Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: generally
The core is what counts.

Remember the Clipper chip?

https://www.techopedia.com/definition/1766/clipper-chip

Techopedia explains Clipper Chip

The clipper chip used what is called a skipjack algorithm, which was developed by the U.S. National Security Agency (NSA) and classified as secret. It contained the CAPSTONE chip, which provided all cryptographic processing. The clipper chip was supposed to be adopted by all telecommunication companies in the U.S. to provide encryption, thus preventing outside eavesdropping. However, there was a back door; the government had the decryption key and anyone legally authorized could gain access to the key and decrypt all messages.

Of course consumers complained and they backed off... NOT.

Capstone chip - similar to Keystone?

https://www.scientific-computing.com/press-releases/keystone-based-system-chip

Texas Instruments has announced a new KeyStone-based System on a Chip (SoC) and EVM for development of high performance computer systems. The device known as '66AK2H14' provides developers with access to a 10Gbps Ethernet switch-on-chip. The company claims the inclusion of the 10GigE switch, along with the other high-speed, on-chip interfaces can save board space which has the potential to lower system cost and power. The new evaluation module (EVM) released in conjunction with this device enables developers to evaluate and benchmark the system.

The 66AK2H14 SoC provides computational DSP performance at 307 GMACS/153 GFLOPS and 19600 DMIPS of ARM performance, making it ideal for applications such as video surveillance, radar processing, medical imaging, machine vision, and geological exploration.

A 10Gbps Ethernet switch on the chip...how convenient for video surveillance etc.

Just tossing this out there...

123 posted on 03/07/2019 6:53:28 PM PST by eldoradude
[ Post Reply | Private Reply | To 87 | View Replies ]


To promote open and honest discourse I'll repost this:

Ordinary trolls are just people — jerks, perhaps, but still, regular people.

They post what they think and want and feel: and part of this, is that people want to be loved, wanted, accepted, and agreed with.

Certain types of responses cause them to back away, to reconsider; maybe, in a rare moment, to admit they were wrong.

But paid disruptors are different. Sure, being of the left, they loathe us and really wish us dead. (Literally.)

But even that isn’t enough to account for their resistance to counterattacks.

It is that they consider the trolling a job: and in many cases, have a literal script, a bag-of-tricks for HOW to derail a thread, get other people so mad as to get them banned, how to discredit a thread or eventually destroy an entire forum.

Some of the trolls are so sang-froid (”cold-blooded”) that it is clear they are professional mercenaries: whether from that damned faggot David Brock’s Share Blue, or somewhere else spawned in Omoeba’s or ValJar’s rectum, I don’t know.

But treating them like regular, but misguided posters, is simply not going to work.

Look upthread, or ask someone else, about the COINTELPRO techniques posted by Q or one of the anons.

I reproduce a section here:

COINTELPRO Techniques for dilution, misdirection and control of a internet forum.

There are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a ‘uncontrolled forum.’

Technique #1 - ‘FORUM SLIDING’

If a very sensitive posting of a critical nature has been posted on a forum - it can be quickly removed from public view by ‘forum sliding.’ In this technique a number of unrelated posts are quietly prepositioned on the forum and allowed to ‘age.’ Each of these misdirectional forum postings can then be called upon at will to trigger a ‘forum slide.’ The second requirement is that several fake accounts exist, which can be called upon, to ensure that this technique is not exposed to the public. To trigger a ‘forum slide’ and ‘flush’ the critical post out of public view it is simply a matter of logging into each account both real and fake and then ‘replying’ to prepositined postings with a simple 1 or 2 line comment. This brings the unrelated postings to the top of the forum list, and the critical posting ‘slides’ down the front page, and quickly out of public view. Although it is difficult or impossible to censor the posting it is now lost in a sea of unrelated and unuseful postings. By this means it becomes effective to keep the readers of the forum reading unrelated and non-issue items.

Technique #2 - ‘CONSENSUS CRACKING’

A second highly effective technique (which you can see in operation all the time at www.abovetopsecret.com) is ‘consensus cracking.’ To develop a consensus crack, the following technique is used. Under the guise of a fake account a posting is made which looks legitimate and is towards the truth is made - but the critical point is that it has a VERY WEAK PREMISE without substantive proof to back the posting. Once this is done then under alternative fake accounts a very strong position in your favour is slowly introduced over the life of the posting. It is IMPERATIVE that both sides are initially presented, so the uninformed reader cannot determine which side is the truth. As postings and replies are made the stronger ‘evidence’ or disinformation in your favour is slowly ‘seeded in.’ Thus the uninformed reader will most like develop the same position as you, and if their position is against you their opposition to your posting will be most likely dropped. However in some cases where the forum members are highly educated and can counter your disinformation with real facts and linked postings, you can then ‘abort’ the consensus cracking by initiating a ‘forum slide.’

Technique #3 - ‘TOPIC DILUTION’

Topic dilution is not only effective in forum sliding it is also very useful in keeping the forum readers on unrelated and non-productive issues. This is a critical and useful technique to cause a ‘RESOURCE BURN.’ By implementing continual and non-related postings that distract and disrupt (trolling ) the forum readers they are more effectively stopped from anything of any real productivity. If the intensity of gradual dilution is intense enough, the readers will effectively stop researching and simply slip into a ‘gossip mode.’ In this state they can be more easily misdirected away from facts towards uninformed conjecture and opinion. The less informed they are the more effective and easy it becomes to control the entire group in the direction that you would desire the group to go in. It must be stressed that a proper assessment of the psychological capabilities and levels of education is first determined of the group to determine at what level to ‘drive in the wedge.’ By being too far off topic too quickly it may trigger censorship by a forum moderator.

Technique #4 - ‘INFORMATION COLLECTION’

Information collection is also a very effective method to determine the psychological level of the forum members, and to gather intelligence that can be used against them. In this technique in a light and positive environment a ‘show you mine so me yours’ posting is initiated. From the number of replies and the answers that are provided much statistical information can be gathered. An example is to post your ‘favourite weapon’ and then encourage other members of the forum to showcase what they have. In this matter it can be determined by reverse proration what percentage of the forum community owns a firearm, and or a illegal weapon. This same method can be used by posing as one of the form members and posting your favourite ‘technique of operation.’ From the replies various methods that the group utilizes can be studied and effective methods developed to stop them from their activities.

Technique #5 - ‘ANGER TROLLING’

Statistically, there is always a percentage of the forum posters who are more inclined to violence. In order to determine who these individuals are, it is a requirement to present a image to the forum to deliberately incite a strong psychological reaction. From this the most violent in the group can be effectively singled out for reverse IP location and possibly local enforcement tracking. To accomplish this only requires posting a link to a video depicting a local police officer massively abusing his power against a very innocent individual. Statistically of the million or so police officers in America there is always one or two being caught abusing there powers and the taping of the activity can be then used for intelligence gathering purposes - without the requirement to ‘stage’ a fake abuse video. This method is extremely effective, and the more so the more abusive the video can be made to look. Sometimes it is useful to ‘lead’ the forum by replying to your own posting with your own statement of violent intent, and that you ‘do not care what the authorities think!!’ inflammation. By doing this and showing no fear it may be more effective in getting the more silent and self-disciplined violent intent members of the forum to slip and post their real intentions. This can be used later in a court of law during prosecution.

Technique #6 - ‘GAINING FULL CONTROL’

It is important to also be harvesting and continually maneuvering for a forum moderator position. Once this position is obtained, the forum can then be effectively and quietly controlled by deleting unfavourable postings - and one can eventually steer the forum into complete failure and lack of interest by the general public. This is the ‘ultimate victory’ as the forum is no longer participated with by the general public and no longer useful in maintaining their freedoms. Depending on the level of control you can obtain, you can deliberately steer a forum into defeat by censoring postings, deleting memberships, flooding, and or accidentally taking the forum offline. By this method the forum can be quickly killed. However it is not always in the interest to kill a forum as it can be converted into a ‘honey pot’ gathering center to collect and misdirect newcomers and from this point be completely used for your control for your agenda purposes.

CONCLUSION

Remember these techniques are only effective if the forum participants DO NOT KNOW ABOUT THEM. Once they are aware of these techniques the operation can completely fail, and the forum can become uncontrolled. At this point other avenues must be considered such as initiating a false legal precidence to simply have the forum shut down and taken offline. This is not desirable as it then leaves the enforcement agencies unable to track the percentage of those in the population who always resist attempts for control against them. Many other techniques can be utilized and developed by the individual and as you develop further techniques of infiltration and control it is imperative to share then with HQ.

https://cryptome.org/2012/07/gent-forum-spies.htm

128 posted on 03/07/2019 7:02:24 PM PST by eldoradude
[ Post Reply | Private Reply | To 123 | View Replies ]

To: eldoradude

>>Techopedia explains Clipper Chip...Capstone chip - similar to Keystone?

It’s 1 am and your post was DEFINITELY worth waking up for. Many thanks.


286 posted on 03/07/2019 10:35:24 PM PST by mairdie (http://www.iment.com/maida/family/father/catharineburnett/hotshots.htm)
[ Post Reply | Private Reply | To 123 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson