cover of altruism

    Although CTIL officials have repeatedly stressed that the organization was founded on purely altruistic principles, the clear goal of its leaders was to “build support for censorship among national security and cybersecurity institutions,” writes Public, and they built that support by promoting Terp’s idea of “cognitive safety.”

    The choice of the term “cognitive safety” takes on a rather sinister flavor in light of Dr. Michael Nehls’ findings that over the past four years there has been what appears to be an intentional effort to destroy autobiographical memory function in the public’s brain , thus facilitating mass indoctrination and inhibiting personal will and critical thinking.vast plan for global censorship by US and British military contractors

    The Indoctrinated Brain - By Michael Nehls (hardcover) : Target

    He presents his thesis in the book “The Indoctrinated Brain: How to Successfully Fend Off the Global Attack on Your Mental Freedom”, published in mid-December 2023.

    The whistleblower material clearly reveals that sophisticated military tactics have been turned against the American public, powerful psychological tools – the same tools that, according to Nehls, can literally alter the biological functions of the brain.

    Public cites a MisinfoSec report in which “the authors called for placing censorship efforts within ‘cybersecurity,’ while acknowledging that ‘disinformation security’ is entirely different from cybersecurity. They wrote that the third pillar of the “information environment”, after physical and cyber security, should be the “cognitive dimension”.

    Indeed, your mind – your cognition, your very ability to think independently – is the battlefield of today’s war, as Nehls proposes in his book. The scary part is that the tools used have the power to reprogram who we are.

    We are indeed “hackable animals,” as proposed by Yuval Noah Harari, and the censorship industrial complex has already hacked the brain structure of billions of people over the past four years. Gutentag also talks about it in an article dated December 3, 2023:”What was once considered a “conspiracy theory”, according to which military and intelligence forces manipulated public opinion through inorganic interventions, has now been confirmed .

    Our study of the censorship industrial complex has exposed a far-reaching plan to subvert the democratic process and engage in activities that have a basis in military techniques and that amount to attempts at thought or mind control.”

    ”It’s legal if we can get away with it”

    The CTIL files also demonstrate that there was a clear intent to circumvent the First Amendment by outsourcing censorship to the private, non-governmental sector.

    According to the informant:“The ethos was if we get away with it, it’s legal, and there were no First Amendment problems because we have a ‘public-private partnership’ – that’s the word they used to mask these problems. Private individuals can do things that public officials cannot do, and public officials can provide leadership and coordination.”

    Good news, bad news

    ”The good news is that more and more information is coming out about the U.S. government’s illegal outsourcing of censorship, and with it, legal challenges that pose roadblocks to this circumvention of the Constitution.

    The three activists also achieved other victories. In August 2022, DHS was forced to shut down the Disinformation Governance Board due to public backlash. CISA also deleted information about its national censorship work from its website and dismantled its Misinformation, Disinformation, and Malinformation (MDM) subcommittee.

    The federal government’s Select Subcommittee on Armaments is also continuing its search for the truth and will (hopefully) use all the power at its disposal to put an end to the abuses. Its latest report, “The Weaponization of ‘Disinformation’ Pseudo-Experts and Bureaucrats: How the Federal Government Partnered with Universities to Censor Americans’ Political Speech” was released on November 6, 2023.

    Unfortunately, there is a global effort underway not only to normalize, but also to legalize this type of censorship by third parties.

    In short, they are trying to restructure the censorship industry “away from a top-down government-led model” to a “competitive brokerage model” in which “content management” (read censorship) is simply outsourced to third-party organizations.

    In this way, a “legal” market for disinformation compliance is created, while the government can claim to have nothing to do with controlling the information. In essence, we are witnessing the emergence of organized corporate censorship.

    There is no clear solution to this threat other than to continue to oppose all efforts to legalize, standardize and normalize censorship. Vocally oppose, refuse to use intermediaries like NewsGuard, and boycott any company or organization that uses intermediaries or engages in censorship of any kind.”

    Claudio Resta was born in Genoa, Italy in 1958, he is a citizen of the world (Spinoza), a maverick philosopher, and an interdisciplinary expert, oh, and an artist, too.

    Grew up in a family of scientists where many sciences were represented by philosophy to psychoanalysis, from economics to history, from mathematics to physics, and where these sciences were subject to public display by their subject experts family members, and all those who they were part of could participate in a public family dialogue/debate on these subjects if they so wished. Read Full Bio

    Latest Articles (2023-Present)
    Archived Articles (2019-2022)


    ATTENTION READERS

    We See The World From All Sides and Want YOU To Be Fully Informed
    In fact, intentional disinformation is a disgraceful scourge in media today. So to assuage any possible errant incorrect information posted herein, we strongly encourage you to seek corroboration from other non-VT sources before forming an educated opinion.

    About VT - Policies & Disclosures - Comment Policy
    Due to the nature of uncensored content posted by VT's fully independent international writers, VT cannot guarantee absolute validity. All content is owned by the author exclusively. Expressed opinions are NOT necessarily the views of VT, other authors, affiliates, advertisers, sponsors, partners, or technicians. Some content may be satirical in nature. All images are the full responsibility of the article author and NOT VT.

    https://www.vtforeignpolicy.com/2024/01/the-cyber-threat-intelligence-league/
    The Cyber Threat Intelligence League Claudio RestaJanuary 18, 2024 VT Condemns the ETHNIC CLEANSING OF PALESTINIANS by USA/Israel $ 280 BILLION US TAXPAYER DOLLARS INVESTED since 1948 in US/Israeli Ethnic Cleansing and Occupation Operation; $ 150B direct "aid" and $ 130B in "Offense" contracts Source: Embassy of Israel, Washington, D.C. and US Department of State. There is a vast plan for global censorship by US and British military contractors: US military contractor Pablo Breuer (left), UK defense researcher Sara-Jayne “SJ” Terp (center), and Chris Krebs, former director of the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS-CISA) – Documents received by investigative journalists Michael Shellenberger, Alex Gutentag and Matt Taibbi from an anonymous but “highly credible” whistleblower reveal new details about how the US censorship industrial complex – a network of more than 100 government agencies, private companies, universities and organizations non-profit – seeks to control and criminalize “wrong thinking”. – The documents describe how modern digital censorship programs were created and the various roles of the military, US intelligence agencies, civil society organizations and commercial media. They also describe the methods and techniques used, such as the creation and use of “sock puppet” accounts to spy on and direct online discussions and propagate desired narratives, and the discrediting of dissidents “as a necessary prerequisite for requiring censorship in their comparisons.” – Documents show that the weaponization of the financial sector originated with the Cyber Threat Intelligence League (CTIL), which specifically sought to get banks to “cut off financial services to individuals organizing gatherings or events.” – CTIL files also show that there was a clear intent to circumvent the First Amendment by outsourcing censorship to the private, non-governmental sector. According to the informant, “the ethic was that if we get away with it, it’s legal.” Documents received by investigative journalists Michael Shellenberger, Alex Gutentag and Matt Taibbi from an anonymous but “highly credible” whistleblower reveal new details about how the US censorship industrial complex – a network of more than 100 government agencies, private companies, universities and non-profit organizations – regulates and criminalizes “wrong thinking”. as Ursula Van der Leyen, the president of European Commission since 2019, stated at the WEF in Davos on January 17th, 2023 similar censorship are the most urgent and necessary policies (!) and will be implemented everywhere They describe the activities of an “anti-disinformation” group called the Cyber Threat Intelligence League, or CTIL, which officially began as a volunteer project of data scientists and defense and intelligence veterans, but whose tactics over time appear to have been absorbed into multiple official projects, including those of the Department of Homeland Security (DHS). The CTI League documents provide missing answers to key questions not addressed in the Twitter Files and Facebook Files. Together, they offer a complete picture of the rise of the “anti-disinformation” industry, or what we have called the Censorship Industrial Complex.” The documents describe how modern digital censorship programs were created and the various roles of the military, US intelligence agencies, civil society organizations and commercial media. They also describe the methods and techniques used, such as the creation and use of “sock puppet” accounts to spy on and direct online discussions and propagate desired narratives, the discrediting of dissidents, and the deliberate weaponization of the financial industry against them . According to the whistleblower, the CTIL was also involved in the creation of a counter-disinformation project to “avoid a repeat of 2016”, a reference to Brexit and Donald Trump’s surprise victory in the elections, two situations in which the democratic processes have actually won. As Jimmy Dore noted, it wasn’t about preventing the circulation of false information. It was about ensuring that no political outsider could ever enter the Oval Office again. The instruction to prevent a repeat of 2016 was a direct call to undermine, if not eliminate, the process of free and fair elections. Importantly, the documents admit that censorship efforts against Americans must be carried out by private sector partners, because the government does not have “legal authority” to do so. The new series of documents and videos reveals that 2019 was a pivotal year for the censorship industrial complex. According to Public, it was then that “US and British military and intelligence contractors, led by a former British defense researcher, Sara-Jayne ‘SJ’ Terp, developed the blanket censorship framework.” These contractors became co-leaders of CTIL, whose original founders were a former Israeli intelligence official, Ohad Zaidenberg, the person responsible of Microsoft security Nate Warfield, Chris Mills, another Microsoft security official, and Marc Rogers, the head of security operations at the hacker convention DEF CON. According to media reports , these highly trained and in-demand professionals have made the altruistic decision to offer their services to help billion-dollar hospitals with their cybersecurity, for free and with no strings attached. It wasn’t a believable cover story then, and it certainly hasn’t gotten any better. Within a month of CTIL’s founding in March 2020, this supposedly entirely volunteer group had grown to 1,400 “invitation-only” members in 76 countries and entered into an official partnership with Cybersecurity and Information Security Agency (CISA) of the United States Department of Homeland Security. As reported by Public: Parallel censorship agencies In spring 2020, CISA also created the Election Integrity Partnership (EIP) – a consortium composed of the Stanford Internet Observatory (SIO), the University of Washington’s Center for an Informed Public, the Atlantic’s Digital Forensic Research Lab Council and from Graphika (a social media analytics company) – and outsourced what would otherwise have been illegal and unconstitutional censorship. During the 2020 election cycle, EIP and CISA worked with the State Department’s Global Engagement Center (GEC) and the DHS-supported Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) to influence and monitor political discussions online. EIP coordinated the removal of unwanted content using a real-time chat application shared by DHS, EIP, and social media companies. At the same time, CTIL monitored and reported anti-blockade views on social media. A “law enforcement” channel was created specifically to spy on and monitor social media users posting anti-lockdown hashtags. CTIL even kept a printout detailing their Twitter biographies. According to Public, the CTIL has also “engaged in offensive operations to influence public opinion, discussing ways to promote ‘counter-messaging,’ co-opting hashtags, diluting unfavorable messaging, creating sock puppet accounts, and infiltrating private groups by invitation.” In February 2021, the EIP was renamed the Virality Project, at which point its censorship focus shifted from elections to COVID-related issues. Government infiltration and takeover Although CTIL member Bonnie Smalley responded to a Public question by saying that CTIL has “nothing to do with the government,” the evidence shows otherwise. At least a dozen government employees working with DHS, the FBI, and CISA were also active members of CTIL. According to the whistleblower, CTIL’s goal “was to become part of the federal government.” Terp’s plan called for the creation of “MisinfoSec communities” that would include the federal sector, and documents show that this goal was achieved. In April 2020, Chris Krebs, then director of CISA, also publicly announced the agency’s partnership with CTIL. The audience continues:“The documents also show that Terp and his colleagues, through a group called the MisinfoSec Working Group, which included [Renee] DiResta, head of research at the Stanford Internet Observatory, created a censorship, influence and counter-disinformation strategy called Adversarial Misinformation and Influence Tactics and Techniques (AMITT). SJ on X: "AMITT (Adversarial Misinformation and Influence Tactics and Techniques) includes the left-of-boom misinformation activities that are often missed by other analyses, where ”left of boom” covers activity before an incident They wrote AMITT by adapting a cybersecurity framework developed by MITER… Terp then used AMITT to develop the DISARM framework, which the World Health Organization then used to “counter anti-vaccination campaigns across Europe.” A key component of Terp’s work through CTIL, MisinfoSec and AMITT has been to bring the concept of “cognitive security” to the fields of cybersecurity and information security… The ambitions of the 2020 pioneers of the censorship industrial complex went far beyond simply requiring Twitter to place a warning label on tweets or blacklist individuals. The AMITT framework calls for discrediting people as a necessary prerequisite for requiring censorship of them. Invite influencers to train to spread messages. And he invites us to try to convince banks to cut financial services to individuals who organize demonstrations or events.” The arming of the financial sector was born with the CTIL Now we know where this financial sector weapon comes from. It originated with the CTIL, which hspecifically sought to induce banks to “cut financial services to individuals who organize rallies or events”. Clearly, as my case and that of many others demonstrates, even banks and online payment processors have been tricked into cutting off services to people who simply expressed opposing views. It’s not just demonstration organizers who are being targeted. Under the cover of altruism Although CTIL officials have repeatedly stressed that the organization was founded on purely altruistic principles, the clear goal of its leaders was to “build support for censorship among national security and cybersecurity institutions,” writes Public, and they built that support by promoting Terp’s idea of “cognitive safety.” The choice of the term “cognitive safety” takes on a rather sinister flavor in light of Dr. Michael Nehls’ findings that over the past four years there has been what appears to be an intentional effort to destroy autobiographical memory function in the public’s brain , thus facilitating mass indoctrination and inhibiting personal will and critical thinking.vast plan for global censorship by US and British military contractors The Indoctrinated Brain - By Michael Nehls (hardcover) : Target He presents his thesis in the book “The Indoctrinated Brain: How to Successfully Fend Off the Global Attack on Your Mental Freedom”, published in mid-December 2023. The whistleblower material clearly reveals that sophisticated military tactics have been turned against the American public, powerful psychological tools – the same tools that, according to Nehls, can literally alter the biological functions of the brain. Public cites a MisinfoSec report in which “the authors called for placing censorship efforts within ‘cybersecurity,’ while acknowledging that ‘disinformation security’ is entirely different from cybersecurity. They wrote that the third pillar of the “information environment”, after physical and cyber security, should be the “cognitive dimension”. Indeed, your mind – your cognition, your very ability to think independently – is the battlefield of today’s war, as Nehls proposes in his book. The scary part is that the tools used have the power to reprogram who we are. We are indeed “hackable animals,” as proposed by Yuval Noah Harari, and the censorship industrial complex has already hacked the brain structure of billions of people over the past four years. Gutentag also talks about it in an article dated December 3, 2023:”What was once considered a “conspiracy theory”, according to which military and intelligence forces manipulated public opinion through inorganic interventions, has now been confirmed . Our study of the censorship industrial complex has exposed a far-reaching plan to subvert the democratic process and engage in activities that have a basis in military techniques and that amount to attempts at thought or mind control.” ”It’s legal if we can get away with it” The CTIL files also demonstrate that there was a clear intent to circumvent the First Amendment by outsourcing censorship to the private, non-governmental sector. According to the informant:“The ethos was if we get away with it, it’s legal, and there were no First Amendment problems because we have a ‘public-private partnership’ – that’s the word they used to mask these problems. Private individuals can do things that public officials cannot do, and public officials can provide leadership and coordination.” Good news, bad news ”The good news is that more and more information is coming out about the U.S. government’s illegal outsourcing of censorship, and with it, legal challenges that pose roadblocks to this circumvention of the Constitution. The three activists also achieved other victories. In August 2022, DHS was forced to shut down the Disinformation Governance Board due to public backlash. CISA also deleted information about its national censorship work from its website and dismantled its Misinformation, Disinformation, and Malinformation (MDM) subcommittee. The federal government’s Select Subcommittee on Armaments is also continuing its search for the truth and will (hopefully) use all the power at its disposal to put an end to the abuses. Its latest report, “The Weaponization of ‘Disinformation’ Pseudo-Experts and Bureaucrats: How the Federal Government Partnered with Universities to Censor Americans’ Political Speech” was released on November 6, 2023. Unfortunately, there is a global effort underway not only to normalize, but also to legalize this type of censorship by third parties. In short, they are trying to restructure the censorship industry “away from a top-down government-led model” to a “competitive brokerage model” in which “content management” (read censorship) is simply outsourced to third-party organizations. In this way, a “legal” market for disinformation compliance is created, while the government can claim to have nothing to do with controlling the information. In essence, we are witnessing the emergence of organized corporate censorship. There is no clear solution to this threat other than to continue to oppose all efforts to legalize, standardize and normalize censorship. Vocally oppose, refuse to use intermediaries like NewsGuard, and boycott any company or organization that uses intermediaries or engages in censorship of any kind.” Claudio Resta was born in Genoa, Italy in 1958, he is a citizen of the world (Spinoza), a maverick philosopher, and an interdisciplinary expert, oh, and an artist, too. Grew up in a family of scientists where many sciences were represented by philosophy to psychoanalysis, from economics to history, from mathematics to physics, and where these sciences were subject to public display by their subject experts family members, and all those who they were part of could participate in a public family dialogue/debate on these subjects if they so wished. Read Full Bio Latest Articles (2023-Present) Archived Articles (2019-2022) ATTENTION READERS We See The World From All Sides and Want YOU To Be Fully Informed In fact, intentional disinformation is a disgraceful scourge in media today. So to assuage any possible errant incorrect information posted herein, we strongly encourage you to seek corroboration from other non-VT sources before forming an educated opinion. About VT - Policies & Disclosures - Comment Policy Due to the nature of uncensored content posted by VT's fully independent international writers, VT cannot guarantee absolute validity. All content is owned by the author exclusively. Expressed opinions are NOT necessarily the views of VT, other authors, affiliates, advertisers, sponsors, partners, or technicians. Some content may be satirical in nature. All images are the full responsibility of the article author and NOT VT. https://www.vtforeignpolicy.com/2024/01/the-cyber-threat-intelligence-league/
    WWW.VTFOREIGNPOLICY.COM
    The Cyber Threat Intelligence League
    There is a vast plan for global censorship by US and British military contractors: US military contractor Pablo Breuer (left), UK defense researcher Sara-Jayne “SJ” Terp (center), and Chris Krebs, former director of the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS-CISA) – Documents received by investigative journalists Michael Shellenberger, Alex Gutentag...
    Angry
    1
    0 Comments 1 Shares 24584 Views
  • Edward Graham - NIST releases revised cyber requirements for controlled unclassified information:

    https://www.nextgov.com/cybersecurity/2023/11/nist-releases-revised-cyber-requirements-controlled-unclassified-information/391904/

    #SensitiveInformation #ControlledInformation #CUI #NIST #SP800171 #Government #RiskManagement #InformationSecurity #InfoSec #Security
    Edward Graham - NIST releases revised cyber requirements for controlled unclassified information: https://www.nextgov.com/cybersecurity/2023/11/nist-releases-revised-cyber-requirements-controlled-unclassified-information/391904/ #SensitiveInformation #ControlledInformation #CUI #NIST #SP800171 #Government #RiskManagement #InformationSecurity #InfoSec #Security
    WWW.NEXTGOV.COM
    NIST releases revised cyber requirements for controlled unclassified information
    The proposed revisions will ideally serve as a “balanced, strong starting point” for agencies and contractors that deal with sensitive information, a NIST official said.
    0 Comments 0 Shares 4833 Views