- The CIA, MI5/6, Mossad … are western Illuminist intelligence agencies. This is not to say that everyone working in them are Satanists. The top echelons are Illuminists-Satanists. Their agenda is the coming Luciferian New World Order –> ‘666’. The people in the lower rungs do not really understand what is going on.
CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information!
by Susanne Posel, Occupy Corporatism
In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.
David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”
Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.
In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA’s Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range. This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data. They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.
The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore. Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:
• Stock transactions
• Business deals
• Foreign military
• Diplomatic secrets
• Legal documents
• Personal civilian communications