The city of San Francisco now has several terrorist threats that were sparked by federal agents and law enforcement. The Al-Qaeda terrorist group was used as a tactic, and targeted the Transamerica building--they're slaughtering the public, and causing mayhem among good people--the local law enforcement/feds of San Francisco, CA have been reluctant to care or be concerned about the threats that have been made on particular individuals and majorities of people.
If this sounds crazy, remember that the FBI is known to regularly manufacture terrorist threats in order to inflate the official number of terrorism plots that it "solves," and that false flags have been a routine U.S. warfare and propaganda tactic for decades. Also remember that the U.S. has aided terrorist groups like Al Qaeda and ISIS when this has been useful for its latest regime change proxy war against Syria. U.S. intelligence actors become alarmed about "terrorism" when dealing with political opponents, yet are glad to facilitate terrorism when it fits their own goals.
This is also made apparent by a Blue Leaks email from an individual named Terry Atkins, who's written about the psychological tactics the state uses to wear down its targets:
The goal is to identify the victim's strengths and vulnerabilities. With that information, perpetrators begin to publicly trivialize the target. Perpetrators are often fixated on the past [mistakes of the target]--they often publicly label targets as unstable, drug addicted, or threat to society either through misinformation or the repeated conjuring of past events. The goal is alienation and isolation. The next phase includes psychological attacks through cognitive and emotional infiltration. Organized stalkers attempt to invoke self-doubt through misinformation aimed at the manipulation of memory and perception often referred to as gas-lighting. Emotional infiltration includes the befriending or consoling the attacked individual and conversely initiate emotional aggression using language and implications.
Physical attacks against property include breeches of privacy and invasion of personal space, pseudo-random acts of violence and poisonings.
Again, none of the claims made throughout these leaked communications contradict the tactics that U.S. intelligence agencies are already known to use. These agencies send spies to infiltrate activist groups. They carry out psychological operations, whether through the media or through spying practices, with the goal of manipulating people's emotions and instilling counter-revolutionary thoughts into people's minds. They assault, harass, and attempt to assassinate their enemies, like when the CIA tried to poison Fidel Castro's ice cream.
All of the warfare methods that they use against their targets abroad, from strategic misinformation to espionage to terrorist attacks that get falsely blamed on the enemy, have been and will be used against the elements of American society that the state sees as a threat. If they're willing to kill random civilians in the streets to subdue protests, they'll employ all the tools for regime change that Steve Kangas described in his essay A Timeline of CIA Atrocities:
Propaganda, stuffed ballot boxes, purchased elections, extortion, blackmail, sexual intrigue, false stories about opponents in the local media, infiltration and disruption of opposing political parties, kidnapping, beating, torture, intimidation, economic sabotage, death squads and even assassination. These efforts culminate in a military coup, which installs a right-wing dictator. The CIA trains the dictator's security apparatus to crack down on the traditional enemies of big business, using interrogation, torture and murder.
A different version of such a regime is already in place within the United States. And it aims to use all of these measures and more to crack down on dissent in the coming years. The information from the Blue Leaks only helps confirm some of people's most frightening suspicions about what the state is capable of doing.
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).