Internet masking is what Mid to High tier targets will almost certainly face. The best way to introduce you to the practice of Internet Masking is imagine the NSA puts your internet experience into a special bubble where your ENTIRE internet experience is or can be tailored to a specific user.
Think of it like how video games have God Mode. Anything and everything can be can be realized in the game with the God Mode cheats on.
Article: https://www.nytimes.com/2018/02/18/us/politics/russian-operatives-facebook-twitter.html
While your under this program your social media feeds will be used to do all sorts of fuckery. We will go over some of what can be modified, then we will go over some strategies on how it can be used to manipulate your decision making, manipulate you, and get you to do catestrophic things.
Think of it like how video games have God Mode. Anything and everything can be can be realized in the game with the God Mode cheats on.
The NSA will put your mobile devices, smartphone, computers, smart home devices, smart TVs, and even computers that aren't yours (you're being tracked most likely if you're in this teir of this program, so this bubble can be put around computers and devices in your general location as well).
While inside this filter bubble, every part of your internet experience can be modified, swapped out, filtered, puppeted, deep faked, and gate kept. Your internet is now an experience, that is no longer susceptible to the rules of the real and democratic internet. The computers and devices you use to access the world wide waste of time are now just a window into a movie you're not in control of.
Every app, web site, social media platform, and communication hub you use is suseptable to fakery, modification, and gate keeping of messages, information, and content.
This is granted permission to be done to you for "National Security" reasons usually but as we are finding out more and more that obtaining FISA warrants to engage in this totalitarian behavior is beyond simplistic. Like I said, to be considered for mid to high level tiers of being a target of this COINTELPRO 2.0 program, you just have to be suspected or affiliated with a person who is identified as a leaker/moves sensitive information, or enemy of the state/hostile foreign actor in some form or fashion.
So without more introduction of Internet Masking (the official term is a INTRAnet). Let's go into how it can be modified to tailor your internet experience.
Web Sites - sites you go to regularly will almost certainly be veneered. I say veneered becuase data can be easily filtered, and even modified on your favorite web sites you visit every day.
Gizmodo, your favorite news web site, or blog can easily have a copy of the web sites you're visiting, overlayed and modified to show fictitious data and info. The articles, images, videos etc can be swapped out for modified content of the masked version of the web you are using. This is used to provide false information, and even create the illusion that your internet or important web sites might be "sending secret messages" to you. Trying to add to the psychological torment that you might be going schizo. This is basically an entrapment technique to gaslight you into a psych ward. These tools are trying to edge you towards saying crazy shit to a doctor, and get a "special" jacket.
Social Media - your favorite social platforms can and will ABSOLUTELY be masked and put inside a filter bubble. This is beyond a shadow ban.
If your unfamiliar with a shadow ban, basically the practice is to allow you to see everyone else, but they can see you or your messages. To keep you from figuring out you've been unfairly censored, the government internet monitoring center that initiated the shadowban on your account will have you interact with low level NSA monitors running multiple fake accounts or high end natural language bot accounts. Eventually for whatever reason, the data center will have you out of social media jail once they feel the reason they put you in there has subsided. NSA contractors are also human beings, so the opportunity for unfair fuckery being director towards you is always on the table.
How this is enhanced, is being able to "playlist" your supposedly AI generated social media content feeds. I say playlist, becuase that's what it felt like after a while. In the same way the Gangstalking discipline of the COINTELPRO 2.0 program likes to throw an assortment or situations at you, this practice of puppeting your social media is to get you to react to content or comments, debrief you in what you know through honey trap content & eytracking, or even sockpuppet a friend or trusted sources social media account to get you to release information, make you look foolish, or start conflict with them that the actual account has no idea exists.
Some of my research has informed me some of these experiences can be modified by the cookies in your phone, device or computer. I imagine there is more than one way to skin a cat to achieve the same results. Especially since it's geofenced so easily.
I imagine at higher levels this uses your devices camera to see who's using the device, maybe even voice printing. Considering government contractors are involved in a lot of this, I imagine it must lean on some auto verifying metrics. If they are unsure, they can just use backdoors to stare back at you to make sure you infact are the one using the device. Automation MUST be involved, government contracts are usually awarded to the lowest bidder.
Anywho, I will now give you the things to look out for in your social feed, of the kinds of things that can be ALSO modified to curate your information. These may seem like in interesting details, but combined these details can dramatically misinform a user to understand a different frame of their current situation.
Misinformation can lead you to actions with catastrophic consequences.
Now besides this great story above, of how Russian hackers organized two opposing groups to demonstrate across the street from each other, here are some of the details of what I have experienced, can be masked and modified, honey honey trapped and puppeted.
Let's talk about the things that can be modified in a social media post your just scrolling past, and break down why modifying the info can attribute to bad consequences.
Let's take a look at this post below. We're going to break it down, into it's pieces, and let you know what can be modified.
First things first, let's go over what can be modified on a social media post in this "God Mode" NSA software for your dynamic social media feeds.
The Likes Counter - This can be modified to enact social proof, which is one of the 6 scientific methods of persuasion. If everybody likes it, it must be worth following suit on this behavior trend.
The Comments - These comments can be faked by bots, and develop a internal narrative about what people think should be done about the contents of this article. It can also away your feelings about how to feel about what this post is about.
The Title - There is so much in a title. Words covey emotion, they can be triggering, they can put you at ease.
The Image - The image can be swapped out on a LEGIT post, & image color changed. Images can convey emotions, be triggering, and even blasphemous.
Posting Profile Name - can be changed to seem like a friend posted it, it can be changed to have an ALMOST identical spelling as a friend or follower, bit since your not paying attention to the details, you might assume it's from a friend or follower. The name could be fake entirely and it could be a bogus account as well.
The Profile Pic - this can be a picture taken from a friend's profile, and uploaded to a fake profile with the same or slightly different Posting Profile Name. This can give you the illusion a friend or associate posted this. You can be given a false sense that maybe they are being passive aggressive in relation to the post, or maybe the information is coming from a trusted sources.
Since your scrolling and half paying attention to the hundreds of posts in your feed, you might not notice these small details that you will make assumptions on.
The Date - the date can be modified, or a post from a long time ago could be put back in your feed after a heated moment with a friend or collegue. Since you don't pay attention to the date of the post this could be used to make you think something passive aggressive is being conveyed, or that something happened without you. I know, those seem like juvenile things to be worried about. But all it takes is a miscommunication or false communication to have catestrophic repercussions in your personal life. That's why these tools are so handy.
Also keep in mind that YOUR post and content, also people you are friends with posts and content can be "gatekept" or on hold until approved by a agent to make sure it isn't sending or communicating sensitive info. This lapse in communication can also be damaging. More than likely, you WON'T be informed that it's on hold like the graphic below states. Situational Awareness is a luxury most of this program rarely have.
This isn't just a problem for Facebook. This capability is available for ALL major social platforms.
There was even a a popular post on Reddit of the mechanics of this system breaking down.
So platforms like YouTube, Twitter, Instagram, Snapchat, TikTok, Pinterest, Reddit, Vimeo, ect...are all suseptable to this kind of post manipulation, gatekeeping, shadowbanning and censorship.
The practice in particular of Gate Keeping goes both ways too. Content is "pooled" by your internet monitor, then can be released in a generalized conversational matter. When I say released, I mean things like a tweet push notification by an account you follow, but until you do a particular thing or action by someone who is also observing you, they don't release the push notification that roughly pertains to you, but in a conversational matter. This will take a while to match up, but as shown in the videos in the beginning of this guide. A very obvious manipulation of your internet will be done to "speak" to you. After you understand that everything you look at on your phone and/or computer can be manipulated, timing and generalized release of your digital environment will then after be used to communicate to avoid you having obvious proof to use to begin an investigation.
The name of this game is, "Keep Your Hands Clean"
They can hear and see you, but since your abusers want a way to speak to you without a trace so you can't go running to the cops over well timed release of push notifications you were already gonna get, but are held and sent to you only when they conversationally pertain to communication.
This is not the only method of using controlled release, you can use several things in your digital environment to communicate without speaking while maintaining plausible deniability.(see below graphic)
This ability to modify your social media platform has some SUPER FUCKING SPOOKY effects on the COINTLEPRO 2.0 target. Especially if your not ready for it. Once you understand it can be modified in a means to communicate, ESPECIALLY if you don't have any understanding or I.T. background
It's feels less "follow the White rabbit" from the Matrix and more like the girl from The Ring coming out of your T.V. in the beginning.
See the below clip cued up at 5:05
After this initial "contact" that you WILL NOT be ready for and in my case did not log since I was so freaked out, you will at least understand that your digital provocators will be using this as a means of "communication."
I say that with quotes becuase they will only make a blatant outreach to you once, to let you know "hey I can say anything I want over this thing."
After you understand that your internet can be curated and crafted. You will look at EVERYTHING differently.
Every post, video, picture, comment, web site, email, etc.
You'll have good reason to do so. After that first initial "contact" so to speak, the people of the other end will begin to use indirecto communication to harass you.
What is indirect communication? Let's let Marriage.com answer that question.
So, every post, video, picture, comment, web site, email, etc. Will begin to accumulatively start to communicate scary ideas about what your provocators will do to loved ones, accusations, even candid reflections on how a subtle abuse happened and you were not made aware of it until some days or hours later. Always in a mocking connotation.
Since you will only get one BLATANT means of communication through your internet experience like our editor Steven got, this method of indirect communication will get slowly inch by inch less and less obvious. This method of indirect communication allows for all kinds of torment, without the risk of having something seem outright threatening to you or your loved ones, WHICH WILL HAPPEN CONSTANTLY to keep you on edge emotionally. It's also a perfect means of communicating, without worrying about damning evidence being recorded with screen shots or screen capture video. Make no mistake though, this can is is enormously tormenting, and will take your biggest fears and constantly beat you over the head with them.
E-mail - you can expect and notice if your keen enough, that your email will be filtered, and start to notice messages aren't getting returned.
This is because NOT filtering your email before it reaches you would be considered a "National Security Risk" or some bullshit excuse they use to step on your constitutional rights.
The same goes though for the indirect communication, and outright falsifying messages. Not getting a message altogether is also a risk while under this insane abuse of your civil rights.
You no longer have a device that's yours that you use to access the world wide web. You have a window into a curated experience.
This capability with internet God Mode wasn't actually created to scare people over the web. Believe it or not, its original purpose was to be able to change the internet experience as a means of covertly communicating with officers and later use the backdoors on phones & computers to change things if the agent needed them to back up his story like his agency uploading photoshopped photos into his phones gallery of a person he professes to know, or other situations that arose for under cover agents. As with most things used in this abuse, some of the scariest things are repurposed from tools Intel or law enforcement agencies needed, then later they found alternative uses for them.
4 Comments
Thanks for this it was pretty helpful and gave me a greater understanding of how all this works
ReplyDeleteI was NOT allowed to post this without signing into google, which tried to make me put in a phone number and alt email in 2 separate pages. i was already starting to have to fight the hysteria giggles before that now my face is twitching cause I'm trying to hurry up.
ReplyDeleteI am not gonna be okay am I? I really don't think I am... I cant even think of a way out of this net anymore. I dont know how to hang on to all the info and deliver it in a coherent manner anymore. everything you said. it was happening low-key until a week after mandates ended.
now i dont even have a timeline cause thing that happend last week are being described by these people as 3-4 weeks ago or yesterday.
I am so screwed.
This comment has been removed by the author.
DeleteWeavercore
DeleteAugust 19, 2025 at 10:11 AM
https://cointelpro2.blogspot.com/2021/06/internet-masking.html?sc=1755623351563#c2576667717178091749
do you use 'sc=' and '#c'? if you don't I have to know asap.