OP-ED Connections, Facebook Spies on Private Messages and DHS Uses Private Chats Against J6 Detainees

Buick Electra

TB2K Girls with Guns

Connections, Facebook Spies on Private Messages and DHS Uses Private Chats Against J6 Detainees​


September 15, 2022 | Sundance | 158 Comments

Two journalists surface today with two different aspects to the same big picture story.​

First, Julie Kelly notes the DOJ is using social media chat messages as evidence in court against J6 detainees: “DOJ and Big Tech are working seamlessly to excavate private messages and info from deleted accounts to use as incriminating evidence for J6ers.” (link) Second, Miranda Devine is writing in the New York Post about Facebook spying on private messages to identify people who questioned the outcome of the 2020 election (link)

This ‘surveillance system‘ has been of great interest to CTH for several years, in part because it is a key aspect of the domestic intelligence system now operating as a functioning part of the Fourth Branch of Government. The overwhelming majority of the investigative resources within the Dept of Homeland Security (DHS) are used in this whole of network monitoring system.

I cannot emphasize the importance of the connections enough.

Surveillance of domestic communication, to include surveillance of all social media platforms, is now the primary mission of DHS. The information is gathered by social media, funneled by direct portals into the DHS network then distributed to DOJ-NSD and FBI officials as well as the Office of the Director of National Intelligence. This communication surveillance network is what DHS, created as an outcome of the Patriot Act, is all about.

The four pillars of the Fourth Branch of Government are: DHS, ODNI, DOJ-NSD and the revised/political FBI. All four pillars were created as an outcome of the Patriot Act. These institutions – as specifically named – represent the domestic surveillance state. The subsidiary institutions like TSA etc, exist under their authority. There is no oversight or counterbalance to this system. The Fourth Branch exists using the shield of “national intelligence” to hide their activity. Domestic surveillance is done by the intelligence apparatus under one big connected system, operated by the ODNI and DHS.

New York Post – Facebook has been spying on the private messages and data of American users and reporting them to the FBI if they express anti-government or anti-authority sentiments — or question the 2020 election — according to sources within the Department of Justice.

Under the FBI collaboration operation, somebody at Facebook red-flagged these supposedly subversive private messages over the past 19 months and transmitted them in redacted form to the domestic terrorism operational unit at FBI headquarters in Washington, DC, without a subpoena.

“It was done outside the legal process and without probable cause,” alleged one of the sources, who spoke on condition of anonymity.

“Facebook provides the FBI with private conversations which are protected by the First Amendment without any subpoena.”

These private messages then have been farmed out as “leads” to FBI field offices around the country, which subsequently requested subpoenas from the partner US Attorney’s Office in their district to officially obtain the private conversations that Facebook already had shown them. (read more)


None of this should be surprising to anyone who has been reading our research about the domestic intelligence apparatus and their connections to the Big Tech platforms. The largest social media networks are fully compromised by this relationship, and that is exactly why the legislative branch has not done anything to impede (ie. break up) the tech monopoly system that was created.

♦ EXAMPLE: Jack’s Magic Coffee Shop (Twitter), essentially a global and public commenting system, could not feasibly exist without the support of the U.S. government providing extreme scale data-processing. Also, specifically because the platform is in a symbiotic relationship with the intelligence apparatus, the IC itself has contracted people working within the platform.

The whole system was admitted in a 2021 Reuters article outlining the networks and their surveillance relationship with DHS.

We have been trying to hammer this issue for a long time, because at the end of this continuum people will eventually be given digital identities. It’s just the natural outcome if you follow the arc of how this is operating. Once a digital ID is established, all of your activity is then connected to it and a digital currency system emerges.

2021, Public-Private Partnership – The modern Fourth Branch of Government is only possible because of a Public-Private partnership with the intelligence apparatus. You do not have to take my word for it, the partnership is so brazen they have made public admissions.

The biggest names in Big Tech announced in June their partnership with the Five Eyes intelligence network, ultimately controlled by the NSA, to: (1) monitor all activity in their platforms; (2) identify extremist content; (3) look for expressions of Domestic Violent Extremism (DVE); and then, (4) put the content details into a database where the Five Eyes intelligence agencies (U.K., U.S., Australia, Canada, New Zealand) can access it.

Facebook, Twitter, Google and Microsoft are all partnering with the intelligence apparatus. It might be difficult to fathom how openly they admit this, but they do. Look at this sentence in the press release (emphasis mine):

[…] “The Group will use lists from intelligence-sharing group Five Eyes adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.”

Think about that sentence structure very carefully. They are “adding to” the preexisting list…. admitting the group (aka Big Tech) already have access to the the intelligence-sharing database… and also admitting there is a preexisting list created by the Five Eyes consortium.

Obviously, who and what is defined as “extremist content” will be determined by the Big Tech insiders themselves. This provides a gateway, another plausible deniability aspect, to cover the Intelligence Branch from any oversight.

When the Intelligence Branch within government wants to conduct surveillance and monitor American citizens, they run up against problems due to the Constitution of the United States. They get around those legal limitations by sub-contracting the intelligence gathering, the actual data-mining, and allowing outside parties (contractors) to have access to the central database.

The government cannot conduct electronic searches (4th amendment issue) without a warrant; however, private individuals can search and report back as long as they have access. What is being admitted is exactly that preexisting partnership. The difference is that Big Tech will flag the content from within their platforms, and now a secondary database filled with the extracted information will be provided openly for the Intelligence Branch to exploit.

The volume of metadata captured by the NSA has always been a problem because of the filters needed to make the targeting useful. There is a lot of noise in collecting all data that makes the parts you really want to identify more difficult to capture. This new admission puts a new massive filtration system in the metadata that circumvents any privacy protections for individuals.

Previously, the Intelligence Branch worked around the constitutional and unlawful search issue by using resources that were not in the United States. A domestic U.S. agency, working on behalf of the U.S. government, cannot listen on your calls without a warrant. However, if the U.S. agency sub-contracts to say a Canadian group, or foreign ally, the privacy invasion is no longer legally restricted by U.S. law.

What was announced in June 2021 is an alarming admission of a prior relationship along with open intent to define their domestic political opposition as extremists.

July 26, 2021, (Reuters) – A counterterrorism organization formed by some of the biggest U.S. tech companies including Facebook (FB.O) and Microsoft (MSFT.O) is significantly expanding the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias, the group told Reuters.

Until now, the Global Internet Forum to Counter Terrorism’s (GIFCT) database has focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organizations such as Islamic State, al Qaeda and the Taliban.

Over the next few months, the group will add attacker manifestos – often shared by sympathizers after white supremacist violence – and other publications and links flagged by U.N. initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups, including the Proud Boys, the Three Percenters and neo-Nazis.

The firms, which include Twitter (TWTR.N) and Alphabet Inc’s (GOOGL.O) YouTube, share “hashes,” unique numerical representations of original pieces of content that have been removed from their services. Other platforms use these to identify the same content on their own sites in order to review or remove it. (read more)


The influence of the Intelligence Branch now reaches into our lives, our personal lives. In the decades before 9/11/01 the intelligence apparatus intersected with government, influenced government, and undoubtedly controlled many institutions with it. The legislative oversight function was weak and growing weaker, but it still existed and could have been used to keep the IC in check. However, after the events of 9/11/01, the short-sighted legislative reactions opened the door to allow the surveillance state to weaponize.

After the Patriot Act was triggered, not coincidentally only six weeks after 9/11, a slow and dangerous fuse was lit that ends with the intelligence apparatus being granted a massive amount of power. The problem with assembled power is always what happens when a Machiavellian network takes control over that power and begins the process to weaponize the tools for their own malicious benefit. That is exactly what the installation of Barack Obama was all about.

The Obama network took pre-assembled intelligence weapons we should never have allowed to be created and turned those weapons into tools for his radical and fundamental change. The target was the essential fabric of our nation. Ultimately, this corrupt political process gave power to create the Fourth Branch of Government, the Intelligence Branch. From that perspective the fundamental change was successful.

It’s all Connected Folks, SEE HERE

 

Squib

Veteran Member
Meanwhile, in the evil kingdom of eternal darkness called D.C., the J6 prisoners are being abused & tortured by their captors - and here’s a pic of one of the prison guards, AKA Lt. Krystal Lancaster, recently suspended for their treatment:

8A7CFCD9-905F-4333-A408-02D30DB362DB.jpeg
 

Dozdoats

On TB every waking moment
If you want to hide your commo, learn to generate and use one-time pads. Book codes are reasonable substitutes.
 

Sooth

Veteran Member
As Millie Weaver and Snowden and others clearly pointed out years ago, the Feds do not monitor our electronic communications. They are the clean hands people. As with Echelon, others spy for us, we spy for them. As with Shadow Gate, the Feds contract with 3d party private companies to monitor the traffic and send the salacious results to the Feds. With Facebook, they do not even need to pretend. Mark Zuckerberg (so tempting to make a one letter change to his name) is more than willing to directly report “enemies of the STATE”.
 

Griz3752

Retired, practising Curmudgeon
I wonder if FB volunteered the files or responded to a warrant.

I've never been a regular FB user going way back to when it was free simply because free never is.

I reluctantly use gmail because most web providers don't support email accounts/clients anymore and am leery using some "secure" SMS will attract the wrong kind of scrutiny. I might be wrong there but I don't think so . . . .
 

tnphil

Don't screw with an engineer
I wonder if FB volunteered the files or responded to a warrant.

I've never been a regular FB user going way back to when it was free simply because free never is.

I reluctantly use gmail because most web providers don't support email accounts/clients anymore and am leery using some "secure" SMS will attract the wrong kind of scrutiny. I might be wrong there but I don't think so . . . .
Don't send anything via Gmail that you wouldn't want on the front page of the newspaper. Or any email, for that matter. It travels the backbones and can be snatched, logged and saved.
 

Griz3752

Retired, practising Curmudgeon
Don't send anything via Gmail that you wouldn't want on the front page of the newspaper. Or any email, for that matter. It travels the backbones and can be snatched, logged and saved.
My point exactly - if the file is electronic and on a server somewhere, even in the cloud, it can be found and retrieved, coutresy B Gates and his contemories, all of whom sold out for fun & profits..
 

Publius

TB Fanatic
Negress. Queen turd of a cesspool.


Anyhoo, there are NO secure electronic comms.

Unless'n you're good friends with folks like LoupGarou and have built your own...


Nope nothing is allowed to be secure by design, you have to do everything old school and I mean really old school like messenger on foot telling everyone to show up on X date at X place and none of this is allowed to be talked about near a cell phone or computer.
 
Last edited:

tnphil

Don't screw with an engineer
Nope nothing is allowed to be secure by design, you have to do everything old school and I mean really old school like messenger on foot telling everyone to show up on X date at X place and none of this is allowed to be talked about near a cell phone or computer.
Be very careful about talking around your phone, even if the screen is off. My wife and I have discussed things like a new mattress, etc. while driving down the interstate. Phones "inactive". Next thing I know, I'm getting mattress ads (etc) on all of my tablets. I merely took a picture of the side of a fire pit box at Wally World on my phone, we didn't even discuss verbally, and then starting getting ads for firepits on tablets. We all know we live in a surveillance society, but few realize how much.
 

LoupGarou

Ancient Fuzzball
Airgapped laptops and tablets (ones with only WiFi) are the best to use for source work and the actual OTP based encryption. Then you can send the encrypted file via thumbdrive to a laptop or PC that is internet connected and there is NO chance of them seeing the source text.

I'm working on a BBS/Forum software that only works with encrypted posts in certain SIGs, and the Forum software does not have the keys, that is up to each user to have access to, and they are shared peer to peer, encrypted with OTP Padfiles just made for sharing bulk encrypted PADfiles.

I'm debating on getting a few fake accounts with certain social media systems just to post encrypted copy... Or maybe even encrypted QR codes...
 

Tesss

Veteran Member
Got back on FBook so I could sell TV entertainment center and visit with a few old friends. My only post was, “May everyone have a blessed day!”

Friend and I were talking on MESSENGER. We were discussing vaccines. She said she would never get the vaccine or boosters, there are too many problem. I agreed but said I gave in and got the original vaccines. I joked she was a “pure blood”

I immediately got a message from FB telling me my account was suspended because I didn’t meet community standards. I has 30 days to respond and if I did not my account would be terminated!

I sent response and they did the are you a robot. I did their stupid, robot test and THEN they asked for a picture of me and THEN asked for a video of me. ( I had used a picture of a wreath.). Oh heck NO!

One day on and I was in Facebook jail.

Yesterday, I watched a video from Dan Bongino talking about FB spying on Messenger, and then sending info to F. I. B.! I

I believe that. Just hope I don't get 3 guys at my door!
At first I was in shock and then angry. Now, just feel canceled and learned, in real time, we do have a target on our backs.

Talk about a reality check. I "knew" if I posted that on fb I
would get put in fb jail but never thought about a private
messenger conversation.

Deleted fb app and messenger app immediately!

Real Person, Real Life, Real Experience! I’m over it but wanted the whole crew to see,
“We Are Watching You!”
 
Last edited:

Knoxville's Joker

Has No Life - Lives on TB
Can you explain or elaborate please?
OK take a work of shakespear say. Every day the commo code is a set page, paragraph, sentence, word, next one that day is same page different paragrapsh, sentence, word.

Now if it is a cipher you use that sentence to scramble the alaphabet and each time it is unique.
 

mistaken1

Has No Life - Lives on TB
All your metadata are belong to us.

When something is out of the ordinary routine it sticks out like a sore thumb.
 

LoupGarou

Ancient Fuzzball
Which is all why everyone needs to make their OWN OTP Padfiles, and not use something that is public unless you use multiple parts of it as feed material for your encryption generation.
 
Top