What better way to maintain assassination lists than to release an eavesdropping tool disguised as anonymous money? The people drawn to currency anonymity are precisely the ones that the genocidal luciferian pedophiles ( http://thoughtcrimeradio.net/2014/12/franklin-coverup-the-white-house-call-boy-ring/ ) who control the “fed” ( http://thoughtcrimeradio.net/2017/03/censored-ben-franklin-on-the-real-cause-of-the-american-revolution/ ) will want to kill first when they come out in all their glory.
The CIA of the 60’s and 70’s would have made good use of such a tool in compiling their lists of targets in south vietnam ( http://www.douglasvalentine.com/index.htm ) indonesia ( http://thoughtcrimeradio.net/2018/03/the-indonesian-massacres-and-the-cia/ ) and iran ( http://thoughtcrimeradio.net/2014/10/beast-of-savak-prowls-streets-of-orlando-florida/ http://thoughtcrimeradio.net/2014/06/ancient-history-cia-helped-install-khomeini-in-iran/ ) who were subsequently rounded up by the west’s newly installed torture regimes. ( http://thoughtcrimeradio.net/2014/06/border-crisis-the-crocodile-tears-of-the-empire/ )
Oh yeah, sorry I’m supposed to have forgotten all that. Luckily it’s all ancient history and the institutions and their resident psychopaths which carried it out are all just a dark shadow from the past. Not. But at least they’re patriots who would never kill their own people. Not. But at least they’re flesh and blood human beings who have some basic sense of human decency. Not.
They are obstetrically empathically-lobotomized ( http://thoughtcrimeradio.net/2014/06/the-vagus-nerve-and-american-obstetrics-precision-lobotomy-of-empathy-and-altruism/ http://thoughtcrimeradio.net/2014/02/the-war-on-empathy-love-and-family/ http://thoughtcrimeradio.net/2015/01/the-political-consequences-of-child-abuse-2/ ) biological machines, drones of the teeming legally-constituted artificially intelligent collectively autocatalytic corporate hive which is so in our faces that we don’t even see it. Corporations, after all, are just people. Not.
From the beginning darpa’s plan for the internet was to use it as a massive surveillance grid. Between social media, GPS-enabled cell phones and bitcoin their wet dream has come true. Now go back to sleep and wait for the knock on the door.
NSA Has Been Tracking Bitcoin Users Since 2013, New Snowden Documents Reveal
During his 2015 trial, Silk Road creator Ross Ulbricht’s defense attorneys raised questions about the government’s case that, although they were ultimately disregarded by the jury, have continued to bother crypto users with an affinity for so-called “conspiracy theories.” They pointed out vagaries in the FBI’s account of its years-long pursuit of Ulbricht, and questioned whether the bureau had truly discovered Ulbricht’s involvement on its own, or whether it had help from other deep state elements, namely the National Security Agency.
Of course, the judge, who eventually sentenced Ulbricht to life in prison without the possibility of parole, refused to entertain their argument. But if they were correct, it would mean that the government’s whole case was built on evidence that was ultimately inadmissible.
As it turns out, Ulbricht’s lawyers were on to something.
In a blockbuster report published Tuesday in the Intercept, reporter Sam Biddle cited several documents included in the massive cache of stolen NSA documents that showed that the agency has been tracking bitcoin users since 2013, and has potentially been funneling some of this information to other federal agencies. Or, as Biddle puts it, maybe the conspiracy theorists were right.
It turns out the conspiracy theorists were onto something. Classified documents provided by whistleblower Edward Snowden show that the National Security Agency indeed worked urgently to target Bitcoin users around the world – and wielded at least one mysterious source of information to “help track down senders and receivers of Bitcoins,” according to a top-secret passage in an internal NSA report dating to March 2013. The data source appears to have leveraged the NSA’s ability to harvest and analyze raw, global internet traffic while also exploiting an unnamed software program that purported to offer anonymity to users, according to other documents….