🏴TheTruthAddict🏴
205 subscribers
18.4K photos
4.48K videos
1.26K files
38.5K links
thetruthaddict.substack.com
Fedi: @thetruthaddict@noauthority.social

XMR
8AVwAiPGVRGSrsfpvjjGBPQcZmHJpkRWwCripXFKdQVYLyc1zmhWAr2itCGn61btVhDcARZ1RpGc9LHSAoX1GJAZJrJA2Hs
Download Telegram
Forwarded from The Epstein List Is Real
Doing a little legal digging, if an agency's permits are invalid because of violations of said permits, any (invisible non existent warrants) they may have are invalid by default of agents being invalid to operate in state because of permit violations

This basically means ICE cannot operate and are basically an armed gang under a criminal presidency acting outside the law.

And we know how armed gangs get treated under their own rules.

They are Trumps Cartel enforcers essentially.

Cartel by definition is an organization operating outside law. What does this say about US gov, police, DHS and ICE?
Forwarded from The Daily Psyop (Mitchell)
This media is not supported in your browser
VIEW IN TELEGRAM
🔥 🇲🇽🇮🇱🚨BREAKING: Mexicans Set The Israeli Embassy on Fire! 🇲🇽🔥

The outrage is global. The world is rising against genocide.


🔗SOURCE ➡️ SilencedSirs

Related: 1/20 — Trump Says He Will Designate Mexican Cartels As ‘Terrorist Organizations,’ Vows To ‘Take Back’ Panama Canal

Follow us on Minds / X / Substack

Boost This Channel

Follow ➡️ @PsyopDaily
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from LiveLeak
This media is not supported in your browser
VIEW IN TELEGRAM
🇺🇸 Man arrested for documenting police and federal agents in Washington, D.C., last night.

Follow us -> LiveLeak
What the fuck could possibly go wrong?

'The synthetic bacteria contain a shorter genetic code with 57 codons rather than 64, freeing up space for further edits that might lead to new drugs or virus-resistant microbes'

Scientists Rewrite the Genetic Code of E. Coli, and It’s Drastically Different From Anything Found in Nature
https://www.smithsonianmag.com/smart-news/scientists-rewrote-the-genetic-code-of-e-coli-and-its-drastically-from-anything-else-found-in-nature-180987098/
They Saw It Coming: The 19th-Century Libertarian Critique of Fascism

'To speak of a 19th-century libertarian critique of fascism might seem anachronistic, since fascism is generally understood as a 20th-century phenomenon. But it did not spring from nothing, and the libertarians of the 19th century saw it in the making...'

https://c4ss.org/content/15126
Forwarded from Only cats
Forwarded from Save Alexandria
Forwarded from Save Alexandria
Forwarded from Save Alexandria
the-art-of-deception-training-for-a-new.pdf
27.8 MB
#FiveEyes The Art of Deception - Training for a New Generation of Online Covert Operations #Minerva #4GW #MemeticWarfare #5GW #NLP

Source: The Intercept
Forwarded from Save Alexandria
The Military Balance 2025.pdf
45.1 MB
>inb4 what is this?
It's a desk reference for world armed forces by personnel and equipment. There's a general analysis chapter followed by a series of chapters dividing the world into a geoscheme. Each region's chapter opens with regional analysis and closes with an encyclopedia-entry style section on each country. The forces, their basic organization, and their equipment are enumerated.

they scrape Jane's, SIPRI and other news orgs for defence data
it's professional wikipedia for the army, with all the attendant caveats.

funfact: when the Falklands War broke out, Argentina was so far off the average British junior officer's radar that they resorted to the Military Balance to get the gist of what they were up against
Forwarded from Save Alexandria
behavioural-science-support-for-jtrigs-effects.pdf
238.8 KB
Behavioural Science Support for JTRIG’s (Joint Threat
Research and Intelligence Group’s) Effects and Online HUMINT Operations

Mandeep K. Dhami, PhD
Human Systems Group, Information Management Department, Dstl

JTRIG targets a range of individual, group and state actors across the globe who pose criminal, security and defence threats. JTRIG staff use a range of techniques to, for example, discredit, disrupt, delay, deny, degrade, and deter. The techniques include: uploading YouTube videos containing persuasive messages; establishing online aliases with Facebook and Twitter accounts, blogs and forum memberships for conducting HUMINT or encouraging discussion on specific issues; sending spoof emails and text messages as well as providing spoof online resources; and setting up spoof trade sites.

#Intercept #MemeticWarfare #FiveEyes
#JTRIG #GHCQ
Forwarded from Save Alexandria
Forwarded from Save Alexandria
“High numbers of chat room contributions and words, as well as high levels of assertiveness and exaggeration can have a significant influencing effect during anonymous computer-mediated discourse (Miller & Brunner, 2008). Finally, during computer-mediated interaction, females are more likely to conform when the other party expresses confidence in their expertise verbally, whereas males are more likely to be influenced by quantitative expressions of confidence (Lee, 2005). Male online characters are also more likely to induce informational influence than female ones.”

P. 20 Behavioural Science Support for JTRIG’s (Joint Threat
Research and Intelligence Group’s) Effects and Online HUMINT Operations

Mandeep K. Dhami, PhD
Human Systems Group, Information Management Department, Dstl

#Intercept #MemeticWarfare #FiveEyes
#JTRIG #GHCQ #GCHQ
Forwarded from Save Alexandria
One Nation Under Blackmail, Volume 1: The Sordid Union Between Intelligence and Crime that Gave Rise to Jeffrey Epstein by Whitney Alyse Webb (2022)

One Nation Under Blackmail, Volume 2: The Sordid Union Between Intelligence and Crime that Gave Rise to Jeffrey Epstein by Whitney Alyse Webb (2022)

Please support this great researcher here:
https://unlimitedhangout.com