mRNA Vaccines that Breach the Nucleus and Change the Genome – What are the Chances?

Ask yourself a simple question. Why should the very first examples of mRNA vaccines for humans violate the most important safety standard of the mRNA platform? Why would the vaccines do exactly what they PROMISED US the vaccines would not do?


TL;DR –

They didn’t just lie to us about the spike mRNA not going into the nucleus and not changing human DNA – the whole purpose was very likely to do exactly what they did – to open the cell nucleus and keep it open, so that we as a species can start changing population genomics in a huge way, using a variety of technologies.


The central dogma of molecular biology. They shilled the blue arrows to the masses as lies about safety, while hiding the special red arrow and actually working to open it up for business.


Show-Time (Introduction)

I have finally realized that I need to spell out, in as many ways as needed, what is really going on with SARS-CoV-2 and these derived mRNA vaccines.

I had hoped that people would see the implications of the science which is now open to us, with the publication of first the Jaenish paper, then the De Marinis paper, and finally the Mehedi paper. I have commented extensively on each one of these papers, including very recently on the Mehedi paper, which really makes things obvious. I had thought that somebody more notable than me would try to make the point I am about to make. Sadly, nobody has, so it looks like I’m going to have to do it.

These vaccines are designed to BEGIN to change us on a fundamental level which is not exactly the same as the “transhumanism” that constitutes most of the “clickbait” against the vaccines. It’s similar, but it’s not the same. What we see in the clickbait is a distraction from the actual danger, which is not strange and distant and unbelievable, but is in fact right here, and right now, and very believable, once you understand it.

The truth is a lot more like GATTACA, and a lot less like Transcendence.

It’s already starting, and the infrastructure is being set up. The first step has actually been accomplished, and it was in many ways a HUGE success.

Humans ARE being engineered right in front of our eyes. I hope that you can see this point by the end of this article.

They (meaning WEF and its backers) hacked the human cell nucleus on a population genome level. They created a “Trojan” virus that appears to have “zero-dayed” the human cell nucleus. Artfully, the hack is a lot like state-level “APT” (advanced persistent threat) computer hacks, in that it gets in and holds the door open. Of course, better models can be created, but the self-replicating crowbar for the cell nucleus has obviously arrived, and its imperial version of SPQR is PRRARSV.

THAT is the fundamental advance that was achieved here.

I have to say, it was ingenious and “admirable”, in several senses – scientific, military, and criminal. Of course, your mileage may vary on “admirable”. Many will consider it “diabolical”.

What we are facing is the immediate REAL danger of biological engineering and eugenics, which was employed in a fantasy way, as a technical MacGuffin, in various episodes and productions in the Star Trek universe.

This is a scene from Star Trek II: The Wrath of Khan. These two people are “superhumans” who (according to the story) proved to be disastrous for Earth, during our current century (more or less). The one on the right is “Khan” – obviously in homage to Genghis Khan and his relatives, who ruled much of Asia for centuries.

Don’t get lost in the fantasy stuff. THAT is not the big danger. Stick around for an explanation of the reality which is actually upon us.

Here is how Wikipedia describes Khan, but more importantly, where he CAME FROM.


Khan Noonien Singh is a fictional character in the Star Trek science fiction franchise, who first appeared as the main antagonist in the Star Trek: The Original Series episode “Space Seed” (1967), and was portrayed by Ricardo Montalbán, who reprised his role in the 1982 film Star Trek II: The Wrath of Khan. In the 2013 film Star Trek Into Darkness, he is portrayed by Benedict Cumberbatch.

Khan had controlled more than a quarter of the Earth during the Eugenics Wars of the 1990s.[1] After being revived from suspended animation in 2267 by the crew of the Starship Enterprise, Khan attempts to capture the starship but is thwarted by James T. Kirk and exiled to Ceti Alpha V, where he has the chance to create a new society with his people. In Star Trek II: The Wrath of Khan, set fifteen years after “Space Seed”, Khan escapes his exile and sets out to exact revenge upon Kirk.

In Star Trek Into Darkness, set in the alternate continuity established in Star Trek (2009), Khan is awakened almost a decade before the events of “Space Seed“. Khan is given the false identity John Harrison and coerced by Admiral Marcus into building weapons for Section 31 and Starfleet in exchange for the lives of Khan’s crew. He ultimately rebels and comes into conflict with the crew of Enterprise.


OK – so what are the “Eugenics Wars”?

Back to Wikipedia…..


When the original series of Star Trek was produced, the 1990s were several decades away, and so various elements of the backstory to Star Trek are set in that era, particularly the Eugenics Wars. The references to the Eugenics Wars and to a nuclear war in the 21st century are somewhat contradictory.

The episode “Space Seed” establishes the Eugenics Wars, and has them lasting from 1992 to 1996. The Eugenics Wars are described as a global conflict in which the progeny of a human genetic engineering project, most notably Khan Noonien Singh, established themselves as supermen and attempted world domination. Spock calls them “the last of your so-called World Wars”, and McCoy identifies this with the Eugenics Wars.


OK – don’t get me wrong. I’m not saying it’s EXACTLY like Star Trek, although I do subscribe to the folk notion that Star Trek is a VERY good predictor of things that are likely to happen.

What I AM saying is that genetic engineering of humanity has already started, and now I’m going to explain why this is so.

We will take a brief tour into the PAST, before we return to the future. If a light bulb comes on, keep it lit!


You cannot uninvent the genetic Tommy-gun, nor the gun moll who knows how to code.

Bonnie & Clyde of the Nucleus

BANKS make a really great analogy of the cell nucleus.

  • they’re common and everywhere
  • they contain valuable stuff that needs to be protected yet dispersed
  • they have high security
  • things need to traffic securely in and out of them

Breaking into a bank with very high security is a lot like what the spike protein does. But the spike protein doesn’t do it alone. THAT is an important point from the three papers I keep mentioning. The spike protein has a PARTNER who has all the plans.

OK – just for the record – this is going to deviate a little bit from the ACTUAL story of Bonnie and Clyde. Just warning you – it will get weird.

The spike protein and the spike protein mRNA are a PAIR, and together, they are able to not only break into the bank, but to totally take it over, and keep it taken over. And then to take over more banks.

Here is how it works.

The spike protein is Clyde. He’s got a gun, and he causes all kinds of trouble with it. He’s the “action” guy. He knows how to break into banks, mostly because he has a phony ID that always gets him in. The phony ID says PRRARSV in big letters on it, which makes all the bank guards at Cell Nucleus Bank and Trust say “Why, welcome, Mr. Barrow! We’re pleased to see you at the bank today! Come right on in!”

Or, to use a different analogy…..

These bank guards are such chumps, but it works every time.

Well, here is the problem for the bank. When Clyde goes in, he always brings his partner Bonnie. And SHE is trouble. She’s not so good with a gun or a fake ID, but she is a real scam artist, who knows how to get into the bank and embezzle the hell out of it.

Bonnie gets into the cell nucleus bank, and with some help from Clyde, she gets a permanent job there. Bonnie and Clyde are set for life. None of this “grab the cash, run out, get caught, and die in a hail of bullets” shit. No sir! THIS Bonnie and Clyde are smart.

Bonnie trains many of the new girls at the bank – and like the pod people in “Invasion of the Body Snatchers”, she turns every last one of them into exact copies of HERSELF. NASTY! So all these fresh Bonnies are trained by the bank and sent out to get into new banks.

But wait! Bonnie can’t get into banks. Bonnie doesn’t have a gun or a fake ID! How can she get into more banks?

Easy! Bonnie and all her Bonnie clones have the power of multiplication – not just to make more copies of each one herself, but to make more Clydes. Bonnie makes more copies of herself while she’s IN the bank, and she makes copies of Clyde while she’s OUT of the bank.

So every Bonnie that leaves the bank, creates hundreds of new Clydes on the outside. The next time Bonnie wanders near a bank, there are bound to be dozens of Clydes just hanging around, ready to escort her, and maybe even other gals [important], into the bank. If no Bonnie is already working there, she gets a job, and the process starts over.

The KEY POINT is that BONNIE makes the CLYDES who can get her, or women like her, into the next bank.

Bonnie can’t get into the bank, and Clyde can’t get a job in the bank, but together, they can make a living by embezzling banks.

Side Note: This is a beautiful example of a contradiction in the Marxist sense. Proteins and nucleic acids can’t do certain things alone, and thus NEED EACH OTHER.

Once Bonnie is on the payroll, this fact introduces a permanent security problem in the bank, and for all other banks.

And why is that?

Once Bonnie is on the payroll, you can’t get rid of her.

She will just create more Bonnies and more Clydes, and they will scam more banks.

In terms of banks, banks can resist just Clyde or just Bonnie, but they can’t resist the pair.

In terms of the cell nucleus, it can resist the spike protein or the spike mRNA, but it cannot resist both of them together.

Which pair, oddly, is exactly what the vaccines create.

WHAT ARE THE CHANCES?


We can use other analogies, using banks, which emphasize the spike protein more.

Imagine a bank that was convinced to crank out KEYS TO THE BANK, and to send out these keys. Imagine thousands of keys to the bank being sent out by the bank into the community, perhaps in a really stupid PR stunt.

God knows WHO is going to get into the bank now.

God knows WHAT is going to get into the genome now.

Are you starting to see what they did?


Fact Checking the Fact Checkers on DNA Change

The absolute best way for me to convince you that they really said these vaccines could not do what they are now proven to be doing, is to simply play back the words of the “fact checkers”.

See if you can spot how many LIES are told in this video.

If you’re not spotting the lies, read THIS ARTICLE.

AND – by the way – this video is a GREAT explanation of the way things NORMALLY work. It’s totally out to lunch on the way things ACTUALLY work.

Did you spot the lies? Tell me what you found in the comments.

This video is not alone – there are HUNDREDS OF THEM.

There are also hundreds if not thousands of articles of a similar nature. I’m just going to pick one of them – the one that happened to have the graphic I used above. That article is dated from MARCH of 2021 – right when the authorities were hard-selling the “vaccines”.


mRNA Covid-19 vaccines: Facts vs Fiction

MARCH 10, 2021

By: Maria Elisa Almeida Goes
Editing: Offspring Magazine Editorial Team
Images: Nina Lautenschläger.

LINK: https://www.phdnet.mpg.de/offspring/Covid-19_vaccines

ARCHIVE: https://archive.fo/irZec


Interestingly, this archive was made only 5 months ago. It was very likely archived by Wikipedia or somebody else who is shilling the false explanation, when faced with the emerging science showing nuclear translocation and genomic incorporation. But it’s perfect for me to preserve evidence.

As an aside, I find it terribly sad that this particular lover of “Max Planck” era scientific history, lived to see one of Planck’s namesake organizations lying about science on a grand scale, but yet here we are.

Let me just pull out the most relevant section. I was planning on highlighting ALL of the lies, fibs, evasions, etc., but there are so many, I decided to only highlight or [comment on] the most horrible and ironic.


mRNA vaccines will not alter your DNA, this is why:

Concerns about the effects mRNA vaccines over the integrity of our DNA also exist. Thankfully, you do not need to worry about this. Such an event would challenge everything scientists know about basic cell biology, and is so improbable, that one can actually call it impossible.

The main reason for that is that, besides being chemically and structurally different from DNA, mRNA is located in a different cellular compartment. While DNA is enclosed in the nucleus, mRNA is produced in the nucleus, but is quickly exported to the cytoplasm with a one-way ticket: it does not come back. In fact, only specific proteins carrying “nuclear localization signals” are able to migrate from the cytoplasm into the nucleus, and mRNA vaccines definitely do not include such molecular instruction. Thus, because mRNA cannot spontaneously be trafficked to the nucleus, it cannot modify your DNA sequence.  Additionally, the RNA molecule is charged and carries the same charge as the nucleus, so as our 6th grade physics taught us, like charges repel, and hence the RNA molecule is physically repelled by the nucleus. [Note added by Wolf – WHAT THE HELL???]

One might also argue [HA! You TOADS! Yes, one “might”!] that there are mechanisms through which RNA can be integrated into the genome – HIV viruses being the classic example. The key differences here are that such viruses (1) express special enzymes which are able to code DNA back into RNA and (2) can associate with proteins that can traffic them into the nucleus. Neither scenario is applicable to the mRNA vaccines. [OH, THE IRONY]

For the same reasons, mRNA vaccines cannot affect your unborn children. This would require genomic mutations [oh, really!] in the reproductive cells – sperm and egg – since only these could potentially be transmitted to the next generation. [AND???!!!]

Speaking of children, you might have heard that Covid-19 vaccines would cause infertility in women [why don’t you just stop there, and not go on to one bad hypothesis?] because antibodies against the spike protein could mistakenly attack placenta cells, due to an alleged similarity with a placental protein called syncytin-1. There is no scientific evidence supporting this claim – and, in fact, the two proteins are barely similar, sharing only 4 sequential amino acids out of 538. [This did seem to be a bit of a miss. Nevertheless, what new hypothesis explains all the pregnancy problems?]

Still, you might want to ask why pregnant women are excluded from the vaccination campaigns [wait a minute….not in the US], and why, during clinical trials, women are asked to use contraceptive methods that will avoid pregnancy [because there might be a problem?]. Again, this is not a red flag. Any clinical trial for a potential vaccine or drug will exclude children, pregnant women, old people and people with specific underlying conditions. Initially, trials are designed to obtain major insights whether the developed pharmaceutical product works at all, in healthy adults. Once safety and efficacy are determined [read what you just said before that, where you excluded safety as a motive], tests are expanded to smaller groups that at first were set aside. Excluding pregnant women from trials only shows that trials are being done systematically and following standard protocols. [I’m sorry, but this sounds like happy horseshit, lady.]


Let’s concentrate on the lies most relevant to this discussion. I’ll isolate them and respond to each one.


In fact, only specific proteins carrying “nuclear localization signals” are able to migrate from the cytoplasm into the nucleus, and mRNA vaccines definitely do not include such molecular instruction.

This is EXACTLY what was found with the spike protein that was produced by the full spike mRNA. What a coincidence! See De Marinis for proof that it happens, and Mehedi for WHY. OH – because there’s a nuclear location signal! Was it a “known” one, and if so, who knew it and who didn’t? If some people knew, and others didn’t, wouldn’t that make it like a “zero day” on the nucleus?

Thus, because mRNA cannot spontaneously be trafficked to the nucleus, it cannot modify your DNA sequence.

OH! But isn’t that SO STRANGE that the Mehedi work shows that the spike protein LITERALLY “traffics” the spike protein mRNA into the nucleus? WELL AHHHHH’LLLLL BE! So maybe this explains the nuclear DNA modification that is seen in the De Marinis results. Yes? Maybe? Come on, girl – you’re a scientist at a prestigious institute. Put on your big girl pants and hypothesize with me! You can do it! This is undergraduate, “smart-alec guy in the back of introductory class raises his hand” stuff! And when you were in that class, you thought the same sorts of things but didn’t raise your hand. Maybe it’s time to be brave!

One might also argue that there are mechanisms through which RNA can be integrated into the genome – HIV viruses being the classic example.

This should have been your really big hint, girl. Our local accountant named cthulhu realized that Fauci’s HIV interests and his bat virus interests had remarkable similarities, both in what he himself did, and in what he was studying. “This isn’t Fauci’s first rodeo.” Ask yourself – why was Fauci interested in this? Could it have been the same reason that Doudna was so interested in CRISPR-Cas9? The desire for WRITE PERMISSIONS on the genome?

The key differences here are that such viruses (1) express special enzymes which are able to code DNA back into RNA and (2) can associate with proteins that can traffic them into the nucleus. Neither scenario is applicable to the mRNA vaccines.

Thank you, my lying lady. You have just provided me with a huge clue, by the process of “liar subtraction” – a form of deductive reasoning. We know from De Marinis that genomic incorporation and modification is a fact. We know from Mehedi that “nuclear trafficking” (your point 2) is a fact. This means that it is almost certain that the spike protein ALSO acts as a promoter of reverse transcription (your point 1). You said it – not me. That sure seems convenient, doesn’t it? My question is now – DID YOU KNOW THIS? Were you part of the plot? Or was the person who reminded you of these things part of the plot? Or were we all part of the plot, when I, too, mindlessly parroted the “central dogma” as a defense of mRNA vaccines?

I’m willing to confess that I was wrong. I will admit to my part in promoting the conspiracy. Will you?


But their defenses get worse.

There are now MSM “fact checks” which specifically try to walk back the implications of both the Jaenisch and De Marinis papers, and you can bet there will be similar fact checks on Mehedi’s paper. There has likewise been pressure on those authors to DOWNPLAY the significance of their own works. To me, this is the height of bullshit.


Jaenisch Paper Downplay

Fact Check-Controversial MIT study does not show that mRNA vaccines alter DNA

LINK: https://www.reuters.com/article/factcheck-coronavirus-vaccines-idUSL1N2PK1DC

ARCHIVE: https://archive.fo/vJwBk


De Marinis Paper Downplay:

Swedish study on COVID vaccines and DNA misinterpreted

LINK: https://apnews.com/article/Fact-Check-COVID-Vaccine-Sweden-Study-986569377766

ARCHIVE: https://archive.fo/vJwBk


Rather than take these arguments apart myself, I ask you all to take a first crack at the different techniques used, by clicking the links and observing the UNETHICAL SKEPTICISM. Much of this does not require a science background.

In particular, knowing what we know now, after the Mehedi work, I think it should be very clear how much the media went to bat for the vaccines without honestly questioning the “authorities”.

I will confirm your findings in the comments, and catch any straggler sins of science.

To me, this media mendacity is all simple, stupid, and predictable.

“Nothing to see here!”

Frankly, it changes nothing for me, if any of these authors get talked into walking back their own work, because push-back on critical work is a common phenomenon in the history of science. Not all scientists are capable of weathering the storm. Here are TWO that did. Both got Nobel prizes, by the way.


A classic case, emphasizing a field aversion among an establishment group to a field solution emerging from deductive reasoning, was Van’t Hoff and tetrahedral carbon. Basically, a doctoral candidate in an applied science school had the temerity to take an old hypothesis and revive it as the solution to a very significant current problem. The guy was good – he went on to win a Nobel prize for other work. However, many chemists, especially older ones, rejected the idea, in my opinion by not prioritizing explanatory power over their own abstract philosophical preconceptions. The fact that important people rejected an elegant solution of remarkable utility and truth shows how bad group-think problems can be in science.

Another case was Rick Smalley and C60 (buckminsterfullerene). The linked article accurately describes the initial skepticism that people had for “soccer ball carbon” or “bucky balls”.

The Nature letter describing C60 was attractive and logical, but seeing a line in a mass spectrum did not convince all scientists of the discovery of a new allotrope of carbon. During the period 1985-1990, the Curl/Smalley team at Rice and Kroto at Sussex managed to amass a wide range of circumstantial evidence to support the fullerene structure proposal. Full acceptance came when Wolfgang Krätschmer of the Max Planck Institute for Nuclear Physics in Heidelberg, Germany, and Donald Huffman of the University of Arizona, with their students Konstantinos Fostiropoulos and Lowell Lamb, succeeded in synthesizing C60 in sufficient quantities to allow structural characterization.

I personally remember colleagues assuring me that Smalley was loony, demented, senile, past his prime, or at best something along the lines of “a nice guy, but clearly deluded and obsessed with an error.” The doubt about C60 as reality – particularly as a stable reality – ran thick. And that doubt was WRONG from the very beginning.


Scientists right now are NOT THINKING, and they’re letting the MEDIA push them around.

Scientists are also letting guys like Anthony FAUCI push them around, mainly by the horrible federal grant system, and by the psychology of woke universities, both designed to control science.

And that doesn’t even begin to address other malign interests altering science and medicine in dishonest ways.


Some Actual Speculation – Why Would They Push These Clearly Defective Shots So Hard?

You want some actual “conspiracy theorizing”? Here it is.

Let me go back to my “TLDR” again…..

They didn’t just lie to us about the spike mRNA not going into the nucleus and not changing human DNA – the whole purpose was very likely to do exactly what they did – to open the cell nucleus and keep it open, so that we as a species can start changing population genomics in a huge way, using a variety of technologies.

There are reasons to suspect depopulation as a motive for these vaccines, and both Gail Combs and I have written extensively about this. I continue to believe that this is part of the motivation of the “complex event” we have been undergoing, between virus and vaccine.

Depopulation is very important to these people.

MALTHUSIANS AND EUGENISTS MAKE A CASE FOR POPULATION CONTROL

DEPOPULATION – NEVER LET A CRISIS GO TO WASTE

The Population Control Shot – Introduction

The Population Control Shot – Understanding the Peoples Climate Temple

Likewise, there are many other motives, ranging from mercenary profits, to promoting gene therapy, to “Covid communism”, and beyond. Many of these roads lead back to WEF – the World Economic Forum. One of those roads may be an actual attempt to commit humanity to a future of genetic engineering as a kind of fait accompli.

Just listen to Yuval Noah Harari talk about changing humanity. A few times he talks about “we”, “I”, “me”, “my”, and “our” programs of genetic engineering of humanity. It’s not just creepy and megalomaniacal – it seems quite self-assured.

WEF’s interest in genetic transformation of humanity cannot be understated. You will note in the above video, the presence of Jennifer Doudna – the Nobel laureate who (IMO) was most responsible for pushing CRISPR gene editing technology forward. Here is the full video.

I have discussed the technology recently here:

Dear KMAG: 20230213 Joe Biden Didn’t Win ❀ Open Topic / Introduction to CRISPR/Cas9 Gene Editing Technology

This is a particularly good explanation for those who want to dig into the science a little.

So how does CRISPR-Cas9 connect to the spike protein?

I have mentioned that the spike not only is proven to have nucleus-opening properties and cell nuclear mRNA-trafficking properties, but it likely has reverse-transcribing properties as well. Thus, it may have utility in facilitating certain varieties of genomic incorporation of genetic material beyond its own spike mRNA. I’m leaving that open very broadly. We don’t really know how far the “nuclear translocation of mRNA” capabilities of the spike protein actually go.

But even just the incorporation of its own instructions into the cellular genome, makes the spike protein highly relevant to CRISPR-Cas9 gene editing technology.

We can’t REALLY be sure what happens if the spike protein code gets into egg or sperm DNA, and goes on to be a “feature” of every human cell of a “spike baby”, but I can say one thing – if that gene can be REMOVED during in vitro fertilization (IVF) by CRISPR-Cas9 technology, to the betterment of the child, then it’s very likely going to be demanded by elite parents, to assure a healthy baby.

So – I ask again – WHAT ARE THE CHANCES?

What are the chances, that people who are gung-ho on the “solution” of genetic modification of humanity – you know – like WEF – would have anything to do with releasing a virus and promoting a vaccine that would almost FORCE us into that future?

I think that this era is a lot like the chemical revolution of the late 1800s, precisely when Van ‘t Hoff was dealing with chemical theory. Figures like Malone and Doudna operate in the time of our own biological revolution. Remember Rockefeller, and what he did to science and medicine back during the chemical revolution. Well, now we have Gates and what HE did to science and medicine during the biological revolution.

Personally, I think it’s high time for us to stop taking shit from the corporate media – and particularly the “fact checkers” like Reuters and the AP – as they LIE to our faces about science – as they deny reality on behalf of the corporate titans behind them.

These mRNA vaccines are DEFECTIVE relative to how they were sold to us – very likely by intention – and the media and media organizations have LIED to us about those vaccines in the most scurrilous ways. The media has defended LIES and defrauded all of us.

You don’t have to be FOR or AGAINST gene editing per se, to be against LYING, DEFRAUDING, and FORCING IT ON THE WORLD by a criminal conspiracy.

We need to demand TRUTH about the vaccines, or the SHUTTERING of these “media” companies and organizations, which have cosigned onto crimes against humanity.

Demand no less. TRUTH or BREAK-UP. Media that lies and conceals is USELESS and a hindrance to REAL SCIENCE.

W

Was “Trust and Safety” a CCP Trojan Horse?


Thanks to Darren Beattie, Elon Musk, and Gail Combs, I have been struck by lightning, and can now see the origins of the highly successful “trust and safety” censorship paradigm.

I survey the catastrophe that “Trust & Safety” has been for not only Twitter and Apple, but all of Big Tech, America, and the world, and I cry out “Well played, CCP! Well played!”

And you, my fellow coders who watched it all turn to crap, know I’m right. We did not object to the early assaults on Free Speech, as CHINA slyly moved into our tech businesses, and now we have paid the price.


Or if we really want to be complete…..

The part about “can’t code” welcoming in the Trojan Horse is important. In my opinion and experience, it was the non-coding “verbal world” of bureaucratic policy which welcomed “trust and safety”, then forcing it on the more mathematical geek world which had once been a bastion of honesty, truth, and freedom.

Free speech mattered to old tech. Not so much to the people who took control of tech.

This is relevant, in that WOMEN tend to show up as the cops, police chiefs and ambassadors of “trust and safety”. It’s a very female and “beta male” thing, even at the high levels.

BEFORE ELON:

After Elon:

Yeah, those pictures are a bit of an unfair comparison, because they’re different company functions as well, but in other ways, that in itself is exactly the problem.

Coders versus the people who tell them what to do. Twitter was filled with chiefs and not enough Indians.

ALTHOUGH perhaps one too many……

Yoel Roth’s problems don’t end with his refusal to “manspread” like a man, but the problems surely start there. Any “man” who is threatened by the Babylon Bee needs help, not power.

BUT BACK TO THE ACTUAL STORY…..


Trustina Applegate

Darren Beattie of Revolver News had one of the biggest stories yet on censorship in Big Tech.

LINK: https://www.revolver.news/2022/12/revealed-eric-holder-fingerprints-all-over-apple-trust-and-safety-department-during-2020-election/

Turns out that Eric Holder’s former chief of staff was the head of censorship at Apple for quite a while, including the 2020 election.

Here is the brief version of what happened. Please go to the original for the full story. I am only including a highly edited snippet of the middle of the story (and yet it’s VERY long).


FTA…..

The current head of Apple Trust and Safety is someone who is clearly aware of the value of having a low profile online. Look for details on Jessica Gimarc-Savini and you’ll find her sparse LinkedIn page, her (lesbian) wedding page, and not much else.

While we know little about Jessica Savini, we can learn much from a profile of her predecessor, former head of Trust and Safety at Apple Margaret Richardson.

Richardson served as Apple’s top trust and safety figure from August 2020 through May 2022.

As you read the following, keep in mind that Apple is the largest company in the world, with a market capitalization of $2.3 trillion dollars.  Its annual revenues exceed the GDP of most U.S. states. It’s annual net profits are worth more than the GDP of Bulgaria. Apple might as well be a country unto itself, and a powerful one at that. Of all of the people they could have chosen to be the key decision maker for content moderation and safety — that is, censorship — you’d think they’d at least choose someone with the appearance of moderation and lack of political bias.

Think again.

While Richardson wisely avoided tweeting during her tenure at Apple, at her previous job, first as “director of global policy” and then “director of trust” as Airbnb, Richardson was entirely unrestrained. Her still-extant tweets from August 2020 and before give a stark demonstration of her thinking, a perpetually-spinning hamster wheel of stock left-wing political tropes. For starters, Richardson’s Twitter banner screams “Black Lives Matter”!

But that’s only scratching the surface.

Dig back through 5+ years of tweets and retweets, and you see a type that is disturbingly common: A person’s whose public life consists almost wholly of mindlessly affirming, then reaffirming, and then re-reaffirming, far-left and liberal partisan orthodoxies.

It’s not that any one tweet from Richardson is particularly bad. It’s that that’s all there is. She never strays into talking about her family or her favorite books or even, say, her favorite vacation spots (she was working at a lodging company, after all!). It’s just the current partisan lib obsession du jour, every time, with ruthless tedium.

Richardson isn’t just deeply ideological, pro-BLM, and so forth. She’s also narrowly and almost pettily partisan.

If this was your barista at Starbucks, or a Congressional staffer, or heck, an ordinary Apple engineer, this would be rather lame but unremarkable. But this is the person Apple chose to lead its Trust and Safety division, the person chosen to be head censor at the most powerful company in the world. This is the person who was empowered to make crucial, politically-loaded decisions during one of the most hotly-contested elections in American history.

Five months after Richardson started at Apple, the company made one of the most ideologically aggressive cancellations ever when it banned Parler from its app store. While Apple works hard to obscure its decision-making process, Richardson was without a doubt central to that decision, and with her involved, it wasn’t a surprising one. In April 2022, shortly before she left, the company also committed itself to a ridiculous internal “racial equity audit.”

So, where did this person come from? Well, just looking at her tweets, one notices that Richardson doesn’t just have a habit of boosting left-wing causes. She has a noticeable preference for boosting senior figures from the Obama Administration itself — Valerie Jarrett, Arne Duncan, John Kerry, and so forth. Richardson was particularly active when President Trump dismissed acting attorney general Sally Yates for insubordination after she refused to enforce his executive order implementing a travel ban on several nations linked to Islamic terrorism.

This isn’t random.

After earning dual degrees in law from UC-Berkeley and in public policy from Harvard’s Kennedy School, Richardson spent three years working at a free legal clinic in the Bay Area. From there, she went to the Obama campaign, and after his election she joined the Justice Department as a top adviser to Eric Holder, eventually ascending to become his chief of staff.


Wolf again….

SO – I hope that is crystal clear.

The Obama-Holder DOJ directly controlled Apple’s view of “acceptable content” during the engineered fall of the Trump administration (a.k.a. “The Coup”) as well as first two years of the Biden administration.

This is exactly why I absolutely cannot stand Apple News, for it’s horrible, judgmental, left-wing slant.

If you read the rest of the Revolver article, it is VERY clear that the “Trust and Safety” racket is largely an infiltration of Big Tech by an ideology centered on Eric Holder and the DOJ.

In my opinion, Trust & Safety in Big Tech was ultimately a downstream effect of the disastrous Obamacare website, which was used to “lure in” Big Tech for what became an infection operation.

People who had no idea how to deal with criminals and communists were sheep led to the slaughter.


SO – back to Twittergate.

I didn’t really make the connection of Twitter’s “Trust and Safety” machine to DOJ, until Elon Musk revealed The Twitter Files to the world, via left-trusted journalist Matt Taibbi, in a massive act of transparency.

Somewhere in the middle of Matt Taibbi’s tweet-thread, I realized that Apple and Twitter were undoubtedly similar stories – and that Eric Holder likely had an insider at Twitter.

Allow me to interject with a meme here…..

Moving on…..


But THIS is where the DOJ comes back into things. The next tweet (28) is like discovering Eric Holder working at Twitter.


Jim Baker? You mean SPYGATE Jim Baker???

I had figured there was some Holder groupie analogous to Richardson at Apple, inside Twitter’s Trust & Safety apparatus. I had no idea that Holder’s henchman – THE Jim Baker, fired as part of Spygate – was there.

Let’s just look at that Jim Baker message more closely…..

This is an incredible stall tactic. Twitter can hold off the truth forever with this thinking.

Note how the “hacked materials” policy is already anti-journalism, but combine it with a DOJ Obama/Hillary toadie INSTALLED INSIDE TWITTER, and, it’s every bit like Apple. Complete DOJ commie control.

SO – it’s clear that “Trust and Safety” is a DOJ gig – right?

How could this possibly be worse?

The trick is understanding the “environmental push” for “Trust and Safety” over free speech, which overwhelmed both government and tech. It almost certainly had foreign help.


Gail Combs Exposes Trust-and-Safetygate

Today, Gail posted a series of deep dives into the subject of where much of the “trust and safety” censorship has appeared and festered in both government and Big Tech – spilling over into everything, including elections, journalism, STEM, and even White House policymaking.

The big picture blew me away, as I saw how successful this movement was, in transforming our own government and national security complex away from freedom and toward CCP-style totalitarianism, without even being fully understood by the victims.

Some of the CCP infiltration is obvious – some of it is not.

I present it to you now, largely unedited except by Gail herself, in preparing it for this post. I have also taken the liberty of embedding the videos by hand, rather than just leaving links. I have further included some comments that Gail left out, because I feel they are still important, even though she did not.

LINKS TO SELECTED ORIGINAL COMMENTS:

LINK: https://www.theqtree.com/2022/12/05/dear-kmag-20221205-joe-biden-didnt-win-%e2%9d%80-open-topic/comment-page-1/#comment-1004332

LINK: https://www.theqtree.com/2022/12/05/dear-kmag-20221205-joe-biden-didnt-win-%e2%9d%80-open-topic/comment-page-1/#comment-1004307


Gail Combs

Gail Combs

Online

Coyote

 Reply to  WSB

 December 5, 2022 07:14

From BadKitty’s Thread — The KEY INFO showing GOVERNMENT CENSORSHIP IMPACTING ELECTIONS!!!

They also submit reported tweets to CISA at DHS. Boom!

DHS puts on its CISA website for election misinformation, disinformation, and malinformation to be reported to Misinformation@Cisecurity. (NGO Katie Hobbs used for reporting.)

CISA

RUMOR CONTROL PAGE START-UP GUIDE Misinformation, disinformation, and malinformation (MDM) can present risks to the election infrastructure community, its owners and operators, and the public. MDM can spread quickly, causing rumors to undermine facts. 

The risks of MDM range from undermining confidence in institutions to activating and inspiring dangerous behaviors and violence. This Rumor Control Page Start-Up Guide is for organizations seeking to dispel specific MDM narratives through transparent and authoritative information. Designed for use by state, local, tribal, and territorial (SLTT) government officials and private sector partners, this guide cites the Cybersecurity and Infrastructure Security Agency’s (CISA) Rumor Control page as a model for debunking inaccurate narratives. The recommendations in this guide are not intended to be one-size-fits-all and should be adapted to the capabilities and resources available, as well as the MDM risks facing the community. Organizations should only set up a rumor control webpage related to issues for which they have access to information and expertise necessary to properly dispel MDM narratives and articulate facts. Each organization that plans to set up a rumor control page may want to consult with the appropriate organization legal counsel, if possible, prior to beginning operations. What is a rumor control page? A rumor control page is a web page that offers the public accurate and authoritative sources of information which will help address common MDM narratives. It is provided by a trusted voice to either preempt or respond to developing narratives. Credible messengers are most effective at disproving falsehoods. A rumor control page should not be considered the sole source of truth, rather it should drive people to seek more information about a complex subject by directing them to other trustworthy sources.

With a rumor control page, election officials and stakeholders can dispel rumors about the systems and assets they manage and have unique insight into. Some election offices may already have public information websites, which commonly include a “Frequently Asked Questions” page and/or press releases that seek to clarify information. In this sense, a rumor control page can be viewed as an extension of existing efforts….

  :wpds_arrow:  It is important to note that a rumor control page is only one element of a successful MDM response strategy. Improving resilience of elections to MDM also requires reporting MDM narratives. The Center for Internet Security (CIS) was established to support the cybersecurity needs of the election subsector. The CIS can be leveraged to report real-time MDM via email at misinformation@cisecurity.org

Be sure to include links and screenshots as well as details on the misinformation and your jurisdiction.

7

 Reply

Gail Combs

Gail Combs

Online

Coyote

 Reply to  Gail Combs

 December 5, 2022 07:44

Don’t miss Bad Kitty’s other thread.

CCP involved with Carnegie…

comment image

Multiple former Chinese gov employees and at least 20 CCP members worked at Carnegie Endowment while CIA DIR William Burns was pres 2015-21

They are closely associated with CUSEF (reg under the Foreign Agents Registration Act as a Chinese foreign gov org)

Last edited 12 hours ago by Gail Combs

7

 Reply

Gail Combs

Gail Combs

Online

Coyote

 Reply to  Gail Combs

 December 5, 2022 07:52

EXCLUSIVE: GOP Rep Calls On CIA Director To Address His ‘Strong Ties’ To CCP While At Helm Of Elite DC Think Tank

  • Texas Republican Rep. Lance Gooden called on CIA Director William Burns to address his “strong ties” to the Chinese Communist Party (CCP) while formerly heading an elite Washington, D.C., think tank, according to a letter obtained by the Daily Caller News Foundation.
  • At least 20 undisclosed CCP members worked at Carnegie Endowment for International Peace during Burns’ presidency of the think tank, the DCNF recently reported.
  • “Evidence would suggest Director Burns lied under oath during his confirmation hearing,” Gooden told the DCNF, referring to Burns’ February 2021 CIA confirmation hearing.

Texas Republican Rep. Lance Gooden called on CIA Director William Burns to address his “strong ties” to the Chinese Communist Party while formerly heading an elite Washington, D.C., think tank, according to a letter shared with the Daily Caller News Foundation Monday….

“The vast influence the CCP had at Carnegie during your tenure as president and the continued influence they have today — despite claims you made at your confirmation hearing that you had ended the CCP’s influence — presents a significant lapse in judgment and brings into question your ability to identify and mitigate national security risks,” Gooden’s letter said. (RELATED: Biden’s New Green Energy Adviser Has Ties To Chinese Communist Party Front Group)


There is a lot of information coming out and We want to capture it before it disappears.

First a Youtube from August 25, 2020 just before early voting started.

Are We Ready? Foreign Interference, Disinformation and the 2020 election
Streamed live on Aug 25, 2020
Public and private sector leaders join the Digital Forensic Research Lab of the Atlantic Council to discuss what steps they have taken to secure the information space around the 2020 presidential election. For further information, please visit: https://www.atlanticcouncil.org/event…

——————————————————————————————– Subscribe for more! https://www.youtube.com/user/Atlantic…

Driven by our mission of “shaping the global future together,” the Atlantic Council is a nonpartisan organization that galvanizes US leadership and engagement in the world, in partnership with allies and partners, to shape solutions to global challenges.

LINK: https://www.youtube.com/watch?v=rUDHdwSwQFQ

After looking at part of this video I decided to investigate the people named. This is my research.

March 26, 2018
DHS hires new cybsersecurity adviser ahead of 2018 midterm elections – Washington Examiner

The Department of Homeland Security has hired the former chairman of the Election Assistance Commission, Matt Masterson, to help federal, state, and local authorities coordinate cybersecurity efforts ahead of the 2018 midterm elections, the department announced Monday.
Masterson will serve as senior cybersecurity adviser within the National Protection and Programs Directorate’s Office of Cybersecurity and Communications.
“There are few who have Matt’s experience working with all levels of government and the private sector to protect our nation’s election systems. His wealth of experience and depth of knowledge make him highly respected on both sides of the aisle,” Chris Krebs, NPPD senior official performing the duties of the undersecretary, said in a statement.
Krebs added that Masterson’s previous work as chief information officer in the Ohio secretary of state’s office and at the EAC “significantly advanced” the country’s cybersecurity efforts.

Matthew Masterson Joins DHS as Senior Cybersecurity Adviser

Matthew Masterson, former chairman of the U.S. Election Assistance Commission, has been named senior adviser for the Department of Homeland Security‘s cybersecurity unit, Washington Examiner reported Monday.

DHS expects Masterson to continue working with federal, state and local officials to protect election systems against cyber threats.

He served as EAC commissioner for nearly four years, following his nomination by then President Barack Obama and subsequent confirmation by the Senate in late 2014.

Masterson previously held various positions within the Ohio secretary of state’s office, where he managed voting system certification procedures and led the development of online voter registry and ballot delivery platforms for military and overseas voters.

WIKI: Christopher Krebs

Christopher Cox Krebs (born 1977) is an American attorney who served as Director of the Cybersecurity and Infrastructure Security Agency in the United States Department of Homeland Security from November 2018 until November 17, 2020 when President Donald Trump fired Krebs for contradicting Trump’s claims of election fraud in the 2020 presidential election.[1]

ATLANTIC COUNCIL

Clara Tsao

Clara Tsao is a nonresident fellow with the Atlantic Council’s Digital Forensic Research Lab. Clara is a national security and disinformation expert and technology entrepreneur currently serving as the co-founder and on the board of the Trust & Safety Professional Association and the Trust & Safety Foundation. Clara previously was the Senior Advisor for Emerging Technology at the Department of Homeland Security and the Chief Technology Officer of two U.S. Government task forces focused on countering foreign influence, election security, and homegrown extremism. Clara also serves as a nonresident expert at the German Marshall Fund, a senior advisor for the UN-backed initiative, Tech Against Terrorism, and the President/Chair of the White House Presidential Innovation Fellows Foundation. Clara has also held fellowships focused on national security and technology policy with the Mozilla Foundation and Google.

June 26, 2020

The Brief: Clara Tsao’s newly-launched Trust & Safety Professionals Association

Clara Tsao is Cofounder of the Trust & Safety Professionals Association (“TSPA”), a new, nonprofit, member-based organization for trust & safety professionals that launched in June 2020. The TSPA will support the global community of professionals who develop and enforce principles & policies that define acceptable behavior online.

Clara was inspired to build an association for trust & safety professionals due to her background as a national security/disinformation expert and technology entrepreneur. She is President of the White House Presidential Innovation Fellows Foundation and a Senior Advisor at the UN-CTED-backed Tech Against Terrorism.

Clara has held various national security and tech policy roles for the U.S. Government, Google, and Mozilla.

Clara Tsao (dot) Com

most of the page is just icons with very few words. I wondered if she was a non-native English speaker while Hubby suggested it was a method to prevent word searches.

Her Awards/honors/networks section shows:

Fulbright Canada
Clinton Global Initiative
Hesslbein Global Academy
Pembroke College Cambidge
Univ California
United Nations: Many Cultures One Humanity – Linked to spam
Alliance of Civilizations – Linked to spam
GES Malaysia 2013 – Linked to spam
Global Startup Youth Malaysia – Linked to spam
Yale School of Management [Emerging Leaders Seminar Entrepreneurship & Innovation] – Access denied
TITLE – Global Network for Advanced Management

Clara Tsao | Presidential Innovation Fellows

Clara Tsao is an entrepreneur and a White House Presidential Innovation Fellow. Prior to government, she led global strategic partnerships in education for Microsoft. In addition to corporate roles with Google, Apple, Sony, Playstation, HP, and AT&T, Clara is also the co-founder and former Executive Director of the Congressional App Challenge.

Clara Tsao – Guidance on building better digital services in government
Through the Presidential Innovation Fellows program, Clara has worked across various national security roles in US Government, serving as a senior advisor and Chief Technology Officer focused on emerging technology policy, countering terrorist use of the internet, and foreign influence operations online. News and Events

ALLIANCE For SECURING DEMOCRACY:

About Clara Tsao
Clara Tsao was a non-resident fellow at the Alliance for Securing Democracy. She is an online disinformation expert and a civic tech entrepreneur, who recently co-founded the Trust & Safety Professional Association and the Trust & Safety Foundation to support the global community of professionals who develop and enforce principles and policies that define acceptable behavior and content online. Clara is also a non-resident senior fellow at the Atlantic Council’s Digital Forensic Research Lab. Her previous roles include CTO at the U.S. Department of Homeland Security’s Countering Foreign Influence Task Force and the interagency U.S. Countering Violent Extremism Task Force and Senior Advisor for Emerging Technology at the Cybersecurity Infrastructure Security Agency. She has spent a decade working in the technology industry across global teams at Microsoft, Apple, Sony PlayStation, AT&T, and also as a Google and Mozilla Technology Policy Fellow. Clara is also the Board Chair and President of the White House Presidential Innovation Fellows Foundation and a Senior Advisor at Tech Against Terrorism.

This may be her (Her resume has been erased)
https://www.claratsao-design.com/about
(UI/UX Designer From Taiwan)

There is NOTHING about her early history and where she was born. CHINESE maybe?? Does she actually work for the CCP?

Changemakers → Clara Tsao

MUST READ about her views on ‘Disinformation’ Interesting tidbit”…we need to encourage more technologists to lend their expertise to support better policy-making, through incubators like Aspen’s Tech Policy Hub….”

…..Much of your current work lies at the intersection of tech and policy, focusing on issues like disinformation and online safety. How did you first become interested in these issues?

JFK once said, “We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win.” In a similar way to how JFK committed the nation to the ambitious goal of landing on the moon,I believe the field of “trust and safety” (including online safety / disinformation), is the most difficult challenge of this decade that technology companies, governments, civil society, and internet users must stand united behind.

This is a challenge we need to win. From live-streamed mass shootings, terrorist content, online sexual exploitation and conspiracy theories, to election interference, there are endless problems that require collaboration, starting with strengthened dialogue. I have always been fascinated with how people behave online, and I spend my free time evaluating how people behave on social media. I especially love testing and exploring new technology platforms to understand the new ways in which people interact and connect with one another.

However, I was first exposed to the offline consequences of fake news and misinformation while I was at Microsoft in early 2014. At Microsoft I was managing a partnership program focused on growing the capacity of libraries in Myanmar to serve as trustworthy information hubs. We piloted new platforms and approaches to tackle digital and information challenges in the lead-up to the country’s critical 2015 general elections, the first time the nation could participate in a democratic vote after nearly 50 years of military rule. Over the span of months,I saw firsthand the impact of rampant disinformation as Facebook unintentionally introduced the country to a new digital era that causing offline chaos, violence, and eventually, ethnic genocide.

Years later, I joined the US Government as an Entrepreneur-in-Residence’ where I served as the CTO of two teams within the Department of Homeland Security focused on online safety issues, ranging from terrorist use of the internet, to foreign influence operations and election security. Most recently, I worked with human rights defenders, civil society groups, and policy professionals at Mozilla, evaluating regulatory policies and tools around harmful content online. My Passion for problem solving in this space was cultivated by these experiences.

What particular questions/challenges have you been tackling recently, and why is now the right time to address these?

Over the last year, I have been building a new organization to support and advance the trust and safety profession through a shared community of practice. Today the biggest challenge in trust and safety is the lack of formalized training and support for the professionals that determine and enforce acceptable content policies and behavior online.Professionals working in trust and safety teams at technology companies are tasked with adjudicating what is acceptable behavior or content, while also protecting free speech, user safety, and society. Trust and safety teams are also asked to make difficult decisions to protect users, while also having limited support from product and engineering teams to carry out and enforce these policies at scale.

There has never been a better time to support trust and safety professionals and to do their best work. Due to recent media coverage of content moderation, there has been more awareness of the psychological and mental health risks associated with content review that impact employee wellness.

As fake news and misinformation has gone rampant in election processes, governments around the world have threatened regulation or fines for the inability of timely content review and removal. Some countries, like Germany, have introduced and are enforcing such regulations. Hate speech that stays online in Germany for more than 24 hours can accrue a fine of €50 million under Netzwerkdurchsetzungsgesetz. Examples like these have led companies to invest more resources in their trust and safety operations and have more transparency in their decision-making practices.

Furthermore, technology companies are increasingly realizing the impact that toxic users and behavior have on “user churn” and bottom line.

“Advertisers like Unilever have threatened to take their marketing budgets elsewhere if platforms don’t mitigate the spread of toxic content or toxic users.”

Are certain types of misinformation more dangerous than others? What criteria should companies use to evaluate whether a piece of content should be removed from their platform as misinformation?

The perceived danger of misleading content is a key element that influences the way many companies prioritize and investigate removal. Misinformation can include false or misleading information, ranging from rumors, gossip, errors, propaganda. While misinformation can be harmless (i.e married celebrity having an affair), information can become dangerous when the content has offline or behavioral consequences for users and goes viral (i.e. drinking diluted bleach will prevent you from COVID-19 infections).

When evaluating misinformation, companies can evaluate the actor behind the campaign, the behavior of the post (is it a bot network?), and the context of the content to determine how to prioritize removal. Other times, misinformation is automatically detected by AI/machine learning or flagged manually by users reporting the post 

One challenging part of misinformation is when content is further bolstered by recommendation engines and algorithms, originally designed to heighten user engagement but now leaving users in partisan and polarized filter bubbles.

When Someone searches for content reinforcing fake science such as the flat earth theory, they become stuck in a “rabbit hole”of other conspiracy theories unknowingly, of which many include content from the anti vaccine movement. To Counteract this, AI researchers like Guillaume Chaslot have advocated internet platforms to have increased algorithmic transparency.


>

ALICIA WANLESS

Australian Strategic Policy Institutes

Alicia Wanless is the director of the Partnership for Countering Influence Operations at the Carnegie Endowment for International Peace.

Alicia researches how people shape — and are shaped — by a changing information space. With over a decade of experience in researching and analyzing the information environment, focusing on propaganda and information warfare, Wanless applies this learning to support government, military, and major tech companies to develop policies and integrate information activities into training programs that better reflect how the information environment is manipulated.
Wanless is currently a PhD Researcher at King’s College London exploring alternative frameworks for understanding the information environment.

In 1836, King’s became one of the two founding colleges of the University of London…

Kings College – Biography

Biography
Alicia researches how we shape — and are shaped — by a changing information space. With more than a decade of experience in researching and analysing the information environment, focusing on propaganda and information warfare, Alicia conducts content and network analysis, and has developed original models for identifying and analysing digital propaganda campaigns. Alicia applies this learning to support government, military and major tech companies to develop policies and integrate information activities into training programs that better reflect how the information environment is manipulated.  She has shared her work and insights with senior government, military, industry leaders and academic experts at Wilton Park, the Munich Security Conference, the Hedayah Centre, NATO’s ARRC and the Lawrence Livermore National Laboratory. Alicia’s work has been featured in the CBC, Forbes, and The Strategy Bridge

LAWFARE: Alicia Wanless – Contributors – Lawfare

Jan 20, 2022

Alicia Wanless is the director of the Partnership for Countering Influence Operations at the Carnegie Endowment for International Peace. Wanless is a PhD Researcher at King’s College London exploring how the information environment can be studied in similar ways to the physical environment.

Her twitter account is PRIVATE….
https://twitter.com/lageneralista

This interest led me to research things like nationalism, propaganda, and language engineering in my undergrad, and later in the 2010s, to start analyzing how influence operations were changing in a Digital Age. That research, which covered political campaigns and alternative media outlets, led me to work with militaries, major tech platforms, and civil society organizations—and ultimately to pursue a Ph.D. in War Studies at King’s College London….

The disinformation landscape surrounding the 2020 elections was so different than what we saw in 2016, with domestic, verified users supplanting bots and fake accounts, and new narratives focusing on both Covid and electoral fraud.  The actors, behaviors, and content keep changing. How do you see the disinformation landscape evolving in the future?
I’m not sure it’s the information environment changing quickly so much as our focus on what happens within it shifting. In researching the U.S. primary election in 2016, it was apparent that domestic actors were likely far more active and prevalent than any foreign actors, and this was later confirmed in Benkler, Faris, and Roberts’ Network Propaganda. The disclosure that Russian actors were actively running influence operations made for more shocking news, whereas disentangling the complex web of domestic actors can be difficult and highly politicized. The role of domestic actors engaging in influence operations has certainly come to the fore in the wake of the attack on Congress on 6 January.
One major challenge in understanding the information environment is that research tends to focus on threat actors, tactics, and the content they produce, often in the form of case studies— interesting and informative, but fairly narrow in scope. Unless it is all brought together in bigger meta studies, it leaves us focused on the last bad thing that happened, which is not great for being strategic about addressing the problem. To that end, I think we need to move towards a more systemic understanding about disinformation and influence operations, looking at the wider information environment in which these things occur to find patterns that might offer a warning where the next problem is emerging. That would allow us to intervene sooner.

Some of the information from the BadKitty Thread:

LINK: https://threadreaderapp.com/thread/1599609708574543873.html

Breaking thread! I found the directions for submitting tweets to El-ISAC (CiSecurity) like Katie Hobbs did. They land at Stanford for determination

There is also a hidden Twitter Portal and a gov Twitter email address.😹

https://pbs.twimg.com/media/FjLxKJWWIAAnyc0.jpg (see below)

The Stanford Partnership site that fact checks submitted tweets etc:

1. It’s home page changed dramatically in months.
2. They lied and said Trump supporters went to J6 Armed.
3. They work with the Zinc Network/Integrity Initiatives Graphika and DFRLAB.


LINK: https://archive.ph/GdkGR

I missed putting the biggest part in the top tweet because I was eating ham salad crackers. And ran outta edit time.

They also submit reported tweets to CISA at DHS. Boom! 💥 

DHS puts on its CISA website for election misinformation, disinformation, and malinformation to be reported to Misinformation@Cisecurity. (NGO Katie Hobbs used for reporting.)

https://www.cisa.gov/sites/default/files/publications/rumor-control-startup-guide_508.pdf

It is important to note that a rumor control page is only one element of a successful MDM response strategy. Improving resilience of elections to MDM also requires reporting MDM narratives. The Center for Internet Security (CIS) was established to support the cybersecurity needs of the election subsector. The CIS can be leveraged to report real-time MDM via email at misinformation@cisecurity.org
Be sure to include links and screenshots as well as details on the misinformation and your jurisdiction.

RUMOR CONTROL PAGE START-UP GUIDE Misinformation, disinformation, and malinformation (MDM) can present risks to the election infrastructure community, its owners and operators, and the public. MDM can spread quickly, causing rumors to undermine facts. >> The risks of MDM range from undermining confidence in institutions to activating and inspiring dangerous behaviors and violence. This Rumor Control Page Start-Up Guide is for organizations seeking to dispel specific MDM narratives through transparent and authoritative information. Designed for use by state, local, tribal, and territorial (SLTT) government officials and private sector partners, this guide cites the Cybersecurity and Infrastructure Security Agency’s (CISA) Rumor Control page as a model for debunking inaccurate narratives. The recommendations in this guide are not intended to be one-size-fits-all and should be adapted to the capabilities and resources available, as well as the MDM risks facing the community. Organizations should only set up a rumor control webpage related to issues for which they have access to information and expertise necessary to properly dispel MDM narratives and articulate facts. Each organization that plans to set up a rumor control page may want to consult with the appropriate organization legal counsel, if possible, prior to beginning operations. What is a rumor control page? A rumor control page is a web page that offers the public accurate and authoritative sources of information which will help address common MDM narratives. It is provided by a trusted voice to either preempt or respond to developing narratives. Credible messengers are most effective at disproving falsehoods. A rumor control page should not be considered the sole source of truth, rather it should drive people to seek more information about a complex subject by directing them to other trustworthy sources. >>With a rumor control page, election officials and stakeholders can dispel rumors about the systems and assets they manage and have unique insight into. Some election offices may already have public information websites, which commonly include a “Frequently Asked Questions” page and/or press releases that seek to clarify information. In this sense, a rumor control page can be viewed as an extension of existing efforts….


ADDED NOTE BY WOLF

This stuff is just off-the-charts suspicious to me.


The Big Picture – CCP Subversion and Influence

I’m going to let people draw their own conclusions here. I’m not going to do anything other that talk about my own experiences with Chinese spies and assets in tech. You do the math.

It is beyond any doubt that the CULTURE of “trust and safety” is off-the-charts CCP in tone. There is SMOKE everywhere. And where there is smoke, there is probably fire.

It is my suspicion that “trust and safety” is filled with CCP-bots of various kinds, both Chinese and non-Chinese. However, diagnosing a spy from a non-spy is difficult, and requires an enormous amount of personal knowledge. I may have suspicions, but they are little more than that. Some may think I have TOO MANY suspicions, and that is fine.

However, it is my opinion that anybody with a potential CCP spy or asset background (thus including non-Chinese Americans) who strongly advocates or (even more tellingly) creates outcomes for things which serve CCP’s interests, and which oppose freedom-loving Americans’ interests, needs to be treated as such, particularly in regards to sensitive information or access. Just my opinion.

CCP loves to use women spies, operatives, and agents of influence, just like CIA. CCP girl spies are not just out of the mainland – many come out of Hong Kong, Taiwan, Singapore, Malaysia, Indonesia, Japan, England, Canada, America, and Latin America. Having them come out of somewhere other than the mainland, gives them a lot of flexibility, by lowering people’s guard and defenses.

CCP girl spies are smart, and the ones in tech tend to be excellent at both the coding side AND the schmoozing, verbal, business and policy side. They will sometimes HIDE one side of their abilities, if that deception is useful. However, in many cases, they will leverage both sides openly.

ChiSpies are often (but not always) among the most relentless social climbers you will ever meet. It’s the job – get as high as they can, targeting higher and higher up the chain. The Russian spies Maria Butina and Anna Chapman were the same way. I saw this much more often with the women than the men. The men tended to be far less obvious in trying to make new connections, whereas the women were extremely socially focused.

Many CCP spies are what I call “two-steppers”, which involve two generations of family as a form of cover. The parents may appear in America as refugees or economic migrants, being apolitical or (less often) even anticommunist. They may come from a place or background which throws off suspicion. The child, however, ends up in a sensitive position, and engages in actions, both of which clearly serve CCP interests. Thus, “two steps” to achieve a solid and easily dismissed infiltration.

CCP spy girls will often change their stories quickly and believably when questioned. They are quite good at planting false or compromising background information in social networks, although men tend to be used when planting something directly to another man, as a technique of peer influence.

Washington is the perfect environment for CCP players, because the operatives don’t stick out. The culture is one of influence and networking, so it looks like everybody else. ChiSpies tend to stick out more in the hinterlands.

Non-Chinese who carry water for CCP can be of many different types. Many are CCP allies, such as old Russian communists, American leftists, American rightists with economic ties to China, or dupes who become personally or professionally involved with agents.

It is important to understand that CCP operatives can have dramatically negative effects on other nations without doing ANYTHING illegal. I saw this form of stealthy sabotage over and over in tech. Just by burying into a key position and turning into an unremovable goldbrick, a CCP operative can create negative effects that have an organization chasing its tail. With only a bit more effort, such as engineered incompetence, organizations can be made weak, unprofitable, and ripe for takeover.

I put the “Trust and Safety” movement in this category of organizational sabotage. I think this entire movement serves CCP goals, and not American interests.

Others may disagree. They may assert that China helped America, if anything, by supporting “trust and safety” in any ways that it did, such as by providing “moderation” services.

To those who might think so, I simply add one more “unit” to my previous assessment of “4”.

W