Every Breath you Take, Every Move you Make…

 

every breath1

 By TLB contributor: Bruce Robinson

 

Every bond you break
Every step you take
I’ll be watching you…

Long before the Internet, television programming, commercials, nightly news, newspapers, magazines and media of all sorts, contributed in some way in unwittingly forcing the ideals of others upon us, the news kept us all in sync. We all knew what to talk about. Our newspapers and television news channels provided us with all the conviction we needed for our thoughts and all of the determination required for our actions. It gave us small talk in the elevator and an easy way to end the awkward silence at the water cooler.

Other topics or issues were cussed about and kicked around on the factory floor; the same ones could be heard over and over down at the local tavern, just slightly louder. What we heard or read, for the most part, was skewed in the direction of someone else’s way of thinking and thought we should believe the same. No one can sit mid fence all the time. Opinions can be made to sound like facts and that’s not so deceptive, is it? What when thrown in with a lot of other known facts, some opinions are easy to accept as truth, especially when all the uncontested statements are all dressed up, conveniently packaged, and ready for us to take on… as our own. Our very own customized opinion.

every breath10

With other forms of persuasion, such as mainlining subliminal messages directly into the base of our brains, we took it like junkies because we realized that a commercial about laundry detergent or a magazine add for a car was to influence us to go out and spend. Airtime or print space, we knew it was purchased by the maker of the product and they were diligent about us wanting to have it. Their intent was up front. We knew they were tickling our pocketbook with awareness to their products or services.

That forthright practice continues to this day and with all of the transparency we have always come to expect . Some are clever, some are straight forward but there is little doubt they are directed at our wallet by tempting us through accessing our secret desires with the highest standard of all – Sex sells!

Whether for convenience or glamour, prestige or utility, we regard it as American as apple pie. We certainly are not prepared, in their absence, to spend our hard earned money on things we really don’t want, or don’t really need, unless we are told to, shown where, and the fastest route to pay for it.

It was only an amount of time before those who once guided our thoughts and our dollars realized they had competition. Information could be easily gleaned with a keyboard and a phone connection was outside the confines of their creepy, sticky little grasp. The Internet was here and we were independent! Free at last! We decided on a whim and for ourselves and only for ourselves what news interested us or whether we wanted to wander aimlessly through the vast jungle of websites and nudity. We sought out what interested us most and we had the ability to research to our satisfaction whether 4 out of 5 dentists actually recommend Crest Toothpaste, or whether 9 out of 10 doctors really did prefer Tylenol over Aspirin. The age of discovery was upon us. We were pioneers on whichever frontier we chose. Nightly news and their-ever-so convenient scheduling was our prerogative. The morning paper delivering us a big heaping spoonful of group-think du jour was simply an option.

Little did we know as we danced in the ad-free moonlight that the corporate bloodsuckers had our throats in sight. We never dreamed the Three Stooges of network television would be lurking around the corner, wondering where we went and pissed about their ratings. Realizing they needed to pick up their step, a whole new breed of control was hatched, completely invisible and ready to infiltrate you mind.

For too long, one particular angle of the powers- that-be have gone unexposed. True to form, drip by drip they infiltrate everything about us. It is so gradual we don’t even notice it. Why deviate from a strategy that has worked so well for decades? So with nets in hand and a rusty hook, they chum the waters with just the right amount of common sense, patriotism, and decency.

Advertising was left in the open but a vile beast was on its way, an unholy spawn, one born of parents with acronyms for names and with deep dark secrets and we became its prey.

every breath8

Every single day
Every word you say
Every game you play
Every night you stay

I’ll be watching you. Whether you call it the Police State, New World Order or just plain old-fashioned Political Corruption, it has a hunger for knowledge. Not of foreign nations, not for military espionage, and not even for the boogieman who goes by the war-worthy name of “The Terrorist” It wants us. Many ruses are created for our viewing pleasure and deliberately put out there for us on television to assure we drop our jaw in amazement. Of course, this is followed shortly by our Government’s heroic, overly publicized, all-too-rehearsed response and conclusion – one so massive in its attack that it instantly becomes indelibly etched in our trusting little minds.

But let’s look at the ones who have had immunity for way too long, the ones that appear the most benign but may have the darkest agenda of all. To avoid any words that might dignify it, I’ll just call it the Shit List. You know, the ones we are all afraid of.

Every piece of our digital life is kept in a neat little file but its accumulation  certainly has to reduce down to something meaningful, doesn’t it? What would be the purpose of NSA’s collection of our Twitter tweets and our Facebook Likes if not to compile a list of who’s gonna be trouble and who is not. With the zillions of DHS initiatives, hollow point bullets and all, TSA, militarization of our local police forces, surveillance on nearly every corner, let’s not forget the backfiring suggestion that, “If I see something then I need to say something.”

That’s just what I’m about to do. Someone is making a list and it sure isn’t for Santa! If given ten things that would be helpful to a government under siege, the one most necessary would certainly be a list of dissenters. There, I said it. You know, your basic patriot, veteran, Christian, prepper, activist…anything capable of making a noise really. If you are, if you have, if you do, if you want to, well, you can bet you are on it. I sure the hell better be or some troll or shill is not doing their job.

Social Media provides the perfect hunting grounds for those “freaking liberty lovers.” A continual stream of degradations and provocations against the average American, provoking many in a never-ending stream to resist and placing them all in a great big box in Bluffdale Utah, labeled: DISSENTERS. Once they have been labeled as such, they are put on a Department of Homeland Security (DHS) Main Core Terror Watch List, which top insiders know is a targeted list of all Freedom-loving Americans who want to restore the AmericanConstitutionalRepublic.

every breath5

When NSA routinely scans every pixel of your digital emissions, and they have picked up enough key trigger words, then you can bet you will eventually end up there. Great company, poor accommodations.

In the annals of Internet conspiracy theories, none is more pervasive than the one speculating that paid government plants infiltrate websites, social network sites, and comment sections with an intent to sow discord, troll, and generally manipulate, deceive and destroy reputations and get your name on the prize list. Guess what: it is all true.

GCHQ’s (Britain’s dirty equivalent of the TSA) previously secret unit, now JTRIG (Joint Threat Research Intelligence Group) the NSA and three other English speaking partners have a sweet little club called “FIVE EYES ALLIANCE.” Glenn Greenwald at The Intercept wrote a piece just recently called “How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations.” He, in association with NBC News, wrote a series of articles about “dirty trick” tactics used by GCHQ. These were based on four classified documents presented to the NSA. In  another new JTRIG , Greenwald writes: “By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS (distributed denial of service) attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses.

But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the Internet itself.

Among the core, self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the Internet in order to destroy the reputation of its targets and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the Internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing to Greenwald’s complete story and supporting documents can be found at: http://www.birtherreport.com/2014/02/doc-dump-conspiracy-theory-is-true.html

Next time you see a seemingly worthy petition fly across your screen, you might think twice. I need to point out that there are some very legitimate petitions and for very legitimate reasons. It’s going to be your job to decide if you are signing a petition or are volunteering your name as a potential trouble maker. Can you think of a better way of gathering names of potential dissenters? No human has the right to read other’s emails, snoop through your social media messages or posts. No computer needs to single out trigger words and no one needs to know how to alphabetize your name on that Shit List.

It’s more complete than a Betty Crocker Cookbook. Score enough points here and there and you can bet your texts to your mother will be intercepted and read in real-time before she has a chance to find her glasses. A few hints to help you decide are listed below.

This new re-definition of normal law-abiding Americans into “Enemies of the State” and a threat to national security along with its internal security apparatus is a magical conversion or transformation of normal American Society, mainstream law abiding America, into a huge domestic national security market. Agent provocateur’s everywhere you go.

Every single day
Every word you say
Every game you play
Every night you stay
I’ll be watching you…

Might not have to even look further than your own friend list. That’s a pleasant thought. There are even government sponsored contests for the best “screw your fellow man” (In the name of public safety of course) http://www.iarpa.gov/ This process of transforming honest law abiding Citizens into “Enemies of the State” is based on categorizing or re-labeling these folks as deviant criminals or “soon-to-be criminals”. This is an occult, “alchemical” and symbolic processing of the American people (aka “we the people”) into a defined domestic enemy that the USG, DHS, and the Alphabets feels justified in targeting, spying on and waging war against on many fronts–phone and email tapping, massive spying and infiltration of all domestic groupings, even neighborhood coffee parties or local church charities–you name it, everything.

The Department of Homeland Security, run by perverts and enemies of “we the people,” are the real risk to the true and actual national security of America the republic and to all honest, law abiding, Constitutional Americans. DHS is nothing less than world class criminals committing both High Treason and Sedition against America the Republic.

Here are a few signs that should help you see when anything published online  might have artificial elements:

  • Any petition, or blog, or “share if you agree” or begs for “Likes” should be given a firm TSA grope and pat-down.
  • If something has a comment section, take a good look. Does it seem like its scripted or conversations in favor or against a particular cause or want?
  • When one Social Media transects the others, at least with respect to a commenter’s name and profile, check a few of them out. It shouldn’t take too many before you can determine if it’s a scripted page with false identities trying to suck you in.
  • Beware of interconnected faking. At one time it was probably reasonable to think that if someone had a group of friends interacting with them and vouching for each other, that that person must be real. Not anymore! There are increasing cases of one person running numerous fake accounts, pretending to be an array of different people, all vouching for one another and all trying to be friends with someone real! Look for photos in the profile. If there is only one photo of the individual in the whole profile, it makes it quite clear that the account is fake.
  • Look for status updates, wall posts and comments. If the user hasn’t updated a status for quite a long time and hasn’t been involved in any wall posting or commenting of other statuses, it means that the profile is likely to be fake.
  • Look at the recent activities. If it seems that the user has just been adding randomers and making new friends, and that there are no pages liked or groups joined, it suggests that the user is determined to just add people and hence the profile is fake.
  • Check the info. If found that there is no ideal links given regarding school or education institutions or workplace and that the user is looking for dating and interested in both men and women, it shows signs of being fake.
  •  Check the birth date. Birth dates like 1/1/XX…..or……31/12/XX are common between fake accounts as it is quite unique and easy to type in.
  • Look out for recent wall posts, if you see loads of people asking …’THANKS FOR THE ADD….DO I KNOW YOU?’……and yet the posts remain unanswered…it is bound to be a fake one. Pay particularly close attention to the sincerity and conviction of their posts if many of them are mostly anti-government; or random complaint issues. If it looks like they are having a bit of a bitch party on their page by themselves – fake.

Trust is a holographic term these days; trust your instincts and intuition. They are your best defense and more reliable than someone you have never met in person. Stay in the game. You can sign up right here. They are not winning!

Doc Dump: The Conspiracy Theory Is True; Agents Infiltrate Websites Intending To Deceive -… www.birtherreport.com http://www.birtherreport.com/2014/02/doc-dump-conspiracy-theory-is-true.html

http://www.birtherreport.com/2014/02/doc-dump-conspiracy-theory-is-true.html

Lyrics from “Every Breath You Take” by The Police

 

Be the first to comment

Leave a Reply

Your email address will not be published.


*