- Spitfire List - http://spitfirelist.com -

FTR #786 The Adventures of Eddie the Friendly Spook, Part 16: The Obverse Oswald–Update and Summary Analysis

Dave Emory’s entire life­time of work is avail­able on a flash drive that can be obtained here. [1] (The flash drive includes the anti-fascist books avail­able on this site.)

Listen: MP3

Side 1 [2]  Side 2 [3]

[4]

[5]

Eddie Snowden unplugged

Introduction: Supplementing and summing up the exhaustive FTR series on “The Eddie the Friendly Spook” series, this program sets forth the Snowden “psy-op” against the background of Lee Harvey Oswald, the U.S. spy infiltrated into the Soviet Union and then into leftist organizations in the United States, Oswald was framed for JFK’s assassination and then killed before he could defend himself.

Whereas Oswald was portrayed as a villain, Eddie the Friendly Spook’s operation is the obverse, with Snowden decamping first to China and then to Russia. Snowden is not only a spy but a fascist, who advocates the elimination of Social Security and the return to the gold standard.

Snowden’s Russian sojourn appears to have been arranged by WikiLeaks [6], which also appears to have arranged his flight to China from Hawaii. Throwing Obama’s “reboot” with Russia under the bus [7], the Snowden “op” is probably part of the broader operation–financed to the tune of $5 billion [8]–that brought the Nazi heirs to the OUN/B to power in the Ukraine. We do not think it is coincidental that Citizen Greenwald’s financial angel Pierre Omidyar [9] helped to finance the fascist coup [10] in Ukraine, nor do we think it coincidence that the elements of the Swedish neo-Nazi milieu [11] to which Carl Lundstrom [12] belongs are decamping to Ukraine to bolser the Swoboda and Pravy Sektor fascists.

[13]

The Turner Diaries and Hunter, published by Greenwald's client, the National Alliance

German [14] and Brazilian [15] drives to update and popularize their IT sectors, supposedly in response to Edward Snowden’s “disclosures,” can be safely assumed to have been anticipated quite some time ago. The things Snowden has discussed have not only been known for some time, but are standard operating procedure for intelligence services all over the world.

The Snowden “psy-op” is almost certainly a device for propagandizing on behalf of the German/Brazilian drive, which constitutes economic warfare against the U.S. high-tech business [16], under the circumstances.

The program also notes other aspects of this apparent psy-op, including further destabilization of the Obama administration [17] and U.S. foreign policy.

[18]

Matthew Hale, Glenn Greenwald's pro-bono client, convicted of solicitation of murder.

With Citizen Greenwald’s Nazi clients having foreshadowed the 9/11 attacks [19] and predicted and advocated the destruction of the United States through terrorist acts using WMD’s, it appears that the ongoing destabilization of the NSA and GCHQ [20] as a result of the actions of the Obverse Oswald and the forces that control him are preparatory for just such an onslaught.

We are strongly supportive of the NSA and GCHQ for this reason.

We end on a speculative note: Eddie the Friendly Spook’s economic and political theories are fascist and fundamentally opposed to Franklin Delano Roosevelt’s New Deal. His belief that we must get rid of Social Security and bring back the gold standard are propagated by the Ludwig von Mises Institute, the ideological font of Snowden’s political idol Ron Paul.

Arguably the most famous member of the Austrian School of Economics that spawned and dominates the Ludwig von Mises Institute is Friedrich von Hayek. An immigrant from Austria, von Hayek was ostensibly an “anti-Nazi.” In 1944, he published The Road to Serfdom, which attacks the New Deal policies of F.D.R. Begun well before the Canaris memo, von Hayek’s work has been a staple of GOP/Underground Reich propaganda ever since its publication, as well as a foundational element of revisionist history.

We present a document [21] drawn up by the head of German military intelligence (the Abwehr) in 1944. Abwehr chief Admiral Wilhelm Canaris notes that undercover propaganda assets in the United States should be utilized to generate anti-Roosevelt sentiment and help his electoral defeat in the 1944 elections. The Third Reich viewed the defeat of Roosevelt as consummately important.

We  wonder if von Hayek–ostensibly one of the “anti-Nazis” cryptically referred to at the end of the document below, was one of the Third Reich’s undercover propaganda and psychological warfare assets among the Allies. The Road to Serfdom was heavily publicized by The Readers Digest in the UniTed States.

We are also of the considered professional opinion that the Ludwig von Mises Institute is an important element of the Underground Reich.

Program Highlights Include: Supplemental information [22] about U.S. high-tech companies collaborating in order to hold down the salaries of their employees; discussion of the European Telecommunications Standards Institute’s [23] mandating of backdoors to European software and hardware so that intelligence services and law enforcement can conduct exactly the kind of surveillance that Germany, Brazil and the EU are complaining about; Snowden’s leaks about monitoring of German high-tech [24] companies have compromised NSA and GCHQ surveillance of targets that are absolutely legitimate and have terror-related concerns; the leaking of NSA spying in Chinese tech giant Huawei while Michelle Obama was in China on a good will visit and on the eve of Chinese President Xi’s visit to Europe to speak with Angela Merkel; review of Greenwald’s Nazi client National Alliance and their foreshadowing of the 9/11 attacks and the degree of coincidence of those attacks with Hitler’s plans for destroying the United States [25]; comparison of the GOP with Mussolini and Hitler [26].

1a. The level of hypocrisy on the part of the European countries on the NSA and GCHQ spying is consummate:

“NSA Surveillance Sparks Talk of National Internets” by John Blau; IEEE Spectrum; 1/23/2014. [23]

. . . . . . . .Backdoors are essentially software designs in networks that allow authorities to conduct “deep packet” inspection to monitor and intercept data. The European Telecommunications Standards Institute, for instance, works closely with operators, government, and law enforcement agencies to integrate surveillance capabilities into communications networks. [!!!–D.E.] But many operators are concerned about how access to the backdoor “keys” is regulated, and, in the case of some equipment vendors—notably China’s Huawei Technologies Co.—about whether secret backdoors are built into network systems without operators’ knowledge. . . .

1b. The discussion underscores analysis of the loss of business by U.S. tech firms as a result of the Snowden “op.”

“Revelations of N.S.A. Spying Cost U.S. Tech Companies” by Claire Cain Miller; The New York Times; 3/22/2014. [16]

Microsoft [27] has lost customers, including the government of Brazil.

IBM [28] is spending more than a billion dollars to build data centers overseas to reassure foreign customers that their information is safe from prying eyes in the United States government.

And tech companies abroad, from Europe to South America, say they are gaining customers that are shunning United States providers, suspicious because of the revelations by Edward J. Snowden that tied these providers to the National Security Agency [29]’s vast surveillance program.

Even as Washington grapples with the diplomatic and political fallout of Mr. Snowden’s leaks, the more urgent issue, companies and analysts say, is economic. Technology executives, including Mark Zuckerberg of Facebook, raised the issue when they went to the White House on Friday for a meeting with President Obama.

It is impossible to see now the full economic ramifications of the spying disclosures — in part because most companies are locked in multiyear contracts — but the pieces are beginning to add up as businesses question the trustworthiness of American technology products. . . .

. . . . “It’s clear to every single tech company that this is affecting their bottom line,” said Daniel Castro, a senior analyst at the Information Technology and Innovation Foundation, who predicted that the United States cloud computing industry could lose $35 billion by 2016 [30].

Forrester Research, a technology research firm, said the losses could be as high as $180 billion [31], or 25 percent of industry revenue, based on the size of the cloud computing, web hosting and outsourcing markets and the worst case for damages.

The business effect of the disclosures about the N.S.A. is felt most in the daily conversations between tech companies with products to pitch and their wary customers. The topic of surveillance, which rarely came up before, is now “the new normal” in these conversations, as one tech company executive described it. . . . .

1c. In FTR #769 [20], we noted that the GOP (its “shut down,” libertarian wing in particular) has twinned with the Underground Reich, Germany and Brazil in the economic warfare against U.S. high-tech business. An article from The Courthose News Service sums up the character of the Republican party.

“Weak Fas­cism” by Robert Kahn; Cour­t­house News Ser­vice; 3/28/2014. [26]

Repub­li­cans are liv­ing down to their self-proclaimed role as the party of ideas. What they have been propos­ing for years is a form of weak fas­cism: not one in which the cor­po­ra­tions are put in har­ness to strengthen the gov­ern­ment, but one in which the gov­ern­ment is shack­led to the power of cor­po­ra­tions.

Fas­cism, Webster’s Sec­ond Edi­tion tells us, is “a sys­tem of gov­ern­ment char­ac­ter­ized by rigid one-party dic­ta­tor­ship, forcible sup­pres­sion of the oppo­si­tion (unions, other, espe­cially left­ist, par­ties, minor­ity groups, etc.), the reten­tion of pri­vate own­er­ship of the means of pro­duc­tion under cen­tral­ized gov­ern­ment con­trol, bel­liger­ent nation­al­ism and racism, glo­ri­fi­ca­tion of war, etc.: first insti­tuted in Italy in 1922.”

The only dif­fer­ence between Mussolini’s Fas­cism and Repub­li­can fas­cism is the four words under cen­tral­ized gov­ern­ment con­trol, yet if pri­vate cor­po­ra­tions con­trol or can dic­tate to the gov­ern­ment, that’s a dis­tinc­tion with­out a difference.

Mus­solini har­nessed the cor­po­ra­tions to the state. Repub­li­cans would har­ness the state to the cor­po­ra­tions. They claim they want to free the cor­po­ra­tions from the shack­les of gov­ern­ment.. . .

. . . .Local con­trol — states’ rights, in vot­ing, racial poli­cies, “sci­ence” and reli­gious cur­ricu­lum in pub­lic schools, what women should be allowed to do, and so on, is, of course, a ban­ner cause of the so-called tea party — the Repub­li­can fascists.

Mod­ern Amer­i­can fas­cism, then, has just one essen­tial dif­fer­ence from Ital­ian or Ger­man fas­cism of the bloody 20th cen­tury: whether the con­trols should be exerted by gov­ern­ment or cor­po­ra­tions.

Tea party Repub­li­cans are squarely on the side of the cor­po­ra­tions, and this is a place where Repub­li­can fas­cism and Lib­er­tar­i­ans meet.

2a. German e-mail providers have touted a “secure data storage” capability. This has been described as “great mar­ket­ing stunt at exactly the right time.” We are of the opinion that the Snowden “op” was executed and timed to provide psychological impetus to the ramping up of German and Brazilian internet and high-tech business. Note that these “secure” e-mail and data storage capabilities will NOT be secure from BND surveillance.

“Crypto Experts Blast Ger­man e-mail Providers’ ‘Secure Data Stor­age’ Claim by Cyrus Fari­var; Ars Tech­nica [14]; 8/10/2013. [14]

GPG devel­oper calls move a “great mar­ket­ing stunt at exactly the right time.”

In the wake of the shut­down [32] of two secure e-mail providers in the United States, three major Ger­man e-mail providers have banded together [33] to say that they’re step­ping for­ward to fill the gap. There’s just one prob­lem: the three com­pa­nies only pro­vide secu­rity for e-mail in tran­sit (in the form of SMTP TLS) and not actual secure data storage.

GMX, T-Online (a divi­sion of Deutsche Telekom), and Web.de—which serve two-thirds of Ger­man e-mail users—announced [34] on Fri­day that data would be stored in Ger­many and the ini­tia­tive would “auto­mat­i­cally encrypt data over all trans­mis­sion paths and offer peace of mind that data are han­dled in com­pli­ance with Ger­man data pri­vacy laws.” Start­ing imme­di­ately, users who use these e-mail ser­vices in-browser will have SMTP TLS enabled, and start­ing next year, these three e-mail providers will refuse to send all e-mails that do not have it enabled.

“Ger­mans are deeply unset­tled by the lat­est reports on the poten­tial inter­cep­tion of com­mu­ni­ca­tion data,” said René Ober­mann, CEO of Deutsche Telekom, in a state­ment [34]. “Our ini­tia­tive is designed to coun­ter­act this con­cern and make e-mail com­mu­ni­ca­tion through­out Ger­many more secure in gen­eral. Pro­tec­tion of the pri­vate sphere is a valu­able commodity.”

These com­pa­nies have dubbed this effort “E-mail made in Ger­many [35],” and tout “secure data stor­age in Ger­many as a rep­utable loca­tion.” In prac­tice, that appears (Google Trans­late) [36] to sim­ply mean that start­ing in 2014, these providers will “only trans­port SSL-encrypted e-mails to ensure that data traf­fic over all of their trans­mis­sion paths is secure.”

Ger­many has noto­ri­ously strong data pro­tec­tion laws—likely the strongest in the world. But those laws do have law enforce­ment excep­tions for secu­rity agen­cies, like the BND, Germany’s equiv­a­lent to the National Secu­rity Agency. The BND likely can eas­ily access e-mails stored unen­crypted on Ger­man servers with lit­tle legal or tech­ni­cal inter­fer­ence. Clearly, forc­ing users (par­tic­u­larly less tech-savvy ones) to use SMTP TLS pro­vides a mod­icum of bet­ter pro­tec­tion for data in tran­sit, but it’s hardly any­where close to improved secu­rity for stored data.

Law enforce­ment can still get stored e-mail

Ger­man tech media and the well-respected Chaos Com­puter Club have lam­basted this approach, dis­miss­ing it as “pure marketing.”

“The basic prob­lem with e-mail is that it’s a post­card read­able by all—[this] changes noth­ing,” wrote Andre Meis­ter on the noted Netzpolitik.org blog [37] (German).

Lukas Pitschl of GPG­Tools [38] told Ars this was merely a “mar­ket­ing stunt,” which would “not add real value to the secu­rity of e-mail communication.”

“If you really want to pro­tect your e-mails from pry­ing eyes, use OpenPGP or S/MIME on your own desk­top and don’t let a third-party provider have your data,” he told Ars. “No one of the ‘E-Mail made in Ger­many’ ini­tia­tive would say if they encrypt the data on their servers so they don’t have access to it, which they prob­a­bly don’t and thus the gov­ern­ment could force them to let them access it.”

The Chaos Com­puter Club prac­ti­cally laughed [39] (Google Trans­late) at this new announcement:

“What com­peti­tors [have had] for years as standard—a forced encryp­tion when access­ing a per­sonal e-mail account—is now sold pro­mo­tion­ally as a new, effec­tive tech­no­log­i­cal advance­ment,” the group wrote. “The NSA scan­dal has shown that cen­tral­ized ser­vices are to be regarded as not trust­wor­thy when it comes to access by secret [agencies].”

2b. Citizen Greenwald [40] is residing in Brazil, one of the countries whose IT industry acceleration appears to have been aided by the Snowden “psy-op.” It is essential to note in this regard that the vacuuming up of electronic communications [41] by NSA and GCHQ has been known for years. Such practices are also standard operating procedure [42] for all major intelligence agencies. The professed motive for Brazilian, German and European actions as being “in response” to the “disclosures” of Snowden are nonsensical. The Snowden psy-op is propaganda to boost the Brazilian and German actions.

The Snowden psy-op is part of an economic warfare program [20] against the United States.

“On Inter­net, Brazil Is Beat­ing US at Its Own Game” by Bill Wood­cock; Al Jazeera; 9/20/2013. [15]

. . .The third and less doc­u­mented area of devel­op­ment con­sists of pri­vate over­land fiber cable sys­tems link­ing Brazil to each of its South Amer­i­can neigh­bors. These fol­low a pat­tern sim­i­lar to Brazil­ian private-sector invest­ment in under­sea cables but on a much smaller scale. This is par­tic­u­larly impor­tant with regard to the land­locked coun­tries of Paraguay and Bolivia. With no inde­pen­dent access to the under­sea inter­na­tional cable sys­tems, they depend entirely on this form of tran­si­tive con­nec­tiv­ity through their coastal neigh­bors. Because these over­land cables will lie exclu­sively within the sov­er­eign ter­ri­to­ries of their respec­tive users, it’s much less likely that they will be tapped than their under­sea equiv­a­lents. They are thus likely to pro­vide effec­tively pri­vate com­mu­ni­ca­tion chan­nels between Brazil and its neigh­bor­ing countries….

3a. It appears that Assange and WikiLeaks were instrumental in getting Snowden to Russia. As discussed in FTR #771 [43], it also appears that Jacob Applebaum and WikiLeaks also got Snowden to China from Hawaii. In short, the Snowden “op” is an extension of WikiLeaks.

Assange him­self admit­ted in an inter­view last Decem­ber that he specif­i­cally advised to Snow­den that Rus­sia would be the safest place to stay:

“Julian Assange’s ‘Ghost­writer’ Evis­cer­ates The Wik­iLeaks Founder In Crush­ing Tell-All” by Michael Kelley; Busi­ness Insider; 2/23/2014. [6]

. . . . In Jan­u­ary 2011, Wik­iLeaks founder Julian Assange chose Scot­tish nov­el­ist and non-fiction author Andrew O’Hagan to ‘ghost­write’ his autobiography/manifesto. . . .

. . . . O’Hagan, an Edi­tor at Large of Esquire, has now writ­ten a 25,000-word lam­bast­ing [44]in the Lon­don Review of Books, in which he describes the 42-year-old Aus­tralian as “thin-skinned, con­spir­a­to­r­ial, untruth­ful, [and] narcissistic.”

O’Hagan, who is actu­ally quite sym­pa­thetic to Assange, spent months around the pub­lisher and his entourage.

The account, which seems gen­uine, is dev­as­tat­ing to pop­u­lar notions of Assange as a hero of trans­parency who has been per­se­cuted by the gov­ern­ments that he holds into account.

Dur­ing O’Hagan’s last vis­its with Assange, they spoke about Edward Snow­den. Assange had sent his per­sonal assis­tant and girl­friend, Sarah Har­ri­son, to advise the 30-year-old leaker some­time after he outed him­self in Hong Kong on June 10.

Assange, who O’Hagan notes has chat­ted with Snow­den, con­sid­ers the NSA fugi­tive the ninth best hacker in the world (while he con­sid­ers him­self to be No.3).

Har­ri­son accom­pa­nied Snow­den on June 23 when he flew from Hong Kong to Moscow, where Snow­den was promptly stranded [45]. Har­ri­son, who O’Hagan describes as “strung between lov­ing [Assange] and being baf­fled,” stayed with Snow­den for more than four months before going to Berlin.

Assange told [46] Janet Reit­man of Rolling Stone that he advised Snow­den that the for­mer CIA tech­ni­cian “would be phys­i­cally safest in Rus­sia.” And that’s where Snow­den remains for the fore­see­able future. . . . 

3b. More about WikiLeaks’ role in getting Snowden to Russia:

“Snowden and Greenwald: The Men Who Leaked the Secrets” by Janet Reitman; Rolling Stone; 12/4/2013.  [47]

. . . . Green­wald has a com­pli­cated rela­tion­ship with Wik­iLeaks and Assange, whom he con­sid­ers an ally, though given Assange’s con­tro­ver­sial rep­u­ta­tion in the United States, he admits that “Julian step­ping for­ward and being the face of the story wasn’t great for Snow­den.” But he cred­its Assange with hav­ing helped save Snow­den from almost cer­tain extra­di­tion to the U.S. Snow­den, how­ever, never wanted to go to Rus­sia, which Assange acknowl­edges.

Assange, how­ever, dis­agrees. “While Venezuela and Ecuador could pro­tect him in the short term, over the long term there could be a change in gov­ern­ment. In Rus­sia, he’s safe, he’s well-regarded, and that is not likely to change. That was my advice to Snow­den, that he would be phys­i­cally safest in Rus­sia.” . . . .

4. The timing of articles published by The New York Times and Der Spiegel is suspicious and fits directly into the template we constructed in FTR #762 [7].

“NSA Infiltrates Servers of China Telecom Giant Huawei: Report” [Reuters]; Yahoo News; 3/23/2014. [17]

. . . .The Times and Der Spiegel articles were published just days before Chinese President Xi Jinping visits Europe and will hold talks with German Chancellor Angela Merkel, herself a target of electronic surveillance by the NSA.

They also were published during U.S. first lady Michelle Obama’s visit to China. In Beijing on Saturday, she told an audience of college students that open access to information – especially online – is a universal right. . . .

5. Note the targets of an NSA and GCHQ spying program, as reported by Der Spiegel. All of these would be logical focal points of investigation of terror-related activities. We note in this context, that Brazil–part of the Three Borders Area [48]–as been a major staging point for Islamist terror and is, therefore, a more than legitimate focal point for NSA and GCHQ counter-intelligence.

In FTR #767 [49], we noted he Snowden “op” as the destabilization of the NSA and GCHQ. This story appears to further that end, exposing surveillance of entities that are valid targets for surveillance.

” ‘A’ for Angela: GCHQ and NSA Targeted Private German Companies and Merkel” by Laura Poitras, Marcel Rosenbach and Holger Stark; Der Spiegel; 3/29/2014. [50]

. . . . The headquarters of Stellar, a company based in the town of Hürth near Cologne, are visible from a distance. Seventy-five white antennas dominate the landscape. The biggest are 16 meters (52 feet) tall and kept in place by steel anchors. It is an impressive sight and serves as a popular backdrop for scenes in TV shows, including the German action series “Cobra 11.”

Stellar operates a satellite ground station in Hürth, a so-called “teleport.” Its services are used by companies and institutions; Stellar’s customers include Internet providers, telecommunications companies and even a few governments. “The world is our market,” is the high-tech company’s slogan.
Using their ground stations and leased capacities from satellites, firms like Stellar — or competitors like Cetel in the nearby village of Ruppichteroth or IABG, which is headquartered in Ottobrunn near Munich — can provide Internet and telephone services in even the most remote areas. They provide communications links to places like oil drilling platforms, diamond mines, refugee camps and foreign outposts of multinational corporations and international organizations. . . .

. . . .According to Cetel CEO Guido Neumann, the company primarily serves customers in Africa and the Middle East and its clients include non-governmental organizations as well as a northern European country that uses Cetel to connect its diplomatic outposts to the Internet. . . .

6. As noted in FTR #774 [51], “privacy advocates” should be more concerned with the tech companies whose wares and services the public has so enthusiastically and precipitously endorsed.

Note the prevailing morality that guides the “Titans of Tech.” Bear in mind the technologies they are developing: Amazon and Facebook are developing drones, and Google is developing robots with military applications. What sort of judicial oversight is going to apply to these operational devices?

And you can bet that they will be hacked.

“Revealed: Apple and Google’s Wage-Fixing Car­tel Involved Dozens More Com­pa­nies, Over One Mil­lion Employees” by Mark Ames; Pando Daily; [22]3/22/2014. [22]

“British medieval ordi­nances of Bris­tol cob­blers in 1364 state, ‘Mas­ters are for­bid­den to poach work­ers from other mem­bers of the craft.’”

— Orly Lobel, Tal­ent Wants To Be Free

Back in Jan­u­ary, I wrote about “The Tech­to­pus [52]” — an ille­gal agree­ment between seven tech giants, includ­ing Apple, Google, and Intel, to sup­press wages for tens of thou­sands of tech employ­ees. The agree­ment prompted a Depart­ment of Jus­tice inves­ti­ga­tion, result­ing in a set­tle­ment [53] in which the com­pa­nies agreed to curb their restrict­ing hir­ing deals. The same com­pa­nies were then hit with a civil suit by employ­ees affected by the agreements.

This week, as the final sum­mary judge­ment for the result­ing class action suit [54] looms, and sev­eral of the com­pa­nies men­tioned (Intuit, Pixar and Lucas­film) scram­ble to set­tle [55] out of court, Pando has obtained court doc­u­ments (embed­ded below) which show shock­ing evi­dence of a much larger con­spir­acy, reach­ing far beyond Sil­i­con Valley.

Con­fi­den­tial inter­nal Google and Apple memos, buried within piles of court dock­ets and reviewed by Pan­do­Daily, clearly show that what began as a secret car­tel agree­ment between Apple’s Steve Jobs and Google’s Eric Schmidt to ille­gally fix the labor mar­ket for hi-tech work­ers, expanded within a few years to include com­pa­nies rang­ing from Dell, IBM, eBay and Microsoft, to Com­cast, Clear Chan­nel, Dream­works, and London-based pub­lic rela­tions behe­moth WPP. All told, the com­bined work­forces of the com­pa­nies involved totals well over a mil­lion employees.

Accord­ing to mul­ti­ple sources famil­iar with the case, sev­eral of these newly named com­pa­nies were also sub­poe­naed by the DOJ for their inves­ti­ga­tion. A spokesper­son for Ask.com con­firmed that in 2009-10 the com­pany was inves­ti­gated by the DOJ, and agreed to coop­er­ate fully with that inves­ti­ga­tion. Other com­pa­nies con­firmed off the record that they too had been sub­poe­naed around the same time.

Although the Depart­ment ulti­mately decided to focus its atten­tion on just Adobe, Apple, Google, Intel, Intuit, Lucas­film and Pixar, the emails and memos clearly name dozens more com­pa­nies which, at least as far as Google and Apple exec­u­tives were con­cerned, formed part of their wage-fixing cartel.

A con­fi­den­tial Google memo (above, left) titled “Spe­cial Agree­ment Hir­ing Pol­icy,” dat­ing from Novem­ber 2006, divides the company’s wage-fixing agree­ments into two cat­e­gories: “Do Not Cold Call” and “Sen­si­tive Com­pa­nies.” Below that, the Google memo offers a brief chronol­ogy and list of companies:

The fol­low­ing com­pa­nies have spe­cial agree­ments with Google and are part of the “Do Not Cold Call” list.

The first entry marks the begin­ning of Google’s par­tic­i­pa­tion in the wage-suppression scheme:

Effec­tive March 6, 2005:

• Genen­tech, Inc.
• Intel Cor­po­ra­tion
• Apple Com­puter
• Pay­pal, Inc.
• Com­cast Corporation

Until now, nei­ther Pay­pal (owned by eBay), Com­cast nor Genen­tech have been pub­licly men­tioned as part of the wage-suppression car­tel. Nor have they been pub­licly named in crim­i­nal or civil actions relat­ing to this par­tic­u­lar case, although both the DOJ and the state of Cal­i­for­nia are cur­rently pur­su­ing a sep­a­rate but related antitrust suits against eBay.

The “effec­tive date” of Google’s first wage-fixing agree­ments, early March 2005, fol­lows a few weeks after Steve Jobs threat­ened Google’s Sergey Brin to stop all recruit­ing at Apple: “if you hire a sin­gle one of these peo­ple,” Jobs emailed Brin, “that means war.”

Jobs threat­ened Brin and Google on Feb­ru­ary 17, 2005; nine days later, Apple’s VP for Human Resources sent out an inter­nal email to Apple recruiting,

All,

Please add Google to your “hands-off” list. We recently agreed not to recruit from one another so if you hear of any recruit­ing they are doing against us, please be sure to let me know.

Please also be sure to honor our side of the deal.

That was Feb­ru­ary 26; on March 6, Google’s iden­ti­cal non-solicitation agree­ment with Apple became “effective.”

This time­line is impor­tant to estab­lish because it demon­strates pre­cisely what makes this scheme ille­gal: secret cross-agreements between two or more par­ties to fix wages in the labor mar­ket, at a time when tech engi­neer wages were soar­ing [56], threat­en­ing profits.

This is just a tiny sam­ple of the “over­whelm­ing” evi­dence used by both the Jus­tice Department’s antitrust divi­sion, and the Dis­trict Court judge in San Jose, to debunk the com­pany exec­u­tives’ claims that each had coin­ci­den­tally imple­mented iden­ti­cal non-solicitation poli­cies at the same time, with the same com­pa­nies, with­out know­ing what the other side was doing.

All of the above is just what’s in the moun­tain of pre-trial court doc­u­ments. It’s highly likely that more names will spill out dur­ing tes­ti­mony. Pando will con­tinue to report any new devel­op­ments and also will be cov­er­ing the sum­mary judg­ment hear­ing next week.

For now, it’s enough to try to absorb what all of these cross-company, cross-industry secret labor-fixing agree­ments mean. Most labor sto­ries about wage theft and cor­po­rate abuse tend to focus on low-wage earn­ers and the most dis­ad­van­taged. Cer­tainly it strains one’s sen­si­bil­i­ties to com­pare an exploited low-wage worker in the fast food or retail indus­try to tech engi­neers and pro­gram­mers, who are far bet­ter com­pen­sated, live more com­fort­ably, and rarely worry about putting food in their children’s mouths.

In terms of pathos, there is no com­par­i­son; min­i­mum wage earn­ers are strug­gling to sur­vive, and nearly all of the well-educated, privileged-born peo­ple in the media world agree that tech indus­try work­ers are all a bunch of over­paid misog­y­nist lib­er­tar­ian bros, a car­i­ca­ture [57] that makes it per­fectly fine to hate the entire class, and impos­si­ble to con­sider them as polit­i­cal com­rades stuck in the same predica­ment as the rest of the non-multimillionaires in this country.

What’s more impor­tant is the polit­i­cal predica­ment that low-paid fast food work­ers share with well-paid hi-tech work­ers: the loss of power over their lives and their futures to the grow­ing mass of con­cen­trated power in Sil­i­con Val­ley, whose ten­ta­cles are so strong now and so great, that hun­dreds of thou­sands of work­ers around the globe—public rela­tions and cable com­pany employ­ees in the British Isles, pro­gram­mers and tech engi­neers in Rus­sia and China (accord­ing to other doc­u­ments which I’ll write about soon)—have their lives con­trolled and their wages and oppor­tu­ni­ties stolen from them with­out ever know­ing about it, all the while being bom­barded with cul­tural cant about the wis­dom of the free mar­ket, about the effi­ciency of free knowl­edge, about the need to take per­sonal respon­si­bil­ity and to blame no one but your­self for every­thing that hap­pens in your life and your career.

7a. The program continues with a review of former Third Reich defense minister Albert Speer’s account of Hitler’s vision of the annihilation of New York City.

“The Swastika & the Cres­cent” by Mar­tin A. Lee; Intel­li­gence Report; Spring 2002 [#105]; Pub­lished by the South­ern Poverty Law Cen­ter; p. 1. [58]

. . . . As Germany’s defeat loomed during the final months of World War II, Adolf Hitler increasingly lapsed into delusional [?] fits of fantasy. Albert Speer, in his prison writings, recounts an episode in which a maniacal Hitler ‘pictured for himself and for us the destruction of New York in a hurricane of fire.’ The Nazi fuehrer described skyscrapers turning into ‘gigantic burning torches, collapsing upon one another, the glow of the exploding city illuminating the dark sky.’ An approximation of Hitler’s hellish vision came true on September 11, when terrorists destroyed the Twin Towers in New York, killing nearly 3,000 people. . . .

7b. Even more telling is the fact that Hitler’s plan for destroying New York involved crashing aircraft into the skyscrapers with kamikaze-style attacks!

Jihad and Jew-Hatred: Islamism, Nazism and the Roots of 9/11; Matthias Kuntzel; Telos Press Pub­lish­ing [HC]; Copy­right 2007 Telos Press Pub­lish­ing; ISBN 10: 0–914386-36–0; pp. XIX-XXI. [25]

. . . . Not only Hitler’s fantasy but also his plan for realizing it recall what happened in 2001: the idea was for Kamikaze pilots to fly explosive –crammed light aircraft lacking landing gear into the Manhattan skyscrapers. The drawings for the Daimler-Benz ‘Amerikabomber’ actually exist. They show giant four-engine planes with raised underbellies beneath which small bombers could be strapped. The bombers were to be released shortly before the plane reached the East Coast, after which the mother plane would return to Europe. . . .

8. Next, the pro­gram reviews a speech made by William Pierce 1998, the pro­gram sets forth the National Alliance leader’s eerie fore­shad­ow­ing of the events of 9/11. (Pierce is the author of The Turner Diaries [59] and Serpent’s Walk [60].) Pierce spoke of Osama bin Laden attack­ing tall build­ings, such as the World Trade Cen­ter, and the com­ing of bio-terrorism to the U.S.

“Neo-Nazis and 9/11” by Jack McCarthy; Coun­ter­punch; 10/29/2001. [19]

. . . Upon perus­ing his speeches from 1998–99, I dis­cov­ered that Pierce, who heads the so-called ‘National Alliance,’ did indeed utter some most inter­est­ing (pre-9/11—if not prophetic—remarks about Osama bin Laden and bio-terrorism. The run­ning theme in Pierce’s com­men­taries is—to para­phrase his hero Hitler—that Osama Bin Laden’s warn­ing to Amer­ica is ‘I Am Com­ing.’ And so is bio-terrorism. . . . In one chill­ing com­men­tary Pierce, (after not­ing that Bin Laden and the rest of the lost gen­er­a­tion of angry Moslem youth had it with their par­ents’ com­pro­mises and were hell bent on revenge against infi­del Amer­ica) issued this stark, prophetic warn­ing in a 1998 radio address titled, ‘Stay Out of Tall Build­ings.’ ‘New York­ers who work in tall office build­ings any­thing close to the size of the World Trade Cen­ter might con­sider wear­ing hard hats . . .’ Pierce warned. . . .

9. The cli­mac­tic episode of The Turner Diaries is a low-level, sui­cide aer­ial attack [61] on the Pen­ta­gon which occurs on the Ger­man “Day of Destiny”–November 9th. A Ger­man would write that date as–9/11!

The Turner Diaries; “Andrew Mac­don­ald;” Bar­ri­cade Books, Inc. [SC] 1996; Copy­right 1978, 1980 William Pierce; ISBN 1–56980-086–3; pp. 201-205. [62]

. . . .I con­ferred pri­vately with Major Williams of the Wash­ing­ton Field Com­mand for more than an hour on the prob­lem of attack­ing the Pen­ta­gon. The military’s other major com­mand cen­ters were either knocked out on Sep­tem­ber 8 or sub­se­quently con­sol­i­dated with the Pen­ta­gon, which the top brass appar­ently regards as impreg­nable. And it damned near is. We went over every pos­si­bil­ity we could think of, and we came up with no really con­vinc­ing plan—except, per­haps one. That is to make an air deliv­ery of a bomb.

In the mas­sive ring of defenses around the Pen­ta­gon there is a great deal of anti-aircraft fire­power, but we decided that a small plane, fly­ing just above the ground, might be able to get through the three-mile gaunt­let with one of our 60-kiloton war­heads. One fac­tor in favor of such an attempt is that we have never before used air­craft in such a way, and we might hope to catch the anti-aircraft crews off their guard.

Although the mil­i­tary is guard­ing all civil air­fields, it just hap­pens that we have an old crop duster stashed in a barn only a few miles from here. My imme­di­ate assign­ment is to pre­pare a detailed plan for an aer­ial attack on the Pen­ta­gon by next Mon­day. We must make a final deci­sion at the time and then act with­out fur­ther delay.

Novem­ber 9, 1993. It’s still three hours until first light, and all sys­tems are ‘go.’ I’ll use the time to write a few pages—my last diary entry. Then it’s a one-way trip to the Pen­ta­gon for me. The war­head is strapped into the front seat of the old Stear­man and rigged to det­o­nate either on impact or when I flip a switch in the back seat. Hope­fully, I’ll be able to mange a low-level air burst directly over the cen­ter of the Pen­ta­gon. Fail­ing that, I’ll at least try to fly as close as I can before I’m shot down. . . .

. . . . Thus end Earl Turner’s diaries, as unpre­ten­tiously as they began. His final mis­sion was suc­cess­ful, of course, as we all are reminded each year on Novem­ber 9—our tra­di­tional Day of the Mar­tyrs. . . .

10. We end on a speculative note: Eddie the Friendly Spook’s economic and political theories are fascist and fundamentally opposed to Franklin Delano Roosevelt’s New Deal. His belief that we must get rid of Social Security and bring back the gold standard are propagated by the Ludwig von Mises Institute, the ideological font of Snowden’s political idol Ron Paul.

Arguably the most famous member of the Austrian School of Economics that spawned and dominates the Ludwig von Mises Institute is Friedrich von Hayek. An immigrant from Austria, von Hayek was ostensibly an “anti-Nazi.” In 1944, he published The Road to Serfdom, a muddled ideological tract which attacks the New Deal of F.D.R. Begun well before the Canaris memo, von Hayek’s work has been a staple of GOP/Underground Reich propaganda ever since its publication, as well as a foundational element of revisionist history.

We present a document [21] drawn up by the head of German military intelligence (the Abwehr) in 1944. Abwehr chief Admiral Wilhelm Canaris notes that undercover propaganda assets in the United States should be utilized to generate anti-Roosevelt sentiment and help his electoral defeat in the 1944 elections. The Third Reich viewed the defeat of Roosevelt as consummately important.

We  wonder if von Hayek–ostensibly one of the “anti-Nazis” cryptically referred to at the end of the document below, was one of the Third Reich’s undercover propaganda and psychological warfare assets among the Allies. The Road to Serfdom was heavily publicized by The Readers Digest in the Unied States.

We are also of the considered professional opinion that the Ludwig von Mises Institute is an important element of the Underground Reich.

 Germany Plots with the Kremlin [21] by T.H. Tetens; Henry Schuman & Sons [HC]; Copyright 1953 by Henry Schuman, Inc.; pp. 233-235. [21]

 “Directive of the German High Command on Political Warfare in the U.S.A.”

The following directive was issued by the Chief of the Intelligence Division of the German High Command, Admiral Walter Wilhelm Canaris, in 1944. The document lays bare the basic German strategy of scaring the U.S.A. with Bolshevism . . . .

 SECRET STATE MATTER

OKW–Abwehr

March 15, 1944

At a meeting of the representatives of the Foreign Office, the Security Division, (“SD”) and the Department of Defense (“Abwehr”), the following resolutions were adopted for unified action by all our agents in foreign countries:

Utilize to the fullest extent all available possibilities in neutral and enemy countries, in order to support our military efforts with political and propaganda campaigns.

  1. Our goal is to crush the enemy’s plan whose object is to destroy forever the German Reich militarily, economically, and culturally.

The new regulations put into effect by the political leaders for the dissolution and disintegration of the enemy bloc should be carried out more intensely. We must do our utmost to create a state of confusion and distrust among our enemies. Such a state of disunity would enable us to sue for a quick separate peace with either side. While it is true that the efforts made in that direction have failed so far due to the implacable hate policy of Roosevelt and Churchill, it does not mean that some day, under different conditions, the unnatural front of our enemies could not be broken. Roosevelt’s electoral defeat this year could have immeasurable political consequences. . . .

. . . . Right now, the chances for a separate peace with the West are a little better, especially if we succeed, through our propaganda campaign and our “confidential” channels, to convince the enemy that Roosevelt’s policy of “unconditional surrender” drives the German people towards Communism.

There is great fear in the U.S.A. of Bolshevism. The opposition against Roosevelt’s alliance with Stalin grows constantly. Our chances for success are good, if we succeed to stir up influential circles against Roosevelt’s policy. This can be done through clever pieces of information, or by references to unsuspicious neutral ecclesiastical contact men.

We have at our command in the United States efficient contacts, which have been carefully kept up even during the war. The campaign of hatred stirred up by Roosevelt and the Jews against everything German has temporarily silenced the pro-German bloc in the U.S.A. However, there is every hope that this situation will be completely changed within a few months. If the Republicans succeed in defeating Roosevelt in the coming presidential election, it would greatly influence the American conduct of war towards us.

The KO-leaders abroad and their staffs have innumerable opportunities of constantly referring to Roosevelt’s hate policy. They must use in this campaign all the existing contacts and they should try to open up new channels. We must point to the danger that Germany may be forced to cooperate with Russia. The greatest caution has to be observed in all talks and negotiations by those who, as “anti-Nazis,” maintain contact with the enemy. When fulfilling missions, they have to comply strictly with instructions. [That would include the “anti-Nazi” von Hayek–D.E.]

(Sgd.) Canaris