Leaked: The UK’s secret blueprint with telcos for mass spying on internet, phones – and backdoors

From the TheRegister.co.uk we learn that the UK deep state is stealthily expanding it’s bulk information & surveillance powers :

“The UK government has secretly drawn up more details of its new bulk surveillance powers – awarding itself the ability to monitor Brits’ live communications, and insert encryption backdoors by the backdoor.

In its draft technical capability notices paper [PDF], all communications companies – including phone networks and ISPs – will be obliged to provide real-time access to the full content of any named individual within one working day, as well as any “secondary data” relating to that person.

That includes encrypted content – which means that UK organizations will not be allowed to introduce true end-to-end encryption of their users’ data but will be legally required to introduce a backdoor to their systems so the authorities can read any and all communications.

In addition, comms providers will be required to make bulk surveillance possible by introducing systems that can provide real-time interception of 1 in 10,000 of its customers. Or in other words, the UK government will be able to simultaneously spy on 6,500 folks in Blighty at any given moment.

According to the draft, telcos and other comms platforms must “provide and maintain the capability to disclose, where practicable, the content of communications or secondary data in an intelligible form and to remove electronic protection applied by or on behalf of the telecommunications operator to the communications or data.”

The live surveillance of individuals will require authorization from secretaries of state, overseen by a judge appointed by the prime minister. And there are a few safeguards built into the system following strong opposition to earlier drafts of the Investigatory Powers Act.”

There is no logical reason for expanding internet surveillance powers , the hackneyed & threadbare excuse ‘The War on Terror’ never had any legitimacy from the start . It would seem that even the slightest ‘information leak’ or ‘terror attack’ is rapidly monopolized & used to consolidate powers to hoover up any & all electronic information in a feverish & maniacal manner . So what is the underlying agenda ?

It was reported several years ago that the N.S.A & it’s Five Eyes poodles are attempting to create a working simulation of the Earth itself , named the Sentient World Simulation . The N.S.A has teamed up with the US Department of Defence to create the mother of all computer simulation games , it goes without saying that UK intelligence services will be rewarded for their subservience by gaining access to the simulation , partially at least .

special-relationship-flag

The ‘Special Relationship’

The real-time global simulation is an attempt to predict future events (such as elections) by monitoring all internet information & applying this information to complex computing models . It is said that the whole system can be scaled down to monitor & model individual countries & cities , businesses and probably individuals or groups of individuals (such as political parties) . It is said by some commentators that the simulation houses a ‘clone’ or ‘sim’ of a vast portion of the Western population , all based on internet used , governmental records , credit card spending patterns etc. In the modern era of electronic connectivity most individuals will leave a large electronic footprint which can be analyzed & disseminated .

sims

The Sims

Much of the information gleaned will more than likely be useless , any computer simulation is only as good as it’s human programming component . No doubt the bulk of the information will be used purely for commercial gain & profiteering , hard cash always buys corporations & wealthy individuals access to similar computing systems .

It is also true that as world events unfold that the system will be able to monitor & ‘learn’ from existing events , the butterfly effect can now be used with more accuracy & less chance of failure . For example , the system could evaluate & predict what effect a ‘terror attack’ or a ‘data leak’ could have on world events , such as an election in any given country . It also follows that if a favorable outcome is gleaned from the computing model then a similar ‘nudge’ could be synthetically introduced to a population or country to induce a certain pattern of events .

Interestingly we see more & more examples of ‘nudges’ that it would seem are introduced before any significant event in countries around the globe . Examples of this are the ‘hacking’ of Hilary Clinton before the US elections and more recently the ‘hacking’ of the French presidential candidate Emmanuel Macron . Also interesting are the relentless ‘terror attacks’ in countries across the globe , usually preceding pivotal events , I am sure that there are many , many more examples in the fields of politics , finance , corporate affairs etc .

Will we see an identifiable pattern of events emerging before the UK election this year ?  Or has there already been a series of ‘nudges’ in the required direction ?


Related :

  1. Leaked: The UK’s secret blueprint with telcos for mass spying on internet, phones – and backdoors
  2. The Queen’s Speech – Spot the Trojan Horse
  3. The Queen’s Speech – Trojan Horse #1

Also related :

  1. How the Government Predicts The Future – Inside the “Sentient World Simulation”
  2. How the Government Predicts The Future – Inside the “Sentient World Simulation” (Video)
  3. Sentient World Simulation (SWS): A Continuously Running Model of the Real World (PDF)
  4. Technocracy V: The Technocrats Tap in

Further related :

electronic-tattoo

‘Tattoo’s’ – They’re Everywhere

  1. Technocracy I
  2. Technocracy II: Big Brother in your Bag and the Auto-Matrix
  3. Technocracy III: Tagged (and Bagged?)
  4. Technocracy IV: The Technocrats Tap in (1)
  5. Technocracy V: The Technocrats Tap in (2)
  6. Technocracy VI: The Technocrats Tap in (3)
Advertisements
This entry was posted in Mind Control, Psychology, Psychotronic Warfare, State Surveillance & Control, Targeted Individuals, Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s