Close Menu
USAHITMAN Conspiracy News
    Facebook X (Twitter) Instagram
    USAHITMAN Conspiracy NewsUSAHITMAN Conspiracy News
    • Home
    • Featured News
      Featured

      Prince Warned Of 9/11 Attacks In 1998

      9/11 May 7, 2016
      Recent

      Hunter Biden filmed himself smoking crack behind the wheel, driving at 172mph on way to Vegas: photos

      July 2, 2023

      King Charles, Bill Gates Foundation and The OceanGate Missing Submarine – How its connected

      June 22, 2023

      Why Is WEF & Bill Gates-Funded APEEL ON Organic Produce?

      June 18, 2023
    • Conspiracy News
      1. 911 Conspiracy
      2. Big Brother
      3. Police State
      4. NWO
      5. UFOs & ETs
      6. Conspiracy or Not
      7. Freemasonry
      8. Chemtrails
      9. HAARP News
      10. The Unknown
      11. Terrorism
      12. Lies & Hoaxes
      Featured

      Candidate Le Pen’s Political Ad Regarding France from the Year 2011

      Conspiracy or Not July 3, 2023
      Recent

      Candidate Le Pen’s Political Ad Regarding France from the Year 2011

      July 3, 2023

      Justice Department: Misconduct by federal jail guards led to Jeffrey Epstein’s suicide

      June 28, 2023

      The 4th Dimension and the Birth of the Jungle Gym

      June 27, 2023
    • Interesting News
      1. Covid
      2. Deaths
      3. Food & Health News
      4. Economy & Money
      5. Restrictions
      6. Bitcoin News
      7. Our Second Amendment
      8. Science & Space
      9. Much More News
      Featured

      U.S. Navy says it can convert seawater into fuel

      Interesting News April 8, 2014
      Recent

      George Soros’ foundation lays off 40% of workforce after billionaire investor’s son takes over

      July 1, 2023

      Supreme Court rejects affirmative action at colleges as unconstitutional

      June 30, 2023

      Prosecutor Reportedly Told Six Witnesses He Was Not Permitted To Charge Hunter Biden

      June 28, 2023
    • Archived Years
      • 2010 Articles
      • 2011 Articles
      • 2012 Articles
    USAHITMAN Conspiracy News
    Home»Interesting News»CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information

    CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information

    December 2, 20127 Mins Read
    Facebook Twitter Reddit Telegram Email

    Susanne Posel
    Occupy Corporatism

    In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.

    David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”

    Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.

    In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA’s Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range. This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data. They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.

    The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore.

    Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:

    • Finances
    • Stock transactions
    • Business deals
    • Foreign military
    • Diplomatic secrets
    • Legal documents
    • Personal civilian communications

    This information could be used at Fusion Centers for the DHS to create a more efficient profile on each and every American citizen. The implications are staggering. This ability to collect these types of data are a violation of the 4th Amendment guard against unreasonable searches and seizures. By collecting intelligence on every American citizen, the US government is treating everyone as if they were a potential foreign or domestic terrorist. Whether this assumption is valid or not, under the US constitution, Americans are supposed to be protected from intrusion of government; even if that government is their own.

    At the same time the NSA spy center was being constructed, Attorney General Eric Holder new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.

    The Obama administration empowered the NCTC with the authority afforded Obama under Presidential Executive Order 13354. This EO was codified by the Intelligence Reform and Terrorism Prevention Act of 2004. The NCTC reports directly to the President and director of National Intelligence as instructed by the President and Department of Homeland Security (DHS). Sen. John McCain was integral in the creation of this combination of military strength and governmental power culminating in all-encompassing tyranny.

    Both private and public corporations will be employed to mine the data. Silicon Valley and other technology giants in the private sector will have open access to private information on any and all American citizens.

    Since the manufactured attack on 9/11, the US government has created a “vast domestic intelligence apparatus” that spies on Americans and collects massive amounts of data to be profiled and used at the discretion of the Federal Bureau of Investigations (FBI), local law enforcement, DHS and military criminal investigators. The FBI and NSA house more than 1.5 billion government and private sector profiles. The information on average citizens includes all sources of criminal and non-criminal databases that assist the US government in creating a filing system on each American.

    The NSA has a comprehensive program to search out our schools into scouting grounds for a team of American grown hacker community. The Obama administration has made it a concern of theirs that the future of cybersecurity rest with the college graduates of tomorrow. The NSA is focusing on colleges and universities within the US. Four schools have already been singled out as official Centers of Academic Excellence in Cyber Operations (CAE-COP).

    The CAE-COP focuses on recruiting persons with “particular emphasis on technologies and techniques related to specialized cyber operations (e.g., collection, exploitation, and response), to enhance the national security posture of our Nation.”

    Those chosen for this program become vital researchers expected to assist the NSA in:

    • Global communications and computing networks
    • Developing a digital strategic advantage
    • Collaboration with the US government on cyber issues
    • Carry out directives on designated targets at the discretion of the US government

    These “cyber operators” are trained to become an elite team of “computer geniuses” that are experts in computer hacking, digital communications, cyber intelligence – for the purpose of spying on Americans; as well as conducting interactive digital psy-ops with users of the internet.

    Earlier this month, Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the National Initiative for Cybersecurity Education (NICE).

    NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.

    Beginning in kindergarten, Napolitano hopes that the DHS-sponsored US Cyber Challenge will provide schools, universities and all forms of academia in the private sector the federal government-allocated tools they would need to “develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.”

    In 2011, the NICE report entitled, “Shaping the Future of Cybersecurity Education”, explored intercepting children in the public education system, as well as continuing the focus throughout their educational career, there can be a national recruitment and retention process that produces “skilled workers for the private sector and government.”

    Napolitano’s Secretary’s Honors Program for Cybersecurity Professionals is meant to recruit college students for the purpose of assimilating their talents into the federal government for “missions including cyber” security as defined by the DHS Advisory Council Task Force on CyberSkills. This focus is to ensemble the most effectual cybersecurity team comprised of civilians, US veterans and those educated specifically in the field of IT technologies. For the sake of national security, DHS is selecting the most technically skilled citizens in the avenues of malware and digital forensic analysis, to participate in the Cybersecurity Internship Program for a 2 year internship that will result in a devotional career in the federal government and service to Big Sis.

    Read More Here

    CIA Discredit Disinfo Factual Information Trolls
    Share. Facebook Twitter Pinterest Email Reddit

    Related Posts

    George Soros’ foundation lays off 40% of workforce after billionaire investor’s son takes over

    July 1, 2023

    Supreme Court rejects affirmative action at colleges as unconstitutional

    June 30, 2023

    Prosecutor Reportedly Told Six Witnesses He Was Not Permitted To Charge Hunter Biden

    June 28, 2023

    Candidate Le Pen’s Political Ad Regarding France from the Year 2011

    July 3, 2023

    Vaccine billionaire’s 3000 per cent gain with surprise bet

    July 3, 2023

    Hunter Biden filmed himself smoking crack behind the wheel, driving at 172mph on way to Vegas: photos

    July 2, 2023

    Millions of Your Taxpayer Dollars Are Going to Fund Foreign Pride Parades and Drag Shows

    July 2, 2023
    Categories
    • 9/11 (108)
    • Big Brother (635)
    • Conspiracy or Not (567)
    • Covid (270)
    • Deaths (71)
    • Economy & Money (953)
    • Featured News (377)
    • Food & Health News (1,146)
    • Fukushima (82)
    • Interesting News (1,956)
    • Lies & Hoaxes (112)
    • More News (2,399)
    • NWO (385)
    • Police State (628)
    • Politics (333)
    • Predictions and Prophecies (43)
    • Random News (2,487)
    • Restrictions (152)
    • Science & Space (953)
    • Second Amendment (129)
    • Secret Societies (112)
    • Survival (67)
    • Terrorism (595)
    • The Unknown (666)
    • UFOs & ETs (388)
    • Vaccine News (237)
    • War News (878)
    • Weather Manipulation (34)
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.