One of the illusions harbored by many–in particular, young people who have grown up with the internet, social networks and mobile technology–sees digital activity as private. Nothing could be further from the truth. Even before the cyber-libertarian policies advocated by individuals like John Perry Barlow, Eddie Snowden, Julian Assange and others became manifest in the Trump administration’s were implemented by the Trump administration and the GOP-controlled congress, digital affairs were subject to an extraordinary degree of manipulation by a multitude of interests.
We begin our examination of technocratic fascism with a look at the corporate foundation of Pokemon Go. Information about the background of Pokemon Go’s developer (Niantic) and the development of the firm is detailed in an article from Network World. In addition to the formidable nature of the intelligence agencies involved with generating the corporate foundation of Pokemon Go (Keyhole, Inc.; Niantic), note the unnerving nature of the information that can be gleaned from the Android phone of anyone who downloads the “app.”
Pokemon Go was seen as enhancing the “Cool Japan Strategy” of Prime Minister Shinzo Abe. The “Cool Japan Promotion Fund” was implemented by Abe (the grandson of Nobosuke Kishi, a Japanese war criminal who signed Japan’s declaration of war against the U.S. and became the country’s first postwar Prime Minister) to “raise the international profile of the country’s mass culture.”
The Finance Minister of Japan is Taro Aso, one of the enthusiasts of Nazi political strategy highlighted below. The “Cool Japan promotion Fund” would have been under his administration, with Tomomi Inada functioning as his administrator for the program. Now serving as Japan’s Defense Minister, Inada is another advocate of Nazi political strategy.
Next, we turn to another manifestation of Pokemon Go. The “Alt-Right” (read “Nazi”) movement is using Pokemon Go to recruit kids to the Nazi cause. Consider this against the background of Niantic, the Cool Japan strategy and the pro-Nazi figures involved with it. Consider this also, in conjunction with the Nazified AI developed and deployed by Robert and Rebekah Mercer, Steve Bannon, Cambridge Analytica and the “Alt-Right” milieu with which they associate.
A recent “New Yorker” article by Jane Mayer concerning Robert Mercer keys some interesting thoughts about Mercer, Bannon, the Alt-Right WikiLeaks and the Nazified AI we spoke of in FTR #’s 948 and 949. In FTR #946, we noted this concatenation’s central place in the Facebook constellation, a position that has positioned them to act decisively on the political landscape.
We note several things about the Mayer piece:
She writes of Mercer’s support for the Alt-Right–Mercer helps fund Bannon’s Breitbart: “. . . . In February, David Magerman, a senior employee at Renaissance, spoke out about what he regards as Mercer’s worrisome influence. Magerman, a Democrat who is a strong supporter of Jewish causes, took particular issue with Mercer’s empowerment of the alt-right, which has included anti-Semitic and white-supremacist voices. . . .”
Mercer is racist, feeling that racism only exists in contemporary black culture: “. . . . Mercer, for his part, has argued that the Civil Rights Act, in 1964, was a major mistake. According to the onetime Renaissance employee, Mercer has asserted repeatedly that African-Americans were better off economically before the civil-rights movement. (Few scholars agree.) He has also said that the problem of racism in America is exaggerated. The source said that, not long ago, he heard Mercer proclaim that there are no white racists in America today, only black racists. . . .”
His work at IBM was funded in part by DARPA, strongly implying that the DOD has applied some of the Mercer technology: “. . . . Yet, when I.B.M. failed to offer adequate support for Mercer and Brown’s translation project, they secured additional funding from DARPA, the secretive Pentagon program. Despite Mercer’s disdain for ‘big government,’ this funding was essential to his early success. . . .”
In a 2012 anti-Obama propaganda film funded by Citizens United, Steve Bannon borrowed from “The Triumph of the Will: “. . . . Many of these [disillusioned Obama] voters became the central figures of ‘The Hope & the Change,’ an anti-Obama film that Bannon and Citizens United released during the 2012 Democratic National Convention. After Caddell saw the film, he pointed out to Bannon that its opening imitated that of ‘Triumph of the Will,’ the 1935 ode to Hitler, made by the Nazi filmmaker Leni Riefenstahl. Bannon laughed and said, ‘You’re the only one that caught it!’ In both films, a plane flies over a blighted land, as ominous music swells; then clouds in the sky part, auguring a new era. . . .”
Next, we return to the subject of Bitcoin and cyber-libertarian policy. We have explored Bitcoin in a number of programs–FTR #’s 760, 764, 770 and 785.
An important new book by David Golumbia sets forth the technocratic fascist politics underlying Bitcoin. Known to veteran listeners/readers as the author of an oft-quoted article dealing with technocratic fascism, Golumbia has published a short, important book about the right-wing extremism underlying Bitcoin. (Programs on technocratic fascism include: FTR #’s 851, 859, 866, 867.)
In an excerpt from the book, we see disturbing elements of resonance with the views of Stephen Bannon and some of the philosophical influences on him. Julius Evola, “Mencius Moldbug” and Bannon himself see our civilization as in decline, at a critical “turning point,” and in need of being “blown up” (as Evola put it) or needing a “shock to the system.”
Note that the Cypherpunk’s Manifesto (published by the Electronic Frontier Foundation) and the 1996 “Declaration of the Independence of Cyberspace” written by the libertarian activist, Grateful Dead lyricist, Electronic Frontier Foundation founder John Perry Barlow decry governmental regulation of the digital system. (EFF is a leading “digital rights” and technology industry advocacy organization.)
The libertarian/fascist ethic of the digital world was articulated by Barlow.
Note how the “freedom” advocated by Barlow et al has played out: the Trump administration (implementing the desires of corporate America) has “deregulated” the internet. All this in the name of “freedom.”
In FTR #854, we noted the curious professional resume of Barlow, containing such disparate elements as–lyricist for the Grateful Dead (“Far Out!”); Dick Cheney’s campaign manager (not so “Far Out!”); a voter for white supremacist/segregationist George Wallace in the 1968 Presidential campaign (very “Un-Far Out!”).
For our purposes, his most noteworthy professional undertaking is his founding of the EFF–The Electronic Frontier Foundation. A leading ostensible advocate for internet freedom, the EFF has endorsed technology and embraced personnel inextricably linked with a CIA-derived milieu embodied in Radio Free Asia’s Open Technology Fund. (For those who are, understandably, surprised and/or skeptical, we discussed this at length and in detail in FTR #’s 891 and 895.)
Next, we present an article that brings to the fore some interesting questions about Barlow, the CIA and the very genesis of social media.
We offer Ms. Sunderson’s observations, stressing that Barlow’s foreshadowing of the communication functions inherent in social media and his presence at CIA headquarters (by invitation!) suggest that Barlow not only has strong ties to CIA but may have been involved in the conceptual genesis that spawned CIA-connected entities such as Facebook.
In FTR #951, we observed that Richard B. Spencer, one of Trump’s Nazi backers, has begun a website with Swedish Alt-Righter Daniel Friberg, part of the Swedish fascist milieu to which Carl Lundstrom belongs. In FTR #732 (among other programs), we noted that it was Lundstrom who financed the Pirate Bay website, on which WikiLeaks held forth for quite some time. In FTR #745, we documented that top Assange aide and Holocaust-denier Joran Jermas (aka “Israel Shamir”) arranged the Lundstrom/WikiLeaks liaison. (Jermas handles WikiLeaks Russian operations, a point of interest in the wake of the 2016 campaign.)
It is a good bet that Lundstrom/Pirate Bay/WikiLeaks et al were data mining the many people who visited the WikiLeaks site.
Might Lundstrom/Jermas/Assange et al have shared the voluminous data they may well have mined with Mercer/Cambridge Analytica/Bannon’s Nazified AI?
We conclude with recap of Microsoft researcher Kate Crawford’s observations at the SXSW event. Crawford gave a speech about her work titled “Dark Days: AI and the Rise of Fascism,” the presentation highlighted the social impact of machine learning and large-scale data systems. The take home message? By delegating powers to Bid Data-driven AIs, those AIs could become fascist’s dream: Incredible power over the lives of others with minimal accountability: ” . . . .’This is a fascist’s dream,’ she said. ‘Power without accountability.’ . . . .”
We reiterate, in closing, that ” . . . . Palantir is building an intelligence system to assist Donald Trump in deporting immigrants. . . .”
In FTR #757 we noted that Palantir is a firm dominated by Peter Thiel, a main backer of Donald Trump.
Program Highlights Include: WikiLeaks’ continued propagation of Alt-Right style Anti-Semitic propaganda: ” . . . . Now it is the darling of the alt-right, revealing hacked emails seemingly to influence a presidential contest, claiming the US election is ‘rigged.’ and descending into conspiracy. Just this week on Twitter, it described the deaths by natural causes of two of its supporters as a ‘bloody year for WikiLeaks.’ and warned of media outlets ‘controlled by’ members of the Rothschild family – a common anti-Semitic trope. . . .”; assessing all of the data-mining potential (certainty) of WikiLeaks, Pokemon Go and the (perhaps) Barlow-inspired Social Media world against the background of the Mercer/Bannon/Cambridge analytica Nazified AI.
The events overtaking the United States are echoes of events occurring worldwide. This “2017 World Tour” examines aspects of ascendant global fascism, including historical and ideological trends stretching back to the World War II period.
Yet another of the fascist/Nazi/racist influences on Steve Bannon is French writer Charles Maurras. A doctrinaire anti-Semite, he was sentenced to life imprisonment for collaborating with the Third Reich.
Setting Maurras’s activities in an historical context, we recap an excerpt from FTR #372 (August of 2002) detailing the French Fifth Column that subverted the French military resistance to the armies of the Third Reich. Maurras’s L’Action Francaise was among the journals influencing French fascists, who saw the German invasion as a vehicle for eliminating democracy and, at the same time, blaming the defeat on government of Leon Blum, whose murder was advocated by Maurras.
In Italy, Bepe Grillo’s Five Star Movement is leading in the polls, and may come out ahead in the 2018 elections. Observers have seen the party as an heir to Mussolini’s blackshirts. We note, in passing, that the populist idealism officially endorsed by Five Star is similar to aspects of many left-populist agendas, while incorporating features of contemporary fascist politics.
Traveling northward, we observe the resuscitation of Slovakian fascism and the celebration of Nazi quisling Josef Tiso’s World War II collaborationist government. Social media/Facebook are a key element of the success of the “neo-Tiso’s.”
An American/Swedish axis, of sorts, manifests as a collaborative effort between Trumpenkampfverbande supporter Richard B. Spencer and Daniel Friberg, a key figure in the Swedish fascist milieu of Carl Lundstrom.
Traveling to Asia, we note the re-emergence of Japanese fascism, instituted in the Abe government by organizations like Nippon Kaigi. In addition to instituting revisionist teaching in the Japanese educational system, the Abe government is curtailing that country’s free press.
Several of Abe’s cabinet ministers are supportive of Hitler’s electoral strategy, seeing it as a blueprint for the implementation of Japanese reaction–among them Tomomi Inada, the new defense minister.
The program concludes with a look at Narendra Modi’s Hindu nationalist/fascist government and it selection of a hard-line anti-Muslim bigot to govern the state of Uttar Pradesh.
Program Highlights Include: review of Modi’s BJP as a cat’s paw for the Hindu nationalist/fascist RSS; discussion of the economic links between German and French industrialists that underlay the development of the French Fifth Column inspired, in part, by Charles Maurras; review of the links between Carl Lundstrom, WikiLeaks and Assange aide Joran Jermas, a doctrinaire Holocaust denier; review of the “Nazified AI” at the heart of Cambridge Analytica’s data manipulation engine.
In previous programs, we have highlighted technocratic fascism, embodied in a text excerpted from an excellent article by David Golumbia. In other programs, we have detailed the anarcho/fascist politics underlying Bitcoin. Now, Mr. Golumbia has published a book about Bitcoin, as excellent as it is short (77 pages of text.) It should be noted that the apocalyptic, dystopian view of our civilization epitomized by the Bitcoin crowd is embraced by Steve Bannon and the philosophical influences on him.
With a new Cold War gaining momentum and charges of Russian interference in the U.S. election, this program takes stock of information pointing in the other direction. After reviewing previous discussion of why the DNC, John Podesta and NSA “hacks” do not withstand scrutiny, the broadcast sets forth information indicating that Ukrainian fascists and related elements may well be the authors of a “cyber false-flag” operation.
Not only is the so-called “evidence” characteristic of a relatively clumsy false-flag operation–albeit one conducted on the internet–but the so-called “experts,” link to the milieu of the Reinhard Gehlen “Org.”
The joint CIA/FBI/NSA declassified version of the Intelligence Report on Russian hacking came out. There is no substantive detail in the report:“ . . . . To summarize, the report says that the CIA, FBI, and National Security Agency believe that Russian hackers—directed ultimately by Vladimir Putin—hacked email accounts belonging to the Democratic National Committee and to Clinton campaign chairman John Podesta and then passed the material they obtained on to WikiLeaks through a third party. This was done, the report asserts, because the Russians believed that Donald Trump would be friendlier to their country’s interests, as president, than Hillary Clinton. And … that’s about it. Not counting intro pages or appendices, the report is five pages long and does not include any description of the actual evidence that Russian actors were responsible for the DNC/Podesta hacks (an assertion that’s supported by publicly available evidence analyzed by third parties) or the assertion that Putin ultimately directed the release of hacked material in order to help elect Donald Trump (an assertion that’s harder to verify independently). . . . .”
The Bitly technology used in the hacks enabled the entire world to see what was going on! This strongly indicates a cyber-false flag operation: ” . . . . Using Bitly allowed ‘third parties to see their entire campaign including all their targets— something you’d want to keep secret,’ Tom Finney, a researcher at SecureWorks, told Motherboard. It was one of Fancy Bear’s ‘gravest mistakes,’ as Thomas Rid, a professor at King’s College who has closely studied the case, put it in a new piece published on Thursday in Esquire, as it gave researchers unprecedented visibility into the activities of Fancy Bear, linking different parts of its larger campaign together. . . .”
It should be noted that while this report is signed off on by the CIA, NSA, and FBI, the FBI never examined the DNC’s hacked server. Instead, according to the DNC, the job was outsourced to CrowdStrike! Neither the FBI, nor any other U.S. government entity has run an independent forensic analysis on the system! ” . . . Six months after the FBI first said it was investigating the hack of the Democratic National Committee’s computer network, the bureau has still not requested access to the hacked servers, a DNC spokesman said. No US government entity has run an independent forensic analysis on the system, one US intelligence official told BuzzFeed News. . . .The FBI has instead relied on computer forensics from a third-party tech security company, CrowdStrike, which first determined in May of last year that the DNC’s servers had been infiltrated by Russia-linked hackers, the U.S. intelligence official told BuzzFeed News. . .’CrowdStrike is pretty good. There’s no reason to believe that anything that they have concluded is not accurate,’ the intelligence official said, adding they were confident Russia was behind the widespread hacks. . . It’s unclear why the FBI didn’t request access to the DNC servers, and whether it’s common practice when the bureau investigates the cyberattacks against private entities by state actors, like when the Sony Corporation was hacked by North Korea in 2014. BuzzFeed News spoke to three cybersecurity companies who have worked on major breaches in the last 15 months, who said that it was “par for the course” for the FBI to do their own forensic research into the hacks. None wanted to comment on the record on another cybersecurity company’s work, or the work being done by a national security agency. . . .”
The FBI claims that the DNC denied them access to the servers! Right! Note the prominence of CrowdStrike in this imbroglio. More about them below. ” . . . . The FBI struck back at the Democratic National Committee on Thursday, accusing it of denying federal investigators access to its computer systems and hamstringing its investigation into the infiltration of DNC servers by Russia-backed hackers. ‘The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated. This left the FBI no choice but to rely upon a third party for information,’ a senior law enforcement official told BuzzFeed News in a statement. ‘These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier.’ . . . The warring statements are the latest twists in an extraordinary standoff between the Democrats and federal investigators that reached a fever pitch over the bureau’s probe into Democratic nominee Hillary Clinton’s private email server. . . . The FBI announced it was investigating the hack of the DNC’s servers in July, after a third-party computer security firm, Crowdstrike, said it had evidence of Kremlin-backed hackers infiltrating its system. . . .”
The DNC responded to the FBI’s counter-assertion by reasserting that it’s giving the FBI full access to whatever it requested. If there’s a problem with the FBI getting access to that server, it’s a problem between the FBI and Crowdstrike: ” . . . The FBI had previously told lawmakers on the Hill that the DNC had not allowed federal investigators to access their servers. After BuzzFeed News reported on Wednesday that the DNC claimed FBI agents had never asked for the servers, congressional officials pressured the FBI for answers. A senior law enforcement official issued a public statement on the matter Thursday night. ‘Someone is lying their ass off,’ a US intelligence official said of the warring statements. But officials with the DNC still assert they’ve ‘cooperated with the FBI 150%.They’ve had access to anything they want. Anything that they desire. Anything they’ve asked, we’ve cooperated,’ the DNC official said. ‘If anybody contradicts that it’s between Crowdstrike and the FBI.’ . . .Without direct access to the computer network, another US intelligence official told BuzzFeed, federal investigators had been forced to rely on the findings of the private cybersecurity firm Crowdstrike for computer forensics. From May through August of 2016, the Democratic National Committee paid Crowdstrike $267,807 dollars for maintenance, data services and consulting, among other things, according to federal records. . . .”
An important article underscores that many tech experts disagree with the government’s so-called analysis: ” . . . . Yet despite the scores of breathless media pieces that assert that Russia’s interference in the election is ‘case closed,’might some skepticism be in order? Some cyber experts say ‘yes.’ . . . Cyber-security experts have also weighed in. The security editor at Ars Technica observed that ‘Instead of providing smoking guns that the Russian government was behind specific hacks,’ the government report ‘largely restates previous private sector claims without providing any support for their validity.’ Robert M. Lee of the cyber-security company Dragos noted that the report ‘reads like a poorly done vendor intelligence report stringing together various aspects of attribution without evidence.’ Cybersecurity consultant Jeffrey Carr noted that the report ‘merely listed every threat group ever reported on by a commercial cybersecurity company that is suspected of being Russian-made and lumped them under the heading of Russian Intelligence Services (RIS) without providing any supporting evidence that such a connection exists.’ . . .”
CrowdStrike–at the epicenter of the supposed Russian hacking controversy is noteworthy. Its co-founder and chief technology officer, Dmitry Alperovitch is a senior fellow at the Atlantic Council, financed by elements that are at the foundation of fanning the flames of the New Cold War: “In this respect, it is worth noting that one of the commercial cybersecurity companies the government has relied on is Crowdstrike, which was one of the companies initially brought in by the DNC to investigate the alleged hacks. . . . Dmitri Alperovitch is also a senior fellow at the Atlantic Council. . . . The connection between [Crowdstrike co-founder and chief technology officer Dmitri] Alperovitch and the Atlantic Council has gone largely unremarked upon, but it is relevant given that the Atlantic Council—which is is funded in part by the US State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk—has been among the loudest voices calling for a new Cold War with Russia. As I pointed out in the pages of The Nation in November, the Atlantic Council has spent the past several years producing some of the most virulent specimens of the new Cold War propaganda. . . . ”
There was an update back in December from the German government regarding its assessment of the 2015 Bundgestag hacks (attributed to “Fancy Bear” and “Cozy Bear,” as mentioned in the Sandro Gaycken post above) that it attributed to APT28 and Russia: while it asserts the hacks did indeed take place, the leaked documents were later determined to be an insider leak (via Google translate). “ . . . . According to the report, federal security authorities are convinced that not hackers had stolen the 2420 documents published by the Internet platform Wikileaks in early December. There was certainly no evidence that the material had been stolen in the cyber attack on the Bundestag in 2015, it was called into security crises. . . . ”
Another article details at length the skepticism and outright scorn many cybersecurity experts feel concerning the report. ” . . . . Did the Russian government hack the DNC and feed documents to WikiLeaks? There are really two questions here: who hacked the DNC, and who released the DNC documents? These are not necessarily the same. An earlier intrusion into German parliament servers was blamed on the Russians, yet the release of documents to WikiLeaks is thought to have originated from an insider.  Had the Russians hacked into the DNC, it may have been to gather intelligence, while another actor released the documents. But it is far from certain that Russian intelligence services had anything to do with the intrusions. Julian Assange says that he did not receive the DNC documents from a nation-state. It has been pointed out that Russia could have used a third party to pass along the material. Fair enough, but former UK diplomat Craig Murray asserts: ‘I know who the source is… It’s from a Washington insider. It’s not from Russia.’ [We wonder if it might have been Tulsi Gabbard–D.E.]  . . . .”
Exemplifying some of the points of dissension in the above-linked story: ” . . . . Cybersecurity analyst Robert Graham was particularly blistering in his assessment of the government’s report, characterizing it as “full of garbage.” The report fails to tie the indicators of compromise to the Russian government. ‘It contains signatures of viruses that are publicly available, used by hackers around the world, not just Russia. It contains a long list of IP addresses from perfectly normal services, like Tor, Google, Dropbox, Yahoo, and so forth. Yes, hackers use Yahoo for phishing and maladvertising. It doesn’t mean every access of Yahoo is an ‘indicator of compromise’.’ Graham compared the list of IP addresses against those accessed by his web browser, and found two matches. ‘No,’ he continues. ‘This doesn’t mean I’ve been hacked. It means I just had a normal interaction with Yahoo. It means the Grizzly Steppe IoCs are garbage. . . .”
The source code used in the attacks traces back to Ukraine! ” . . . . In conjunction with the report, the FBI and Department of Homeland Security provided a list of IP addresses it identified with Russian intelligence services.  Wordfence analyzed the IP addresses as well as a PHP malware script provided by the Department of Homeland Security. In analyzing the source code, Wordfence discovered that the software used was P.A.S., version 3.1.0. It then found that the website that manufactures the malware had a site country code indicating that it is Ukrainian. [Note this!–D.E.] The current version of the P.A.S. software is 4.1.1, which is much newer than that used in the DNC hack, and the latest version has changed ‘quite substantially.’ Wordfence notes that not only is the software ‘commonly available,’ but also that it would be reasonable to expect ‘Russian intelligence operatives to develop their own tools or at least use current malicious tools from outside sources.’ To put it plainly, Wordfence concludes that the malware sample ‘has no apparent relationship with Russian intelligence.’ . . .”
The program concludes with a frightening piece of legislation signed into law by Barack Obama in December. It is an ominous portent of the use of government and military power to suppress dissenting views as being “Russian” propaganda tools! “. . . . The new law is remarkable for a number of reasons, not the least because it merges a new McCarthyism about purported dissemination of Russian ‘propaganda’ on the Internet with a new Orwellianism by creating a kind of Ministry of Truth – or Global Engagement Center – to protect the American people from ‘foreign propaganda and disinformation.’ . . . As part of the effort to detect and defeat these unwanted narratives, the law authorizes the Center to: ‘Facilitate the use of a wide range of technologies and techniques by sharing expertise among Federal departments and agencies, seeking expertise from external sources, and implementing best practices.’ (This section is an apparent reference to proposals that Google, Facebook and other technology companies find ways to block or brand certain Internet sites as purveyors of ‘Russian propaganda’ or ‘fake news.’) . . .”
Program Highlights Include: review of information from previous programs linking the disinformation about the high-profile hacks to the milieu of Ukrainian fascism; review of Alexandra Chalupa’s role in disseminating the “Russia did it” meme; review of “Eddie the Friendly Spook” Snowden’s role in the disinformation about the high-profile hacks; the implementation of a frightening new law authorizing the Pentagon and other government agencies to act to counter any information seen as “Russian propaganda.”
In FTR #’s 891 and 895, we highlighted the Broadcasting Board of Governors, a Congressional fig leaf instituted to dilute CIA control over American foreign broadcast outlets such as Radio Free Europe, Voice of America and Radio Free Asia. In addition to the broadcast outlets discussed in the story that follows, we note that the change from a “board of governors” to a “CEO” to be appointed by Trump also gives the nominee power over Radio Free Asia’s Open Technology Fund, developer of numerous apps and other technological methodologies favored by the so-called “privacy advocates.”
The replacement of the governors is seen as a potential boon to the Trump administration. “ . . . . ‘There’s some fear among the folks here, that the firewall will get diminished and attacked and this could fall victim to propaganda,’ the Republican official said. ‘They will hire the person they want, the current CEO does not stand a chance. This will pop up on Steve Bannon’s radar quickly. They are going to put a friendly person in that job.’ . . . . ”
The change will affect domestic broadcast media as well. ” . . . . Because of the modification of the Smith-Mundt Act in 2013, the BBG can now broadcast in the U.S., too. But the influence on the domestic market could be even more subtle, the Republican official warned. A BBG CEO influenced by the administration could penetrate established media outlets with packages, series or other news products produced by the BBG’s networks but picked up and aired by traditional media like Fox News or Breitbart. Many U.S. outlets currently use content from VOA. ‘No money would even change hands, you’ve had no effect on the budget,’ the official said. ‘But it will denigrate the product. . . . ‘ ”
In the context of the changes made to the BBG, we review the political inclinations of Bannon: ” . . . The late Andrew Breitbart, founder of the website Bannon went on to lead, called Bannon the “Leni Riefenstahl of the Tea Party movement”—a reference to the infamous creator of Nazi propaganda films. While insisting to a Wall Street Journal reporter in 2011 that his work isn’t propaganda, Bannon went on to cite Riefenstahl among his main influences . . . ”
Next, we turn to the subject of free trade, on which Trump has had much to say, bashing China and Mexico as countries the U.S. should “put right” in their trade relations with the U.S. It’s worth noting we haven’t heard Trump mention a trade war with Germany despite all his tirades against China and Mexico. It raises the question of why, since Germany’s unprecedented and damaging surpluses make it such an obvious trade war target.
” . . . . There is one potential trade war, however, that few people have so far noticed — but which could soon be his easiest target. Germany. Given the size of its population, it runs a far larger trade surplus than China — and a massive surplus with the U.S. in particular. Even better, the industries to pick off are relatively simple to identify, and would actually have a chance of creating well-paid American jobs. . . .
“. . . . Germany’s trade surplus is absolutely massive, and unprecedented in modern industrial history. Last year it hit 8.9% of gross domestic product, and it is likely to break through 9% before the end of 2016. Globally, it is second in size only to China’s, but given that Germany is a far smaller country, it is only fair to measure it on a per capita basis — and when you look at it that way, Germany’s surplus is seven times bigger than China’s. . . . Much of Germany’s trade surplus is clearly the result of currency manipulation. The euro has depressed the real value of the country’s exports, allowing it rack up those huge exports. You can argue about whether China’s currency is really at its fair value or not — but no one can really dispute that Germany’s currency is way, way below what it would be if it still had the deutschemark. . . .”
Obviously, part of the answer lies in the fact that Deutsche Bank–a key element of the Bormann capital network and the Underground Reich–is owed hundreds of millions of dollars by Trump. Trump’s other connections run in the direction of the Underground Reich as well. (The Trump/Deutsche Bank connection is discussed, in among other programs, FTR #’s 920, 921, 922 and 927.)
We note in passing that Germany is preparing for a trade war with the U.S.–we don’t think one will really take place, but we may be treated to Trumpian “fake news” and/or propaganda. Germany is asserting that the factors behind its enormous trade surplus can not be altered, because it is due to naturally occurring circumstances like a rapidly aging population.
” . . . There are plenty of reasons for that. Germany’s current account surplus has never been as high as it is this year and never before has that surplus represented such a significant share of the country’s gross domestic product. Making matters worse is the fact that the US is the largest consumer of German exports. . . .
“. . . . As high as it is, though, the current surplus is likely to continue growing. The recent fall in the euro’s value relative to the dollar following Trump’s election makes German products and services even more competitive. And many economists believe that the value of the dollar will continue to climb, which means that the value of the euro against the dollar will shrink correspondingly. Their predictions are based on recent indications that Trump’s announced economic stimulus policies will push up both America’s sovereign debt load and its interest rates. . . .”
The program concludes with analysis of how Trump’s continued involvement in his business empire (through his children) leaves him open to manipulation. The Philippines is a good example: “ . . . . So, under the deal, Trump’s children will be paid millions of dollars throughout their father’s presidency by Jose E.B. Antonio, the head of Century Properties.
“Duterte recently named Antonio the special government envoy to the United States. The conflicts here could not be more troubling or more blatant: President Trump will be discussing U.S. policy in Southeast Asia with one of his (or his children’s) business partners, a man who is the official representative of a foreign leader who likens himself to Hitler. Also note that the Trump family has an enormous financial interest in Duterte’s deadly campaign: Rooting out crime in the Philippines is good for the real estate values. . . . Duterte recently named Antonio the special government envoy to the United States. The conflicts here could not be more troubling or more blatant: President Trump will be discussing U.S. policy in Southeast Asia with one of his (or his children’s) business partners, a man who is the official representative of a foreign leader who likens himself to Hitler. Also note that the Trump family has an enormous financial interest in Duterte’s deadly campaign: Rooting out crime in the Philippines is good for the real estate values. . . . .”
Program Highlights Include: Trump’s business dealings in India, where members of the BJP party figure in the disposition of the operations in that country; Trump’s consideration of Bernie Sanders supporter Tulsi Gabbard for a cabinet position; “Alt-Right” kingpin Steve Bannon’s high regard for Gabbard; Gabbard’s strong support for Modi and networking with the BJP; Gabbard’s networking with the RSS, the Indian fascist organization for which the BJP serves as a front.
In FTR #854, we noted John Perry Barlow’s background as Dick Cheney’s campaign manager and George Wallace supporter in 1968. In FTR #895, we discussed the fact that the Electronic Frontier Foundation embraced technologies developed by CIA-linked institutions. Barlow founded the EFF. It turns out that Barlow was invited to CIA headquarters in 1992 and advanced concepts that may well have lead to the development of social media–“. . . Let’s create a process of information digestion in which inexpensive data are gathered from largely open sources and condensed, through an open process . . . The entity I envision would be small, highly networked, and generally visible. It would be open to information from all available sources . . . It would rely heavily on the Internet, public media, the academic press, and an informal worldwide network of volunteers–a kind of global Neighborhood Watch–that would submit on-the-ground reports. . . . It would use off-the-shelf technology, and use it less for gathering data than for collating and communicating them. Being off-the-shelf, it could deploy tools while they were still state-of-the-art. . . .”
WikiLeaks is a fascist, “Alt-Right” institution that aided Trump’s election. Facebook, one of whose largest stockholders is Trump supporter Peter Thiel, also helped aid the election of “The Donald.” All of the contents of this website as of 12/19/2014–Dave Emory’s 35+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated.
We will be analyzing David Cay Johnston’s book about Donald Trump in weeks to come. WikiLeaks played a decisive role on behalf of the Trumpenkampfverbande, manifesting what we have called “Technocratic Fascism”: “. . . . Such technocratic beliefs are widespread in our world today, especially in the enclaves of digital enthusiasts, whether or not they are part of the giant corporate-digital leviathan. Hackers (“civic,” “ethical,” “white” and “black” hat alike), hacktivists, WikiLeaks fans [and Julian Assange et al–D. E.], Anonymous “members,” even Edward Snowden himself walk hand-in-hand with Facebook and Google in telling us that coders don’t just have good things to contribute to the political world, but that the political world is theirs to do with what they want, and the rest of us should stay out of it: the political world is broken, they appear to think (rightly, at least in part), and the solution to that, they think (wrongly, at least for the most part), is for programmers to take political matters into their own hands. . .”
Just as JFK’s assassination–pinned on the ersatz Communist Lee Harvey Oswald–destroyed JFK’s attempts at detente with the Soviet Union, the “op” fronted for by Edward Snowden–the “Obverse Oswald”–destroyed the Obama/Clinton State Department’s attempts at a “re-boot” with Russia. This program is the second in a series reviewing how Oswald was “painted red.” For purposes of convenience and continuity, we begin the discussion by reviewing and synopsizing information indicating that Russia has been framed for the “Shadow Brokers” alleged hack of the NSA, much as it appears to have been framed for the DNC hack.
Indeed, with both the DNC hack and the “Shadow Brokers” non-hack of the NSA, the evidence points increasingly toward “Team Snowden” (including WikiLeaks) and Eddie the Friendly Spook himself. The process of propagandizing the high-profile hacks as effected by “Russia” is analogous to the “painting of Oswald Red.” This broadcast details a visit to Mexico City by “Oswald,” in which the patsy-to-be of the JFK assassination went to lengths to reinforce the image of a Communist, linked to, among other elements, the KGB’s assassination expert Valery Kostikov.
The “Oswald” operating in Mexico City did not look like Oswald: ” . . . He was described as ‘apparent age 35, athletic build, circa 6 feet, receding hairline, balding top.’ In a CIA cable back to Mexico City on October 10, the Lee Oswald who defected to the U.S.S.R. in October 1959 was described as not quite 24, ‘five feet ten inches, one hundred sixty five pounds, light brown wavy hair, blue eyes.’ . . .” He did not speak like Oswald: ” . . . . Equally noteworthy in the October 9 cable is the evidence it provides that the “Lee Oswald” who made the October 1 phone call was an impostor. The caller, it said, “spoke broken Russian.” The real Oswald was fluent in Russian. . . .”
The “Oswald” in Mexico City had unusual credentials: ” . . . [Cuban diplomat Silvia] Duran was a little suspicious of Oswald. She felt the American was too eager in displaying his leftist credentials: membership cards in the Fair Play for Cuba Committee and the American Communist Party, old Soviet documents, a newspaper clipping on his arrest in New Orleans, a photo of Oswald being escorted by a policeman on each arm that Duran thought looked Phony. Duran also knew that belonging to the Communist Party was illegal in Mexico in 1963. For that reason, a Communist would normally travel in the country with only a passport. Yet here was Oswald documented in a way that invited his arrest. . . .”
The “Oswald” in Mexico City displayed unusual behavior: ” . . . He took a revolver from his jacket pocket, placed it on a table, and said, ‘See? This is what I must now carry to protect my life.’ The Soviet officials carefully took the gun and removed its bullets. They told Oswald once again they could not give him a quick visa. They offered him instead the necessary forms to be filled out. Oswald didn’t take them. Oleg Nechiporenko joined the three men as their conversation was ending. For the second day in a row, he accompanied a depressed Oswald to the gate of the embassy, this time with Oswald’s returned revolver and its loose bullets stuck back in his jacket pocket. Nechiporenko says that he, Kostikov, and Yatskov then immediately prepared a report on Oswald’s two embassy visits that they cabled to Moscow Center. . . .”
A CIA telephonic intercept of the “Oswald” appears to have been a fabrication: ” . . . . The CIA’s transcript states that the Saturday, September 28, call came from the Cuban Consulate. The first speaker is identified as Silvia Duran. However, Silvia Duran has insisted repeatedly over the years, first, that the Cuban Embassy was closed to the public on Saturdays, and second, that she never took part in such a call. ‘Duran’ is said to be phoning the Soviet Consulate. Oleg Nechiporenko denies in turn that this call occurred. He says it was impossible because the Soviet switchboard was closed. The ‘Duran’ speaker in the transcript says that an American in her consulate, who had been in the Soviet Embassy, wants to talk to them. She passes the phone to a North American man. The American insists that he and the Soviet representative speak Russian. They engage in a conversation, with the American speaking with the translator describes as ‘terrible hardly recognizable Russian.’ This once again argues against the speaker being Oswald, given his fluent Russian. . . .”
The net effect of the phony Oswald in Mexico City was to reinforce the notion that a Communist killed Kennedy, increasing pressure for retaliation against Russia and/or Cuba and escalating Cold War tensions. ” . . . . One must give the CIA (and the assassination sponsors that were even further in the shadows) their due for having devised and executed a brilliant setup. They had played out a scenario to Kennedy’s death in Dallas that pressured other government authorities to choose among three major options: a war of vengeance against Cuba and the Soviet Union based on the CIA’s false Mexico City documentation of a Communist assassination plot; a domestic political war based on the same documents seen truly, but a war the CIA would fight with every covert weapon at its command; or a complete cover-up of any conspiracy evidence and a silent coup d’etat that would reverse Kennedy’s efforts to end the Cold War. . . .” The propaganda blitzkrieg against Russia over the high-profile hacks, Ukraine and Syria have positioned Hillary Clinton in an analogous fashion. It will be VERY difficult for her to avoid being sucked into the New Cold War dynamics. Program Highlights Include: Review of the disinformation linking Oswald to the KGB’s alleged assassination of Stephan Bandera (head of the OUN/B); review of the role of Pierre Omidyar in the Maidan coup; review of Oswald’s altogether improbable activities in the U.S., given his supposed Communist status.
Continuing our analysis of the high-profile hacks and “Team Snowden,” we begin with analysis of some cryptic tweets that Snowden issued, shortly before the “Shadow Brokers” announced their pilfering of NSA cyberweapons. The possibility that the tweets were a signal to release the information is one to be considered.
Much of the program reviews key points of information from FTR #923 and other broadcasts: Russia appears to have been wrongly fingered for the DNC hack released by WikiLeaks; the Shadow Brokers’ supposed hack of the NSA’s servers does not appear to have been a hack at all but the work of an insider who downloaded the files onto a USB drive; the files offered up by the Shadow Brokers were from 2013, when Snowden undertook his operation.
Snowden has supported the cover story for the NSA non-hack–that it was, indeed, a hack (it probably wasn’t) and that Russia was behind it, which was probably not the case.
A chief suspect in the release of the NSA files is Jacob Applebaum, the WikiLeaker who appears to have facilitated Snowden’s journey from Hawaii to Hong Kong. The program reviews Applebaum’s hostility to Hillary Clinton, comparing it to the so-called “Shadow Brokers'” hostility to Clinton, echoing the views of Trump, Assange and Applebaum. The broadcast reviews the fact that the “Shadow Brokers” used an e-mail account in Germany that has been recalcitrant to attempts at penetrating its users’ information.
The program reviews Applebaum’s presence in Germany, along with other key members of the WikiLeaks/Team Snowden cadre.
Program Highlights Include: review of the fact that Snowden (at the time he set out to subvert the NSA), Applebaum and other high-profile “privacy activists” have documented links to the CIA; a look at Donald Trump, Jr. who has been active in tweeting and re-tweeting “Alt.right” racist and anti-Semitic memes; Trump, Jr.’s expressed willingness to run for office.