Spitfire List Web site and blog of anti-fascist researcher and radio personality Dave Emory.

News & Supplemental  

Citizen Snowden

Dave Emory’s entire life­time of work is avail­able on a flash drive that can be obtained here. (The flash drive includes the anti-fascist books avail­able on this site.)

COMMENT: As information emerges concerning Edward J. Snowden, the apparent leaker in the NSA/PRISM story, a number of points of information stand out:

  • This poster boy for civil liberties and openness [Snowden] has spent his entire [young] professional life steeped in “alphabet soup”–the intelligence agencies. He has worked for NSA, the CIA and Booz Allen Hamilton, a tech firm that is a virtual annex of the American intelligence apparat. (Booz Allen is owned by the Carlyle Group and has employed James Clapper [current director of national intelligence, Jonathan Bush, of THOSE Bushes, and James Woolsey [former director of the CIA]). Snowden’s is a curious professional resume for someone we are to believe is deeply concerned about privacy and personal liberty issues.
  • Ron Paul, champion of individual liberty

    He materializes in Hong Kong as President Obama is meeting with the Chinese leadership in an attempt to improve relations. This cannot help any attempts at improving U.S./Chinese relations with regard to cyberspying or much of anything else. He is apparently leaking documents to the Chinese on U.S. hacking operations directed against the Chinese. (This incident strikes us in a similar manner to the downing of a U-2 spy plane prior to the Eisenhower/Kruschev summit. In The Guns of November, Part I, we examined information from Colonel L. Fletcher Prouty indicating that the U-2 had been deliberately sabotaged by CIA hardliners to frustrate attempts at improving U.S./Soviet relations.)

  • Snowden does not have a high school degree–mandatory for someone seeking employment as a national security contractor. One wonders if he was “fast-tracked” and just who may have done the work on his behalf.
  • The disclosures concerning PRISM follow shortly on Obama’s taking control of the drone program away from the CIA. Might this be a response? Might Michael J. Morrell be involved in this? Are we, in fact, looking at a destabilization gambit against Obama? Are we looking, perhaps, at a CIA-NSA tiff as well?
  • It develops that Morrell decides to retire right in the middle of this imbroglio.
  • It turns out that Citizen Snowden is a supporter of Nazi-linked Ron Paul, as well as a modest contributor to his campaign. We note in passing that, in addition to his long-standing Nazi/white supremacist connections, Ron Paul has successfully played Pied Piper to the young, stupid and stoned, who aren’t necessarily Nazis. Not everyone who backed Hitler was a Nazi either. Libertarianism is a far-right doctrine, however. As noted in our previous post, looming in the background is Peter Thiel, who’s Palantir firm appears to be the developer of PRISM, disclaimers to the contrary notwithstanding. Thiel also networks with the Cato Institute which has also networked with Glenn Greenwald. Greenwald was also deeply involved with the far-right Nazi-linked WikiLeaks operation. We note that Snowden isn’t some dumb-ass college kid, however. He’s a spook.
  • The vast bulk of Paul’s Super PAC money came from ultra-right wing Peter Thiel.
  • Despite denials from Palantir concerning inquiries about its PRISM software being the same “PRISM” featured in the NSA data-mining program, it turns out that Palantir does indeed have a working relationship with the intelligence community. The notion that “alphabet soup” would have two different software functions with identical names is not credible. Any attempt at utilizing the name “PRISM” by a different firm would certainly have triggered litigation by Palantir.
  • Thiel is one of the associates of the Koch Brothers-founded Cato Institute.
  • The leaking journalist, Glenn Greenwald, is also professionally associated with the Cato Institute.
  • The possibility that the Cato/Thiel/Paul dynamic may have factored in the development of this story is one to be contemplated and researched. 
  • The Koch Brothers have also been deeply involved with financing the Tea Party movement, focus of the IRS non-scandal. 
  • It now develops that a conservative Republican initiated the scrutiny of the Tea Party documents. Coupled with the fact that a Bush appointee was in charge of the IRS at the time, one must wonder if the non-scandal surrounding the IRS/Tea Party scrutiny was a deliberate gambit to ensnare the Obama administration in scandal.
  • Note that, again, the so-called scandals ensnaring Obama stem from programs begun by George W. Bush’s regime and leaked from the intelligence community. We are almost certainly looking at a de-stabilization program undertaken by the GOP/Underground Reich faction of the intelligence community.
  • With regard to NSA/GCHQ spying–this has been known for years. There are For The Record programs dealing with this subject material. So there is nothing really new here. We also reiterate that the initial assault on Echelon/NSA/GCHQ came from the far right and Underground Reich, in the form of the Free Congress Foundation and the European Parliament (read “Germany,” which does the same thing). Be sure to read our first post on this subject.

The New York Times; 6/11/2013; p. A13.

EXCERPT: . . . . It is not clear how Mr. Snowden managed to extract the secret documents, and the portrait of his transformation from a trusted National Security Agency contractor to a leaker is still impressionistic.

Last year, he donated money to the campaign of Ron Paul the libertarian -leaning Republican presidential candidate who was long critical of government’s growing reach. . . .

“How the U.S. Uses Technology to Mine More Data More Quickly” by James Risen and Eric Lichtblau; The New York Times; 6/8/2013.

EXCERPT: When American analysts hunting terrorists sought new ways to comb through the troves of phone records, e-mails and other data piling up as digital communications exploded over the past decade, they turned to Silicon Valley computer experts who had developed complex equations to thwart Russian mobsters intent on credit card fraud.

The partnership between the intelligence community and Palantir Technologies, a Palo Alto, Calif., company founded by a group of inventors from PayPal, is just one of many that the National Security Agency and other agencies have forged as they have rushed to unlock the secrets of “Big Data.” . . . .

“C.I.A. to Get First Woman in No. 2 Job” by Scott Shane; The New York Times; 6/12/2013.

EXCERPT: The C.I.A.’s deputy direc­tor, Michael J. Morell, is retir­ing after 33 years at the agency and will be replaced by Avril D. Haines, the top lawyer at the National Secu­rity Coun­cil, the C.I.A.’s direc­tor, John O. Bren­nan, announced Wednes­day.

The switch will put a woman in one of the agency’s top two jobs for the first time. Ms. Haines is an unusual choice because she is not an intel­li­gence pro­fes­sional, though in her two years at the White House she has been deeply involved in intel­li­gence pro­grams and got to know Mr. Bren­nan when he was Pres­i­dent Obama’s coun­tert­er­ror­ism adviser.

In April, the pres­i­dent had nom­i­nated Ms. Haines to become the legal adviser at the State Depart­ment, a job in which she would also have been the first woman. But with Mr. Morell’s depar­ture, he evi­dently decided to shift her to the C.I.A. post.

The agency’s deputy direc­tor is not sub­ject to Sen­ate confirmation.

Mr. Morell, 54, is leav­ing vol­un­tar­ily, offi­cials said, after a full career that has included two recent stints as act­ing direc­tor of the spy agency, first after the depar­ture of Leon E. Panetta in 2011 and then after the res­ig­na­tion of David H. Petraeus last year over a sex scan­dal. . . .

. . . . Mr. Morell, a career intel­li­gence ana­lyst and for­mer pres­i­den­tial briefer, pre­vi­ously over­saw the agency’s ana­lytic efforts, which are sep­a­rate from the clan­des­tine ser­vice that sends spies over­seas. He is viewed as a com­pe­tent and well-liked man­ager who has rarely made waves with the pub­lic, though in recent months he drew atten­tion for his role in help­ing to draft the administration’s dis­puted “talk­ing points” on the lethal attack in Sep­tem­ber on the Amer­i­can diplo­matic com­pound in Beng­hazi, Libya.

In a state­ment, Mr. Morell recalled that he was at Pres­i­dent George W. Bush’s side as his intel­li­gence briefer when Al Qaeda struck on Sept. 11, 2001, and with Mr. Obama dur­ing the 2011 raid that killed Osama bin Laden. . . .

“Republican IRS Agent Says Cincinnati Began ‘Tea Party’ Inquiries” by David Morgan and Kim Dixon [Reuters]; Yahoo News; 6/9/2013.

EXCERPT: A U.S. Internal Revenue Service manager, who described himself as a conservative Republican, told congressional investigators that he and a local colleague decided to give conservative groups the extra scrutiny that has prompted weeks of political controversy.

In an official interview transcript released on Sunday by Democratic Representative Elijah Cummings, the manager said he and an underling set aside “Tea Party” and “patriot” groups that had applied for tax-exempt status because the organizations appeared to pose a new precedent that could affect future IRS filings.

Cummings, top Democrat on the House of Representatives Oversight and Government Reform Committee conducting the probe, told CNN’s “State of the Union” program that the manager’s comments provided evidence that politics was not behind IRS actions that have fueled a month-long furor in Washington.

“He is a conservative Republican working for the IRS. I think this interview and these statements go a long way toward showing that the White House was not involved in this,” Cummings told CNN’s “State of the Union” program. . . .


24 comments for “Citizen Snowden”

  1. Dave

    I would imagine the most difficult part of your job at Spitfirelist.com is making sure your political views and agenda do not skew the accuracy of your reporting.

    At the tender age of 55, I have come to fully realize that our entire government is corrupted beyond redemption. And that includes both political parties, as well as the bureaucracies.

    As for me, I only dream of the day when all these criminals are called to account.

    Posted by Dan | June 12, 2013, 4:23 pm
  2. Morrell just stepped down today and will be joining the President’s Intelligence Advisory Board. He’s being replaced by the current legal advisor to the NSA:

    The New York Times
    C.I.A. to Get First Woman in No. 2 Job
    Published: June 12, 2013

    The C.I.A.’s deputy director, Michael J. Morell, is retiring after 33 years at the agency and will be replaced by Avril D. Haines, the top lawyer at the National Security Council, the C.I.A.’s director, John O. Brennan, announced Wednesday.
    The switch will put a woman in one of the agency’s top two jobs for the first time. Ms. Haines is an unusual choice because she is not an intelligence professional, though in her two years at the White House she has been deeply involved in intelligence programs and got to know Mr. Brennan when he was President Obama’s counterterrorism adviser.

    In April, the president had nominated Ms. Haines to become the legal adviser at the State Department, a job in which she would also have been the first woman. But with Mr. Morell’s departure, he evidently decided to shift her to the C.I.A. post.

    The agency’s deputy director is not subject to Senate confirmation.

    Mr. Morell, 54, is leaving voluntarily, officials said, after a full career that has included two recent stints as acting director of the spy agency, first after the departure of Leon E. Panetta in 2011 and then after the resignation of David H. Petraeus last year over a sex scandal. He was a leading candidate for the top job, but Mr. Obama chose Mr. Brennan in January, and colleagues said then that Mr. Morell was likely to retire.

    “As much as I would selfishly like to keep Michael right where he is for as long as possible, he has decided to retire to spend more time with his family and to pursue other professional opportunities,” Mr. Brennan said in a statement. He praised Mr. Morell for his “exceptionally sharp mind, tremendous energy and absolute dedication to mission.”

    Mr. Morell, a career intelligence analyst and former presidential briefer, previously oversaw the agency’s analytic efforts, which are separate from the clandestine service that sends spies overseas. He is viewed as a competent and well-liked manager who has rarely made waves with the public, though in recent months he drew attention for his role in helping to draft the administration’s disputed “talking points” on the lethal attack in September on the American diplomatic compound in Benghazi, Libya.

    In a statement, Mr. Morell recalled that he was at President George W. Bush’s side as his intelligence briefer when Al Qaeda struck on Sept. 11, 2001, and with Mr. Obama during the 2011 raid that killed Osama bin Laden. He will leave his job on Aug. 9; Mr. Obama said he would appoint him to the President’s Intelligence Advisory Board.

    As legal adviser to the National Security Council, Ms. Haines, 43, leads the group of lawyers from security agencies that studies the legal implications of the most delicate operations, including lethal drone strikes, cyberattacks and intelligence collection on American soil. Mr. Brennan said her work at the White House and previously as an assistant legal adviser for treaty affairs at the State Department “has given her a range of experiences on many of the same issues that we focus on as an agency.”

    Posted by Pterrafractyl | June 12, 2013, 6:32 pm
  3. @Pterrafractyl–

    One wonders if the timing of Morrell’s resignation has anything to do with the “revelations” of “Citizen Snowden.”

    The NSA/GCHQ activity has been known for many years and has been reported on my programs for much of that time.

    As FDR said; “In politics, nothing happens by accident.”

    The timing of Snowden’s “disclosures” is more than a little interesting. As is his surfacing in Hong Kong, where his leaking of documents to the Chinese can not help but obstruct Obama’s diplomacy.

    As I indicated in my first post on the NSA/PRISM story, I believe this is part of a destabilization program against Obama.

    No doubt younger, less informed and more impressionable people will find this “revelatory.”

    The suspicion in these quarters centers on suspicion that younger, more “liberal” and less sophisticated voters will be sufficiently turned off to stay away from the polls.

    Note, again, that the “leaks” are coming from Spookville.

    This comes right after Obama took control of the drone program away from CIA.

    I doubt we’ll ever know for sure, but I suspect the Petraeus affair was preparation for what we are seeing now.



    Posted by Dave Emory | June 12, 2013, 7:11 pm
  4. @Dan–

    You are wrong on all counts.

    The most difficult part of what I do is facing what the Powers That Be have to Dish Out, while receiving no pay for what I do.

    At the same time, I move forward knowing that an increasingly large percentage of the public will not understand what I do–this owing to their own accelerating ignorance and myopia, as well as the increasing sophistication of the analysis.

    Other than avoiding fascism, I don’t have an “agenda.”

    You are wrong about both parties, as well. Both are dependent, to an extent, on corporate monies.

    The sort of generalized, cheesy non-analysis of the sort you have dished up here serves only to justify inaction and rationalization.

    You do not appear to have much familiarity with what is on this website, so I’ll simply conclude by referring you to the post entitled “Reagan’s Nazis.” http://spitfirelist.com/news/reagans-nazis/

    Suffice it to say, there is nothing remotely like this in the Democratic Party.

    I “dream” of the day when the lazy, uninformed public actually gets off their lazy butts and does something concrete and constructive.

    Now THAT is, indeed, a dream.



    Posted by Dave Emory | June 12, 2013, 7:21 pm
  5. @Dave,

    If I may interrupt, I want to admit I am a follower of the Spitfire List and your work for going on two years now. I absolutely honour, appreciate and respect what you do. I LOVE listening to you talk and lecture. I tried to find video lectures of you, so I could see you instead of just hear you, but all I found was audio lectures on Youtube but they are fascinating and informative and educational.

    I don’t know how you feel about this, Dave, but my feelings toward Edward Snowden have completely changed. I cannot look over or forgive him for supporting the likes of Ron Paul and by extension supporting such psychopathic and failed ideologies. Additionally, I don’t like Greenwald either, even though he is an excellent writer and an excellent speaker, the breadth of his vocabulary impresses me as does the excellent articulation he has, the point is, this guy is in league with the Charles Koch Foundation (now called the Cato Institute) and that is so mind-numbingly scary.

    I don’t know if you missed it, but a recent Gallup poll suggests that most Americans like George Bush II (aka, George Bush Jr.).

    There was a bloody brilliant response to this news over at Truth Dig.

    Parsons’ said

    “As brilliant as Karl Marx was, his belief in the inevitability of revolution and the subsequent overthrow of capitalism by the very people being exploited by it is, I believe, highly suspect. I have looked into the eyes of Wal-Martians on Prozac and heard their cries – not for justice and freedom – but for a cheaper dozen waffles. I have heard their complaints – not for a living wage and the ability to organize their place of work – but rather, their petty grievances over “The Mexicans living on Welfare.”

    So yes, “The People” are stupid. They are also tired, beat down, beat up, underpaid, under-educated, and overmedicated. And they have a short attention span to the point of amnesia.

    “George Bush? Which one was he? Oh hell, he wasn’t too bad – at least you always knew where he stood.”

    Even if where he stood was on an aircraft carrier under a banner that said “Mission Accomplished.”

    Posted by Jay | June 12, 2013, 8:28 pm
  6. This is interesting…there appears to be a particular request Snowden made with the Washington Post: The full 41-slide PowerPoint presentation that was first passed along to Washington Post reporter Bart Gellman be published within 72 hours. It was apparently only after Gellman said he couldn’t promise that all of the slides would be published that Snowden contacted Greenwald. After Gellman published this, Greenwald tweeted on Monday that “Bart Gellman’s claims about Snowden’s interactions with me – when, how and why – are all false”. Greenwald claims that he never had any condition that all 41 slides get published and he also claims that he first contacted by Snowden back in February, long before Snowden appears to have contacted Gellman. Neither The Washington Post nor The Guardian have published the full set slides yet and both only published the same 4 out of 41 slides initially with the fifth “Prism” slide later getting published.

    So Snowden appears to have first contact Greenwald in February. Then, at some point, Snowden contacted Gellman. But Greenwald says Gellman’s account of the sequence of events surrounding Greenwald are “all false”. So the basic timeline of what happened when is unclear and in dispute:

    Barton Gellman, Glenn Greenwald feud over NSA leaker

    By MACKENZIE WEINGER | 6/10/13 1:23 PM EDT

    The Guardian’s Glenn Greenwald on Monday blasted investigative reporter Barton Gellman for making “false” claims about the man they shared as a source: Edward Snowden.

    The public tiff between two journalists who have led the way on disclosing National Security Agency surveillance offers a rare window into high-stakes negotiations between reporters and their sources. It illustrates the balance between publishing secrets and protecting the nation’s security — and shows the risks that a source thought to be exclusive to one outlet might peddle his news scoop elsewhere.

    Snowden came forward on Sunday afternoon in both The Guardian and the Post, where Gellman wrote his piece, to say he was the source of the revelations about National Security Agency surveillance.

    On Sunday evening, the Post published a story by Gellman detailing his interactions with Snowden. Gellman wrote that Snowden asked for a guarantee that the Post would publish, within 72 hours, all the PowerPoint slides he provided on PRISM. When Gellman said he couldn’t promise that, Snowden went to Greenwald, according to Gellman’s account.

    Greenwald fired back via Twitter on Monday morning.

    “Bart Gellman’s claims about Snowden’s interactions with me – when, how and why – are all false,” Greenwald wrote on Twitter.

    On the issue of conditions for publishing the information from Snowden, Greenwald tweeted, “I have no idea whether he had any conditions for WP, but he had none for us: we didn’t post all the slides.” He also wrote he had been “working with” Snowden since February, “long before anyone spoke to Bart Gellman.”

    In the back-to-back scoop, Greenwald struck first in The Guardian with his bombshell about sweeping NSA surveillance of phone calls, while Gellman followed up quickly in the Post with the revelation about PRISM.

    The spat continued during the day on Monday, with Gellman writing on Twitter: “Snowden didn’t bolt when I refused guarantees, just quit going steady.”

    In his Post piece, Gellman described a series of “indirect contacts” he had with Snowden before their first “direct exchange” on May 16, Gellman wrote in an account for The Washington Post about his exchanges with his source. Snowden — who chose the name Verax, or “truth teller” in Latin for his code name, and called Gellman “Brassbanner” — “dropped a bombshell” on May 24 and asked Gellman for a guarantee that The Washington Post would publish, within 72 hours, all the PowerPoint slides he provided on PRISM.

    Snowden told Gellman he wanted “to embolden others to step forward.”

    Additionally, according to Gellman, Snowden requested that the Post publish online a “cryptographic key” so he could prove to a foreign embassy he was the source of the document leak.

    Gellman responded that he could make no guarantees about what The Post would publish or when — and according to his account, that’s when Snowden replied, “I regret that we weren’t able to keep this project unilateral.”

    Shortly afterward he made contact with Glenn Greenwald of the British newspaper the Guardian,” Gellman wrote.

    Snowden, however, wrote that he still remained in contact with Gellman. And on Thursday, the Post published its PRISM story, with Gellman noting in his account that the paper “sought the views of government officials about the potential harm to national security prior to publication.” The Post ultimately decided to publish only four of the 41 slides.

    Early Monday morning, just after 1 a.m., Greenwald took to Twitter to briefly respond to Gellman’s play-by-play.

    “Bart Gellman’s claims about Snowden’s interactions with me – when, how and why – are all false,” Greenwald wrote on Twitter.

    Neither Gellman nor Greenwald has yet responded to respective requests for comment.

    The Post just barely beat The Guardian in publishing the PRISM story on Thursday by about 20 minutes — with neither paper publishing the full set of slides — but in everything else, The Guardian has led the way. Greenwald broke the story about the NSA collecting Verizon phone records late Wednesday night. Then it was The Guardian who Snowden asked to reveal his identity to the public on Sunday after “several days of interviews,” according to a story with the bylines of Greenwald, The Guardian’s Washington bureau chief Ewan MacAskill and documentary filmmaker Laura Poitras, who co-wrote The Post’s PRISM story with Gellman.

    Gellman told The Huffington Post last week that he “started to hear some footsteps, so I had to move” on the PRISM story. There’s no question it was a race to publish, and although Gellman said he “would have been happier to have had a day or two” longer on the story, the Post had to move to get that scoop online before The Guardian.

    After The Post published his account of his exchanges with Snowden, Gellman also took to Twitter to “clarify a couple of points,” he wrote. “Snowden didn’t bolt when I refused guarantees, just quit going steady. And not because I consulted USG,” Gellman said.

    As for Snowden, he doesn’t seem preoccupied with the “when, how and why” of his interactions with the press.

    “I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in,” he told The Guardian. “My sole motive is to inform the public as to that which is done in their name and that which is done against them.”

    Most of what’s been leaked isn’t new information but it’s not unhelpful information either. We really should be talking about how programs like this affect societies. And when topics like mass-surveillance come up it really should be an “ongoing discussion” sort of national dialogue. The appropriateness of mass-surveillance is an extremely context-specific topic (i.e. is there a legitimate need or are Palantir & Friends just looting?). Mass-surveillance is a critical topic for the US, and humanity in general, to discuss because it’s intertwined with that nebulous swirl of “free will”, “technology”, “the common good”, and “something we hope resembles morality”. We HAVE to be talking about these topics but we also HAVE to not mess up the discussion because the topics are very tricky and extremely important. So when an event like this pops up that thrusts an important topic into the spotlight – but in a kind of weird way involving journalistic disputes and traveling to Hong Kong and cozying up to the Chinese government – we definitely need to consider the possibility that someone(s) is trying to control the narrative around the public’s understanding of how mass-surveillance impacts their lives. There are 36 PowerPoint slides that both The Washington Post and The Guardian have withheld from the public so far. We might eventually see what those slides contained but it looks like ~88% of what Snowden wanted released has yet to be published. It could be a summer of drip…drip…drip…

    Posted by Pterrafractyl | June 12, 2013, 11:44 pm
  7. Michael Morell, John Boehner and Darrel Issa… America’s destabilization and distraction crew.. all have Ohio connections… Coinka-Dance?

    Posted by patternizer | June 12, 2013, 11:57 pm
  8. Seventy-five percent of data mining is
    performed by private corporations
    increasingly backed by CIA investment
    funds such as In-Q-Tel. The commercial applications mask the destabilizing political ones. The Silicon Valley libertarians erroneously believe technology is apolitical. Nothing could be further from the truth as self-aggrandizing media darlings like Snowden and Greenwald
    front for the Koch Brothers,Thiel, the Pauls and the rest of their Underground Reich colleagues.

    Posted by Dennis | June 13, 2013, 1:11 am
  9. Dave,


    A couple things – he was dissing the surveillance state on the internet years ago, and he got top secret access? And what do they mean when they say that his company was “next door” to the NSA?


    Posted by David M | June 13, 2013, 9:26 am
  10. Wrote about Snowden’s curious work history a couple of days ago. I wonder if his two broken legs were the 21st Century equivalent of his mom being hurt in a workplace injury. I presume your readers will get the Oswald reference.

    I’d be interested in his parents’ actual background, and where they worked when he grew up next to the NSA.

    And yes, it is discouraging that so few people can grasp our revised governmental schematics since the coup 50 years ago. I am reminded of SCIENCE OF COERCION by Simpson. The Wurlitzer folks are nothing if not comprehensive.

    In the summer of 2008 it was pretty obvious that a Democrat would be the next President. And yet the Republicans in the Senate were unanimous in the FISA bill. Why would they want to hand over so much power to a Democratic President? They weren’t. They knew the power accrues to the intelligence community, not to the President. If only the public were wise enough to recognize that.

    As I recall, Obama, who was initially opposed to it, switched his support to the FISA bill after his plane had mechanical problems on the campaign trail and he made an appearance in DALLAS where the Secret Service “mistakenly” turned off the metal detectors.

    Life goes on.

    Posted by Bob Miller | June 13, 2013, 12:14 pm
  11. Dave: You are one of the very very few who really understands the dynamics and the dangers surrounding these “leaks”. This is one of the few times I’m more disgusted the “the progressive/left” than I am with “the right”. This is a very scary situation. My fear is that a false flag incident will trigger a coup. But again, most people just don’t get it. I think we need to understand “the process” behind the leaks – how did Snowden get hired, how did he figure out in just a few months where to find documents and digest what they contained. What information is actually contained in the documents? System flows? Technical Service Documents? What? This whole “leak process” smells to high heaven. But very, very few “journalists” or bloggers want to question the actual story itself.

    Posted by Kathleen | June 13, 2013, 1:49 pm
  12. Thank you, Bob. I totally agree with everything you said.

    Posted by Kathleen | June 13, 2013, 2:12 pm
  13. There is a line of thought that says that the right/left divide is a diversion, what really exists is the corporate agenda and it doesn’t matter who sits in the oval office.

    Posted by Chris | June 13, 2013, 3:06 pm
  14. OTT
    The Tablet of 6/10/13 has a review of an upcoming book published by Harvard University Press, written by Ben Urguard – The Collaboration: Hollywood’s Pact With Hitler.
    “As it turns out, Hitler’s love for American movies was reciprocated by Hollywood. A forthcoming book by the young historian Ben Urwand, to be published by Harvard University Press in October, presents explosive new evidence about the shocking extent of the partnership between the Nazis and major Hollywood producers. Urwand, a former indie rock musician and currently a member of Harvard’s prestigious Society of Fellows, takes the subject personally: His parents were Jewish refugees from Egypt and Hungary. Digging through archives in Berlin and Washington, D.C., he has unearthed proof that Hollywood worked together with the Nazis much more closely than we ever imagined.

    Urwand has titled his riveting book The Collaboration: Hollywood’s Pact With Hitler, and as you turn its pages you realize with dismay that collaboration is the only fitting word for the relationship between Hitler and Hollywood in the 1930s. Using new archival discoveries, Urwand alleges that some of the Hollywood studio heads, nearly all of whom were Jewish, cast their lot with Hitler almost from the moment he took power, and that they did so eagerly—not reluctantly. What they wanted was access to German audiences. What Hitler wanted was the ability to shape the content of Hollywood movies—and he got it. During the ’30s, Georg Gyssling, Hitler’s consul in Los Angeles, was invited to preview films before they were released. If Gyssling objected to any part of a movie—and he frequently did—the offending scenes were cut. As a result, the Nazis had total veto power over the content of Hollywood movies.”

    Posted by Senn | June 13, 2013, 3:19 pm
  15. http://www.foreignpolicy.com/articles/2013/06/10/inside_the_nsa_s_ultra_secret_china_hacking_group?print=yes&hidecomments=yes&page=full

    Inside the NSA’s Ultra-Secret China Hacking Group
    Deep within the National Security Agency, an elite, rarely discussed team of hackers and spies is targeting America’s enemies abroad.
    BY MATTHEW M. AID | JUNE 10, 2013

    This weekend, U.S. President Barack Obama sat down for a series of meetings with China’s newly appointed leader, Xi Jinping. We know that the two leaders spoke at length about the topic du jour — cyber-espionage — a subject that has long frustrated officials in Washington and is now front and center with the revelations of sweeping U.S. data mining. The media has focused at length on China’s aggressive attempts to electronically steal U.S. military and commercial secrets, but Xi pushed back at the “shirt-sleeves” summit, noting that China, too, was the recipient of cyber-espionage. But what Obama probably neglected to mention is that he has his own hacker army, and it has burrowed its way deep, deep into China’s networks.

    When the agenda for the meeting at the Sunnylands estate outside Palm Springs, California, was agreed to several months ago, both parties agreed that it would be a nice opportunity for President Xi, who assumed his post in March, to discuss a wide range of security and economic issues of concern to both countries. According to diplomatic sources, the issue of cybersecurity was not one of the key topics to be discussed at the summit. Sino-American economic relations, climate change, and the growing threat posed by North Korea were supposed to dominate the discussions.

    Then, two weeks ago, White House officials leaked to the press that Obama intended to raise privately with Xi the highly contentious issue of China’s widespread use of computer hacking to steal U.S. government, military, and commercial secrets. According to a Chinese diplomat in Washington who spoke in confidence, Beijing was furious about the sudden elevation of cybersecurity and Chinese espionage on the meeting’s agenda. According to a diplomatic source in Washington, the Chinese government was even angrier that the White House leaked the new agenda item to the press before Washington bothered to tell Beijing about it.

    So the Chinese began to hit back. Senior Chinese officials have publicly accused the U.S. government of hypocrisy and have alleged that Washington is also actively engaged in cyber-espionage. When the latest allegation of Chinese cyber-espionage was leveled in late May in a front-page Washington Post article, which alleged that hackers employed by the Chinese military had stolen the blueprints of over three dozen American weapons systems, the Chinese government’s top Internet official, Huang Chengqing, shot back that Beijing possessed “mountains of data” showing that the United States has engaged in widespread hacking designed to steal Chinese government secrets. This weekend’s revelations about the National Security Agency’s PRISM and Verizon metadata collection from a 29-year-old former CIA undercover operative named Edward J. Snowden, who is now living in Hong Kong, only add fuel to Beijing’s position.

    But Washington never publicly responded to Huang’s allegation, and nobody in the U.S. media seems to have bothered to ask the White House if there is a modicum of truth to the Chinese charges.

    It turns out that the Chinese government’s allegations are essentially correct. According to a number of confidential sources, a highly secretive unit of the National Security Agency (NSA), the U.S. government’s huge electronic eavesdropping organization, called the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China.

    Hidden away inside the massive NSA headquarters complex at Fort Meade, Maryland, in a large suite of offices segregated from the rest of the agency, TAO is a mystery to many NSA employees. Relatively few NSA officials have complete access to information about TAO because of the extraordinary sensitivity of its operations, and it requires a special security clearance to gain access to the unit’s work spaces inside the NSA operations complex. The door leading to its ultramodern operations center is protected by armed guards, an imposing steel door that can only be entered by entering the correct six-digit code into a keypad, and a retinal scanner to ensure that only those individuals specially cleared for access get through the door.

    According to former NSA officials interviewed for this article, TAO’s mission is simple. It collects intelligence information on foreign targets by surreptitiously hacking into their computers and telecommunications systems, cracking passwords, compromising the computer security systems protecting the targeted computer, stealing the data stored on computer hard drives, and then copying all the messages and data traffic passing within the targeted email and text-messaging systems. The technical term of art used by NSA to describe these operations is computer network exploitation (CNE).

    TAO is also responsible for developing the information that would allow the United States to destroy or damage foreign computer and telecommunications systems with a cyberattack if so directed by the president. The organization responsible for conducting such a cyberattack is U.S. Cyber Command (Cybercom), whose headquarters is located at Fort Meade and whose chief is the director of the NSA, Gen. Keith Alexander.

    Commanded since April of this year by Robert Joyce, who formerly was the deputy director of the NSA’s Information Assurance Directorate (responsible for protecting the U.S. government’s communications and computer systems), TAO, sources say, is now the largest and arguably the most important component of the NSA’s huge Signal Intelligence (SIGINT) Directorate, consisting of over 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers.

    The sanctum sanctorum of TAO is its ultramodern operations center at Fort Meade called the Remote Operations Center (ROC), which is where the unit’s 600 or so military and civilian computer hackers (they themselves CNE operators) work in rotating shifts 24 hours a day, seven days a week.

    These operators spend their days (or nights) searching the ether for computers systems and supporting telecommunications networks being utilized by, for example, foreign terrorists to pass messages to their members or sympathizers. Once these computers have been identified and located, the computer hackers working in the ROC break into the targeted computer systems electronically using special software designed by TAO’s own corps of software designers and engineers specifically for this purpose, download the contents of the computers’ hard drives, and place software implants or other devices called “buggies” inside the computers’ operating systems, which allows TAO intercept operators at Fort Meade to continuously monitor the email and/or text-messaging traffic coming in and out of the computers or hand-held devices.

    TAO’s work would not be possible without the team of gifted computer scientists and software engineers belonging to the Data Network Technologies Branch, who develop the sophisticated computer software that allows the unit’s operators to perform their intelligence collection mission. A separate unit within TAO called the Telecommunications Network Technologies Branch (TNT) develops the techniques that allow TAO’s hackers to covertly gain access to targeted computer systems and telecommunications networks without being detected. Meanwhile, TAO’s Mission Infrastructure Technologies Branch develops and builds the sensitive computer and telecommunications monitoring hardware and support infrastructure that keeps the effort up and running.

    TAO even has its own small clandestine intelligence-gathering unit called the Access Technologies Operations Branch, which includes personnel seconded by the CIA and the FBI, who perform what are described as “off-net operations,” which is a polite way of saying that they arrange for CIA agents to surreptitiously plant eavesdropping devices on computers and/or telecommunications systems overseas so that TAO’s hackers can remotely access them from Fort Meade.

    It is important to note that TAO is not supposed to work against domestic targets in the United States or its possessions. This is the responsibility of the FBI, which is the sole U.S. intelligence agency chartered for domestic telecommunications surveillance. But in light of information about wider NSA snooping, one has to prudently be concerned about whether TAO is able to perform its mission of collecting foreign intelligence without accessing communications originating in or transiting through the United States.

    Since its creation in 1997, TAO has garnered a reputation for producing some of the best intelligence available to the U.S. intelligence community not only about China, but also on foreign terrorist groups, espionage activities being conducted against the United States by foreign governments, ballistic missile and weapons of mass destruction developments around the globe, and the latest political, military, and economic developments around the globe.

    According to a former NSA official, by 2007 TAO’s 600 intercept operators were secretly tapping into thousands of foreign computer systems and accessing password-protected computer hard drives and emails of targets around the world. As detailed in my 2009 history of NSA, The Secret Sentry, this highly classified intercept program, known at the time as Stumpcursor, proved to be critically important during the U.S. Army’s 2007 “surge” in Iraq, where it was credited with single-handedly identifying and locating over 100 Iraqi and al Qaeda insurgent cells in and around Baghdad. That same year, sources report that TAO was given an award for producing particularly important intelligence information about whether Iran was trying to build an atomic bomb.

    By the time Obama became president of the United States in January 2009, TAO had become something akin to the wunderkind of the U.S. intelligence community. “It’s become an industry unto itself,” a former NSA official said of TAO at the time. “They go places and get things that nobody else in the IC [intelligence community] can.”

    Given the nature and extraordinary political sensitivity of its work, it will come as no surprise that TAO has always been, and remains, extraordinarily publicity shy. Everything about TAO is classified top secret codeword, even within the hypersecretive NSA. Its name has appeared in print only a few times over the past decade, and the handful of reporters who have dared inquire about it have been politely but very firmly warned by senior U.S. intelligence officials not to describe its work for fear that it might compromise its ongoing efforts. According to a senior U.S. defense official who is familiar with TAO’s work, “The agency believes that the less people know about them [TAO] the better.”

    The word among NSA officials is that if you want to get promoted or recognized, get a transfer to TAO as soon as you can. The current head of the NSA’s SIGINT Directorate, Teresa Shea, 54, got her current job in large part because of the work she did as chief of TAO in the years after the 9/11 terrorist attacks, when the unit earned plaudits for its ability to collect extremely hard-to-come-by information during the latter part of George W. Bush’s administration. We do not know what the information was, but sources suggest that it must have been pretty important to propel Shea to her position today. But according to a recently retired NSA official, TAO “is the place to be right now.”

    There’s no question that TAO has continued to grow in size and importance since Obama took office in 2009, which is indicative of its outsized role. In recent years, TAO’s collection operations have expanded from Fort Meade to some of the agency’s most important listening posts in the United States. There are now mini-TAO units operating at the huge NSA SIGINT intercept and processing centers at NSA Hawaii at Wahiawa on the island of Oahu; NSA Georgia at Fort Gordon, Georgia; and NSA Texas at the Medina Annex outside San Antonio, Texas; and within the huge NSA listening post at Buckley Air Force Base outside Denver.

    The problem is that TAO has become so large and produces so much valuable intelligence information that it has become virtually impossible to hide it anymore. The Chinese government is certainly aware of TAO’s activities. The “mountains of data” statement by China’s top Internet official, Huang Chengqing, is clearly an implied threat by Beijing to release this data. Thus it is unlikely that President Obama pressed President Xi too hard at the Sunnydale summit on the question of China’s cyber-espionage activities. As any high-stakes poker player knows, you can only press your luck so far when the guy on the other side of the table knows what cards you have in your hand.

    Posted by Vanfield | June 13, 2013, 3:22 pm
  16. Looks like the destabilizing duo of Rupert Murdoch and Roger Ailes is in the news again. Let me amend my list above, let’s add Ohio born Roger Ailes to that list since he and Rupert Murdoch are in the news again today. Now it could be my active imagination, but I smell something in the air as of late… for starters, I smell a bit of fear in the air over there at Fox News, fear they know they have been the unwitting or witting dupes of the secret police state elements they are now having a hissy fit about.

    Just look at that clown-weasel-jackass hybrid Sean Hannity now trying to do back flips to blame Obama for stuff he was perfectly ok with under Bush. Read Roger Ailes lame weasel ass attempts to undig the ditch they are in and portray himself and Fox News as America loving “unifying” forces in this article :

    Some highly flatulent quotes from Ailes : “Regardless of your political party there are some themes that I believe we should all agree on: Government must reinforce the value of the individual and life.”

    “Of course, the country’s split politically. Democrats and Republicans can’t get along. And it is hard to figure out if it is ever going to get back together…”

    Yeah, douchebag, and you and the Australian were a major force in splitting the USA in two!!!

    Another quote from the Destabilizing Douche : “I’ve watched even some Americans systematically try to dismantle the greatest country on earth and yet we are still strong.”

    Uh, would that be the America Destabilizing Duo of Roger Ailes and his Oxford schooled Australian and China Trade connected pal Rupert Murdoch that have kept the USA in gridlock with one stoopid faux scandal after another since Obama took office?

    “We have allowed ourselves to be manipulated by others…”

    No shit.

    Here is the prize quote : “”My remarks tonight are my own, and don’t necessarily reflect those of News Corporation, Rupert Murdoch or Fox. I will say, however, that I didn’t give up my citizenship to create and run a news organization. I speak here with the highest authority and title anyone could ever aspire to — citizen of the United States.”

    Odd, statement, because that is exactly what Rupert Murdoch did so that he could take over American media companies and then use those media companies to fill American minds with lies and anger. Is he putting a bit of space between himself and Murdoch?

    Rupert Murdoch’s agents were of course involved with hacking phones in the United Kingdom. So Faux News doesn’t have any ground to stand on with regard to domestic spying. Murdoch spied on all sorts of people in the UK. Is Fox calling for Rupert Murdoch to go to jail??? NO. And it is suspected Murdoch did the same thing in the USA.

    The other news we are getting today is that Murdoch’s media empire is being divided into two. And oh, one more thing.. Murdoch is divorcing his wife Wendy(born in Communist China). He met her at a party in Hong Kong in 1997. Hmmm.

    Trying to smear Murdoch as a communist is not what I am doing here. Describing Murdoch as a hyper Capitalist asshole who would turn a profit off of the destabilization of his own country for various parties. Yes. Wasn’t that what the Opium trade was all about??? Two way collusion to profit off the suffering of your own people?

    And what’s that I smell in the air? A faint hint that not all is lost in America? That maybe, just maybe the tide is turning and the sheeple are waking up? Call me an Optimist, but somehow I personally just don’t see this Police State America thing going all the way.

    Dave, I don’t agree with you on everything you say, but thanks for being one of the early cracks in the wall to help let in some of the light.


    Posted by Patternizer | June 13, 2013, 3:58 pm
  17. It seems like one of the reasons it’s so hard to have a meaningful national discourse on the topic of mass-surveillance is that the topic inherently involves two somewhat mutually exclusive twin horrors:
    1. Mass-surveillance and the society-warping consequences.
    2. Whatever it is that justifies mass surveillance (nukes, biowarfare, etc)

    It’s hard to reduce one while not increasing the other. Or at least that’s the perception.

    So, if the US (and the rest of the world in general) wants to ever find a “solution” to balance privacy vs security going forward in a world that seems to be getting more unstable and dangerous by the year shouldn’t any discussion about mass-surveillance programs also necessitate a discussion on why the world doesn’t do more to address the underlying causes that contribute to the scary things are supposedly justify the mass-surveillance? The problems of religious fanaticism, climate change, state-sanctioned terrorist networks, out of control corporatists, and the global youth unemployment crisis didn’t just create themselves. So isn’t it kind of insane for a nation to have the realization (rightly or wrongly) that “it’s a really scary world out there and we need Total Information Awareness just to survive” and yet not have the realization that “we really need to be better about building a better world. Maybe that’s the best way to address the long-term threats?” Even when doing the right thing is a selfish act the US seem to have deep problems with the idea the the developing world should really be doing everything it can to ensure the planet doesn’t turn into a cesspool and that means actually helping the rest of the world develop sustainable internal economies that result in happy lives instead of looking for the latest, greatest sweatshop opportunities. High profit-margins are a poor replacement for jobs and decent living from a terror-prevention standpoint.

    There’s always going to a baseline level of danger in any society with advanced technology but the world today is WAY more messed up than it needed to be at this point. It’s one of the consequences of the extreme mismanagement by the global oligarchy over the past few decades. There are just a lot of bad actors out there and global policies have ensured they’re very capable bad actors and there is a virtually endless supply of bad actors because our world is a bad actor factory. Focusing on trying to intersect and preempt terror through mass-surveillance is a long-run losing strategy.

    A real “War on Terror” would have been some sort of global jobs and education program at its core and it’s hard to see why that strategy or the world it creates would require mass-surveillance. Or we could just continue marching down spy-master Thiel’s path to the future. Sure, it’ll be a shitty future and the will be lots of spying but at least the public will feel safe…for some exremely mysterious reasons.

    Posted by Pterrafractyl | June 13, 2013, 10:35 pm
  18. Well, it looks like Snowden has sort of won over the Hong Kong populace to an extent that the government is making decisions regarding the treatment of Snowden based, in part, on concerns over the reaction of the domestic audience:

    China Newspaper: Snowden Could Be Useful to China

    Associated Press June 14, 2013, 1:32 AM

    BEIJING (AP) — A popular Communist Party-backed newspaper is urging China’s leadership to get more information from former defense contractor Edward Snowden rather than send him back to the U.S., because his revelations about secret U.S. surveillance programs concern China’s national interest.

    The Global Times newspaper said in an editorial Friday that the Chinese government should not only consider Beijing’s relations with the United States but also domestic public opinion, which the paper says would be unhappy if Snowden were sent back.

    The Chinese paper known for nationalist views says Snowden could offer intelligence that can help China update its understanding of cyberspace.

    Snowden alleged in an interview with a Hong Kong newspaper that the U.S. National Security Agency’s 61,000 hacking targets around the world include hundreds in Hong Kong and mainland China.

    It also doesn’t look that the positive response towards Snowden’s arrival was an accident. The “50 Cent Party” of government paid internet opinion makers has been hailing him as a hero but because this is all happening right before a big US-China summit where a new ‘cooperative-relationship’ was on the agenda it doesn’t sound like Beijing shares the public’s Snowdenthusiasm:

    US leaker Snowden both boon and burden for China
    Damian Grammaticas China correspondent
    13 June 2013 Last updated at 11:50 ET

    For China, Edward Snowden’s sudden arrival in Hong Kong and his explosive revelations about the extent of US cyber-spying activities around the world are both a boon and a burden, a potential propaganda and intelligence gift, but also a diplomatic dilemma.

    Beijing has in recent months come in for sustained criticism over its own cyber-spying activities.

    The US government and private US internet security firms have criticised China for state-sponsored cyber-attacks, targeting everything from US military contractors to corporations in America.

    Evidence has been produced that purports to show Chinese hackers operating from military facilities targeting US media firms and private companies.

    US President Barack Obama was sitting down to tell Chinese leader Xi Jinping that US patience had run out and China had to rein in its cyber-spies, just as Edward Snowden’s claims that America ‘s National Security Agency had been collecting vast amounts of information about internet users around the world were gaining attention.

    What’s more, Mr Snowden now says the US was hacking hundreds of targets in Hong Kong and China, including private individuals, academics and students too.

    China has long said it is a victim of hacking. Here was a contractor for American intelligence who had fled to Hong Kong saying he wanted to expose US “hypocrisy”; China’s claims, he said, were true.

    Treacherous waters

    So it is unsurprising that China’s state-controlled media has leapt on the opportunity.

    The China Daily on Thursday said “the massive US global surveillance programme… is certain to stain Washington’s overseas image and test developing Sino-US ties”.

    It quoted Li Haidong, a researcher at the China Foreign Affairs University, who said that “for months Washington has been accusing China of cyber-espionage, but it turns out that the biggest threat to the pursuit of individual freedom and privacy in the US is the unbridled power of the government”.

    The Global Times, which is produced by the Communist Party’s People’s Daily group, added, “in the last year or two, the US has kept posing as a victim to accuse China of hacker infiltration. Many people speculate that this is the US’ cover for its own cyber-warfare. [Edward] Snowden’s whistle-blowing has confirmed this speculation.”

    Tao Duanfang writing in the Beijing News says “this is also probably just the tip of the iceberg. In other words, who can guarantee that the privacy of government, legislative and judicial organs has not also been spied on quietly by the eyes of intelligence agencies?

    “Since the US government and intelligence agencies reject transparency, how can one guarantee that they have not transgressed boundaries?”

    But Beijing’s schadenfreude only goes so far, because these are treacherous waters for China to tread in.

    China’s own controls on the internet, the activities of its own cyber-police, spying on China’s own citizens – these practices are the most intrusive and extensive in the world. Pointing out US hypocrisy is a risky move for China.

    In Hong Kong itself, the Beijing-backed Ta Kung Pao paper used the opportunity to gloat that “the ‘Prism programme’ leaked by US renegade spy Snowden has torn off the US’ glorious mantle as a world-class ‘human rights defender’, and once again let the international community witness its other ugly face…

    “It is hoped that the US government will no longer avoid differentiating between home and abroad, making peremptory calls on others to do things that even it is unwilling to do.”

    Fly in the ointment

    But others have pointed out how hazardous the whole issue is for China and the armies of paid internet opinion pundits, known as the 50 Cent Party, who have been praising Edward Snowden on Chinese websites.

    In an editorial, Hong Kong’s independent Apple Daily wrote that “no matter how China’s cyber-50 Cent Party praises Snowden for betraying the Central Intelligence Agency and how they drag the US down with mud-slinging tactics, it can neither change the fact that China is abusing cyber-monitoring to violate human rights and serve a one-party dictatorship, nor build up theoretical grounds for China to continue to abuse cyber-monitoring without any checks and balances whatsoever…

    “Snowden will always be a hero who China’s 50 Cent Party cannot afford to love. If the 50 Cent Party hails Snowden as a hero, they will be calling for the birth of Snowden-style heroes in China.”

    And the same dilemma applies to China’s own government. Edward Snowden’s sudden arrival in Hong Kong, and the fact he will probably now seek to prevent any deportation to the US through Hong Kong’s courts may look like an opportunity to Beijing, but it really is a headache that China’s leaders did not want right now.

    Xi Jinping’s summit with Barack Obama in California was meant to set the tone for the coming years.

    Substantive issues – from North Korea to the territorial disputes in the South and East China Seas, from cyber-spying to trade, technology and investment frictions – were all up for discussion.

    There was talk of a new, co-operative relationship. Edward Snowden is a new fly in the ointment.

    David Zweig, a professor the Hong Kong University of Science and Technology, says: “I think the big issue for China in his being here is it’s a big pain in the butt. I think that the last thing they really wanted is for him to come here. They have just spent a lot of time and energy trying to improve Sino-American relations.

    “So I don’t see that they get much from getting the Americans angry at them by protecting him if the Americans want him to go back. I don’t see anything positive in that.”

    Intelligence value?

    With his intimate knowledge of America’s spying capabilities and the work of the National Security Agency, Edward Snowden could have some intelligence value for China, says Mr Zweig, but it is limited.

    “The only thing that could be useful is that if the Hong Kong police arrest him, then his computer might fall into their hands and then that intelligence could then fall to China. But I don’t think that China really wants him. He doesn’t bring much.”

    So, on balance, David Zweig says, there are far more serious issues at stake for China.

    Posted by Pterrafractyl | June 14, 2013, 8:48 am
  19. Anyone remember how Lee Harvey Oswald was feared to have leaked U-2 secrets to the Soviets? Does that remind you of anyone in the news lately?

    Posted by Bob Miller | June 15, 2013, 9:54 am
  20. Google has “Modular Data” centers spread out all around the world. What do these Data Centers contain? Personal information about google users.


    Where are these Google Modular Data centers located?

    Douglas County, Georgia
    Council Bluffs, Iowa
    Lenoir, North Carolina
    Pryor Creek, Oklahoma
    The Dalles, Oregon
    Berkeley County, South Carolina

    Quilicura, Chile

    St. Ghislain, Belgium
    Hamina, Finland
    Dublin, Ireland

    Kowloon, Hong Kong
    Jurong West, Singapore
    Changhua County, Taiwan


    So personal information of Google users is being stored in the old stomping grounds of Pinochet’s Chile, Oklahoma(a nexus for two major U.S. terror attacks), Belgium (known for Dutroux and Gladio operations), South Carolina (birthplace of the U.S. Civil War), Hong Kong(historic nexus for western monied elite and China opium trade and #3 financial center), and Taiwan, that old school democracy destroyin’ & destabilizin’ WACL nexus.

    So google has its data centers sitting on servers in locations with historical ties to authoritarianism, democracy hatin’ and rightwing terror.

    Google #1 guy is Eric Schmidt, a German-American from the Falls Church/Blacksburg Virginia area. He had worked for Novell which is based in Provo Utah(about 33 minutes from the NSA snooping center in Bluffsdale) He took over google as CEO in August 2001. Google’s first funding came from German Andy Bechtolsheim. Google was created by Sergey Brin(Russian emigre) and Larry Page(American).

    It might be worthwhile to note that Anwar Awlaki was also based in Falls Church in 2001 and had some of the 9/11 hijackers under his wing. Coinka-Dance?

    Posted by Patternizer | June 15, 2013, 1:08 pm
  21. @Bob Miller–
    That’s the inference and reference I made in the main body of this post.



    Posted by Dave Emory | June 15, 2013, 6:55 pm
  22. Check out the latest run-down on Snowden’s background at Cannonfire. It’s getting spookier.

    Posted by Pterrafractyl | June 18, 2013, 7:14 am
  23. It looks like Merkel had to soften her criticism of the US’s surveillance program after it was reported that Germany is planning a $133 million expansion of the BND’s surveillance capabilities that would give it NSA-like capabilities:

    Germany to spend millions to expand internet surveillance – report
    By our dpa-correspondent and Europe Online

    Berlin (dpa) – Germany‘s main intelligence agency plans to expand internet surveillance by launching a five-year programme that will cost 100 million euros (133 million dollars), Der Spiegel magazine reported Sunday.

    The report about the federal intelligence service‘s (BND) plans comes days after whistleblower Edward Snowden revealed details of top-secret US government surveillance programmes that gathered vast telephone records and internet data.

    With the additional funding, the BND will add 100 new employees to its technical intelligence department and bolster its computing and server capacities, the report said.

    The government has already released a first tranche of 5 million euros, according to Der Spiegel.

    To fight terrorism and organized crime, the BND is permitted by law to monitor 20 per cent of all communications between Germany and foreign nations. Until now, it only had the capacity to check on 5 per cent of traffic – emails, telephone calls, Facebook and Skype chats – because of technical issues.

    With the new capabilities, the BND wants to ensure that cross-border traffic can be monitored as comprehensively as possible, just as is done in the United States by the National Security Agency (NSA), which specializes in electronic intelligence.

    Official data made public in April showed that the BND was intercepting millions of emails and text messages each year.

    A report published by the parliamentary committee on the intelligence services said nearly 2.9 million messages were intercepted in 2011, but only 290 contained “material of intelligence relevance.”

    A government spokesman said at the time that 38 million communications had been intercepted in 2010. dpa wn ar Author: Uta Winkhaus

    Posted by Pterrafractyl | June 19, 2013, 8:32 am
  24. Glenn Greenwald is heading new media venture funded by Ebay CEO Pierre Omidyar:


    I’m sure there is an agenda here somewhere other than serving freedom of Americans and whistleblowers blah blah blah.

    Posted by Kathleen | October 17, 2013, 1:44 pm

Post a comment