Tavistock, the shadow behind the government

Tavistock, the shadow behind the government

from Era of Light

The Greatest Mass Mind-Control Operation in World History

Tavistock Institute was officially established in 1921 by Luciferian Jesuit agents serving the Vatican Roman Catholic one world empire. The sole purpose of Tavistock then and now is to devise methods of mind control in order to socially engineer the masses into subservience and ultimately “slavery.”

This invisible agency has unlimited funding and works closely with other Jesuit agencies such as the CIAFBIMI6, media corporations, Hollywood and advertising agencies to ensure the implementation of cultural programs that distract and ultimately blind the minds of men everywhere.

Tavistock Manipulates the Mind of Mankind

The Method of Brainwashing and Social Psychiatry that manipulates popular perception in order to shape society.

Tavistock is People’s enemy number one, clearly identifiable as the Committee of 300 and its front organisations, such as the Royal Institute for International Affairs -Chatham House, the Club of Rome, NATO, U.N., the Black Nobility, CFR and all its affiliated organisations, the think tanks and research institutions controlled by Stanford and the Tavistock Institute of Human Relations and last, but certainly not least, the military establishment. It is without any doubt the Greatest Mass Mind-Control Operation in World History.

The Tavistock institute is a psychological warfare research centre, created in 1922. One of its remits was to develop ways to influence the ideologies of mass populations.
In particular, they gave us ‘The Beatles’ pop group, and many other popular mass music performers, like the Rolling Stones, and cults like Rock and Roll, etc.

Controlled by the Committee of 300 which is the ultimate secret society made up of an untouchable ruling class, which includes the Queen of the United Kingdom (Elizabeth II), the Queen of the Netherlands (Queen Beatrix whom, as we shall see later, has been photographed attending meetings of another ultra-secret society called The Bilderberg Group), the Queen of Denmark and the royal families of Europe. These aristocrats decided at the death of Queen Victoria, the matriarch of the Venetian Black Guelphs that, in order to gain world-wide control, it would be necessary for its aristocratic members to “go into business” with the non-aristocratic but extremely powerful leaders of corporate business on a global scale, and so, the doors to ultimate power were opened to what the Queen of England likes to refer to as “the commoners”.  Through their illicit banking cartel, they own the stock of the Federal Reserve, which is a private for-profit corporation that violates U.S. Constitution and is a root of the problem.

Further, this institute developed the strategy of ‘crisis creation’ to manipulate mass populations, by sponsoring a number of ‘sensitivity’ and ‘diversity’ programs designed to erase a people’s individuality to make them ‘team players’.

Political correctness, is all about creating uniformity. Individuality is one of the biggest obstacles for the ‘ New World Order’. They want a public that is predictable and conditioned to comply without asking questions.

Another discovery they did was related to stress. Researchers found out that people under controlled stress became more infantile and gave up strongly held beliefs under group pressure to conform to popular opinion. That explains why the mass media insist so much on sex, violence, and fear-inducing messages, via digital videos. To turn the populace into scared, submissive offspring.

On average; people spend four plus hours a day at their TV-screen, the equivalent of two months a year, or nine years in a lifetime, being hypnotized by a television screen without being conscious of the effects. They have almost stopped interacting with friends, neighbours, community, and even family.

The Tavistock Institute was involved in the rock and roll music movement. Former, MI6 agent John Coleman stated that Theodor Adorno wrote the lyrics for the Beatles and other British penetration bands. trying to influence and contaminate music.

From its modest beginnings in 1921, Tavistock was ready in 1966 to launch a major irreversible cultural revolution aka – the mass culture industry, one that has not yet ended.

Dr Lewin at Tavistock pushed the theory of topological psychology, which is to this day the world’s most advanced method of behaviour modification: i.e., brainwashing.

Docile, easily manipulated demoralised subjects

Psychopath Bertrand Russell (1872-1970) had stated that what was needed was a world populated by “docile,” easily manipulated and demoralised subjects. Russell regarded mankind as being slightly above the level of cattle. Russell said,

“The social psychologists of the future will have a number of classes of school children on whom they will try different methods of producing an unshakable conviction that snow is black.”

In doing research on this general topic, it is astonishing just how out in the open these criminals were and are with their schemes.

In the period before the WWII, Roosevelt sent Gen. William Donovan to London for indoctrination before setting up the Office of Strategic Services (OSS), the precursor to the CIA. The entire OSS program, as well as the CIA, has always worked by guidelines set forth by the Tavistock Institute. Toward the end of the war, Tavistock personnel took over the World Federation of Mental Health. Other collaborators were the Stanford Research Institute, Rand, and the Institute for Social Relations. More P2/

Source

There is evidence of election fraud in the recent French presidential elections

There is evidence of election fraud in the recent French presidential elections

by Alexandra Bruce

There is evidence of election fraud in the recent French presidential elections, which handed a victory to Emmanuel Macron.

In this first video, France 2 news anchor, Jean-Baptiste Marteau announces that data received directly from France’s Ministry of the Interior showed Marine Le Pen was slightly ahead of Macron with exactly 13,899,494 votes. But by the end of the night, her vote tally had decreased by over 1.13 million votes. This is causing many to cry foul.

A second video, which has also gone viral shows how the fraud was accomplished: The ballots for Le Pen were intentionally damaged in order that they be invalidated.

On his Telegram account, Aaron Hawkins (aka StormCloudsGathering), who lives in France says that many are pointing to the obvious parallels with the 2020 Elections in the US but he says that we will not likely see a repeat of what happened in America, because the politics are very different in France. Aaron explains:

“[Macron] is the most hated politician in the history of France. He isn’t viewed as a champion of the Left, but rather as a puppet of the banking elite. The fact that he literally worked for the Rothschild bank in France, and made a name for himself by brokering Nestlé’s acquisition of Pfizer’s baby food division made this the case from the very beginning, and his policies while in office only reinforced this perception.

“The post election riots in France may dissipate temporarily but with evidence of election fraud hanging over Macron as the food and energy crisis begins, revolution isn’t just possible, it’s probable. Separatist movements in Corsica, and various overseas territories will accelerate this, and fighters from all over the world will participate. Expect Italy to destabilize in parallel, and it is at this critical moment that the insane quantities of weapons that are disappearing in Ukraine will become very, very important (as will the various neo-nazi terrorist groups that the CIA and Mossad have been cultivating throughout western Europe).

“Ordo Ab Chao. Order out of chaos. Don’t let them get away with it.”

Source

Russia is fighting all of NATO, collecting evidence of US biolabs in Ukraine

Russia is fighting all of NATO, collecting evidence of US biolabs in Ukraine

Cairns News world exclusive from the front line

By Robert J Lee

NATO and the United States have been supplying arms “by the trainload” to fascist Ukranian troops who are now into their third and last wave of soldiers and almost out of ammunition and food supplies while battling crack Russian troops..

There are at least three United States’ bioweapons labs yet to be destroyed.

Russian Cossack, Colonel Yuri Komiyenko near the front line at Kiev

From the front line in a video hook up last night Cairns News reporter Robert Lee spoke through an interpreter to a Russian Cossack, Colonel Mr Yuri Komiyenko at Sakhalin near Kiev. He is based in Russia.

This first-hand information flies in the face of the blatant propaganda being forced upon the western world by the ABC, BBC and NBC which the Colonel said is mostly lies.

“Russia essentially is fighting all of NATO comprising Germany, Poland the US and France are supplying arms to the Ukra-Nazi troops by the trainload and plane load,” Colonel Komiyenko said.

“Last night 47 French mercenaries surrendered, they were hiding underground in the Azov-steel industrial complex, the heart of Mariupol. The underground complex comprises eight stories and 24 klm of tunnels. The original Ukranian fighting force in Mariupol was 14,000 military personnel, it comprised the standard Ukranian forces, the fascist Ukro-Nazis and various NATO personnel from numerous countries.

“Many of the Ukranians have been trained by NATO since 2014 and carry with them certificates of completion issued by NATO trainers. It took the Russian forces approximately 60 days to win this fight.

“The complex is now under the complete control of the Russians. This complex also housed a bioweapons lab bought to you by Zelensky a Ukrainian Oligarch, Hunter Biden and his friends. The Russians are now collating further proof of western war crimes against humanity.” 

Fresh in this morning  …..

Last night during the interview an additional “52 French Foreign Legion troops crawled out of their sub-surface hiding places surrendering to the Russian forces.”

The Russians estimate that the original French foreign legion fighting force was at least 300. The number of subterranean die-hards remaining is approximately 400 fighters and these are mostly Ukro-Nazi fanatics.  

The primary subterranean entry point (there are multiple) was bombed using thermal explosives that generate heat to 2500C. Many of the Ukro-Nazis wouldl never be identified, unless relatives are able to identify skulls.

The Ukrainians started to acquire fuel and other supplies from neighbouring countries such as Moldovi. These convoys became easy targets for precision strikes using orbiting satellites and drones to destroy convoys.

Unfortunately there have been numerous civilian casualties, many shot by the fascists when they flee their positions which are frequently buildings occupied by the civilian population such as apartment blocks, schools and hospitals. Often the Fascists herd the civilian population into the basements of such buildings and use them as human shields.  

Upon fleeing they have been known to murder these civilians, Bucha is such an example. They will also gun down civilians in the street, people simply looking to find water or fire upon buildings containing civilians the Colonel said.

“Both the Ukranian armies are shooting civilians after they hide in apartments and schools.”

After taking Azov-Steel, the Russian armed forces are now engaging the Ukrainians on a larger scale in the Donbass region. When the fighting started in the Donbass region recently, there were initially 40,000 Ukranian fascist troops which have been reduced to 29,000.

They are now encircled by Russians and the Nazis have little food or ammunition. This large force is being systematically destroyed and the Ukrainian’s are taking heavy losses.

Nikolaev city is surrounded by artillery and Russian troops are attempting to push the fascists out of there into Odessa similarly the Russians are pushing the Nazis out of Kharkiv towards Kiev.

“Every day the Russian and Donesk Republic forces gain three kilometres of territory,” the Cossack explained.

Russian forces are compiling evidence after they destroyed a large US underground biolab at the 11 square kilometre Mariupol Azov steel facility. Another biolab in Mariupol has been destroyed.

Known biolabs at Odessa, Suma and Kiev are yet to be destroyed.

The fascists are using trains to move military equipment, the same trains also carry civilian hostages. Yesterday alone 29 targets were bombed, destroying bridges, sidings and associated electrical infrastructure such as signal systems, but not the carriages to avoid casualties.

Ukranian President Volodymyr Oleksandrovych Zelenskyy is faring as badly as his diminishing troops when a huge protest was staged in Kiev yesterday calling on the gay, former entertainer to resign.

“Eastern Ukranians are lining up against him because everything he promised during the election has not eventuated,” the Colonel said.

When asked about the possibility of a ceasefire, the Colonel said, “No chance.”

“Russia twice offered a ceasefire and actually stepped back from Kiev as a gesture of goodwill, but the Nazis used this to regroup, while killing civilians at Bucha where there were real corpses and some crisis actors too.”

Contrary to disinformation being peddled by Australian correspondents in the battle zone, Russian troops have moved convoys of food relief for starving civilians and Russian soldiers have many times handed out their ration packs to civilians after being locked in basements for two weeks.

“We look at certain (TV)channels and just laugh at the disinformation,” he said.

At least 1.3 million refugees have fled into Russia and another 6.5 million have crossed into Poland and further. The Ukranian population before the hostilities started was 40 million.

“This war and western sanctions has united all of Russia because we are being seen to save Ukraine,” he said.

Many Ukranian soldiers were on drugs and had no real fighting spirit. Some were dressing as women attempting to get out through Russian lines, “but we busted them,” he said.

Some captured facilities were found to contain huge amounts of European military armaments enough to equip all the Russian soldiers. The Colonel laughed, ” we don’t need to bring any of our own equipment, we just pick up what’s been left and send it back to the Ukrainian forces at high speed.”

Russian soldiers were armed mostly with AK47 assault rifles while the fascists complained the US M16 rifles they had been given often jammed and were useless.

Americans had also handed out thousands of 1958 vintage M14 carbines to Ukraine, many of which had been found in bombed out warehouses while the packaged RPG anti-tank weapons were 10 years old and most had flat batteries and were inoperable.

The Cossack said his troops collected some RPG’s then “hot-wired” them and destroyed Ukranian tanks.

“In some of the Ukranian strongholds we have taken we found man-sized nappies for soldiers.

“This is now a standing joke among the Russian forces and their allies.”

Cairns News will present another segment hopefully next week.

Source

UK Home Secretary Priti Patel Was Part of CIA-linked Lobby Group with Husband of Assange Judge

UK Home Secretary Priti Patel Was Part of CIA-linked Lobby Group with Husband of Assange Judge

All Global Research articles can be read in 51 languages by activating the “Translate Website” drop down menu on the top banner of our home page (Desktop version).

To receive Global Research’s Daily Newsletter (selected articles), click here.

Visit and follow us on InstagramTwitter and Facebook. Feel free to repost and share widely Global Research articles.

***

First published on March 31, 2022.

***

Home Secretary Priti Patel, who will soon decide whether to extradite Julian Assange to the US, has been a political adviser to – and been funded by – a right-wing lobby group which has attacked Assange in the British media for a decade.

Priti Patel sat on the Henry Jackson Society’s (HJS) advisory council from around 2013-16, although the exact dates are unclear as neither the HJS nor Patel responded to Declassified’s requests for clarification.

She has also received funds from the HJS, and was paid £2,500 by the group to visit Washington in March 2013 to attend a “security” programme in the US Congress.

Patel, who became an MP in 2010 and was appointed Home Secretary in 2019, also hosted an HJS event in parliament soon after she returned from Washington.

After the UK Supreme Court said this month it was refusing to hear Assange’s appeal of a High Court decision against him, the WikiLeaks founder’s fate now lies in Patel’s hands. He faces life in prison in the US.

The HJS, which was founded in 2005 and does not disclose its funders, has links to the CIA, the intelligence agency behind the prosecution of Assange and which reportedly developed plans to assassinate him.

One of the HJS’s international patrons is James Woolsey, CIA director from 1993-95, who was in this role throughout the period Patel was advising the group. Woolsey’s affiliation to the HJS goes back to at least 2006, soon after it was founded.

In 2014, the group hosted General David Petraeus, CIA director from 2011-12, at a UK parliament meeting from which all media were barred.

Three years later, in 2017, the HJS organised another event at parliament with General Michael Hayden, CIA director from 2006-9, to “discuss the current state of the American Intelligence Community and its relationships with foreign partners.”

Hayden described “the relationship within the Five Eyes community as strong as ever, despite potential concerns over recent intelligence leaks between members.” Five Eyes is an intelligence alliance comprising Australia, Canada, New Zealand, the UK, and the US.

‘Perception of bias’

During a visit to the UK in July 2020, then US Secretary of State Mike Pompeo spoke at a roundtable hosted by the HJS with what the Washington Post referred to as a group of “hawkish” members of the Conservative Party.

As director of the CIA in 2017, Pompeo had launched a blistering attack on WikiLeaks calling the media organisation a “hostile intelligence service” that makes “common cause with dictators”.

Pompeo did not provide evidence but added a threat: “To give them the space to crush us with misappropriated secrets is a perversion of what our great Constitution stands for. It ends now.”

On the HJS advisory council at the same time as Patel was Lord James Arbuthnot, a former Conservative defence minister. His wife, Lady Emma Arbuthnot, was Westminster Chief Magistrate from 2016-2021.

For part of her tenure, she was in charge of the Assange case and made two key rulings against him in 2018. Lady Arbuthnot eventually stepped aside from ruling on the case because of a “perception of bias” but never declared a conflict of interest.

The links between Patel and Lord Arbuthnot go further. In 2010, soon after becoming an MP, Patel was appointed one of five parliamentary officers of the Conservative Friends of Israel (CFI) when the group was chaired by Lord Arbuthnot.

CFI has been described as “beyond doubt the most well-connected and probably the best funded of all Westminster lobbying groups”. It also does not disclose its funders.

Patel was forced to resign as Secretary of State for International Development in November 2017 after it was revealed that she had held more than a dozen undeclared meetings with Israeli ministers and organisations while on holiday in the country.

Many of these were arranged by CFI’s honorary president, Lord Polak. Patel’s resignation letter accepted that her conduct “fell below…standards of transparency and openness”.

Lady and Lord Arbuthnot attend the Queen’s garden party at Buckingham Palace in May 2017. Anonymisation by Declassified. (Photo: Instagram)

Lady and Lord Arbuthnot attend the Queen’s garden party at Buckingham Palace in May 2017. Anonymisation by Declassified. (Photo: Instagram)

‘Bonkers and paranoid’

HJS staff have been repeatedly critical of Julian Assange and WikiLeaks in the British media since 2011 when its then associate director, Douglas Murray, engaged in a combative debate with Assange.

The following year, the HJS posted a video of Murray stating on media channel Al-Jazeera English:

“There is not a witch-hunt of WikiLeaks. An organisation illegally obtained, or stole as we used to call it, a whole set of government documents and published them with consequences which are still not fully understood.”

Murray continued:

“I think Mr Assange has been bonkers and paranoid for years, it’s part of his alleged political makeup, and indeed I would allege that of many of his supporters.”

Over the following years, the HJS and its staff continued to be among the most active civil society voices for impugning the motives and reputation of Assange.

This stands in contrast to nearly all human rights and press freedom organisations which argue that extraditing the WikiLeaks publisher to the US would be a grave blow to media freedom.

‘Conspiracy theories’

In October 2016, the HJS released a statement to the media, which claimed:

“Mr Assange has a long track record of stealing and distributing information, peddling conspiracy theories, and casting aspersions on the moral standing of western democratic governments. He has done this whilst supporting, and being supported by, autocratic regimes.”

No evidence was supplied to support the assertions.

A number of other HJS staff—including spokesperson Sam Armstrong and then chief of staff Ellie Green—have made anti-Assange interventions in the British media.

In April 2019, after Julian Assange was seized from the embassy by British police, HJS executive director Alan Mendoza was put up as the counterweight against Assange’s lawyer on BBC’s flagship Newsnight programme.

Posted to the HJS Youtube channel, Mendoza told the national broadcaster:

“Journalists are not allowed to break the law in obtaining their materials.”

He added:

“I think it’s quite clear Mr Assange has spent many years evading justice, hiding in a room in Knightsbridge…Isn’t it time he actually answered questions in a court of law?”.

Secrecy

In October 2019, as home secretary, Patel visited Washington again to meet William Barr, the US Attorney General who was then in charge of the Assange case as head of the Department of Justice.

Together they signed the Cloud Act which made it easier for American and British law enforcement agencies to demand electronic data on targets as they undertake investigations.

Assange’s defence team had previously raised the concern in court that Barr may be using Assange’s extradition case in the UK for political ends.

In August 2020, Declassified requested basic information about Patel’s 2019 trip to Washington. The Home Office confirmed it held the information but refused to release it because the department considered “that disclosure of some of the information would prejudice relations between the UK and the United States”.

In May 2020, Declassified also requested information about any calls or emails made or received by Patel since she became Home Secretary which concerned the case of Julian Assange, or mentioned his name.

The Home Office told us “we can neither confirm nor deny whether we hold the information you have requested” because “to do so either way would disclose information that constitutes the personal data of Julian Assange”.

The same request for Sajid Javid’s tenure as Home Secretary from 2018-19 was rejected because the department said “we have carried out a thorough search and we have established that the Home Office does not hold the information that you have requested.”

This was despite the fact Javid signed the initial US extradition request for Assange in June 2019. The shadow home secretary at the time, Diane Abbott, opposed approving the US extradition request.

Declassified previously revealed that before signing the US request, Javid had attended six secretive meetings, some attended by former CIA directors, which were organised by a US lobby group which has published calls for Assange to be assassinated or taken down.

The Home Office recently admitted it had eight officials working on Operation Pelican, the UK government campaign to seize Assange from the Ecuadorian embassy in London.

The department, however, claimed it did not know which other UK government ministries were involved in the operation.

Priti Patel and the Henry Jackson Society did not respond to requests for information and comment.

*

Note to readers: Please click the share buttons above or below. Follow us on Instagram, Twitter and Facebook. Feel free to repost and share widely Global Research articles.

Matt Kennard is chief investigator at Declassified UK. He was a fellow and then director at the Centre for Investigative Journalism in London. Follow him on Twitter @kennardmatt

Featured image: Priti Patel (R) meets Alejandro Mayorkas, US Secretary of Homeland Security, Washington DC, 17 November 2021. (Photo: Priti Patel / Twitter)

Source

New Documents Suggest Democrats Sicced The CIA On Their Domestic Enemy, The President

New Documents Suggest Democrats Sicced The CIA On Their Domestic Enemy, The President

Newly released CIA memoranda suggest the tech gurus behind the Alfa Bank hoax also tracked Donald Trump’s movements to devise another collusion conspiracy theory. While smaller in scale than other aspects of Spygate, the Yotaphone hoax represents an equally serious scandal because it involved both the mining of proprietary information and sensitive data from the Executive Office of the President (EOP) and the apparent surveillance of Trump’s physical movements.

When Special Counsel John Durham charged former Hillary Clinton campaign attorney Michael Sussmann in September 2021, the indictment focused on the Alfa Bank hoax that Sussmann, tech executive Rodney Joffe, and other cybersecurity experts had crafted. The indictment detailed how Joffe and other tech experts had allegedly mined data and developed “white papers” that deceptively created the impression that Trump had maintained a secret communication network with the Russia-based Alfa Bank.

Then, allegedly on behalf of the Clinton campaign and Joffe, Sussmann provided the Alfa Bank material to the media and to the FBI’s general counsel at the time, James Baker, with Sussmann falsely telling Baker he was sharing the “intel” on his own and not on behalf of any client. That alleged lie formed the basis for the one count, Section 1001 false statement charge against Sussmann.

There’s Another Alleged Lie

The 27-page indictment, however, also spoke of Sussmann sharing “updated allegations” on February 9, 2017, to another U.S. government agency, namely the CIA, while allegedly repeating the same false claim that he was not sharing the “intel” on behalf of any client. From the framing of the indictment, it appeared that what Sussmann had shared with the CIA concerned the same Alfa-Bank data provided to the FBI several months earlier, albeit updated.

But then two months ago, as part of the government’s “Motion to Inquire Into Potential Conflicts of Interest,” Durham’s team revealed for the first time that when Sussmann met with the CIA in early 2017, he provided agents with internet data beyond the Alfa Bank conspiracy theory. This data, Sussmann claimed, “demonstrated that Trump and/or his associates were using supposedly rare, Russian-made wireless phones in the vicinity of the White House and other locations.”

The “supposedly rare, Russian-made wireless phones” were “Yotaphones.” Following Durham’s filing of the conflicts of interest motion, it appeared Sussmann bore responsibility for peddling a second conspiracy theory to the CIA. But the details contained in the government’s motion proved insufficient to understand the Yotaphone angle to Spygate. That all changed on Friday, when the special counsel filed two CIA memoranda memorializing what Sussmann said about the Yotaphones and the data Joffe and his tech experts had compiled.

What Sussmann Told the CIA

The first memorandum, dated January 31, 2017, summarized what Sussmann told a former CIA employee in hopes of scoring a meeting with the CIA. Sussmann said his client “had some interesting information about the presence and activity of a unique Russian made phone around President Trump.” Sussmann claimed the activity started in April 2016 when Trump was working out of the Trump Tower on its Wi-Fi network. That phone was also used on the “Wi-Fi at Trump’s apartment at Grand Central Park West,” according to Sussmann.

The memorandum then noted that “when Trump traveled to Michigan to interview a cabinet secretary, the phone appeared with Trump in Michigan.” The unnamed cabinet secretary apparently refers to Trump’s education secretary Betsy DeVos, whose husband Richard DeVos was chairman of the Michigan-based Spectrum Health in 2016.

According to the notes, Sussmann also told his contact that “the phone was never noticed in two places at once” and was seen “only around the President’s movement.” The memo noted that once, when Trump was not in Trump Tower, the phone was active on the Trump Tower WiFi network. Then, “in December 2016, the phone disappeared from Trump Tower Wi Fi network and surfaced on [the Executive Office Building] network,” the memorandum said, with Sussmann claiming it was the same Yotaphone and that it “surfaced” at the Executive Office Building after Trump moved to the White House.

The Yotaphone is rare, Sussmann told his contact, with only about a dozen or so present in the United States, and Russian government officials often receive a high-end version of the phone as a gift. According to Sussmann, the Yotaphone connected to Trump made a number of WiFi calls to Moscow and St. Petersburg from April 2016 until February 2017.

Adding Some Pressure to the Deal

Sussmann did more than merely pass on this information, however. He also “claimed that his client did not want to provide this [information] to the FBI as he knows that the FBI did not have resources to deal with these issues,” but also that the source—or Sussmann, it is not clear which—“did not trust the FBI” because Sussman is “openly a Democrat” and “does lots of work for the DNC.” Sussmann added “that his client would most likely only provide the data to senior bona fide [redacted] officers (active duty) and if there is no interest, he would most likely go to [the] New York Times.”

To further push for the CIA meeting, Sussmann then stressed that, given that he is “an experienced attorney with full clearances and lots of [redacted] experience, he believes that this client is telling the truth as he knows it.” “He cares about the security of the country” and wanted the CIA “to know about the Yotaphone activity close to the President,” Sussmann claimed.

Sussmann’s preview of this Yotaphone “intel” to his contact served its purpose, with the CIA arranging to meet with Sussmann in person less than two weeks later, on February 9, 2017. At that meeting, Sussmann again noted that he was passing the current information directly to the CIA “based on how the FBI had handled” the information he had previously provided that agency.

During Sussmann’s February 9, 2017 meeting with the CIA, the memorandum notes that Sussmann provided the agency thumb drives with separate data files for the Yotaphone by the location of the “domain name system” or DNS lookups, including one for Trump’s Central Park apartment, one for the EOP, one for Spectrum Health Care, and one for the Trump Tower. That data, Sussmann told the CIA agents, related to DNS information, “indicat[ed] that a Russian-made Yota-phone had been seen by [Sussmann’s contacts] connecting to the WiFi from the Trump Tower in New York, as well as a from a location in Michigan, at the same time that then-candidate Trump was believed to be at these locations.”

These People Were Watching Trump For Years

The data included in those files, however, reflected but a segment of the DNS lookups by the Yotaphones. The special counsel discovered that fact when it obtained more complete DNS data from a company that assisted Joffe in assembling the Yotaphone allegations. For instance, the more complete data assembled by Joffe and his associates showed the DNS lookups involving the EOP began at least as early as 2014, but Sussmann omitted that detail when providing the material to the CIA.

That Joffe and his associates had assembled more complete DNS data related to the Yotaphones than that provided to the CIA—data that disproves the Trump-Russia collusion theory—is a huge scandal: Those allegations indicate an intent to deceive by omission.

But it is not merely what data wasn’t provided to the CIA, it was what data was provided and how it was gathered.

From Durham’s earlier filings, it was already clear that Joffe had culled the DNS data by using proprietary information related to the Trump Tower, Trump’s residential building, and Spectrum Health, as well as exploiting sensitive data from the EOP. At the time, the corrupt media downplayed the misuse of the EOP DNS data by focusing on the fact that Joffe and his crew had accessed the EOP data while Barack Obama was still president. But these newly released CIA notes establish that the EOP DNS data specifically targeted Trump “after his move to the White House.”

The memoranda expose two additional troubling details. While the earlier court filings created the appearance that the DNS data had merely been pulled from locations connected to Trump, the memoranda speak of the phones connected to “Wi-Fi used at Trump’s apartment.” It thus appears that the DNS data directly targeted the Wi-Fi networks specifically used by Trump.

Even more disconcerting are the repeated references in the memoranda to Trump’s physical location during the DNS lookups, whether at the Trump Tower, in Michigan, or at the White House. Sussmann even claimed, according to one of the CIA memoranda, “the phone was never noticed in two places at once, only around the President’s Movements.”

These newly revealed details suggest that Joffe and his team were surveilling Trump’s movements, leading one to wonder whether they were doing so by geolocation technology. The four data files Sussmann provided the CIA related to the Yotaphones likely hold the answer to that question.

Democrats Sicced the CIA on the President

But no matter how Joffe and others tracked Trump’s movements, that a political enemy of Trump would provide the CIA fraudulent-by-omission data to prompt an investigation into the sitting president of the United States is horrifying. These memoranda also make clear that was the goal, as Joffe had Sussmann bypass the FBI and go to great lengths to get the “intel” in the hands of the CIA.

In fact, Sussmann first attempted to peddle the Yotaphone data to the CIA in mid-December 2016, when he communicated with the CIA’s general counsel, Caroline Krass. But when those efforts failed, he contacted a former CIA employee, threatening to go to The New York Times if the CIA didn’t bite.

As noted above, the ploy worked, resulting in Sussmann’s meeting with two CIA agents on February 9, 2017. The memorandum from that meeting also suggests Sussmann wasn’t shooting straight with the CIA.

A Pyramid of Lies

Foremost, of course, was Sussmann’s claim “that he was not representing a particular client,” even though the previous month he had told the former CIA agent his client “cares about the security of the country.” Also, according to Durham, Sussmann continued to represent Joffe during this meeting.

Relatedly, Sussmann told the CIA that his “contacts” “preferred anonymity, citing a potential threat from the Russian Intelligence Services.” But as other court filings established, Joffe had previously shared information with intelligence agencies directly, making a claim he sought anonymity for safety reasons suspect.

Also false, according to the special counsel, was Sussmann’s claim during his February 9, 2017 meeting with the CIA that “one of his contacts,” who was a “clearance holder,” had collected the data from his “private collection.” While that may have been true about the data collected for the Trump Tower, Trump’s Central Park West apartment building, and Spectrum Health, the data related to the EOP was accessed and maintained by Joffe’s employer “as part of a sensitive arrangement whereby it provided DNS resolution services to the EOP.”

Joffe’s exploitation of the government’s EOP data to take down the president of the United States presents another huge scandal.

Sussmann also told the agents that while his firm supported several Democratic causes and officeholders, including the Democratic National Committee and former presidential candidate Hillary Clinton, his “work was unrelated to his reason for contacting the CIA.” But Joffe’s motivation in continuing to target Trump was far from apolitical, and Sussmann knew this.

While the special counsel’s office did not charge Sussmann with making a false statement to the CIA, Durham’s team seeks to present evidence of Sussmann’s representations to the CIA as evidence of his motive and intent to also deceive the FBI. But the scandal here goes much beyond Sussmann, and the Yotaphone hoax far surpasses what the public seems to realize—and represents yet another instance of Trump’s enemies spying on him.


Margot Cleveland is The Federalist’s senior legal correspondent. She is also a contributor to National Review Online, the Washington Examiner, Aleteia, and Townhall.com, and has been published in the Wall Street Journal and USA Today. Cleveland is a lawyer and a graduate of the Notre Dame Law School, where she earned the Hoynes Prize—the law school’s highest honor. She later served for nearly 25 years as a permanent law clerk for a federal appellate judge on the Seventh Circuit Court of Appeals. Cleveland is a former full-time university faculty member and now teaches as an adjunct from time to time. As a stay-at-home homeschooling mom of a young son with cystic fibrosis, Cleveland frequently writes on cultural issues related to parenting and special-needs children. Cleveland is on Twitter at @ProfMJCleveland. The views expressed here are those of Cleveland in her private capacity.

Source

Jack’s Magic Coffee Shop

Jack’s Magic Coffee Shop

The metaphorical Jack had a great idea, open a coffee shop where the beverages were free and use internal advertising as the income subsidy to operate the business.  Crowds came for the free coffee, comfy couches, fellowship, conversation and enjoyment.

It didn’t matter where Jack got the coffee, how he paid for it, or didn’t, or what product advertising the customers would be exposed to while there.  Few people thought about such things.  Curiously, it didn’t matter what size the crowd was; in the backroom of Jack’s Coffee Shop they were able to generate massive amounts of never-ending free coffee at extreme scales.

Over time, using the justification of parking lot capacity and township regulations, not everyone would be able to park and enter.  Guards were placed at the entrance to pre-screen customers. A debate began.

Alternative coffee shops opened around town.  It was entirely possible to duplicate Jacks Coffee Shop, yet no one could duplicate the business model for the free coffee.  Indeed, there was something very unique about Jack’s Coffee Shop.  Thus, some underlying suspicions were raised:

The only way Twitter, with 217 million users, could exist as a viable platform is if they had access to tech systems of incredible scale and performance, and those systems were essentially free or very cheap.  The only entity that could possibly provide that level of capacity and scale is the United States Government – combined with a bottomless bank account.  A public-private partnership.

If my hunch is correct, Elon Musk is poised to expose the well-kept secret that most social media platforms are operating on U.S. government tech infrastructure and indirect subsidy.  Let that sink in.

The U.S. technology system, the assembled massive system of connected databases and server networks, is the operating infrastructure that offsets the cost of Twitter to run their own servers and database.  The backbone of Twitter is the United States government.

FREE COFFEE:

♦ June 2013: […] “Cloud computing is one of the core components of the strategy to help the IC discover, access and share critical information in an era of seemingly infinite data.” … “A test scenario described by GAO in its June 2013 bid protest opinion suggests the CIA sought to compare how the solutions presented by IBM and Amazon Web Services (AWS) could crunch massive data sets, commonly referred to as big data.” … “Solutions had to provide a “hosting environment for applications which process vast amounts of information in parallel on large clusters (thousands of nodes) of commodity hardware” using a platform called MapReduce. Through MapReduce, clusters were provisioned for computation and segmentation. Test runs assumed clusters were large enough to process 100 terabytes of raw input data. AWS’ solution received superior marks from CIA procurement officials”… (MORE)

November 2013: […] “Twitter closed its first day of trading on Nov. 7, 2013, at $44.90 a share. In the years since then, it briefly traded above $70, but more recently, it has struggled.”

Jack’s free coffee shop has been for sale, but there’s no viable business model in the private sector.  No one has wanted to purchase Twitter – it is simply unsustainable; the data processing costs exceed the capacity of the platform to generate revenue – until now….

And suddenly, the people who work in the backroom of Jack’s Magic Coffee Shop don’t want Jack to sell.

Twitter is not making a decision to decline the generous offer by Elon Musk because of stewardship or fiduciary responsibility to shareholders.  The financials of Twitter as a non-viable business model highlight the issue of money being irrelevant.  Twitter does not and cannot make money.  Growing Twitter only means growing an expense. Growing Twitter does not grow revenue enough to offset the increase in expense.

There is only one way for Twitter to exist as a viable entity, people are now starting to realize this.

What matters to the people behind Twitter, the people who are subsidizing the ability of Twitter to exist, is control over the global conversation.

Control of the conversation is priceless to the people who provide the backbone for Twitter.

Once people realize who is subsidizing Twitter, everything changes.

That’s the fight. (more)

2021, Public-Private Partnership – The modern Fourth Branch of Government is only possible because of a Public-Private partnership with the intelligence apparatus. You do not have to take my word for it, the partnership is so brazen they have made public admissions.

The biggest names in Big Tech announced in June their partnership with the Five Eyes intelligence network, ultimately controlled by the NSA, to: (1) monitor all activity in their platforms; (2) identify extremist content; (3) look for expressions of Domestic Violent Extremism (DVE); and then, (4) put the content details into a database where the Five Eyes intelligence agencies (U.K., U.S., Australia, Canada, New Zealand) can access it.

Facebook, Twitter, Google and Microsoft are all partnering with the intelligence apparatus. It might be difficult to fathom how openly they admit this, but they do. Look at this sentence in the press release (emphasis mine):

[…] “The Group will use lists from intelligence-sharing group Five Eyes adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.”

Think about that sentence structure very carefully. They are “adding to” the preexisting list…. admitting the group (aka Big Tech) already have access to the the intelligence-sharing database… and also admitting there is a preexisting list created by the Five Eyes consortium.

Obviously, who and what is defined as “extremist content” will be determined by the Big Tech insiders themselves. This provides a gateway, another plausible deniability aspect, to cover the Intelligence Branch from any oversight.

When the Intelligence Branch within government wants to conduct surveillance and monitor American citizens, they run up against problems due to the Constitution of the United States. They get around those legal limitations by sub-contracting the intelligence gathering, the actual data-mining, and allowing outside parties (contractors) to have access to the central database.

The government cannot conduct electronic searches (4th amendment issue) without a warrant; however, private individuals can search and report back as long as they have access. What is being admitted is exactly that preexisting partnership. The difference is that Big Tech will flag the content from within their platforms, and now a secondary database filled with the extracted information will be provided openly for the Intelligence Branch to exploit.

The volume of metadata captured by the NSA has always been a problem because of the filters needed to make the targeting useful. There is a lot of noise in collecting all data that makes the parts you really want to identify more difficult to capture. This new admission puts a new massive filtration system in the metadata that circumvents any privacy protections for individuals.

Previously, the Intelligence Branch worked around the constitutional and unlawful search issue by using resources that were not in the United States. A domestic U.S. agency, working on behalf of the U.S. government, cannot listen on your calls without a warrant. However, if the U.S. agency sub-contracts to say a Canadian group, or foreign ally, the privacy invasion is no longer legally restricted by U.S. law.

What was announced in June 2021 is an alarming admission of a prior relationship along with open intent to define their domestic political opposition as extremists.

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (read more)

The influence of the Intelligence Branch now reaches into our lives, our personal lives. In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it. The legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01, the short-sighted legislative reactions opened the door to allow the surveillance state to weaponize.

After the Patriot Act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power. The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the installation of Barack Obama was all about.

The Obama network took pre-assembled intelligence weapons we should never have allowed to be created, and turned those weapons into tools for his radical and fundamental change. The target was the essential fabric of our nation. Ultimately, this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch. From that perspective the fundamental change was successful.

It’s all Connected Folks, SEE HERE

[…] “The vision was first outlined in the Intelligence Community Information Technology Enterprise plan championed by Director of National Intelligence James Clapper and IC Chief Information Officer Al Tarasiuk almost three years ago.” … “It is difficult to underestimate the cloud contract’s importance. In a recent public appearance, CIA Chief Information Officer Douglas Wolfe called it “one of the most important technology procurements in recent history,” with ramifications far outside the realm of technology.” (READ MORE)

One job…. “take the preexisting system and retool it so the weapons of government only targeted one side of the political continuum.”

Source

Jack’s Magic Coffee Shop

Jack’s Magic Coffee Shop

The metaphorical Jack had a great idea, open a coffee shop where the beverages were free and use internal advertising as the income subsidy to operate the business.  Crowds came for the free coffee, comfy couches, fellowship, conversation and enjoyment.

It didn’t matter where Jack got the coffee, how he paid for it, or didn’t, or what product advertising the customers would be exposed to while there.  Few people thought about such things.  Curiously, it didn’t matter what size the crowd was; in the backroom of Jack’s Coffee Shop they were able to generate massive amounts of never-ending free coffee at extreme scales.

Over time, using the justification of parking lot capacity and township regulations, not everyone would be able to park and enter.  Guards were placed at the entrance to pre-screen customers. A debate began.

Alternative coffee shops opened around town.  It was entirely possible to duplicate Jacks Coffee Shop, yet no one could duplicate the business model for the free coffee.  Indeed, there was something very unique about Jack’s Coffee Shop.  Thus, some underlying suspicions were raised:

The only way Twitter, with 217 million users, could exist as a viable platform is if they had access to tech systems of incredible scale and performance, and those systems were essentially free or very cheap.  The only entity that could possibly provide that level of capacity and scale is the United States Government – combined with a bottomless bank account.  A public-private partnership.

If my hunch is correct, Elon Musk is poised to expose the well-kept secret that most social media platforms are operating on U.S. government tech infrastructure and indirect subsidy.  Let that sink in.

The U.S. technology system, the assembled massive system of connected databases and server networks, is the operating infrastructure that offsets the cost of Twitter to run their own servers and database.  The backbone of Twitter is the United States government.

FREE COFFEE:

♦ June 2013: […] “Cloud computing is one of the core components of the strategy to help the IC discover, access and share critical information in an era of seemingly infinite data.” … “A test scenario described by GAO in its June 2013 bid protest opinion suggests the CIA sought to compare how the solutions presented by IBM and Amazon Web Services (AWS) could crunch massive data sets, commonly referred to as big data.” … “Solutions had to provide a “hosting environment for applications which process vast amounts of information in parallel on large clusters (thousands of nodes) of commodity hardware” using a platform called MapReduce. Through MapReduce, clusters were provisioned for computation and segmentation. Test runs assumed clusters were large enough to process 100 terabytes of raw input data. AWS’ solution received superior marks from CIA procurement officials”… (MORE)

November 2013: […] “Twitter closed its first day of trading on Nov. 7, 2013, at $44.90 a share. In the years since then, it briefly traded above $70, but more recently, it has struggled.”

Jack’s free coffee shop has been for sale, but there’s no viable business model in the private sector.  No one has wanted to purchase Twitter – it is simply unsustainable; the data processing costs exceed the capacity of the platform to generate revenue – until now….

And suddenly, the people who work in the backroom of Jack’s Magic Coffee Shop don’t want Jack to sell.

Twitter is not making a decision to decline the generous offer by Elon Musk because of stewardship or fiduciary responsibility to shareholders.  The financials of Twitter as a non-viable business model highlight the issue of money being irrelevant.  Twitter does not and cannot make money.  Growing Twitter only means growing an expense. Growing Twitter does not grow revenue enough to offset the increase in expense.

There is only one way for Twitter to exist as a viable entity, people are now starting to realize this.

What matters to the people behind Twitter, the people who are subsidizing the ability of Twitter to exist, is control over the global conversation.

Control of the conversation is priceless to the people who provide the backbone for Twitter.

Once people realize who is subsidizing Twitter, everything changes.

That’s the fight. (more)

2021, Public-Private Partnership – The modern Fourth Branch of Government is only possible because of a Public-Private partnership with the intelligence apparatus. You do not have to take my word for it, the partnership is so brazen they have made public admissions.

The biggest names in Big Tech announced in June their partnership with the Five Eyes intelligence network, ultimately controlled by the NSA, to: (1) monitor all activity in their platforms; (2) identify extremist content; (3) look for expressions of Domestic Violent Extremism (DVE); and then, (4) put the content details into a database where the Five Eyes intelligence agencies (U.K., U.S., Australia, Canada, New Zealand) can access it.

Facebook, Twitter, Google and Microsoft are all partnering with the intelligence apparatus. It might be difficult to fathom how openly they admit this, but they do. Look at this sentence in the press release (emphasis mine):

[…] “The Group will use lists from intelligence-sharing group Five Eyes adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.”

Think about that sentence structure very carefully. They are “adding to” the preexisting list…. admitting the group (aka Big Tech) already have access to the the intelligence-sharing database… and also admitting there is a preexisting list created by the Five Eyes consortium.

Obviously, who and what is defined as “extremist content” will be determined by the Big Tech insiders themselves. This provides a gateway, another plausible deniability aspect, to cover the Intelligence Branch from any oversight.

When the Intelligence Branch within government wants to conduct surveillance and monitor American citizens, they run up against problems due to the Constitution of the United States. They get around those legal limitations by sub-contracting the intelligence gathering, the actual data-mining, and allowing outside parties (contractors) to have access to the central database.

The government cannot conduct electronic searches (4th amendment issue) without a warrant; however, private individuals can search and report back as long as they have access. What is being admitted is exactly that preexisting partnership. The difference is that Big Tech will flag the content from within their platforms, and now a secondary database filled with the extracted information will be provided openly for the Intelligence Branch to exploit.

The volume of metadata captured by the NSA has always been a problem because of the filters needed to make the targeting useful. There is a lot of noise in collecting all data that makes the parts you really want to identify more difficult to capture. This new admission puts a new massive filtration system in the metadata that circumvents any privacy protections for individuals.

Previously, the Intelligence Branch worked around the constitutional and unlawful search issue by using resources that were not in the United States. A domestic U.S. agency, working on behalf of the U.S. government, cannot listen on your calls without a warrant. However, if the U.S. agency sub-contracts to say a Canadian group, or foreign ally, the privacy invasion is no longer legally restricted by U.S. law.

What was announced in June 2021 is an alarming admission of a prior relationship along with open intent to define their domestic political opposition as extremists.

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (read more)

The influence of the Intelligence Branch now reaches into our lives, our personal lives. In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it. The legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01, the short-sighted legislative reactions opened the door to allow the surveillance state to weaponize.

After the Patriot Act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power. The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the installation of Barack Obama was all about.

The Obama network took pre-assembled intelligence weapons we should never have allowed to be created, and turned those weapons into tools for his radical and fundamental change. The target was the essential fabric of our nation. Ultimately, this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch. From that perspective the fundamental change was successful.

It’s all Connected Folks, SEE HERE

[…] “The vision was first outlined in the Intelligence Community Information Technology Enterprise plan championed by Director of National Intelligence James Clapper and IC Chief Information Officer Al Tarasiuk almost three years ago.” … “It is difficult to underestimate the cloud contract’s importance. In a recent public appearance, CIA Chief Information Officer Douglas Wolfe called it “one of the most important technology procurements in recent history,” with ramifications far outside the realm of technology.” (READ MORE)

One job…. “take the preexisting system and retool it so the weapons of government only targeted one side of the political continuum.”

Source

Elon Musk Makes a Massive Proposal, Offers to Purchase Twitter for $41 Billion With Plan to Take Company Private

Elon Musk Makes a Massive Proposal, Offers to Purchase Twitter for $41 Billion With Plan to Take Company Private

The richest man in the world, Tesla CEO Elon Musk, made an offer to purchase the Twitter platform for a price of $41 billion.  The offer represents a value of 38% more than the current evaluation.  [SEC FILING HERE]  The offer is filed with the US Securities and Exchange Commission proposing a full takeover for $54.20 per share in cash.

Within the filing Elon Musk states his intentions:

“I invested in Twitter as I believe in its potential to be the platform for free speech around the globe, and I believe free speech is a societal imperative for a functioning democracy.  However, since making my investment I now realize the company will neither thrive nor serve this societal imperative in its current form. Twitter needs to be transformed as a private company.

As a result, I am offering to buy 100% of Twitter for $54.20 per share in cash, a 54% premium over the day before I began investing in Twitter and a 38% premium over the day before my investment was publicly announced. My offer is my best and final offer and if it is not accepted, I would need to reconsider my position as a shareholder. Twitter has extraordinary potential.  I will unlock it. (SEC LINK)

What Elon Musk appears to be doing is perhaps the biggest story that few understand.

I share this perspective having spent thousands of hours in the past several years deep in the weeds of tech operating systems, communication platforms, and the issue of simultaneous users.   What Twitter represents, and what Musk is attempting, is not what most would think.

In the big picture of tech platforms, Twitter, as an operating model, is a massive high-user commenting system.

Twitter is not a platform built around a website; Twitter is a platform for comments and discussion that operates in the sphere of social media.  As a consequence, the technology and data processing required to operate the platform does not have an economy of scale.

There is no business model where Twitter is financially viable to operate…. UNLESS the tech architecture under the platform was subsidized.

In my opinion, there is only one technological system and entity that could possibly underwrite the cost of Twitter to operate.  That entity is the United States Government, and here’s why.

Unlike websites and other social media, Twitter is unique in that it only represents a platform for user engagement and discussion.  There is no content other than commentary, discussion and the sharing of information – such as linking to other information, pictures, graphics, videos url links etc.

In essence, Twitter is like the commenting system on the CTH website.  It is the global commenting system for users to share information and debate.  It is, in some ways, like the public square of global discussion.   However, the key point is that user engagement on the platform creates a massive amount of data demand.

Within the systems of technology for public (user engagement) commenting, there is no economy of scale.  Each added user represents an increased cost to the operation of the platform, because each user engagement demands database performance to respond to the simultaneous users on the platform.  The term “simultaneous users” is critical to understand because that drives the cost.

According to the Wall Street Journal, Twitter has approximately 217 million registered daily users, and their goal is to expand to 315 million users by the end of 2023.   Let me explain why things are not what they seem.

When people, users, operate on a tech platform using the engagement features, writing comments, hitting likes, posting images, links etc, the user is sending a data request to the platforms servers.  The servers must then respond allowing all simultaneous users to see the change triggered by the single user.

Example: when you hit the “like” button feature on an engagement system, the response (like increasing by one) must not only be visible to you, but must also be visible to those simultaneously looking at the action you took.   If 100,000 simultaneous users are looking at the same thing, the database must deliver the response to 100,000 people.  As a result, the number of simultaneous users on a user engagement platform drives massive performance costs.  In the example above, a single action by one person requires the server to respond to 100,000 simultaneous users with the updated data.

As a consequence, when a commenting platform increases in users, the cost not only increases because of that one user, the cost increases because the servers need to respond to all the simultaneous users.   Using CTH as an example, 10,000 to 15,000 simultaneous commenting system users, engaging with the servers, costs around $4,500/mo.

This is why most websites, even big media websites, do not have proprietary user engagement, i.e. commenting systems.  Instead, most websites use third party providers like Disqus who run the commenting systems on their own servers.  Their commenting systems are plugged in to the website; that defers the cost from the website operator, and the third party can function as a business by selling ads and controlling the user experience.  [It also sucks because user privacy is non existent]

The key to understanding the Twitter dynamic is to see the difference between, (a) running a website, where it doesn’t really matter how many people come to look at the content (low server costs), and (b) running a user engagement system, where the costs to accommodate the data processing -which increase exponentially with a higher number of simultaneous users- are extremely expensive.   Twitter’s entire platform is based on the latter.

There is no economy of scale in any simultaneous user engagement system.  Every added user costs exponentially more in data-processing demand, because every user needs a response, and every simultaneous user (follower) requires the same simultaneous response.  A Twitter user with 100 followers (simultaneously logged in) that takes an action – costs less than a Twitter user with 100,000 followers (simultaneously logged in), that takes an action.

If you understand the cost increases in the data demand for simultaneous users, you can see the business model for Twitter is non-existent.

Bottom line, more users means it costs Twitter more money to operate.  The business model is backwards from traditional business.  More customers = higher costs, because each customer brings more simultaneous users….. which means exponentially more data performance is needed.

User engagement features on Twitter are significant, because that’s all Twitter does.  Not only can users write comments, graphics, memes, videos, but they can also like comments, retweet comments, subtweet comments, bookmark comments, and participate in DM systems.  That is a massive amount of server/data performance demand, and when you consider simultaneous users, it’s almost unimaginable in scale.  That cost and capacity is also the reason why Twitter does not have an edit function.

With 217 million users, you could expect 50 million simultaneous users on Twitter during peak operating times.  My back of the envelope calculations, which are really just estimations based on known industry costs for data performance and functions per second, would put the data cost to operate Twitter around at least $1 billion per month (minimum).  In 2021, Twitter generated $5.1 billion in revenue, according to the Wall Street Journal.

There is no business model, even with paying subscribers, for Twitter to exist.  As the business grows, the costs increase, and the costs to subscribers would grow.  So, what is going on?

The only way Twitter, with 217 million users, could exist as a viable platform is if they had access to tech systems of incredible scale and performance, and those systems were essentially free or very cheap.  The only entity that could possibly provide that level of capacity and scale is the United States Government – combined with a bottomless bank account.

If my hunch is correct, Elon Musk is poised to expose the well-kept secret that most social media platforms are operating on U.S. government tech infrastructure and indirect subsidy.  Let that sink in.

The U.S. technology system, the assembled massive system of connected databases and server networks, is the operating infrastructure that offsets the cost of Twitter to run their own servers and database.  The backbone of Twitter is the United States government.

There is simply no way the Fourth Branch of Government, the U.S. intelligence system writ large, is going to permit that discovery.

Source

error

Please help truthPeep spread the word :)