One of the illusions harbored by many–in particular, young people who have grown up with the internet, social networks and mobile technology–sees digital activity as private. Nothing could be further from the truth. Even before the cyber-libertarian policies advocated by individuals like John Perry Barlow, Eddie Snowden, Julian Assange and others became manifest in the Trump administration’s were implemented by the Trump administration and the GOP-controlled congress, digital affairs were subject to an extraordinary degree of manipulation by a multitude of interests.
We begin our examination of technocratic fascism with a look at the corporate foundation of Pokemon Go. Information about the background of Pokemon Go’s developer (Niantic) and the development of the firm is detailed in an article from Network World. In addition to the formidable nature of the intelligence agencies involved with generating the corporate foundation of Pokemon Go (Keyhole, Inc.; Niantic), note the unnerving nature of the information that can be gleaned from the Android phone of anyone who downloads the “app.”
Pokemon Go was seen as enhancing the “Cool Japan Strategy” of Prime Minister Shinzo Abe. The “Cool Japan Promotion Fund” was implemented by Abe (the grandson of Nobosuke Kishi, a Japanese war criminal who signed Japan’s declaration of war against the U.S. and became the country’s first postwar Prime Minister) to “raise the international profile of the country’s mass culture.”
The Finance Minister of Japan is Taro Aso, one of the enthusiasts of Nazi political strategy highlighted below. The “Cool Japan promotion Fund” would have been under his administration, with Tomomi Inada functioning as his administrator for the program. Now serving as Japan’s Defense Minister, Inada is another advocate of Nazi political strategy.
Next, we turn to another manifestation of Pokemon Go. The “Alt-Right” (read “Nazi”) movement is using Pokemon Go to recruit kids to the Nazi cause. Consider this against the background of Niantic, the Cool Japan strategy and the pro-Nazi figures involved with it. Consider this also, in conjunction with the Nazified AI developed and deployed by Robert and Rebekah Mercer, Steve Bannon, Cambridge Analytica and the “Alt-Right” milieu with which they associate.
A recent “New Yorker” article by Jane Mayer concerning Robert Mercer keys some interesting thoughts about Mercer, Bannon, the Alt-Right WikiLeaks and the Nazified AI we spoke of in FTR #’s 948 and 949. In FTR #946, we noted this concatenation’s central place in the Facebook constellation, a position that has positioned them to act decisively on the political landscape.
We note several things about the Mayer piece:
She writes of Mercer’s support for the Alt-Right–Mercer helps fund Bannon’s Breitbart: “. . . . In February, David Magerman, a senior employee at Renaissance, spoke out about what he regards as Mercer’s worrisome influence. Magerman, a Democrat who is a strong supporter of Jewish causes, took particular issue with Mercer’s empowerment of the alt-right, which has included anti-Semitic and white-supremacist voices. . . .”
Mercer is racist, feeling that racism only exists in contemporary black culture: “. . . . Mercer, for his part, has argued that the Civil Rights Act, in 1964, was a major mistake. According to the onetime Renaissance employee, Mercer has asserted repeatedly that African-Americans were better off economically before the civil-rights movement. (Few scholars agree.) He has also said that the problem of racism in America is exaggerated. The source said that, not long ago, he heard Mercer proclaim that there are no white racists in America today, only black racists. . . .”
His work at IBM was funded in part by DARPA, strongly implying that the DOD has applied some of the Mercer technology: “. . . . Yet, when I.B.M. failed to offer adequate support for Mercer and Brown’s translation project, they secured additional funding from DARPA, the secretive Pentagon program. Despite Mercer’s disdain for ‘big government,’ this funding was essential to his early success. . . .”
In a 2012 anti-Obama propaganda film funded by Citizens United, Steve Bannon borrowed from “The Triumph of the Will: “. . . . Many of these [disillusioned Obama] voters became the central figures of ‘The Hope & the Change,’ an anti-Obama film that Bannon and Citizens United released during the 2012 Democratic National Convention. After Caddell saw the film, he pointed out to Bannon that its opening imitated that of ‘Triumph of the Will,’ the 1935 ode to Hitler, made by the Nazi filmmaker Leni Riefenstahl. Bannon laughed and said, ‘You’re the only one that caught it!’ In both films, a plane flies over a blighted land, as ominous music swells; then clouds in the sky part, auguring a new era. . . .”
Next, we return to the subject of Bitcoin and cyber-libertarian policy. We have explored Bitcoin in a number of programs–FTR #’s 760, 764, 770 and 785.
An important new book by David Golumbia sets forth the technocratic fascist politics underlying Bitcoin. Known to veteran listeners/readers as the author of an oft-quoted article dealing with technocratic fascism, Golumbia has published a short, important book about the right-wing extremism underlying Bitcoin. (Programs on technocratic fascism include: FTR #’s 851, 859, 866, 867.)
In an excerpt from the book, we see disturbing elements of resonance with the views of Stephen Bannon and some of the philosophical influences on him. Julius Evola, “Mencius Moldbug” and Bannon himself see our civilization as in decline, at a critical “turning point,” and in need of being “blown up” (as Evola put it) or needing a “shock to the system.”
Note that the Cypherpunk’s Manifesto (published by the Electronic Frontier Foundation) and the 1996 “Declaration of the Independence of Cyberspace” written by the libertarian activist, Grateful Dead lyricist, Electronic Frontier Foundation founder John Perry Barlow decry governmental regulation of the digital system. (EFF is a leading “digital rights” and technology industry advocacy organization.)
The libertarian/fascist ethic of the digital world was articulated by Barlow.
Note how the “freedom” advocated by Barlow et al has played out: the Trump administration (implementing the desires of corporate America) has “deregulated” the internet. All this in the name of “freedom.”
In FTR #854, we noted the curious professional resume of Barlow, containing such disparate elements as–lyricist for the Grateful Dead (“Far Out!”); Dick Cheney’s campaign manager (not so “Far Out!”); a voter for white supremacist/segregationist George Wallace in the 1968 Presidential campaign (very “Un-Far Out!”).
For our purposes, his most noteworthy professional undertaking is his founding of the EFF–The Electronic Frontier Foundation. A leading ostensible advocate for internet freedom, the EFF has endorsed technology and embraced personnel inextricably linked with a CIA-derived milieu embodied in Radio Free Asia’s Open Technology Fund. (For those who are, understandably, surprised and/or skeptical, we discussed this at length and in detail in FTR #’s 891 and 895.)
Next, we present an article that brings to the fore some interesting questions about Barlow, the CIA and the very genesis of social media.
We offer Ms. Sunderson’s observations, stressing that Barlow’s foreshadowing of the communication functions inherent in social media and his presence at CIA headquarters (by invitation!) suggest that Barlow not only has strong ties to CIA but may have been involved in the conceptual genesis that spawned CIA-connected entities such as Facebook.
In FTR #951, we observed that Richard B. Spencer, one of Trump’s Nazi backers, has begun a website with Swedish Alt-Righter Daniel Friberg, part of the Swedish fascist milieu to which Carl Lundstrom belongs. In FTR #732 (among other programs), we noted that it was Lundstrom who financed the Pirate Bay website, on which WikiLeaks held forth for quite some time. In FTR #745, we documented that top Assange aide and Holocaust-denier Joran Jermas (aka “Israel Shamir”) arranged the Lundstrom/WikiLeaks liaison. (Jermas handles WikiLeaks Russian operations, a point of interest in the wake of the 2016 campaign.)
It is a good bet that Lundstrom/Pirate Bay/WikiLeaks et al were data mining the many people who visited the WikiLeaks site.
Might Lundstrom/Jermas/Assange et al have shared the voluminous data they may well have mined with Mercer/Cambridge Analytica/Bannon’s Nazified AI?
We conclude with recap of Microsoft researcher Kate Crawford’s observations at the SXSW event. Crawford gave a speech about her work titled “Dark Days: AI and the Rise of Fascism,” the presentation highlighted the social impact of machine learning and large-scale data systems. The take home message? By delegating powers to Bid Data-driven AIs, those AIs could become fascist’s dream: Incredible power over the lives of others with minimal accountability: ” . . . .’This is a fascist’s dream,’ she said. ‘Power without accountability.’ . . . .”
We reiterate, in closing, that ” . . . . Palantir is building an intelligence system to assist Donald Trump in deporting immigrants. . . .”
In FTR #757 we noted that Palantir is a firm dominated by Peter Thiel, a main backer of Donald Trump.
Program Highlights Include: WikiLeaks’ continued propagation of Alt-Right style Anti-Semitic propaganda: ” . . . . Now it is the darling of the alt-right, revealing hacked emails seemingly to influence a presidential contest, claiming the US election is ‘rigged.’ and descending into conspiracy. Just this week on Twitter, it described the deaths by natural causes of two of its supporters as a ‘bloody year for WikiLeaks.’ and warned of media outlets ‘controlled by’ members of the Rothschild family – a common anti-Semitic trope. . . .”; assessing all of the data-mining potential (certainty) of WikiLeaks, Pokemon Go and the (perhaps) Barlow-inspired Social Media world against the background of the Mercer/Bannon/Cambridge analytica Nazified AI.
In FTR #’s 891 and 895, we highlighted the Broadcasting Board of Governors, a Congressional fig leaf instituted to dilute CIA control over American foreign broadcast outlets such as Radio Free Europe, Voice of America and Radio Free Asia. In addition to the broadcast outlets discussed in the story that follows, we note that the change from a “board of governors” to a “CEO” to be appointed by Trump also gives the nominee power over Radio Free Asia’s Open Technology Fund, developer of numerous apps and other technological methodologies favored by the so-called “privacy advocates.”
The replacement of the governors is seen as a potential boon to the Trump administration. “ . . . . ‘There’s some fear among the folks here, that the firewall will get diminished and attacked and this could fall victim to propaganda,’ the Republican official said. ‘They will hire the person they want, the current CEO does not stand a chance. This will pop up on Steve Bannon’s radar quickly. They are going to put a friendly person in that job.’ . . . . ”
The change will affect domestic broadcast media as well. ” . . . . Because of the modification of the Smith-Mundt Act in 2013, the BBG can now broadcast in the U.S., too. But the influence on the domestic market could be even more subtle, the Republican official warned. A BBG CEO influenced by the administration could penetrate established media outlets with packages, series or other news products produced by the BBG’s networks but picked up and aired by traditional media like Fox News or Breitbart. Many U.S. outlets currently use content from VOA. ‘No money would even change hands, you’ve had no effect on the budget,’ the official said. ‘But it will denigrate the product. . . . ‘ ”
In the context of the changes made to the BBG, we review the political inclinations of Bannon: ” . . . The late Andrew Breitbart, founder of the website Bannon went on to lead, called Bannon the “Leni Riefenstahl of the Tea Party movement”—a reference to the infamous creator of Nazi propaganda films. While insisting to a Wall Street Journal reporter in 2011 that his work isn’t propaganda, Bannon went on to cite Riefenstahl among his main influences . . . ”
Next, we turn to the subject of free trade, on which Trump has had much to say, bashing China and Mexico as countries the U.S. should “put right” in their trade relations with the U.S. It’s worth noting we haven’t heard Trump mention a trade war with Germany despite all his tirades against China and Mexico. It raises the question of why, since Germany’s unprecedented and damaging surpluses make it such an obvious trade war target.
” . . . . There is one potential trade war, however, that few people have so far noticed — but which could soon be his easiest target. Germany. Given the size of its population, it runs a far larger trade surplus than China — and a massive surplus with the U.S. in particular. Even better, the industries to pick off are relatively simple to identify, and would actually have a chance of creating well-paid American jobs. . . .
“. . . . Germany’s trade surplus is absolutely massive, and unprecedented in modern industrial history. Last year it hit 8.9% of gross domestic product, and it is likely to break through 9% before the end of 2016. Globally, it is second in size only to China’s, but given that Germany is a far smaller country, it is only fair to measure it on a per capita basis — and when you look at it that way, Germany’s surplus is seven times bigger than China’s. . . . Much of Germany’s trade surplus is clearly the result of currency manipulation. The euro has depressed the real value of the country’s exports, allowing it rack up those huge exports. You can argue about whether China’s currency is really at its fair value or not — but no one can really dispute that Germany’s currency is way, way below what it would be if it still had the deutschemark. . . .”
Obviously, part of the answer lies in the fact that Deutsche Bank–a key element of the Bormann capital network and the Underground Reich–is owed hundreds of millions of dollars by Trump. Trump’s other connections run in the direction of the Underground Reich as well. (The Trump/Deutsche Bank connection is discussed, in among other programs, FTR #’s 920, 921, 922 and 927.)
We note in passing that Germany is preparing for a trade war with the U.S.–we don’t think one will really take place, but we may be treated to Trumpian “fake news” and/or propaganda. Germany is asserting that the factors behind its enormous trade surplus can not be altered, because it is due to naturally occurring circumstances like a rapidly aging population.
” . . . There are plenty of reasons for that. Germany’s current account surplus has never been as high as it is this year and never before has that surplus represented such a significant share of the country’s gross domestic product. Making matters worse is the fact that the US is the largest consumer of German exports. . . .
“. . . . As high as it is, though, the current surplus is likely to continue growing. The recent fall in the euro’s value relative to the dollar following Trump’s election makes German products and services even more competitive. And many economists believe that the value of the dollar will continue to climb, which means that the value of the euro against the dollar will shrink correspondingly. Their predictions are based on recent indications that Trump’s announced economic stimulus policies will push up both America’s sovereign debt load and its interest rates. . . .”
The program concludes with analysis of how Trump’s continued involvement in his business empire (through his children) leaves him open to manipulation. The Philippines is a good example: “ . . . . So, under the deal, Trump’s children will be paid millions of dollars throughout their father’s presidency by Jose E.B. Antonio, the head of Century Properties.
“Duterte recently named Antonio the special government envoy to the United States. The conflicts here could not be more troubling or more blatant: President Trump will be discussing U.S. policy in Southeast Asia with one of his (or his children’s) business partners, a man who is the official representative of a foreign leader who likens himself to Hitler. Also note that the Trump family has an enormous financial interest in Duterte’s deadly campaign: Rooting out crime in the Philippines is good for the real estate values. . . . Duterte recently named Antonio the special government envoy to the United States. The conflicts here could not be more troubling or more blatant: President Trump will be discussing U.S. policy in Southeast Asia with one of his (or his children’s) business partners, a man who is the official representative of a foreign leader who likens himself to Hitler. Also note that the Trump family has an enormous financial interest in Duterte’s deadly campaign: Rooting out crime in the Philippines is good for the real estate values. . . . .”
Program Highlights Include: Trump’s business dealings in India, where members of the BJP party figure in the disposition of the operations in that country; Trump’s consideration of Bernie Sanders supporter Tulsi Gabbard for a cabinet position; “Alt-Right” kingpin Steve Bannon’s high regard for Gabbard; Gabbard’s strong support for Modi and networking with the BJP; Gabbard’s networking with the RSS, the Indian fascist organization for which the BJP serves as a front.
In FTR #854, we noted John Perry Barlow’s background as Dick Cheney’s campaign manager and George Wallace supporter in 1968. In FTR #895, we discussed the fact that the Electronic Frontier Foundation embraced technologies developed by CIA-linked institutions. Barlow founded the EFF. It turns out that Barlow was invited to CIA headquarters in 1992 and advanced concepts that may well have lead to the development of social media–“. . . Let’s create a process of information digestion in which inexpensive data are gathered from largely open sources and condensed, through an open process . . . The entity I envision would be small, highly networked, and generally visible. It would be open to information from all available sources . . . It would rely heavily on the Internet, public media, the academic press, and an informal worldwide network of volunteers–a kind of global Neighborhood Watch–that would submit on-the-ground reports. . . . It would use off-the-shelf technology, and use it less for gathering data than for collating and communicating them. Being off-the-shelf, it could deploy tools while they were still state-of-the-art. . . .”
Continuing our analysis of the high-profile hacks and “Team Snowden,” we begin with analysis of some cryptic tweets that Snowden issued, shortly before the “Shadow Brokers” announced their pilfering of NSA cyberweapons. The possibility that the tweets were a signal to release the information is one to be considered.
Much of the program reviews key points of information from FTR #923 and other broadcasts: Russia appears to have been wrongly fingered for the DNC hack released by WikiLeaks; the Shadow Brokers’ supposed hack of the NSA’s servers does not appear to have been a hack at all but the work of an insider who downloaded the files onto a USB drive; the files offered up by the Shadow Brokers were from 2013, when Snowden undertook his operation.
Snowden has supported the cover story for the NSA non-hack–that it was, indeed, a hack (it probably wasn’t) and that Russia was behind it, which was probably not the case.
A chief suspect in the release of the NSA files is Jacob Applebaum, the WikiLeaker who appears to have facilitated Snowden’s journey from Hawaii to Hong Kong. The program reviews Applebaum’s hostility to Hillary Clinton, comparing it to the so-called “Shadow Brokers'” hostility to Clinton, echoing the views of Trump, Assange and Applebaum. The broadcast reviews the fact that the “Shadow Brokers” used an e-mail account in Germany that has been recalcitrant to attempts at penetrating its users’ information.
The program reviews Applebaum’s presence in Germany, along with other key members of the WikiLeaks/Team Snowden cadre.
Program Highlights Include: review of the fact that Snowden (at the time he set out to subvert the NSA), Applebaum and other high-profile “privacy activists” have documented links to the CIA; a look at Donald Trump, Jr. who has been active in tweeting and re-tweeting “Alt.right” racist and anti-Semitic memes; Trump, Jr.’s expressed willingness to run for office.
Supplementing and summing up the exhaustive “Eddie the Friendly Spook” series, this program sets forth the Snowden “psy-op” and the high-profile hacks against the background of Lee Harvey Oswald, the U.S. spy infiltrated into the Soviet Union and then into leftist organizations in the United States. Oswald was framed for JFK’s assassination and then killed before he could defend himself.
Whereas Oswald was portrayed as a villain, Eddie the Friendly Spook’s operation is the obverse, with Snowden decamping first to China and then to Russia, and being portrayed as a hero.
Snowden is not only a spy but a fascist, who advocates the elimination of Social Security and the return to the gold standard.
Snowden’s Russian sojourn appears to have been arranged by WikiLeaks, which also appears to have arranged his flight to China from Hawaii. (Snowden’s journey to Hawaii appears to have been facilitated by Jacob Applebaum, who may be behind the “Shadow Brokers” alleged hack of NSA cyberweapons.) It was Snowden’s journey to Moscow that threw Obama’s “reboot” with Russia under the bus.
In this program, we examine information indicating that Russia has been framed for the “Shadow Brokers” alleged hack of the NSA, much as it appears to have been framed for the DNC hack. Indeed, with both the DNC hack and the “Shadow Brokers” non-hack of the NSA, the evidence points increasingly toward “Team Snowden” and Eddie the Friendly Spook himself.
In that context, we again point to “The Obverse Oswald.” We strongly suspect that “Team Snowden” may have had something to do with this. Snowden is in Russia and working for a computer firm. The (frankly lame) framing of Russia for the DNC hack and the “Shadow Brokers” non-hack of the NSA reminds us of the process of “painting Oswald Red.” After reviewing information about the political, ideological and rhetorical continuity between Ron Paul (Snowden’s and Julian Assange’s Presidential candidate of choice), David Duke and Donald Trump and his “alt.right” associates, the program reviews the apparently deep and ongoing collaboration between Julian Assange, WikiLeaks and Donald Trump’s dirty tricks specialist Roger Stone.
The program reviews at length the overwhelming probability that Russia was framed for the DNC hacks. Tackling the “Shadow Brokers'” penetration of NSA cyberweapons technology, we note that the evidence that this was done by Russia is very poor. The bitcoin auctioning of the cyberweapons is extremely unlikely, as is the public announcement of the so-called “hack.” In addition, the announcement of the so-called “hack” is done in a comical broken English, reminiscent of the Boris and Natasha cartoon characters from the early 1960’s.
Next, the program sets forth the hypothesis that, rather than a “hack,” this was more likely an insider penetration of NSA and downloading of the files onto a USB stick. Longtime NSA observer James Bamford points a finger of suspicion at Jacob Applebaum, the WikiLeaker who appears to have facilitated Snowden’s flight from Hawaii to Hong Kong. Applebaum is a resolute opponent of Hillary Clinton, and the Shadow Brokers’ broken English targeted the Democratic nominee as well.
It is more than a little interesting that Edward Snowden has gone on record saying that Russia was behind this event and that it was a hack. The evidence of Russia being behind the Shadow Brokers and this event being a “hack” is very poor. Nonetheless, Snowden is giving credence to the cover story for this event.
Program Highlights Include: The use of a German e-mail provider that has been resistant to government attempts at transparency; review of the presence in Germany of Applebaum, Sarah Harrison (Assange’s former girlfriend and the woman who assisted Snowden’s flight from Hong Kong to Moscow), Laura Poitras (close associate of Snowden and Glenn Greenwald) and Peter Sunde (who founded the Pirate Bay site on which WikiLeaks inititially held forth); rumination about the possibility that Snowden and Applebaum may have collaborated in the context of the “Shadow Brokers;” review of the links between the CIA-derived Broadcasting Board of Governors and Jacob Applebaum; review of Eddie Snowden’s work for the CIA at the time he chose to leak NSA documents.
Continuing analysis and discussion from FTR #891, we further explore the CIA-generated background and funding of the “privacy” advocates who comprise much of “Team Snowden.” Recall that Snowden himself was with CIA when he chose to double on NSA. We begin by reviewing our scrutiny of Edward Snowden from the perspective of Colonel L. Fletcher Prouty, the Air Force “Focal Point Officer” who developed a CIA-controlled network inside of the branches of the military and other agencies of the federal government. This “focal point” network constituted a “secret government within a government” that appears to exist to this day. Next, we set forth the evolution of the Broadcasting Board of Governors and Radio Free Asia, the parent organizations of the Open Technology Fund. The OTF has capitalized much of the encrypted “anti-surveillance” technology that has been developed. “Team Snowden,” in turn, has evolved from this milieu. In our past discussions of the assassination of President Kennedy, we have noted that the very same covert action networks used to overthrow and eliminate governments and individuals deemed hostile to U.S. interests were ultimately deployed against Americans and even the United States itself. “Regime change” and destabilization came home. In a similar fashion, it is our considered opinion that a CIA-derived technology milieu developed to assist and effect “ops” abroad was used to destabilize the Obama administration through the Snowden “op.” ” . . . Readers might find it odd that a US government agency established as a way to launder the image of various shady propaganda outfits (more on that soon) is now keen to fund technologies designed to protect us from the US government. Moreover, it might seem curious that its money would be so warmly welcomed by some of the Internet’s fiercest antigovernment activists. . . . . You’d think that anti-surveillance activists like Chris Soghoian, Jacob Appelbaum, Cory Doctorow and Jillian York would be staunchly against outfits like BBG and Radio Free Asia, and the role they have played — and continue to play — in working with defense and corporate interests to project and impose U.S. power abroad. Instead, these radical activists have knowingly joined the club, and in doing so, have become willing pitchmen for a wing of the very same U.S. National Security State they so adamantly oppose. . . .” Program Highlights Include: The controversy over WhatsApp’s encryption technology; the development of WhatsApp’s encryption technology by the CIA-derived Open Technology Fund; FBI Director James Comey’s support for Mitt Romney in 2012; the apparent role of Comey in destabilizing the Obama administration and the Hillary Clinton campaign.
A Mitt Romney backer and former George W. Bush Justice Department staffer, James Comey is taking actions that are destabilizing both the Obama administration and the Clinton candidacy. All of the contents of this website as of 12/19/2014–Dave Emory’s 35+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated.
Returning once again to “L’Affaire Snowden,” we note the revealingly profound discontinuities in this event and the key characters involved. We also revisit some of the key features of what appears to have been an Underground Reich intelligence operation. Far from being “shocked, shocked” by the Snowden material, the German BND (successor organization to the Reinhard Gehlen spy outfit) HELPED the NSA spy on foreign leaders. The Snowden “op” also serves as a rationalization for Europe’s assault on American Big Tech and a push for censorship of the Internet. As the New York Stock Exchange, United Airlines and the Wall Street Journal simultaneously experienced what were described as technical glitches, we note that the “Anonymous” hacker group (whoever they are) foreshadowed the event. Program Highlights Include: Electronic Frontier Foundation John Perry Barlow’s work as Dick Cheney’s campaign manager; the EFF’s links to Snowden and the hacker encharged with securing Glenn Greenwald’s computer; the EFF’s work shilling for Big Tobacco; Glenn Greenwald’s work shilling for Big Tobacco; allegations that the Snowden leak compromised American and British spies to Russian and Chinese intelligence; the fact that one of the people with “root access” to the OPM data base was in Argentina (an epicenter of the Underground Reich).
A controversy ensued when it emerged that House majority whip Steve Scalise had attended a meeting of David Duke’s European-American Unity Organization. The newly-seated GOP-dominated congress which Scalise will help to guide began attacking Social Security on its very first day. Specifically, the GOP began attacking the Social Security disability program. These developments serve as a point of entry into our discussion. Snowden is an advocate of eliminating Social Security and the OUN/B fascists running Ukraine are engaging in a similar program to force those in Eastern Ukraine to stop their attempts at secession. The elements of the Snowden/WikiLeaks “op” are networked with Duke, as well. Snowden’s leaking journalist of choice, Nazi fellow-traveler Glenn Greenwald, has been financed by Pierre Omidyar of Ebay, who has also financed the Ukraine coup. The program notes many other elements of confluence between the Snowden/WikiLeaks “op” and the Ukrainian coup. The Snowden/WikiLeaks helped to deep-six Obama’s “reboot with Russia” and also alienate many of the young, idealistic voters who had supported him in 2008, thereby helping to elect the 114th Congress.
In this post we’re going to take a look at the recent Supreme Court ruling on 4th amendment rights and smartphones and how this ruling could impact the ongoing debate over NSA spying. We’re also going to look at the other side of the coin: the 5th Amendment right against self-incrimination during a time when encryption tools strong enough to thwart law enforcement and the NSA are becoming increasingly mainstream. Is encryption like a strongbox or a wall safe? You might be surprised by just how important that question has become.