In-Q-Tel: How the C.I.A. morphed into BIG BROTHER


THE MYSTERY “Q” – SOLVED OR NOT – ALL ROADS LEAD TO “In-Q-Tel”. BIGGER THAN BIG  BROTHER!

Dianne Marshall
The Marshall Report

CIAiqtcia

Q Clearance Anon?  Are people being suckered or just sucked in?  What are the real clues that Q is providing?  It appears to me that the real rabbit hole to go down is that of the data mining wonderland.  I’ll start with Jim Breyer, head of Accel which is an American Venture Capital Firm with partnership to International Data Group named IDG AccelCLICK here to find out more about IDG-Accel

Breyer invested 13 million dollars into Facebook, the same year Gilman Louie joined the Board of National Venture Capital Association of America (NVCA) who was also the first CEO of the CIAstartup “In-Q-Tel” which is an American Venture capital firm in partnership with IDG Accel.  CIA owns Facebook?  

Print

In-Q-Tel is the strategic investor for the U.S. Intelligence and Defense Communities that identifies and adapts cutting edge technologies that (supposedly) make our nation safer.   In-Q-Tel was founded in 1999 for the purpose of funding companies that could develop technologies that the CIAcould USE TO GATHER DATA.

IQT Labs (short for In-Q-Tel) explore the art of possible emerging technology in areas of interest to national security.  These areas include cyber security, biotechnology, commercial space, and advanced data analytics.  Click her to read about IQT Labs

In a nutshell, The CIA Is and has been Investing in Firms That Mine Your Tweets and Instagram Photos from the onset.  Why?  To protect you?  Think again.

While so much speculation has been placed on “Who is Q Anon?” Q has told the readers that he has the highest security clearance there is.  Everyone runs to the President or someone in his top advisory capacity as the highest clearance so they think one of these must be “Q” .  Meanwhile the agency that even the President can’t dig into is the CIA.  The CIA has grown to be a monster of its’ own making.  A secret deep state society of its’ own.  Meaning although the President can use Military to control it – the CIA appears to have gone rogue and take orders from some place other and can withhold information, even from the West Wing.  We are seeing that now.  It is now proven that the CIA has such secrecy it can even plan the assassination of the Commander in Chief, i.e. the President of the United States as they did to President John F. Kennedy. And get away with it.

Therefore, President Trump, who already communicates with his people daily in Tweets, and can use the emergency broadcast system any time to speak to the people and the world,  would not have to go on Reddit channel and seek a select group of people on line to give clues out hoping they will connect dots and be the next “we the people” CIA????  While there are indeed crumbs and many that only high clearance would know about…. the CIA’s In-Q-Tel is such a source, and a much more likely one.

SAUDI AP_17142467002109-780x547REMEMBER when President Trump visited Saudi Arabia, King Salman showed him the mother of all “terrorist finding” cyber technology.  Remember also CIA is Mossad.  Mossad was the House of Saud. CIA is In-Q-Tel.  King Salman arrested the House of Saud. What does this new cyber technology hold?  What is President Trump holding?  What can it do?  What does President Trump think of this new artificial intelligence?  What do you think of this?  What is CERN?

I believe all dots connect and point to Q-Annon as being CIA’S In-Q-Tel.  Why?  To use a new form of data mining that I shall call – effective trolling.  Approach alternative media truth seekers in their own (secret) forum – 4-Chan.  Come in like one of them to do some real time data mining.  Why?  They could want to find what type of  “I- Q’s” human critical thinkers have by playing real time data finding games with real live people?  Is “Q” an artificial program?  Or a real person?

What does “Q” (high level clearance person) have to gain by throwing out bread crumbs?  What does “In-Q-Tel” have to gain by throwing out bread crumbs?

  1. To see what people know?
  2. Analyze how fast people can analyze clues?
  3. Find out how truth researchers think things through – know their thought processes?
  4. See how many people will research and how many will rely on others to find answers?
  5. See how fast people lose interest if answers aren’t found fast?
  6. See how many are discouraged and how long it takes to discourage certain groups?
  7. See how long it takes the last one to get discouraged if nothing is forthcoming?
  8. See how many remain if any, in the end?
  9. See if anyone finds the real “Q” and how long it will take?
  10. Lure other alternative news seekers into one hub?
  11. Data mine the hub?
  12. Find out who listens to them and who their followers are?
  13. Size up strengths and weaknesses?
  14. Infiltrate and classify researchers into groups?
  15. Identify those who really know and those who don’t know?
  16. Find who is capable of finding the real threats to their secrecy?
  17. Allow people to bla, bla, bla and reveal the things their algorithms can’t detect?
  18. Take the information and use it against them with their paid disinformation agents?
  19. See who and how many will do what they are asked by “Q” without knowing who “Q” is?
  20. Create disinformation wars among credible people?

I am sure there are more reasons, these are the ones just off the top of my head.  Before you laugh, remember they (In-Q-Tel) are already data mining everything you say on Google, Facebook, Twitter, Instagram, and all social media sites.

We all (at least those that will be reading this story) know the NSA  has breeched our privacy rights and Google, Twitter, and Facebook are data mined to monitor everything we post, tweet, and use algorithms  to spy on our on line communications to find out our friends, likes, dislikes, etc. from our computers, TV’s, smart phones and other devices.

AI-artikel-foto

What many may not know is the long arm of Q behind it all.  SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets, are just a few of the technologies being pursued by In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept. This is a must read – click here for “Intercept Article”.

Excerpts from “Intercept Article Titled: The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos”:
There are numerous undisclosed companies receiving In-Q-Tel funding, the research focus that stands out is social media mining and surveillance; the portfolio document lists several tech companies pursuing work in this area, including Dataminr, Geofeedia, PATHAR, and TransVoyant .  Those four firms, which provide unique tools to mine data from platforms such as Twitter, presented at a February “CEO Summit” in San Jose sponsored by the fund, along with other In-Q-Tel portfolio companies.

Q anon gqp6hro5agsl

The investments appear to reflect the CIA’s increasing focus on monitoring social media. Last September, David Cohen, the CIA’s second-highest ranking official, spoke at length at Cornell University about a litany of challenges stemming from the new media landscape. The Islamic State’s “sophisticated use of Twitter and other social media platforms is a perfect example of the malign use of these technologies,” he said.
Social media also offers a wealth of potential intelligence; Cohen noted that Twitter messages from the Islamic State, sometimes called ISIL, have provided useful information. “ISIL’s tweets and other social media messages publicizing their activities often produce information that, especially in the aggregate, provides real intelligence value,” he said.
The latest round of In-Q-Tel investments comes as the CIA has revamped its outreach to Silicon Valley, establishing a new wing, the Directorate of Digital Innovation, which is tasked with developing and deploying cutting-edge solutions by directly engaging the private sector. The directorate is working closely with In-Q-Tel to integrate the latest technology into agency-wide intelligence capabilities.
Dataminr directly licenses a stream of data from Twitter to spot trends and detect emerging threats. 
Dataminr directly licenses a stream of data from Twitter to visualize and quickly spot trends on behalf of law enforcement agencies and hedge funds, among other clients.

artificial maxresdefault
Geofeedia collects geotagged social media messages to monitor breaking news events in real time. 
Geofeedia specializes in collecting geotagged social media messages, from platforms such as Twitter and Instagram, to monitor breaking news events in real time. The company, which counts dozens of local law enforcement agencies as clients, markets its ability to track activist protests on behalf of both corporate interests and police departments.
PATHAR mines social media to determine networks of association. 
PATHAR’s product, Dunami, is used by the Federal Bureau of Investigation to “mine Twitter, Facebook, Instagram and other social media to determine networks of association, centers of influence and potential signs of radicalization,” according to an investigation by Reveal.
TransVoyant analyzes data points to deliver insights and predictions about global events. 
TransVoyant, founded by former Lockheed Martin Vice President Dennis Groseclose, provides a similar service by analyzing multiple data points for so-called decision-makers. The firm touts its ability to monitor Twitter to spot “gang incidents” and threats to journalists. A team from TransVoyant has worked with the U.S. military in Afghanistan to integrate data from satellites, radar, reconnaissance aircraft, and drones.

Below – some of “Q” Anon’s bead crumbs.

DOUsZiWWsAAxjYI

After researching In-Q-Tel further, you will see it is far reaching and has grown into a monstrous data mining organization.

“Lee Rowland, a senior staff attorney with the American Civil Liberties Union said, “When you have private companies deciding which algorithms get you a so-called threat score, or make you a person of interest, there’s obviously room for targeting people based on viewpoints or even unlawfully targeting people based on race or religion.  There is a dangerous trend toward government relying on tech companies to “build massive dossiers on people” using “nothing but constitutionally protected speech.”

Now I will ask you this…..why would Twitter take down Rosanne  Barr’s account for asking who “Q” Annon was?   I believe the algorithm told on itself.

qDO5iq1bWAAEJopZ

Dianne

UPDATE:  An article from 2000 revealed that the 7 mega computers at the CIA are named after the 7 dwarfs.  Read article here: Spy VS Spy.    Those following Q (In-Q-Tel) be aware of all things.   Who is Snow White?  CIA and its’ 7 dwarfs?

Excerpt:  “Global intelligence computer databases deep inside Central Intelligence Agency headquarters here are named Doc, Dopey, Grumpy, Sleepy, Happy, Bashful and Sneezy?
Yes, the CIA has indeed named its huge computers after the Seven Dwarfs — and for all I know has a slinky blond in its cloak-and-dagger Directorate of Operations code-named Snow White.”

http://youtu.be/qKBITJTZJqY

___
http://themarshallreport.wordpress.com/2017/11/24/the-mystery-q-solved-or-not-all-roads-lead-to-in-q-tel-bigger-than-big-brother/

This entry was posted in Uncategorized. Bookmark the permalink.