What is the “Redirect Method” of targeting individuals? Organized stalking and artificial intelligence (AI)

What is the “Redirect Method” of targeting individuals? Targeted advertising, and targeted minds: mind control by any other name.

Moonshot CVE is designed to manipulate you, your choices, and your political beliefs.
Many online in the community of “targeted individuals” claim that they are subjected to mind control, which, in the day to day world, usually indicates mental illness to psychologists, social workers, and criminal defense attorneys who eventually encounter targeted individuals.These claims can seem outrageous or preposterous-after all-where is the mind control facility? Where is the mad doctor D.E. Cameron, and the electro-shocks and LSD with the CIA funding? And so on.
Those were the old days- now meet the new: artificial intelligence programmed to manipulate web search results targeting individuals thought processes, choices, and emotions via electronic and other methods.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

-Edward Snowden, NSA whistle blower, on warrantless NSA harassment and targeting of individuals

Here, below, is a snapshot of a real, actual program that is in fact  a form of mind control, where a viewer is “redirected” from one area of interest into another, where those who seek to influence and control the individual then perform an influence operation on the subject-against the subjects “free will”,and without the subjects informed consent.
Here we see that the amorphous and ever changing definition of potential “terrorist” has been applied to 320,000 persons, who have been for whatever reason, arbitrarily labelled first according to their political beliefs as indicated by their internet searches, and then, as potential jihadists or right wing conservatives in America.

Their internet searches are then analyzed using an NSA-like keyword program (Google and the PRISM and XKEYSCORE programs are CIA funded, while startup commpany Moonshot CVE appears to be a British operation , screened with 1700 key words selectors and then redirected in their searches on the internet.

This redirection is without a warrant, and without the informed consent of the searcher. Or: a man-in-the-middle attack, targeting the ambiguity and definitional peculiarities of pure speech alone. And- it is designed to influence peoples actions remotely.
What is most striking is that many early caricatures of mind control from the early 21st century and onward,  utilized hypnosis, and mental influence via “suggestion” as a form of controlling the actions of individuals, and groups, even whole societies. And here, we see that far beyond the caricature of a Svengali or a pulsing swirl of black and white imagery hypnotizing a subject, we have instead, Google-which collaborates with the CIA/NSA/FBI and all other intelligence agencies-acting as the arbiter and the impetus for guiding an individuals thoughts and actions through suggestion and algorithmic programming.

Not only does Google collaborate with these agencies, but in fact, it has worked specifically with NSA and others to develop programs of social control via search engine results, and more. So, here is one of the latest attempts to influence and alter the behaviors (behavior modification)  of people who are targeted with these programs:

From the Intercept:

“A GOOGLE-INCUBATED PROGRAM that has been targeting potential ISIS members with deradicalizing content will soon be used to target violent right-wing extremists in North America, a designer of the program said at an event at the Brookings Institution on Wednesday.
Using research and targeted advertising, the initiative by London-based startup Moonshot CVE and Google’s Jigsaw technology incubator targets potentially violent Jihadis and directs them to a YouTube channel with videos that refute ISIS propaganda.
In the pilot program countering ISIS, the so-called Redirect Method  collected the metadata of 320,000 individuals over the course of eight weeks, using 1,700 keywords, and served them advertisements that led them to the videos. Collectively, the targets watched more than half a million minutes of videos.
The event at Brookings was primarily about the existing program aimed to undermine ISIS recruiting. “I think this is an extremely promising method,” said Richard Stengel, U.S. Undersecretary of State for public diplomacy and public affairs.
Ross Frenett, co-founder of Moonshot, said his company and Jigsaw are now working with funding from private groups, including the Gen Next Foundation, to target other violent extremists, including on the hard right.
“We are very conscious as our own organization and I know Jigsaw are that this [violent extremism] is not solely the problem of one particular group,” Frenett said.”

 

First, they came for the jihadi’s-then they came for the ‘bad ideas’ in peoples minds….then…?

 

This targeting has been going on for decades, specifically targets individuals and whoe classes of persoons, and as we see above in commercial use-these programs are policing  “thoughts” expressed online, and more.

Here, from the early days of Snowden’s leaks:

Glenn Greenwald, reporting for the Guardian, wrote:

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s