Skip to content

The Re‐Levation and Re‐Framation of The Snowden Revelations

jal edited this page Mar 24, 2024 · 6 revisions

In his book Profit Over People Noam Chomsky explains how the American deepstate aka CIA used undemocratic methods to rig the democratic process of Italy just after the world wars:

One of the first tasks of the CIA was to take part in the large-scale effort to undermine democracy in Italy In 1948, when it was feared that elections might come out the wrong way….

These are described as efforts “to stabilize. Italy.”

It is even possible to “destabilize” to achieve “stability.”

We confirm the truth of this from wikipedia that cites the CIA’s own admission:

The U.S. government's Voice of America radio began broadcasting anti-Communist propaganda to Italy on 24 March 1948.[11] The CIA, by its own admission, gave US$1 million (equivalent to $12 million in 2022) to what they referred to as "center parties"[12] and was accused of publishing forged letters to discredit the leaders of the PCI.[13] The National Security Act of 1947, that made foreign covert operations possible, had been signed into law about six months earlier by the American President Harry S. Truman.

"Since 9/11"

The PATRIOT act was outcome of the 9/11’s which changed america forever:

The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of the United States Congress, signed into law by President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001

The key point here is the narrative that the act was meant to protect the people from FOREIGN attack and this allowed it to pass through the constitutional filters:

Expanded surveillance abilities of law enforcement, including by tapping domestic and international phones; Easier interagency communication to allow federal agencies to more effectively use all available resources in counterterrorism efforts; and Increased penalties for terrorism crimes and an expanded list of activities which would qualify for terrorism charges. The law is extremely controversial due to its authorization of indefinite detention without trial of immigrants, and due to the permission given to law enforcement to search property and records without the owner's consent or knowledge. Since its passage, several legal challenges have been brought against the act, and federal courts have ruled that a number of provisions are unconstitutional.

On the Snowden Revelations and PRISM

Until the Snowden revelations it was socially responsible to chastise people that were claiming our governments spy on their respective citizenry against their own constitutional limitations:

Edward Snowden publicly revealed the existence of PRISM through a series of classified documents leaked to journalists of The Washington Post and The Guardian while Snowden, who was an NSA contractor at the time, was visiting Hong Kong.[1][2] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2]

The documents identified several technology companies as participants in the PRISM program, including Microsoft in 2007, Yahoo! in 2008, Google in 2009, Facebook in 2009, Paltalk in 2009, YouTube in 2010, AOL in 2011, Skype in 2011 and Apple in 2012.[22]

On the Constitutionality and Legality of the Prism Program

The prism program was an extension of the PATRIOT ACT

PRISM was enabled under President Bush by the Protect America Act of 2007 and by the FISA Amendments Act of 2008, which immunizes private companies from legal action when they cooperate with U.S. government agencies in intelligence collection.

Snowden’s disclosure showed the limitations of the self-spying to be unbounded:

Snowden's subsequent disclosures included statements that government agencies such as the United Kingdom's GCHQ also undertook mass interception and tracking of internet and communications data[23] – described by Germany as "nightmarish" if true.

Internal NSA presentation slides included in the various media disclosures show that the NSA could unilaterally access data and perform "extensive, in-depth surveillance on live communications and stored information" with examples including email, video and voice chat, videos, photos, voice-over-IP chats (such as Skype), file transfers, and social networking details.[2] Snowden summarized that "in general, the reality is this: if an NSA, FBI, CIA, DIA, etc. analyst has access to query raw SIGINT [signals intelligence] databases, they can enter and get results for anything they want.

On The Precedence of Banning Tik Tok and the Ramifications of Accusations Of Foreign Interference in Domestic Apps

We have already shown in our work the ability of the US Justice system to make long play strategy moves. Here we are noting that the precedence for the US Justice system is to work out a law that is specifically crafted to pass ONLY because its framed as a weapon of defense against FOREIGN threat but that with a simple re-framing can then be turned inward against the American people with that same justification.

Re-Framation and oPandaGhost

Here we are thinking of the possibility of the concept of a hidden player, hidden variables, a dark/shadow field, or the concept of a ghost or spook tele-communications field.

irre-communicant

eerie

The dual nature of the accusation that a foreign entity has subverted our tele-communications at a physical and local level.

Home

Home

Ideal Money Versions by John Nash

Global Games and “Globalization” by John Nash

The Nashian Orientation of Bitcoin

Ideal Poker

Bip

Nashian Orientation vs. Drivechains

nashLinter chatGPT Agent

nashLinterGPT Demo

Linter Knowledge

The following is written to be read in descending order and also doubles as the modules for our nashLinterAgent:

  1. Bitcoin Most Certainly Violates Mises Regression Theorem and This Fact Compels Clarification or Re‐Solution from the Mises Institute; And An Introduction to Szabonian Deconstruction
  2. Of The Fatal Inconsistencies In Saifedean Ammous' Bitcoin Standard
  3. On Terminating Bitcoin's Violation of Mises Regression Theorem With Games as Pre‐Market Commodity Valuators
  4. On the Szabonian Deconstruction of Money and Gresham's Law
  5. The Bitcoin Community is a Sybil Attack On Bitcoin
  6. On The Satoshi Complex
  7. On Cantillon and the Szabonian Deconstruction of the Cantillon Effect
  8. Understanding Hayek Via Our Szabonian Deconstruction of Cantillon
  9. On the Tools and Metaphors Necessary To Properly Traverse Hayek’s Denationalization of Money In the Face and Light of Bitcoin
  10. On the Sharpening of the Tools Necessary As a Computational Shortcut for Understanding Hayek’s Proposal The Denationalization of Money in The Context of the Existence of Bitcoin
  11. Our Tool for Szabonian Deconstruction of Highly Evolved Religions
  12. Thought Systems As Inputs For Turing Machines‐Our Tool For Framing Metaphors Of Intersubjective Truths
  13. On the Szabonian Metaphorical Framework For Objectively Traversing the Complex History of Mankind
  14. On the Synthesis and Formalization of Hayek, Nash, And Szabo’s Proposals For The Optimization of The Existing Global Legacy Currency Systems
  15. On The Re‐Solution of Central Banking and Hayekian Landscapes

Extra (these aren't added to the demo yet)


ChatGTP rheomodeLinguistAgent

rheomodeLinguist GTPAgent Demo

Bohmian Rheomode Modules


Rheomode Construction Examples


Quantum Curiosity (the Schrodinger's Cat) LLM Agent Modules


Nash Cooperation




Protocols etc.

Chomsky

Nash Program Upgrade

The Chomsky Primitive and It's Relevance and Significance To Bitcoin

Bohm

Other

Clone this wiki locally