reSee.it - Tweets Saved By @RebelValkyrie17

Saved - January 23, 2024 at 6:00 PM
reSee.it AI Summary
Why aren't influencers talking about this? They don't share videos that expose them. They never thought investigations into their criminal acts would be exposed. They control the narrative and label true information as conspiracy. Power over the military and three-letter agencies. Follow the husbands. Freedom of the press is vital. We, the people, have the power. Trust the plan. Those in power are becoming liabilities. State actors use blackmail to gain leverage. Data exchanges can be dangerous.

@RebelValkyrie17 - ©.

Why aren’t the big “influencers” talking about this? He was trying to tell us. He was killed for it. They claim to loveeee Kappy but will never share his videos. Why? Because he talks about THEM in his videos. https://t.co/Rg6sQh3A1J

Video Transcript AI Summary
There are claims made about the existence of numerous Assad operatives who are described as very bad people. The speaker accuses certain individuals, including Gabe Hoffman, Mike Cernovich, and Laura Lumer, of running operations and being involved in infiltrating their life. They mention Black Cube, a private intelligence agency run by former Israeli intelligence personnel, and claim that it is protecting slave traders. Harvey Weinstein is mentioned as having hired Black Cube to harass his victims. The speaker also suggests looking into Steve Bannon and accuses Gabe Hoffman of protecting literal slave traders. They express anger and frustration towards these individuals and make references to Hasidic Jews and Scientology's alleged deals with New York City Jews on real estate.
Full Transcript
Speaker 0: There are so many fucking Assad operatives. It would blow your mind, guys. They're very, very bad people. Very, very bad. I just found out a bunch of crap today. I just found out a bunch of stuff this morning. Yeah. I Jack, Gabe Hoffman, Mike Cernovich, Laura Lumer, Gabe Hoffman is running ops on people. He is a He is a bad guy, dude. I look like I've seen a ghost. Yeah, I have. And someone that was very close to me, I'm pretty sure they were just there to infiltrate me. These are really fucking bad people And I'm beyond pissed. I I don't even know how to describe the feeling inside of me. Black Cube. Black Cube. Do you guys know Black Cube? Private Label Intelligence, Run by X, Israeli Intelligence. What is Black Cube? Private Label Intelligence, run by X Israeli intelligence. There's so much infiltration. There's so much subversion. There's so much evil. These people are protecting slave traders. They're protecting the system. They're protecting the system of slave trade. You've never heard of black cube? Well, Get used to it. We're talking about Black Cube a lot. Black Cube is shit. Harvey Weinstein hired Black Cube to harass His victims, black cube is fucking treasonous scum fucks and you all better fly back to Tel Aviv As fast as you fucking can and get out of our country, you pieces of shit. Check them out now. Yeah. Check them out now. Check out Black Cube. Check out Black Cube and look at Steve fucking Bannon. Have a look at Steve fucking Bannon, I would say. Have a look into Steve fucking Bannon. Yeah. The cube is, satanic symbolism. Yes, it is. It is. Yep. Steve fucking Bannon. Look into that guy. Steve Bannon, the guy that got kicked out of Trump's White House. You were wondering about Bannon. Yeah. Well, Gabe Hoffman protects literal slave traders. Entertainment lawyer protects literal slave traders. Jack Vasilvia. Jack Vasilvia. An Open Secret. If you haven't seen me this worked up for a long time, well, guys, they came into my life from every angle and Just fucked everything up. They paid people off. Yeah. They did a lot of, they did a lot of bad stuff. They lied about me. They slandered me. What's an open secret? It's a fucking honey pot run by that fucking facade faggot, Gabe Hoffman. Gabe Hoffman, you're an unregistered foreign agent. Hasidic Jews. Funny you should mention Hasidic Jews. I talked to someone that was at NSA. And they said that Scientology has deals with New York City Jews on real estate. Scientology and New York City Chiefs. Isn't that interesting?

@RebelValkyrie17 - ©.

https://t.co/81XVHp1F6V

@RebelValkyrie17 - ©.

https://t.co/lsGeLEhLrH

@RebelValkyrie17 - ©.

Shall we play a game? Find the spider(s) and build the web (the ‘map’). Remember, they consider you to be the fly (specifically, the ‘feeder’). Remember, they never thought she was going to lose. Therefore, they never thought investigations and/or public interest into their criminal acts would be exposed/investigated. Therefore, they never thought they had anything to fear. Therefore, they openly showcase their symbolism. Therefore, they were sloppy. Hussein’s last speech in Chicago re: ‘scandal free’. Why did he continually emphasize that phrase? As a backup, they infiltrated and control the narrative. As a backup, they install only those on the team. As a backup, they blackmail those that aren’t. —>As a backup, they defined ‘conspiracy’ as crazy/mentally unstable and label anything ‘true’ as such. This works given most of what they engage in is pure evil and simply unbelievable (hard to swallow). The ‘fix’ has always been in – no matter which party won the election (-JFK (killed)/Reagan(shot)). This was always the promise made to those who played the game (willingly or otherwise) (i.e., they would never lose power). Power of the (3) letter agencies. —>Power over the US Military (WW dominance to push against other nations and install like-kind). These people are really stupid. Follow the husbands. Another Hint: Ian Cameron McKinsey & Company Clowns In America. Dr. Emmett J. Rice. Federal Reserve. Everyone is connected. How about a nice game of chess? Q

@RebelValkyrie17 - ©.

Imagine THIS. Raw intel collection. Narrative FEEDER. Narrative COLLECTORS. Narrative DISTRIBUTORS. LEAKS. CLASSIFIED. PAYMENTS. FOREIGN ACCOUNTS. CASH. SPOOK FILES. HOTELS. BLACKMAIL. How do you retain 'Freedom of the Press' if those in front of the camera [trusted by select viewers] are extensions of the ARM? Freedom of the Press is VITAL to retain. TRUST THE PLAN. THERE ARE A LOT MORE GOOD THAN BAD. You, THE PEOPLE, need to remember how TO PLAY. You, THE PEOPLE, have the POWER. We STRIKE every SINGLE DAY. We WIN every SINGLE DAY. EVERY SINGLE DAY THEY ARE BEING DESTROYED - LITERALLY. STAY STRONG. HAVE FAITH. THIS IS BIGGER THAN ANYONE CAN IMAGINE. Q

@RebelValkyrie17 - ©.

What happens when those who held positions of POWER (& INFLUENCE) no longer pull the strings? What happens when 'BLACKMAIL' no longer works? Do you become a LIABILITY? (H)> C, D, I Q

@RebelValkyrie17 - ©.

What happens when state actor(s) [assets] are removed? How does a state actor gain leverage over a person in power [re: blackmail]? Define 'Traitor'. Data exchange(s) can be very dangerous. Q

Saved - January 17, 2024 at 12:20 PM

@RebelValkyrie17 - ©.

#ArrestRayEpps

@onwardsocial - Onward Social

From the team that brought us the video J6: A True Timeline, this 6:00 minute video focused on Ray Epps is eye opening. You don’t need popcorn, but will likely need a vomit bag. https://open.ink/collections/j6-the-ray-epps-files

J6: The Ray Epps Files Ray Epps is a much-discussed figure. Who is he? What was he there to do? open.ink
Saved - January 14, 2024 at 4:56 PM

@RebelValkyrie17 - ©.

I continue to get porn bots on this. Apparently they don’t like this.

@RebelValkyrie17 - ©.

@Matt_Fleming321 @BaddCompani https://t.co/zqxwqx4exx

Saved - January 14, 2024 at 4:38 PM

@RebelValkyrie17 - ©.

This is a must listen of Bill Cooper! Thank you @stormready17 https://t.co/eC5pgCu619

Video Transcript AI Summary
The speaker discusses the difference between capitalism, socialism, and communism, as well as right-wing and left-wing ideologies. They explain that the far right advocates for minimal government control, while the far left believes in total government control. They also mention that the United States is a republic, not a democracy, and highlight the dangers of democracies and their potential to oppress minorities. The speaker argues that communism fails because of human greed, while socialism often leads to dictatorial governments. They criticize socialists as dependent individuals who rely on the government for their needs. The conversation concludes with a mention of the push for national healthcare in the United States.
Full Transcript
Speaker 0: So, the green movement worldwide is now from manipulation of now it's been proposed time and again too that big businesses behind things like this and that would represent a capitalist approach, but what you're saying is we're heading toward a socialist approach based on by this scenario. Speaker 1: You have to understand the difference between capitalism, socialism, communism, what all of these things really mean. You have to understand what the difference is between right wing and left wing. People, They use these phrases all the time and they don't even know what these things mean. And it's just incredible to me to hear a socialist calling someone else a Nazi Because Nazi means national socialism. So, here's a socialist calling a right wing guy a Nazi What he should be calling the right wing guy is anarchist. People on the right want no control. They're really anarchists. Speaker 0: So, they would in theory then or in fact be in opposition to this ultimate movement. Whereas in appearance, they would be the ones behind it. Speaker 1: Well, when you have a misunderstanding what the terms mean, yes. Speaker 0: Okay. Speaker 1: Right wing On the far right, there's total anarchy. They don't want anybody controlling anything that they do and they believe that people are responsible enough that the world can exist without government. Are the very minimal government that it would take to on the far left, on the other hand, they believe that the government should be in total control and should be Supply man with all of his needs. Speaker 0: Well, creating a whole society that's dependent. Speaker 1: Right. A republic is somewhere in the middle. It's governance by laws. Laws are decided by representatives who are elected by the people. And according to the theory, the representatives will do what is right whether they get elected or not because it's not really a democracy. A democracy is far left. People don't understand. We don't live in a democracy. This country is not a democracy, it is a republic. A democracy is ruled by the mob. The mob always votes themselves every kind of benefit that they can vote themselves. And whenever you do that it means large tremendously. Overpowering government in control. Speaker 0: They vote themselves into dependency. Speaker 1: That's it. They vote themselves into a dictatorship CHIP is what they do where they lose all of the benefits that they tend to devote themselves into in the 1st place. Speaker 0: Okay. Speaker 1: And democracies are extremely dangerous to minorities Because if the majority of people don't like Speaker 0: you, Speaker 1: they're going to vote that they kill you and that's it. Democracies are dangerous. Democracies are socialists. Democracies are communism. That's what communism is. The definition of communism Is everybody doing according to their talents and receiving according to their need? And it doesn't work. We already know it doesn't work. Men, by his inherent nature, as greedy. Mhmm. So those at the top always end up having everything and those at the bottom end up having nothing in communism. Socialism is different. Socialism usually ends up in a dictatorship. In a very controlling dictatorial government, which It even owns the people that it governs. So, that those who live in fear of not having are provided for what they need and in turn They worship this oppressive government. Socialists are children who went out into the world, took a look around and said, I can't handle it, and went home to daddy. Okay. Daddy, protect me. Daddy, feed me. Daddy, loan me your car. Daddy, tuck me in at night. Socialists are scared little children who are irresponsible, can't stand on their own 2 feet, and need daddy to take care of them. Speaker 0: Okay. Okay. But Speaker 1: what happens when you go home to daddy and daddy does all these things for you? Tell me. Speaker 0: Well, you never leave the home. You've got no reason to. In other words, if you're being provided for in that way. Speaker 1: You're being provided for, but what does it mean? Doesn't it mean that you have to do what daddy tells you to do? Speaker 0: True. Speaker 1: Hearing that you when daddy tells you to be in? Doesn't it mean that you can't drive the car to the next town that daddy tells you you can't? Doesn't it mean that if daddy tells you to take out the trash, you better take out the trash? Are you beginning to understand the concept? When you ask for favors from daddy, you have to give up freedom in return. Speaker 0: Right. Speaker 1: Okay. So, socialism always leads to repression of liberty, freedom, equality, all of those things fly out the window So that you can have free healthcare. Mhmm. So that you can have a place to live, but you don't have to pay the rent. So that you can have food given to you by the state. And that's where we're headed. Right in this country right now, we're almost totally socialist and now people are screening for a national healthcare policy. Right. Healthcare insurance.
Saved - January 13, 2024 at 5:36 PM

@RebelValkyrie17 - ©.

Holy shit!! Is Roger Stone responsible for assassinations? https://t.co/cJ9SqDQCFT

Video Transcript AI Summary
Please stay put and take care of this task. It's time to complete it and see how successful it will be. Contact everyone involved and get it done.
Full Transcript
Speaker 0: You please stay there and go and follow-up and get this over with. It's time to do it, and we'll see how great the rest of it. Either call all the people,
Saved - January 12, 2024 at 12:00 AM
reSee.it AI Summary
Cambridge Analytica, connected to Michael Flynn and Black Cube, was created by Aleksandr Kogan. Cambridge University's Psychometrics Centre conducted psyops using Facebook data. US defense contractor Boeing funded Michal Kosinski's projects. Steve Bannon tried to convince Trump to hire Cambridge Analytica. Bannon, Kilimnik, and Manafort developed a predictive response model targeting Putin. Kogan traveled to Russia for funding. Lionel Ni, also funded by Boeing, worked on wireless communication systems. Hunter Biden proposed statistical analysis for Alcoa tied to Deripaska. Manafort executed influence operations for Deripaska.

@RebelValkyrie17 - ©.

Cambridge Analytica, a company connected to Michael Flynn and Black Cube (MOSSAD backed intel company), was created by Aleksandr Kogan - professor, Cambridge University Psycho Centre. Cambridge University's Psychometrics Centre has been preforming psyops on the world for many years. Back in 2007, David Stilwell (funded by Intel agencies) created what is now called “Operation KitKat”. “[David Stilwell] had devised various apps for Facebook, one of which, a personality quiz called myPersonality, had gone viral. Users were scored on "big five" personality traits - Openness, Conscientiousness, Extroversion, Agreeableness and Neuroticism - and in exchange, 40% of them consented to give him access to their Facebook profiles. —->Suddenly, there was a way of measuring personality traits across the population and correlating scores against Facebook "likes" across millions of people.”

@GusQuixote - GusQuixote

@RebelValkyrie17 - ©.

This research, which involved building the groundwork for the future psyops to be preformed on the American people (and the world), quickly caught the eyes of the US defense and military establishment. Boeing was the main source of funding and support of Michal Kosinski’s projects. “Boeing, a major US defence contractor, funded Kosinski's PhD and Darpa, the US government's secretive Defense Advanced Research Projects Agency, is cited in at least two academic papers supporting Kosinski's work.”

@GusQuixote - GusQuixote

@RebelValkyrie17 - ©.

Steve Bannon, the “typical investment banker” involved with Cambridge Analytica, tried to convince Trump to take on Cambridge Analytica as a client.

@GusQuixote - GusQuixote

Please scroll through comments for more context. X likes to hide the most relevant additions to these chains if there are time gaps between.

@RebelValkyrie17 - ©.

To prepare the development of a predictive response model, Bannon along with Ukrainian and Russian political/intel operative Konstantin Kilimnik developed a working relationship with Paul Manafort. The main target of Cambridge Analytica’s predictive response model was Vladimir Putin.

@GusQuixote - GusQuixote

@RebelValkyrie17 - ©.

Unbeknownst to his colleagues, the founder of Cambridge Analytica - Aleksandr Kogan traveled to Russia to give presentations and collect funding from the Russian government. Bannon says that Kogan performed services under contract on Cambridge Analytica's behalf, without his knowledge. Cambridge Analytica created at least two other apps to collect psychological data from Facebook users, the "Music Walrus" and "The Sex Compass" applications.

@GusQuixote - GusQuixote

Just to make it look like it reads... ---

@RebelValkyrie17 - ©.

Lionel Ni, of Michigan State University and Tsinghua University (among other universities), was another Boeing funded talent worker. Lionel Ni managed projects to create wireless communication systems that have seamless connectivity. This project is intended to be ongoing.

@GusQuixote - GusQuixote

24/ In 2007, Lionel Ni landed a monster deal with Boeing. It had no ceiling and no term - a professor’s dream. Naturally, it, too, was run in conjunction with Tsinghua University. https://news.hkust.edu.hk/news/hkust-develop-wireless-communication-technologies-boeing

HKUST to Develop Wireless Communication Technologies for Boeing | News - The Hong Kong University of Science and Technology news.hkust.edu.hk

@RebelValkyrie17 - ©.

In 2011, another CEFC affiliate - Rosemont Seneca, Co-Chairman - Hunter Biden proposed to provide a company called Alcoa with statistical analysis of political and corporate risks, elite networks associated with Oleg Deripaska (Russian CEO of Basic Element company and United Company RUSAL). Deripaska is responsible for many major influence operations, often tied to his economic interests, with coordination from the Russian government. Between 2004 and 2009, Paul Manafort executed these operations on Deripaska's behalf, involving a multi-million dollar campaign across various countries. Simultaneously, Deripaska introduced Manafort to pro-Russia oligarchs in Ukraine, leading to lucrative ties and Manafort's involvement in Ukrainian politics until 2014.

@GusQuixote - GusQuixote

https://t.co/dBagFJvszC

Saved - December 18, 2023 at 4:35 PM
reSee.it AI Summary
The Emoluments Clause in the U.S. Constitution prohibits any person in a position of power from accepting any form of profit, advantage, benefit, or comfort from a foreign state without the consent of Congress.

@RebelValkyrie17 - ©.

Emoluments Clause, U.S. Const. art. I, § 9, cl. 8. “No Person holding any Office of Profit or Trust under [the United States], shall, without the Consent of the Congress, accept of any present, Emolument, Office, or Title, of any kind whatever, from any King, Prince, or foreign State.” ** Emolument: "profit," "advantage," "benefit," and/or "comfort." https://www.theusconstitution.org/wp-content/uploads/2018/01/The-Text-and-History-of-the-Foreign-Emoluments-Clause.pdf

Page not found | Constitutional Accountability Center theusconstitution.org

@GusQuixote - GusQuixote

Hunter was on the Board of Burisma while he was in business with CEFC (alleged through 2019). That means he was on the Board of a Ukrainian oil company while his other partners bought 7 billion of stake in. Russian oil company. Qatar has a virtual monopoly (so I’ve read) on LNG in the region, Turkey is an integral part of BRI, and there have been plans for pipelines through Gaza to the Mediterranean for Europe. I just feel like the Biden role in international energy trade and foreign wars isn’t getting enough attention.

Saved - December 7, 2023 at 8:55 PM
reSee.it AI Summary
The MGshow delves into the CTIL Files, exposing the Censorship Industrial Complex. It reveals AMITT, the framework behind censoring the truth movement on social media. The show uncovers tactics like scraping social media, controlling narratives, and using pseudonyms. It also highlights the "Spy Disguise" and the use of burner phones. The CTIL Files shed light on the manipulation and surveillance tactics employed by those seeking to control information.

@RebelValkyrie17 - ©.

🧵MGshow Reading CTIL files @shadygrooove @intheMatrixxx 1/

@RebelValkyrie17 - ©.

The Censorship Industrial Complex. Here is the reading of the 1st post of CTIL Files. This entire episode of the MGshow was so absolutely mind blowing that I really feel like it is worth the watch. @shadygrooove @intheMatrixxx https://t.co/docBVBQOMg

Video Transcript AI Summary
Michael Shellenberger's CTIL files reveal a trove of documents exposing the involvement of governments in censorship. The documents describe the activities of the Cyber Threat Intelligence League (CTIL), an anti-disinformation group that worked closely with the US Department of Homeland Security (DHS) and military contractors. The whistleblower's documents reveal the genesis of modern digital censorship programs, partnerships with intelligence agencies and civil society organizations, and the use of offensive techniques like sock puppet accounts. The documents also show that CTIL aimed to become part of the federal government and had connections with FBI and CISA employees. The documents provide a comprehensive picture of the birth of the censorship industrial complex.
Full Transcript
Speaker 0: Michael Shellenberger's, CTIL files number 1. Many people insist that governments aren't involved in censorship. However, shady groov, we have found that CISA and DHS, who also worked with the foot, with the, defeat disinfo. Guys, put my account on a list for tweets and some others as well. But many people insist that governments aren't involved in censorship. Oh, don't Don't forget the sitting senator shady group, Angus, King, who's worth $10,000,000. Hi, Angus. But they they are. And now a whistle come forward with an explosive new trove of documents rivaling or exceeding the Twitter files and Facebook files in a scale in scale and importance, guys. This is the, the article here. This is, whistleblower makes trove of new documents available to public and Racket, which is, you know, Shellenberger's, news organization, and type b b. The birth of the censorship industrial complex in reaction to Brexit and Trump election 2016. US military contractor, this is Pablo Brewer left. This is UK defense researcher Sarah Jain or s j, Terp. And then this is Chris Krebs, shady group, former director of the US Department of Homeland Security and SISA shady group. Speaker 1: Hey, I guess you guys will know that name. Speaker 0: We know. You know. You know it. I know it. The whole world knows it. So the UK and the u US and UK military contractors created a sweeping plan for global censorship in 2018. The whistleblower makes the trove of new new documents available. So, this is amazing guys, because these new documents, rivaling that of Twitter files or Facebook files in scale and importance, they describe the activities of Anti disinformation group called Cyber Threat Intelligence League or CTIL, the that officially began as the volunteer project of data scientists and defense and intelligence veterans. Stanley who? McChrystal? But whose tactics over time appear to have been absorbed into multiple Official projects, including those of the Department of Homeland Security. The CTI League documents, offer the missing link answers to key questions not addressed in the Twitter files and Facebook files. Combined, they offer a comprehensive picture of the birth of the anti disinformation sector or what we have called the censorship industrial complex. The whistleblower's documents describe everything from the genesis of modern digital censorship programs to the role of the military and intelligence agencies, partnerships with civil society organizations and commercial media, and use use of sock puppet accounts and other offensive techniques. Lock your beep down explains one document about creating your own spy disguise. Another explains that while such activities overseas are typically done by the CIA and NSA and the Department of Defense. So let's just let's just take this in right now. If you have activities overseas, If you have accounts attacking you that are not from the US, say they're from Germany, say they're from somewhere else, they could be the CIA, NSA. Okay, guys? So censorship efforts against Americans have been done by using private partners because the government doesn't have the legal authority. The whistleblower alleges that the leader of CTI League, a former British intelligence analyst, was in the room at the Obama White House in 2017 when she received the instructions to create a counter disinformation project to stop a repeat of 2016. Over the year, over the last year, public racket, congressional investigators and others have documented the rise of censorship industrial complex. A network of over a 100 government agencies and nongovernment organizations that work together to urge censorship by social media platforms and spread propaganda about disfavored individuals, topics, and whole narratives. Shady. Speaker 1: Who would have thunk it? Seems like that. The? We've been in the middle of that. The US Department of Homeland Security Cybersecurity and Information Security Agency, CISA, has been the center of gravity for much of the censorship, with the National Science Foundation financing the development of censorship and disinformation tools And other federal government agencies playing a supportive role. Emails from Integrity Partnership, EIP, in 2020, which involved the Stanford Internet Observatory, note Stanford, And other US government contractors, EIP and its successor, The Virility Project VP, urged Twitter, Facebook, and other platforms to Censor social media posts by ordinary citizens and elected officials alike. Despite the overwhelming evidence of government Sponsored censorship. It had yet to be determined where the idea of such mass censorship came from. In 2018, the SIO official and former CIA fellow, Rene de Risto, generated national headlines before And after testifying to the United States Senate about Russian government interference in the 2016 election. What happened between 2018 and the spring of 2020? Year 2019 has been a black hole in the research of the censorship industrial complex to date. When one of us, Michael, testified to the US House of Representatives about the Censorship Industrial Complex in March of this year, the entire year was missing from his timeline. An earlier start date for the censorship industrial complex, and they're showing the, graphic here, creating misinfo communities, MisinfoSec. Speaker 0: Yeah. This is MisinfoSec. Right? Yep. Cred, Credibility Coalition, People Centered Internet and IACI, pointing over to the industry, academia, media, community, government, and infosec. Shitty. Speaker 1: Now a large trove of new documents, including strategy documents, training videos, Presentations and internal messages revealed that in 2019, US and UK military and intelligence contractors, Led by a former UK defense researcher, Sarah Jane, s j Terp, developed the sweeping censorship framework, and these contractors co led CTIL, which partnered with CISA in the spring of 2020. In truth, the building of this censorship industrial complex began Even earlier in 2018, internal CTIL Slack messages show Terp, Her colleagues and officials from DHS and Facebook, all working closely together in the censorship process. CTI Speaker 0: Elmer and the private model are the seeds of what both the US and UK would put into place in 2020 in 2021, including masking censorship within cybersecurity institutions and counter disinformation agendas, a heavy focus on stopping disfavored narratives, not just wrong facts and pressuring social media platforms to take down information or to take other actions to prevent content from going viral. In the spring of 2020, CTIL began tracking and reporting disfavored content on social media such as anti lockdown narratives like all jobs are essential, we won't stay home and open America now. CTIL created a law enforcement channel for reporting content as part of these efforts. The organization also did research on Individuals posting anti lockdown hashtag like free California hashtag, and kept up spreadsheet with details from twit their Twitter bios. The group also discussed requesting takedowns and reporting website domains to registrars. CTIL's approach to disinformation went far beyond censorship. The documents show that the group engaged in offensive operations to influence public opinion, discussing ways to promote counter messaging, Co opting hashtags, dilute disfavored messaging, create sock accounts, and infiltrate private invite only groups. Wow. Have we been targeted of any of that, JD? Speaker 1: Literally every single bit of it, we have been targeted Right. With. Speaker 0: Right. So in one suggested list of survey questions, CTIL proposed asking members or potential members, quote, have you Speaker 1: worked with influence operations, Speaker 0: e g Influence operations e g disinformation, hate speech and other digital harms, etcetera pea previously. The survey then asked whether these influence operations including active measures and psyops. These documents came to us via highly credible whistleblower. We are able to independently verify Their legitimacy through the extensive cross checking of information to publicly available sources, the whistleblower said that they were recruited to participate in CTIL through a monthly cyber security meeting hosted by DHS. The FBI declined to comment, of course. CISA did not respond to any request for comment, and Terp and the other key CTIL members also did not respond to, their request for comment. Gus Chiodi, sending love. Much love brother. Thank you so much. But here it is, all coming together guys. All of this that has been levied upon you, the president Trump. Q. COVID lockdowns, anything that we wanted to speak out against is all right here coming together into 1, guys. It's all being exposed. But 1 person involved, Bonnie Smalley, replied over LinkedIn saying, All I can comment on is that I joined CTI League which is unaffiliated with any government orgs because I wanted to come back combat the inject bleach nonsense online during COVID. I can assure you that we had nothing to do with the government though. Yet the documents suggest that the government employees were engaged with members of CTIL. One individual who worked for DHS, Justin Frappier, was extremely active in CTIL participating in regular meetings and leading trainings guys. Here's SJ Terp. This is Bonnie Smalley, SJ Terp, Bonnie Smalley, and we're looking for Justin Frappier right here. He was added to this information triaged by SJ Terp. Okay? And he said, hello from the other side. If you can read that, I'm not I'm not sure, but, that's what's happening. Okay? They're in their little Slack room, right here. So if you look at the Slack room right here, it's got medical sector supporting, Android malware analysis, feeds, look at SMS analysis, Windows malware, look at that. Look at all the stuff that they've got in their folders. And this is the COVID nineteen scene. They're very busy. Wow. Wow, guys. So that is the, document there. So Shady, CTL's ultimate goal. Speaker 1: CTIL's ultimate goal said the whistleblower was to become part of the federal government. In our weekly meetings, They made it clear that they were building these organizations within the federal government, and if you built the 1st iteration, we could secure a job for you, end quote. Terp's plan which she shared in presentations to information security and cybersecurity groups in 2019 was to create misinfo set communities that would include government. Both public records and the whistleblower's documents suggest that the are, or achieved that they achieve that she achieved this in April of 2020. Chris Krebs, then director of CISA, announced on Twitter and in multiple articles That CISA was partnering with CTIL. It's really an information exchange, said Krebs. The documents also show that Terp And her colleagues, through a group called MisinfoSec Working Group, which included Derista, created a censorship influence and anti Disinformation strategy called adversarial misinformation and influence tactics and techniques, aim it. They wrote, aim it by adopting a cybersecurity framework developed by MITRE, m I t r e, A major defense and intelligence contractor that has an annual budget of 1 to 2,000,000,000 in government funding. Terp later used AMIT to develop the end disarm framework, which the World Health Organization then employed in countering nation campaigns across Europe. A key component of Terp's work through CTIL, MisinfoSec, and AMIT was to insert the concept of cognitive security, into the fields of cybersecurity and information security. The sum total of the documents is a clear picture of a highly coordinated and sophisticated effort by the United States And the UK government's to build a domestic censorship effort and influence operations similar to the ones that they have used in foreign countries. At one point, Earp openly referenced her work in the background on social media issues related to the Arab Spring. Another time, the whistleblower said she expressed her own apparent surprise that she would ever use such tactics developed for foreign nationals against American citizens. Speaker 0: Let's read that again. Shady group. Okay. Let's read that again. She expressed her own apparent surprise that she would ever use such tactics developed for foreign nationals against American citizens. Wow. Shady, according to the whistleblower, roughly 12 to 20 active people involved in CTIL worked at the FBI or CISA. Quote, for a while, they had their agency sealed. FBI CISA whatever. Next to your name. On the Slack messaging service, she said the whistleblower, Terp, had a CISA badge that went away at some point, the whistleblower said. Ambitions of the 2020 pioneers of the censorship industrial complex went far beyond simply urging Twitter to slap a warning label on tweets or to put individuals on blacklists. The, by the way, VC says, Emit. That's what I use for a baseball. VC, it's $17 rumble rent. Thank you so much. That's a myth. The innate framework calls for discrediting individuals as necessary prerequisite of demanding censorship against them. Wow. Shady. Isn't this what they do to us? Speaker 1: It's exactly what they're doing to us. Speaker 0: It calls for Jan Helper and influencers to spread messages. Wait, sorry. It it calls for training influencers to spread messages. And it calls for trying to get banks to cut off financial services to individuals who organize rallies or events. The timeline of CISA's work with CTIL leading up to its work with EIP and VP strongly suggest that the model for public private censorship operations have originated from a framework originally created by military contractors. What's more, the technique and materials outlining by CTIL closely resemble materials later created by CISA's countering foreign intelligence task force and mis dis information team. Over the next several days weeks, we intend to present these documents to congressional investigators and we'll make public all the documents we can while also protecting the identity of the whistleblower and other individuals who are not senior leaders to the public figures. But for now, we need to take a closer look at what happened in 2018 and 2019 leading up to the creation of CTIL, as well as this group's key role in the formation and growth of the Censorship Industrial Complex. Shady Grove, that was a a pretty Big first tweet, guys. So, you know, wow

@RebelValkyrie17 - ©.

2/ https://x.com/RebelValkyrie17/status/1732797624762126662?s=20

@RebelValkyrie17 - ©.

Censorship Industrial Complex. Introduction to the framework. AMITT (Adversarial Misinformation Influence Tactics and Techniques) The structure for how they are censoring the truth movement on social media. Narrative control on BOTH SIDES. CTIL Files; Clip 2 of the reading of CTIL files by @shadygrooove @intheMatrixxx

Video Transcript AI Summary
The video discusses the CTI League, a group of volunteer cybersecurity experts, and their efforts to combat cybercrime and misinformation. The leaders of the CTI League aimed to build support for censorship and government involvement in cybersecurity. They promoted the concept of cognitive security and advocated for government censorship and counter-misinformation. The leaders had military backgrounds and sought to bring military tactics to social media platforms. They believed that misinformation could be treated as a cybersecurity problem. The report they published called for government, military, and intelligence involvement in censorship. They also suggested using information sharing and analysis centers to promote confidence in government. The leaders viewed disinformation as a political tool to change belief sets and internal narratives. They compared their proposed censorship model to that of the Chinese government.
Full Transcript
Speaker 0: Shady Groove. So this is volunteer and former government agencies. This is the the document. This is the dimensions the dimensions of the information environment. Physical dimension, where the information environment overlaps with the physical world. Information systems and networks. Key characteristics, computers and communication systems and supporting infrastructures. Informational dimension, where information is collected, processed, stored, disseminated, displayed and protected. Dual nature information itself and the medium links, physical and cognitive dimensions, key characteristics, information content flow, information quality, and where automated decision making takes place. Cognitive dimension, where human decision making may takes place. Dimensions of intangibles such as morals, unit cohesion, public opinion, situational awareness, key characteristics, perceptions, emotions, awareness, and understanding. Wow, Shady. Speaker 1: Yeah. All of it. Bloomberg, Washington Post, and others published credulous stories In the spring of 2020 claiming that CTI League was simply a group of volunteer cybersecurity experts, its founders were quote a former Israeli intelligence official, Ohad Zdenberg, a Microsoft security manager, Nate Warfield, and the head of SecOps For DEFCON, a hacker's convention, Mark Rogers, the article claimed that the highly skilled cybercrime professionals had decided to help $1,000,000,000 hospitals on their own and without pay for strictly altruistic motives. In just 1 month from mid March to mid April, the supposedly all volunteer CTIL had grown to 1400 vetted members in 76 countries spanning 45 different sectors. That's 1400 members in 76 countries spanning 45 different sectors had helped to lawfully take down 2833 cyber criminal assets on the Internet including 17 designed to impersonate government organizations, United Nations and the WHO and had identified more than 2,000 vulnerabilities in healthcare institutions in more than 80 countries. At every opportunity the men stressed that they were simply volunteers motivated by altruism. I knew I had to do something to help quote unquote said Zdenberg, there's a really strong appetite for doing good in the community, Rogers said during an Aspen Institute webinar. Speaker 0: Oh, as an institute. Yeah. We know what that is, Shadi Group. It's an Arabella partner right there. Keep going. Speaker 1: Sure is. And yet a clear goal of CTIL's leaders was to build support for censorship among national security and cybersecurity institutions. Toward that end, they sought to promote the idea of cognitive security as a rationale for government involvement in censorship activity. Quote, Cognitive security is the thing you want to have, said Terp in 2019. You want to protect That cognitive layer it basically it's about pollution, misinformation, disinformation is a form of pollution across the internet. Terp and Pablo Breuer, I guess it was Breuer, Brower. Yeah. Another CTIO leader like, Zdenberg had backgrounds in the military and were former military contractors. Both have worked for SoF Works, A collaborative project of the US Special Forces Command and Doolittle Institute, the later or the yeah the ladder transfers Air Force technology through the Air Force Resource Lab to the private sector. According to Turt's bio in the website of consulting Speaker 0: Go ahead if you finish and I'll take off after this one. Go ahead. Speaker 1: All right. According to Terp's bio on the website of a consulting firm she created with Brewer, she's taught data Science at Columbia University was CTO of the UN's Big Data Team, designed machine learning algorithms and unmanned vehicle systems at the UK Ministry of Defense. Speaker 0: Brewer is a former US Navy commander according to his bio. He was Military director of US Special Ops Command Donovan Group and senior military advisor and innovation officer to Softworks, the National Security Agency, the US Cyber Command, as well as being the director of C4 at US Naval Forces Central Command. Brewer is listed as having being Navy, been in the Navy during the creation of CTIL on his LinkedIn page. In June 2018, Terp attended a 10 day military exercise organized by the US Special Operations Command, where she says she first met Brewer and discussed modern disinformation campaigns on social media. Wired summed up the conclusions they drew from their meeting. Misinformation, they realized, could be treated the same way as cybersecurity problem. And so they created COGSEC, COGSCC, with David Perlman and other colleague Thadeus Groog Q. Thank you. At the lead in 2019, Terp co chaired the 'Miss Infosec' working group within COGSEC. Brewer admitted in a podcast that his aim was to bring military tactics to use on social media platforms in the US. I wear 2 hats he explained. The military director of the Donovan Group and one of 2 innovation officers at Softworks, which is completely unclassified 501c3 nonprofit that is funded by US Special Operations Command. This is the, planning, Emit Blue countermeasure framework. If you take a look at this, it just goes through planning, preparation, execution, and evaluation, guys. It's how they actually, this is their stack, their the way that they, you know, operate guys. So Brewer went on to describe how they, how through how they thought they were getting around the First Amendment. He worked with Terp. He explained that There was a way to get non traditional partners into 1 room including maybe somebody from 1 of the social media companies, maybe a few special force operators, and some folks from Department of Homeland Security to talk in a non attribution, open environment in an unclassified way so we can collaborate better, more freely, and really start to change the way that we addressed some of these issues. Wow. The MisinfoSec report advocate for sweeping government censorship and counter misinformation during the 1st 6 months of 2019. The authors say that they analyzed quote, incidents, developed a reporting system, and shared their censorship vision with numerous State Treaty and Arabel Advisors type companies aka NGOs, non government organizations. In every incident mentioned, the victims of misinformation were on the political left and they included Barack Obama, John Podesta, Hillary Clinton and Emmanuel Macron. The report was open about the fact that its motivation for counter misinformation were the twin political earthquakes of 2016, Brexit and the election of Donald J. Trump. Quote. A study of the antecedents the to these events lead to us to the realization that there's something off kilter with our information landscape, wrote Terp and her co authors. The usual useful idiots, and 5th columnness, shady group. 5th column. Speaker 1: It's Kubos. There it is. Yes, it is. Speaker 0: Now augmented by automated bots, cyborgs, and human trolls are busy engineering public opinion, stoking up our outrage, sowing doubt and chipping away at the trust of in our institutions. And now, it's our brains that are being hacked. Wow. That sounds a lot like somebody we know. Help her. Not helping. The MissInfoSec report focused on information that changes beliefs through narratives and rep take it remember Shady, what have we been saying? Take your head out of the deep dream and say, loud. Right? Speaker 1: Get your head out of the narrative and start looking around and saying Out loud what it is that you're being told on the Internet. Speaker 0: Yeah. So and rec okay. So the Miss Infosec report focused on information that challenges beliefs through narratives and recommended a way to counter misinformation by attacking specific links in a kill chain or influence chain from the misinfo incident before it becomes a full bull narrative. The report Speaker 1: Kill Chain was in the Qpos 2. Speaker 0: Yep. For the for the yeah. The report laments that government and corporate media no longer have full control full of information quote. For a long time, the ability to reach mass audiences belong to the nation state e g the USA via broadcast licensing through ABC, CBS and NBC. Now, however, control of information instruments have been allowed to develop to large technology companies who have been fully complacent and complicit in facilitating access to the public for information operators at a fraction of what it would have cost them by other means. The authors advocate for police, military and intelligence involvement in censorship across Five Eyes Nations and even suggested that INTERPOL should be involved. The report proposed a plan for AMITT, a m I t t, and for security, intelligence and law enforcement collaboration and argued for immediate implementation. Quote, we do not need nor can we afford to wait 27 years for the AMIT at and that's the adversarial and adversarial misinformation and influence tactics and techniques framework to go into use. So here it is. This is it right here. The attacker. Campaigns, incidents, narratives, artifacts, the defenders. Okay? The authors called for placing censorship efforts inside of cybersecurity Even while acknowledging that misinformation security is utterly different from cybersecurity, they wrote the 3rd pillar of the information environment. After physical and cybersecurity should be the cognitive dimension, Shady. Speaker 1: The report flagged the need for kind of a prebunking to preemptively inoculate a vulnerable population against messaging. Oh, be it not. The report also pointed to the opportunity to use the to use the DHS funded information sharing and analysis centers, the ISACs, in the homes were orchestrating public private censorship and argued that these ISACs should be used to promote confidence in government. It is here, the ministry, you will look it is here that we see the idea for the EIP and the VP while social media is not identified as a critical sector and therefore doesn't qualify for an ISAC. A misinformation ISAC could and should feed indications and warnings into IACs. What a sentence that was. Terp's view of disinformation was overtly political. Most misinformation is actually true, noted Terp in the 2019 podcast. Most misinformation is actually true. Speaker 0: Read that again. Do it again. Speaker 1: I just I just did. Terp's view of this information was overtly political, Quote, most information is actually true, noted Terp in the 2019 podcast, quote, but set in the wrong context. Oh, it's true, but it's got bad context, Jeff. You know what I'm saying? That's what, that that Halper has that that that, Particular argument doesn't she? Terp is an eloquent explainer of the strategy of using anti disinformation efforts to conduct influence operations. You are not trying to get people to believe lies most of the time. Most of the time, you're just trying to change their belief sets. And in fact, really, deeper than that, you're trying to change to shift your internal narratives, the set of stories that are your baseline for your culture so that might be the baseline for your culture as an American. Wow. Speaker 0: Wow. Speaker 1: Wow. In the fall, Terp and others sought to promote their report. The podcast Terp did with the with, Brewer in 2019 was one example of their effort together. Perp and Brewer described the public and private model of censorship laundering that DHS, EIP and VP would go on to embrace. Brewer spoke freely and openly stating that the information and narrative control he had in mind was comparable to that implemented by the Chinese government only made more palatable for Americans if you talk to the average Chinese citizen. They absolutely believe that the great firewall of China is not there for censorship. They believe it's there because the Chinese Communist Party wants to protect the citizenry and they absolutely believe that that is a good thing. If the US government tried to sell that narrative, we would absolutely lose our minds and say, no, no, no. This is a violation of our first amendment rights. So the in group and out group messaging have to be often different. Speaker 0: Wow. Now pause there for a second, shady group, because I'm gonna play something.

@RebelValkyrie17 - ©.

2B/ https://t.co/YliVobBupQ

Video Transcript AI Summary
We are concerned about three podcasters: Shady Groove in the Matrix, the Authority, and an instigator referred to the FBI. We advise against sharing their posts due to potential backlash. We suspect they are paid and are investigating their sources of funding and personal lives. We need to stop this and restore unity. This situation exemplifies how we are targeted for discussing the truth and making connections between people, families, and contracts. Being labeled conspiracy theorists is a result of these connections. We find ourselves in the same situation once again.
Full Transcript
Speaker 0: Right now, we are really concerned about 3 particular podcasters sites, Shady Groove in the Matrix and the Authority. Can you believe that arrogance? The authority queue is what they call themselves. And and right now, we have also identified one really, really bad instigator that my colleagues referred to the FBI. Now I would encourage anyone who follows these investigators because they are really under investigation that you don't want to be forwarding on their posts. You don't want to be connected to them because you don't know how bad I don't know how bad the backlash would be if something is found out. We know. We suspect they're paid. We're tracing who pays them. We're tracing things about their lives. And, this has to stop. And so I ask everyone to please help bring the unity back. Speaker 1: I mean, that sounds like textbook what we're talking about right now, shady group. I think that that sets a better example than anything else that we could show you right there Of exactly how the show has been targeted, exactly why we are being targeted. We've talked about the idea that they do not attack b s, they only attack the truth. And right here in this we are showing you exactly that. They're saying right there, it doesn't mean that the information isn't truthful. It's got bad context. It's not relevant. This is where you get into being called a conspiracy theorist, right? You're being called a conspiracy theorist because you make connections between people and Families and bloodlines and all of these deals and contracts and all this stuff. You make these connections. You're a conspiracy theorist because you think they're connected. I think we find ourselves in the same boat again.

@RebelValkyrie17 - ©.

2C/ https://x.com/RebelValkyrie17/status/1732800177646243975?s=20

@RebelValkyrie17 - ©.

News Unlocked: Fifth Column Kill_Chain https://t.co/TwAdLOZ7Es

@RebelValkyrie17 - ©.

3/ "Hogwarts School of Misinformation" -Scraping social media -Narratives/Counter narratives -Trolls for hire -"Repetition is truth" -Pseudonyms and secret identities -CISA; Countering Foreign Influence Taskforce -"DISARM" framework, inspired by AMITT -EIP -& more.

Video Transcript AI Summary
The speaker discusses the activities of a group called CTIL (Cyber Threat Intelligence League) and their efforts to combat misinformation and disinformation on social media platforms. The whistleblower reveals that CTIL used Python code to scrape records from Twitter and tracked incidents of disinformation. They also worked on counter messaging, encouraging mask-wearing, and building an amplification network. The speaker mentions that some CTIL members took extreme measures to conceal their identities. The group's activities received little attention until now, but Wired published an article about CTIL, highlighting their work against misinformation. The speaker concludes by mentioning the upcoming testimony to Congress and refers to Matt Taibbi's perspective on the matter.
Full Transcript
Speaker 0: So the next post, let's keep going because, I mean, she sounds like that she went to the Hogwarts School of misinformation. In fact, here it is right here. Poster a, no more lockdowns. Global March for Freedom. So, no more lockdowns. So they didn't like this, apparently. It's SJ called us the Hogwarts School for misinformation and disinformation, said the whistleblower. They were superheroes in their own story and that they affect the and the effect you could still find comic books on the Sissa site. CTI in fact, you could in fact, you can still find wow. The CTIO whistleblower said quote, needed programmers to pull apart information from Twitter, Facebook and YouTube. For Twitter, they created Python code to scrape the CTIL records, records private provided by whistleblower illustrate exactly how CTIL operated and tracked incidents as well as what it considered to be disinformation. About the we won't stay home narrative, CTIL member wrote, do we have enough to ask for groups and or accounts to be taken down or at a minimum reported and checked? And can we get all Can we get all troll on their bums if not? They tracked posters calling for anti lockdown protests and as disinformation artifacts. Quote, we should have seen this one coming. They wrote about the protests. Bottom line, can we stop the spread? Do we have enough evidence to stop super spreaders and are there other things that we can do? Are there countermeasures that we can ping, etcetera? CTIL also worked to brainstorm counter messaging for things like encouraging people to wear masks and discussed buildings and building an amplification network. Repetition is truth. Isn't that a Q post as well? A CTIL member once said in training, CTIL worked with other figures in groups in the censorship industrial complex. Meeting notes indicate that a Graphka's team looked into adopting AMIT and that c t I l wanted to consult derista about getting platforms to remove content more quickly. Whether when asked whether Terp or other CTIL leaders discussed Their potential violation of the First Amendment, the whistleblower said quote, they did not. They did not. The ethos was that if we get away with it, it's legal. And there were no first amendment concerns because we have a quote public private partnership. There's your military civil alliance shady grove. This is a future proof's path. This is a, News Unlocked map. This is it. That's the word they use to disguise those concerns. Private people can do things public servants can't do and public servants can provide the leadership and coordination. Despite their confidence in the legality of their activities, some CTIL members may have taken extreme measures to keep their identities a secret. The group's handbook recommends using burner phones created creating pseudo NIM identities and generating fake AI faces using the this person does not exist website. In June 2020, the whistleblower says the secretive group took actions to conceal their activities even more. 1 month later in July 2020, SIO's director Alex Stamos emailed Kate Starbird from the University of Washington's Center for an informed public writing quote, we are working on some election monitoring ideas with CISA and I would love to I would love your informal feedback before we go too far down this road. Things that should have been assembled a year ago are coming together quickly this week. That summer, CISA also created the Countering Foreign Intelligence Task Force, which has a measure, which measures that reflect CTIL emits methods and includes a real fake graphic novel the whistleblower said was the 1st pinch pinched within c CTIL. The disarm framework, which AMIT inspired, has been formally adopted by the European Union and the United States as part of a common standard for exchanging structured threat information on foreign information, manipulation and interference. Wow. Shady. Speaker 1: Starting to really open up now. People are starting to see this. And you're gonna have to to understand what's going on. Until now, the details of CTIL's activities has received little attention even though the group received Publicity in 2020. In September of 2020, Wired published an article about CTIL that reads like a company press release. Article like the Bloomberg and Washington Post stories that spring that that spring accepts unquestionable unquestioningly CTIO was truly a volunteer network of former intelligence officials from around the world. Very interesting they're using this volunteer thing to get around a number of issues here. But unlike the Bloomberg and Washington Post stories, Wired also described CTIL's anti in for misinformation work. The Wired reporter does not quote any critic of the CTIL activities, but suggests that some might see something wrong with them. Quote, I asked Kim CTIL co founder, Mark Rogers, about the notion of viewing misinformation as a cyber threat. All of these bad actors are trying to do the same thing, Rogers It says, in other words, the connection between preventing cyber crimes and fighting misinformation are basically the same because they both involve fighting what the DHS and CTI League alike call malicious actors, which is synonymous with the bad guys. Like Terp, Rogers takes a holistic approach to cybersecurity. The Wired article explains. 1st, there's physical security like stealing data from a computer into a USB drive. Then there's what we typically think of as cybersecurity securing networks and devices from unwanted intrusions. And finally, you have what Rogers and Terp call cognitive security, which essentially is hacking people using information or more often misinformation. CTIL appears to have generated public publicity about itself in the spring or in the fall of 2020 for the same reason e I VIP did to claim later that its work was all out in the open and that anybody who suggested it was secretive was engaging in a conspiracy theory. Just like we just said. The Election Integrity Partnership has always operated openly and transparently. EIP claimed in October of 22. We published of public blog posts, the run up to the 2020 election, posted daily webinars immediately before and after the election, and published our results in a 290 page final report and multiple peer reviewed academic journals. Any insinuation that information about our operations or findings were secret or, yeah. We're secret up to this point is disproven by the 2 years of free and public content that we have created. But as internal messages have revealed, much of what EIP did was secret, as well as partisan. And demanding of censorship by social media platforms contrary to the claims through the contrary. EIP and VP ostensibly ended, but CTIL is apparently still active today, and several of its members list CTIL as an organization that is still active on their LinkedIn pages. See here. Speaker 0: Wow, guys. This is this is crazy. And, you know, I look forward to providing testimony to Congress. So, basically, he, you know, wraps it up here, but we're gonna go over Matt Taibbi's, but

@RebelValkyrie17 - ©.

4/ @shadygrooove Shady-Monologue: "If you don't feel like you've been made a fool of, you are not paying attention." -Chris Krebs/Election Interference "They did not think you would be able to figure it out."

Video Transcript AI Summary
The speaker expresses their frustration and disbelief at the actions of certain individuals. They believe that these people underestimated the public's ability to uncover the truth and are acting in a corrupt manner. They mention a person named Krebs who claimed that the recent election was the most secure in history, questioning why he would make such a statement. They also compare this behavior to that of a government official named Valerie Jared who insisted that everything was done by the book during the Obama administration. The speaker concludes by expressing their astonishment at how people seem to be unaware of what corruption looks like in today's society.
Full Transcript
Speaker 0: You are not disgusted, if you are not eternally very upset, if you are not, really feeling like you have been made a fool of then you're kind of not paying attention right now because that's exactly what these people are doing. They didn't think that you would be able to figure this stuff out. They didn't think you'd be able to dig into it deep enough to understand what it was they were really doing. Right after the election, this Krebs guy comes out and screams and yells at everybody, This is the most secure election that we have ever had in the history of elections in America. Why was he doing that? Why would you do that? Why would you run out and say it? Isn't that much like, what's her name? Was it Valerie Jared that came out and sent the memo at the end of the Barack Obama administration to make sure that she said like 3 times that everything was done by the book. This is the way that corrupt government officials act. Everybody used to understand that. It seems like in today's day and age people are a little bit of mind controlled into not being able to understand what a corrupt government or a political official looks like. Wow. Unbelievable guys.

@RebelValkyrie17 - ©.

5/ CTIL Files CON'T. Sockpuppets, and spy tactics, and doxxing. OH MY!! [THEY] sell merch in order to obtain your private information.

Video Transcript AI Summary
The speaker discusses the use of sock puppets on Twitter and Facebook, as well as defensive and offensive tactics employed by anti-disinformation operatives. They mention techniques like doxxing and deception, and the use of merchandise sites to gather information. The speaker also talks about checking potentially malicious content sites, takedowns, and ensuring machine security.
Full Transcript
Speaker 0: So Shady, what we need now is sock puppets on Twitter and Facebook. While Twitter files confirmed the use of defensive tactics like censorship and de amplification, the CTI files show anti disinformation operatives planning to go on offense to disrupt speech using fake personas and spy tactics. What recipes do we need? Sock puppets on Twitter and Facebook, merchandise sites linked to accounts, ad and merch, getting to invite only a groups for things like Boogaloo. Active collection is fine, not CTI League offensive counterintelligence, just a few people. Techniques using doxxing and deception. All of these techniques have been used on me, shady group and you. Yep. Merchandise sites are linked to account, add merch to get their info. Checking out a potentially malicious content site like drop sites. Checking out the malicious content from that site, takedowns, are the are site admins friendly? Are take downs anonymous putting warnings out to activists and others? Building a pre built image? Maybe, Halley with a Splunk agent, maybe Loki. Ensuring machines are secure and not leaking data back to Russia. So

@RebelValkyrie17 - ©.

6/ 🕵️‍♂️CTIL "Spy Disguise" for "impact containment" -Security -Compartmentation -Persona

Video Transcript AI Summary
In this video, the speaker talks about the importance of security and the tools that can help in the process. They mention compartmentalization as a way to separate personal and work life. They also emphasize the use of a persona as a disguise for research purposes. The goal is to lock down information to contain any potential impact. If something goes wrong, only the persona would be compromised. Overall, the speaker finds this topic very interesting.
Full Transcript
Speaker 0: Continue. Your spy disguise, lock your groups like Boogaloo. Security, it's a process. Tools to help you execute the process. Compartmentization, separate your personal life from your work life. Persona. Persona. Your spy disguise for research. A fleshed out human being that has details. Step 0. Lock your shit down. Goal. Impact containment. If you use compartmental compartmentation and a persona and everything goes wrong, all that gets compromised is the persona. This is very interesting guys.

@RebelValkyrie17 - ©.

7/ "BURNER PHONES" 📲 CTIL's "Big Book of Disinformation Response" PLAYBOOK?

Video Transcript AI Summary
The speaker discusses the use of burner phones and emails for disinformation response. They mention a book that provides instructions on using burner phones and emails, as well as creating pseudonyms and identities. The speaker suggests using services like Sudo for creating pseudonyms and associated email, phone, text, web browsing, and payment accounts. They also mention the option of using disposable temporary email addresses for anonymity. Various options for burner phones are mentioned, including Tracfone. The speaker briefly mentions their experience selling Obamaphones.
Full Transcript
Speaker 0: Burner phones. The CTI League members were handed a big book of disinformation response that offered instruction in the use of burner phones and emails. Wow. The big book of disinformation, Shady. Disinformation response. Wow. Pseudonym identification, identities, burner email and phone numbers. In fact, Alex's brother got, texted by a burner phone email. It's all being it's all here guys. In the process of doing investigations, you will likely find yourself in a position where you want to create burner accounts that allow you to create pseudonyms and persona. When possible, I create a full identity with name, email address, VoIP phone and a text as well. Pseudo, in terms of easy for pseudonyms identity, I've found that sudo is a great, Easy to use option. It's a paid service, so that it can be, you can be a barrier, but it allows you to create a persona and associate and isolate email, phone calls, text, web browsing, and payment for each persona. Burner emails. Depending on your needs, you may wanna wish you wish to create anonymous pseudonym emails. These are disposable temporary email addresses that you can use. Many of these will get flagged by social media services as suspicious, so it's good to know, but different options. 33 email, ProtonMail, Gmail. Look at that. Google Voice, paid VoIP, burner, hushed, and cover me, burner phones, lots of different options including Trac Phone Tracfone is Mexico Telecom, which is the Obama phone guys. That way you can get a cheap phone and swap the suit when you need. I used I I sold the I sold $1,000,000 of dollars to Obamaphone. Crazy.
Saved - October 24, 2023 at 6:16 PM
reSee.it AI Summary
Critical thinking is the active and objective analysis of information, concepts, situations, or problems. It involves evaluating evidence, arguments, and assumptions, while considering alternative perspectives. Critical thinkers are open-minded, inquisitive, and willing to question their own beliefs. They use reasoning and logic to make informed decisions, solve problems, and form well-considered judgments. This skill is crucial for understanding complex issues and navigating everyday challenges.

@RebelValkyrie17 - ©.

🧵Critical Thinking & Logic🧵 1./ Critical Thinking: the process of actively and objectively analyzing information, concepts, situations, or problems in a systematic and disciplined way. It involves evaluating evidence, arguments, and assumptions, and considering alternative perspectives or solutions. Critical thinkers are open-minded, inquisitive, and willing to question their own beliefs and biases. They use reasoning and logic to make informed and thoughtful decisions, solve problems, and form well-considered judgments. Critical thinking is an essential skill for making sound choices, understanding complex issues, and effectively navigating the challenges of everyday life.

View Full Interactive Feed