Anonymous ID: 67c28c May 11, 2018, 8:32 a.m. No.1371686   🗄️.is 🔗kun

>>1371528

Papapotomus.

 

Though it is a bit more complicated than that. Manafort, Page, and Flynn were all being tapped as sources and operatives in FBI/CIA investigations into Russian attempts to influence the energy and political sectors. Their cases are all 'obvious' when you look at the redactions from the reports and court cases. However, they are officially classified, likely TS Noforn.

 

See how that insurance policy worked? FBI and CIA officials with relevant clearances knew of those operations and likely thought they were setting POTUS up with a devastating scandal they could twist, later.

 

Of course, when you are talking about a counter-movement POTUS is simply the tip of the spear on… Then, such a predictable scheme becomes a liability.

Anonymous ID: 67c28c May 11, 2018, 8:52 a.m. No.1371892   🗄️.is 🔗kun

>>1371655

That assumes it was necessary for you to so overtly state your displeasure or way of thinking.

 

If I have your phone and computers… Then I know what information you have accessed, how frequently, what you search for, and what you move to/from each search. I can see what images you save, what ideas you express in confidence… Etc.

 

But this is also more literal. I can use an algorithm to render speech to text rather cheaply on today's ARM processors. This is a text file that can be compressed to be transmitted, or can even be processed for context locally to key on full recording. GPS coordinates can be set to form areas where -any- connected device will become a full AV bug.

 

So, not only can I know what you voluntary offer the system by interacting with it, I can eavesdrop on what you or others say around the device. If need be, I can also target you for aggressive collection where connected cameras with appropriate hardware are set to record at signs of your biometric hashes (algos that work on larger sets of data to define identifying points and then render it as a hash that can be quickly computed and compared from real time sources). If I suspect you live in a certain area or know where you work, I can, in theory, set bounds in which every mobile phone will be looking for traces of you and sending that information to me.

 

Then, I can use all of this information to assess the threat you pose to my system. High threats are not necessarily the first targets. High threats are usually vigilant and harder targets. Round-ups of all the critics tend to lend them credibility. Identifying people likely to listen to them, likely to turn against the system once evidence of malign intent becomes prevalent…. Those are the people to lock away on petty and innumerable crimes. They didn't check the right box on their tax form, they crossed the street outside of a crosswalk, they said a mean thing about some minority.

 

I can hoop and holler all I want. I am a conspiracy theorist. If the people who do take me somewhat seriously are the ones being thrown in jail… Then how am I to alert people to danger?