With a new Cold War gaining momentum and charges of Russian interference in the U.S. election, this program takes stock of information pointing in the other direction. After reviewing previous discussion of why the DNC, John Podesta and NSA “hacks” do not withstand scrutiny, the broadcast sets forth information indicating that Ukrainian fascists and related elements may well be the authors of a “cyber false-flag” operation.
Not only is the so-called “evidence” characteristic of a relatively clumsy false-flag operation–albeit one conducted on the internet–but the so-called “experts,” link to the milieu of the Reinhard Gehlen “Org.”
The joint CIA/FBI/NSA declassified version of the Intelligence Report on Russian hacking came out. There is no substantive detail in the report:“ . . . . To summarize, the report says that the CIA, FBI, and National Security Agency believe that Russian hackers—directed ultimately by Vladimir Putin—hacked email accounts belonging to the Democratic National Committee and to Clinton campaign chairman John Podesta and then passed the material they obtained on to WikiLeaks through a third party. This was done, the report asserts, because the Russians believed that Donald Trump would be friendlier to their country’s interests, as president, than Hillary Clinton. And … that’s about it. Not counting intro pages or appendices, the report is five pages long and does not include any description of the actual evidence that Russian actors were responsible for the DNC/Podesta hacks (an assertion that’s supported by publicly available evidence analyzed by third parties) or the assertion that Putin ultimately directed the release of hacked material in order to help elect Donald Trump (an assertion that’s harder to verify independently). . . . .”
The Bitly technology used in the hacks enabled the entire world to see what was going on! This strongly indicates a cyber-false flag operation: ” . . . . Using Bitly allowed ‘third parties to see their entire campaign including all their targets— something you’d want to keep secret,’ Tom Finney, a researcher at SecureWorks, told Motherboard. It was one of Fancy Bear’s ‘gravest mistakes,’ as Thomas Rid, a professor at King’s College who has closely studied the case, put it in a new piece published on Thursday in Esquire, as it gave researchers unprecedented visibility into the activities of Fancy Bear, linking different parts of its larger campaign together. . . .”
It should be noted that while this report is signed off on by the CIA, NSA, and FBI, the FBI never examined the DNC’s hacked server. Instead, according to the DNC, the job was outsourced to CrowdStrike! Neither the FBI, nor any other U.S. government entity has run an independent forensic analysis on the system! ” . . . Six months after the FBI first said it was investigating the hack of the Democratic National Committee’s computer network, the bureau has still not requested access to the hacked servers, a DNC spokesman said. No US government entity has run an independent forensic analysis on the system, one US intelligence official told BuzzFeed News. . . .The FBI has instead relied on computer forensics from a third-party tech security company, CrowdStrike, which first determined in May of last year that the DNC’s servers had been infiltrated by Russia-linked hackers, the U.S. intelligence official told BuzzFeed News. . .’CrowdStrike is pretty good. There’s no reason to believe that anything that they have concluded is not accurate,’ the intelligence official said, adding they were confident Russia was behind the widespread hacks. . . It’s unclear why the FBI didn’t request access to the DNC servers, and whether it’s common practice when the bureau investigates the cyberattacks against private entities by state actors, like when the Sony Corporation was hacked by North Korea in 2014. BuzzFeed News spoke to three cybersecurity companies who have worked on major breaches in the last 15 months, who said that it was “par for the course” for the FBI to do their own forensic research into the hacks. None wanted to comment on the record on another cybersecurity company’s work, or the work being done by a national security agency. . . .”
The FBI claims that the DNC denied them access to the servers! Right! Note the prominence of CrowdStrike in this imbroglio. More about them below. ” . . . . The FBI struck back at the Democratic National Committee on Thursday, accusing it of denying federal investigators access to its computer systems and hamstringing its investigation into the infiltration of DNC servers by Russia-backed hackers. ‘The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated. This left the FBI no choice but to rely upon a third party for information,’ a senior law enforcement official told BuzzFeed News in a statement. ‘These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier.’ . . . The warring statements are the latest twists in an extraordinary standoff between the Democrats and federal investigators that reached a fever pitch over the bureau’s probe into Democratic nominee Hillary Clinton’s private email server. . . . The FBI announced it was investigating the hack of the DNC’s servers in July, after a third-party computer security firm, Crowdstrike, said it had evidence of Kremlin-backed hackers infiltrating its system. . . .”
The DNC responded to the FBI’s counter-assertion by reasserting that it’s giving the FBI full access to whatever it requested. If there’s a problem with the FBI getting access to that server, it’s a problem between the FBI and Crowdstrike: ” . . . The FBI had previously told lawmakers on the Hill that the DNC had not allowed federal investigators to access their servers. After BuzzFeed News reported on Wednesday that the DNC claimed FBI agents had never asked for the servers, congressional officials pressured the FBI for answers. A senior law enforcement official issued a public statement on the matter Thursday night. ‘Someone is lying their ass off,’ a US intelligence official said of the warring statements. But officials with the DNC still assert they’ve ‘cooperated with the FBI 150%.They’ve had access to anything they want. Anything that they desire. Anything they’ve asked, we’ve cooperated,’ the DNC official said. ‘If anybody contradicts that it’s between Crowdstrike and the FBI.’ . . .Without direct access to the computer network, another US intelligence official told BuzzFeed, federal investigators had been forced to rely on the findings of the private cybersecurity firm Crowdstrike for computer forensics. From May through August of 2016, the Democratic National Committee paid Crowdstrike $267,807 dollars for maintenance, data services and consulting, among other things, according to federal records. . . .”
An important article underscores that many tech experts disagree with the government’s so-called analysis: ” . . . . Yet despite the scores of breathless media pieces that assert that Russia’s interference in the election is ‘case closed,’might some skepticism be in order? Some cyber experts say ‘yes.’ . . . Cyber-security experts have also weighed in. The security editor at Ars Technica observed that ‘Instead of providing smoking guns that the Russian government was behind specific hacks,’ the government report ‘largely restates previous private sector claims without providing any support for their validity.’ Robert M. Lee of the cyber-security company Dragos noted that the report ‘reads like a poorly done vendor intelligence report stringing together various aspects of attribution without evidence.’ Cybersecurity consultant Jeffrey Carr noted that the report ‘merely listed every threat group ever reported on by a commercial cybersecurity company that is suspected of being Russian-made and lumped them under the heading of Russian Intelligence Services (RIS) without providing any supporting evidence that such a connection exists.’ . . .”
CrowdStrike–at the epicenter of the supposed Russian hacking controversy is noteworthy. Its co-founder and chief technology officer, Dmitry Alperovitch is a senior fellow at the Atlantic Council, financed by elements that are at the foundation of fanning the flames of the New Cold War: “In this respect, it is worth noting that one of the commercial cybersecurity companies the government has relied on is Crowdstrike, which was one of the companies initially brought in by the DNC to investigate the alleged hacks. . . . Dmitri Alperovitch is also a senior fellow at the Atlantic Council. . . . The connection between [Crowdstrike co-founder and chief technology officer Dmitri] Alperovitch and the Atlantic Council has gone largely unremarked upon, but it is relevant given that the Atlantic Council—which is is funded in part by the US State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk—has been among the loudest voices calling for a new Cold War with Russia. As I pointed out in the pages of The Nation in November, the Atlantic Council has spent the past several years producing some of the most virulent specimens of the new Cold War propaganda. . . . ”
There was an update back in December from the German government regarding its assessment of the 2015 Bundgestag hacks (attributed to “Fancy Bear” and “Cozy Bear,” as mentioned in the Sandro Gaycken post above) that it attributed to APT28 and Russia: while it asserts the hacks did indeed take place, the leaked documents were later determined to be an insider leak (via Google translate). “ . . . . According to the report, federal security authorities are convinced that not hackers had stolen the 2420 documents published by the Internet platform Wikileaks in early December. There was certainly no evidence that the material had been stolen in the cyber attack on the Bundestag in 2015, it was called into security crises. . . . ”
Another article details at length the skepticism and outright scorn many cybersecurity experts feel concerning the report. ” . . . . Did the Russian government hack the DNC and feed documents to WikiLeaks? There are really two questions here: who hacked the DNC, and who released the DNC documents? These are not necessarily the same. An earlier intrusion into German parliament servers was blamed on the Russians, yet the release of documents to WikiLeaks is thought to have originated from an insider.  Had the Russians hacked into the DNC, it may have been to gather intelligence, while another actor released the documents. But it is far from certain that Russian intelligence services had anything to do with the intrusions. Julian Assange says that he did not receive the DNC documents from a nation-state. It has been pointed out that Russia could have used a third party to pass along the material. Fair enough, but former UK diplomat Craig Murray asserts: ‘I know who the source is… It’s from a Washington insider. It’s not from Russia.’ [We wonder if it might have been Tulsi Gabbard–D.E.]  . . . .”
Exemplifying some of the points of dissension in the above-linked story: ” . . . . Cybersecurity analyst Robert Graham was particularly blistering in his assessment of the government’s report, characterizing it as “full of garbage.” The report fails to tie the indicators of compromise to the Russian government. ‘It contains signatures of viruses that are publicly available, used by hackers around the world, not just Russia. It contains a long list of IP addresses from perfectly normal services, like Tor, Google, Dropbox, Yahoo, and so forth. Yes, hackers use Yahoo for phishing and maladvertising. It doesn’t mean every access of Yahoo is an ‘indicator of compromise’.’ Graham compared the list of IP addresses against those accessed by his web browser, and found two matches. ‘No,’ he continues. ‘This doesn’t mean I’ve been hacked. It means I just had a normal interaction with Yahoo. It means the Grizzly Steppe IoCs are garbage. . . .”
The source code used in the attacks traces back to Ukraine! ” . . . . In conjunction with the report, the FBI and Department of Homeland Security provided a list of IP addresses it identified with Russian intelligence services.  Wordfence analyzed the IP addresses as well as a PHP malware script provided by the Department of Homeland Security. In analyzing the source code, Wordfence discovered that the software used was P.A.S., version 3.1.0. It then found that the website that manufactures the malware had a site country code indicating that it is Ukrainian. [Note this!–D.E.] The current version of the P.A.S. software is 4.1.1, which is much newer than that used in the DNC hack, and the latest version has changed ‘quite substantially.’ Wordfence notes that not only is the software ‘commonly available,’ but also that it would be reasonable to expect ‘Russian intelligence operatives to develop their own tools or at least use current malicious tools from outside sources.’ To put it plainly, Wordfence concludes that the malware sample ‘has no apparent relationship with Russian intelligence.’ . . .”
The program concludes with a frightening piece of legislation signed into law by Barack Obama in December. It is an ominous portent of the use of government and military power to suppress dissenting views as being “Russian” propaganda tools! “. . . . The new law is remarkable for a number of reasons, not the least because it merges a new McCarthyism about purported dissemination of Russian ‘propaganda’ on the Internet with a new Orwellianism by creating a kind of Ministry of Truth – or Global Engagement Center – to protect the American people from ‘foreign propaganda and disinformation.’ . . . As part of the effort to detect and defeat these unwanted narratives, the law authorizes the Center to: ‘Facilitate the use of a wide range of technologies and techniques by sharing expertise among Federal departments and agencies, seeking expertise from external sources, and implementing best practices.’ (This section is an apparent reference to proposals that Google, Facebook and other technology companies find ways to block or brand certain Internet sites as purveyors of ‘Russian propaganda’ or ‘fake news.’) . . .”
Program Highlights Include: review of information from previous programs linking the disinformation about the high-profile hacks to the milieu of Ukrainian fascism; review of Alexandra Chalupa’s role in disseminating the “Russia did it” meme; review of “Eddie the Friendly Spook” Snowden’s role in the disinformation about the high-profile hacks; the implementation of a frightening new law authorizing the Pentagon and other government agencies to act to counter any information seen as “Russian propaganda.”
FTR #’s 914 and 915 feature former BBC and Reuters journalist Gerrard Williams, developing material he presented in his book (co-authored with military historian Simon Dunstan) “Grey Wolf: The Escape of Adolf Hitler.”
An apparent deal between Sullivan & Cromwell attorney turned spy Allen Dulles and Martin Bormann lies at the core of the Hitler escape, code-named “Aktion Feuerland” (Operation Land of Fire). In exchange for sparing the art looted by the Reich and granting the Western Allies access to Nazi military technology, Hitler’s escape along with those of Eva Braun, Martin Bormann and Gestapo chief Heinrich Muller were arranged. In addition, the SS and Gestapo-staffed Reinhard Gehlen spy outfit was also one of the “carrots” made available to the West in this deal.
The potential “sticks” were the full activation of the Nazi Werewolf guerillas to make life miserable for occupation forces, the destruction of the creme of Western art and a disinformation gambit presenting a Nazi operation to use U-boat launched V-1 missiles filled with nerve gas against New York. (The latter drew U.S. Navy anti-submarine forces away from the planned southern Atlantic route for Hitler’s U-boat escape.)
Because Allen Dulles faced prosecution for his operations on behalf of Third Reich industrial concerns, Dulles joined forces with Bormann. Using the extensive Nazi presence in Argentina, Bormann and Muller successfully spirited Hitler and Eva Braun out of Germany.
Much of FTR #915 deals with the re-establishment of Nazis in power in the “new” Federal Republic and the role of Martin Bormann directing that government from afar. The role of the Nazis and the Gehlen spy outfit in particular in the Cold War is a primary focus of FTR #915.
Program Highlights Include: the foundational role of the German/American corporate links in the realization of “Aktion Feuerland;” the role of Eva Peron (“Evita”) as a Nazi spy prior to, and during, World War II; Evita’s role as a functionary of the postwar Bormann capital network; the revenge taken by Muller on members of Juan and Eva Peron’s contingent for extorting money from the Bormann network; famed espionage novelist Ian Fleming’s role as a British commando securing both art and Nazi military technology as the Nazi armies retreated; mainstream press accounts of Hitler’s escape and postwar activities; the continued redaction and withholding of documents about Hitler’s postwar presence; death threats directed against some of the authors’ sources; review of the Vatican-linked “Ratlines” in the escape of Nazi luminaries; details of the faking of the death of Martin Bormann; the use of doubles for Hitler and Eva Braun in Aktion Feuerland; pressure from right-wing German sources on the authors, attempting to suppress the investigation; the faking of the “DNA test” on Bormann’s “corpse”; the role of Nazis in managing the Cold War.
The spokesman–and apologist–for the Nazi Azov Battalion in Ukraine is Roman Zvarych. Zvarych was the personal secretary to Jaroslav Stetsko–the head of the World War II Nazi collaborationist OUN/B government. Azov is now receiving U.S. government funding. All of the contents of this website as of 12/19/2014–Dave Emory’s 35+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated.
The mafia began as a resistance movement focused against Norse (Viking) and Saracen (Turkish/Muslim) invaders in 12th and 13 century Sicily. It might seem incredible to the casual observer that an organization that began so long ago could have developed and spread to the size, gravitas and scope of operations that it has. We also appreciate that when Mr. Emory uses the term “Underground Reich,” it might seem odd or incredible to many. Bringing up to date “L’Affaire Snowden,” we underscore the deep politics underlying the CIA’s broadcast psychological warfare fronts and their evolution into the milieu involving and surrounding Eddie the Friendly Spook. Much of the material in this program is reviewed from previous broadcasts, presented here to provide depth and understanding to how what has been presented as a “progressive,” “enlightened” phenomenon could be its opposite. “Team Snowden” manifests fascism and the Underground Reich at every turn. A major element of analysis is the development of the CIA’s focal point networks in the 1950’s, resulting in the formation of a CIA-controlled “government-within-the-government.” Is “Team Snowden” evolved from the focal point networks? Next the broadcast reviews the formation of the Broadcast Board of Governors, an umbrella organization enfolding the CIA’s radio propaganda and psychological fronts formed during the Cold War. “Team Snowden” is inextricably linked with the BBG–Snowden himself worked for CIA when he decided to infiltrate NSA and leak its secrets. In that context, we note that the Gehlen organization was at the foundation of the formation of the propaganda/psychological warfare fronts under the direction of the BBG. Much of the program underscores the Gehlen Org’s links to the Underground Reich, in order to reinforce listeners’ understanding of how this network dating to World War II could project its influence through the decades and into our contemporary historical period. ” . . . A network of former Nazi intelligence agents, the majority of whom were members of the SS, began working out of offices at Camp King side by side with army intelligence officers. . . . The Gehlen Organization was a murderous bunch, “free-wheeling” and out of control. . . The army became fed up with the Gehlen Organization, but there was no way out. Its operatives were professional double-crossers and liars–many were also alleged war criminals–and now they had the army over a barrel. . . .” Discussion concludes with “First Look” media czar Pierre Omidyar’s selection of Robert Lietzke to be an Omidyar fellow (Lietzke was one of Edward Snowden’s superiors when he was employed at Booz Allen Hamilton.) Program Highlights Include: Review of the Crusade For Freedom–the covert operation that precipitated the formation of the Nazi wing of the GOP; the CFF’s use of Radio Liberty as a front for employing fascists and laundering funds; the continuity in the Nazi chain of command from the Third Reich to the Gehlen organization when it went to work for the U.S.; the Gehlen organization’s strong links to the Bormann capital network; the strong overlap of the Thyssen industrial family, its business partners in the Bush family, Allen Dulles’ CIA and the Bormann network; the Gehlen group’s initial re-incarnation as the eyes and ears of Army intelligence.
From the Republican Party to European political and intellectual elites to “The New York Times,” everyone is “shocked, shocked” at the fascistic nature of the Trump candidacy. They shouldn’t be–his candidacy is the direct outgrowth of powerful forces that have been at work in this country for decades. After highlighting two op-ed pieces from the “Times,” accurately noting the virulent fascism at the root of the Trump phenomenon, the broadcast notes that neither Europe, where fascism is on the march once again, nor the American so-called “progressive sector,” which has embraced the “Eddie the Friendly Spook,” Glenn Greenwald and Julian Assange are in a position to complain. Snowden, Greenwald, Assange et al embody PRECISELY the same forces percolating at the surface of the Trump waters. Much of the broadcast consists of excerpts of an important new book: “The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government” by David Talbot. In that worthy volume, Talbot chronicles the role of the Dulles brothers and Sullivan and Cromwell in the capitalization of Hitler’s Germany and the cover-up of the Nazi flight capital program, Dulles’s long collaboration with Nazi General Reinhard Gehlen, Gehlen’s pursuit (with Dulles) of the Cold War as a continuation of Hitler’s war against the U.S.S.R., the Dulles/Gehlen collaboration in the formation of the fascist networks known as “Stay Behind/Gladio.” The program concludes with review of the Crusade For Freedom, a Dulles project which culminated in the formation of a Nazi branch of the GOP. Program Highlights Include: the genesis of the Bormann network and its apparent collaboration with the Dulles networks; Prescott Bush, Sr.’s role as the Senate’s liaison with Dulles’s CIA; the roles of Richard Nixon, Ronald Reagan, William Casey and George H.W. Bush with the Crusade For Freedom; “The New York Times” and its own incorporation of Third Reich alumni as part of its collaboration with CIA.
Pravy Sektor associate Valentyn Nalyvaichenko had been the head of the SBU (the Ukrainian intelligence service) since the Maidan Coup, up until his ouster in June of 2015. Not surprisingly, he had operated the organization along the lines of the OUN/B. Previously, he had served in that same capacity under Viktor Yuschenko, seeing the outfit as a vehicle for rewriting Ukraine’s history in accordance with the historical revisionism favored by the OUN/B. Very close to Pravy Sektor head Dymitro Yarosh, Nalyvaichenko employed Yarosh while serving in the Ukrainian parliament. Yarosh claims that the two collaborated on “anti-terrorist” operations conducted against ethnic Russians. The bulk of the program consists of the reading of a review of a recent book about OUN/B leader Stephan Bandera. The encapsulation of the book sets forth the tangled, bloody history leading up to the formation of the OUN/B and the evolution of the organization into a Third Reich ally.
A recent story relates what we already knew: that the BND–German intelligence and the successor to the Reinhard Gehlen spy outfit–does exactly the same things that the Germans are complaining about in connection with the “disclosures” of “Eddie the Friendly Spook” Snowden. BND appears to have retained much of its Nazi character over the years. All of the contents of this website as of 12/19/2014–Dave Emory’s 35+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated.
Placing the Ukraine crisis in a larger framework, this program analyzes the event in the context of both the “Earth Island” (or “World Island” as it is sometimes called) and the psy-op fronted for by Edward Snowden. Stretching from the Straits of Gibraltar, all across Europe, most of the Middle East, Eurasia, Russia, China and India, that stretch of land: comprises most of the world’s land mass; contains most of the world’s population and most of the world’s natural resources (including oil and natural gas.) Geopoliticians have long seen controlling that land mass as the key to world domination. The population that occupies the middle of that stretch of geography is largely Muslim. Utilizing that Muslim population to control the resources of the Earth Island is a stratagem that has been in effect in the West for a century. That stratagem is apparently behind the inclusion of Muslim Chechen fighters associated with the Islamic State in the Ukraine war, fighting under the administrative command of the Nazi Pravy Sektor group. After reviewing Zbigniew Brzezinski’s use of Muslim proxy warriors to draw the Soviets into the first Afghan war and his view of Ukraine as essential to bottling-up Russia, the program notes that the U.S. is continuing to train Nazi combatants in Ukraine despite a prohibition against doing so, because the Ukraine Ministry of Interior is vetting the trainees–THAT is the ministry that formed and administers the Nazi formations. Much of the program notes the continuity between Euro-fascists such as the Carl Lundstrom-financed Sweden Democrats and the WikiLeaks/Snowden “op.” (Lundstrom also bankrolled the Pirate Bay website that hosted WikiLeaks.) Program Highlights Include: statements by Ukrainian “volunteer” battalions that they want to attack Russia; Glenn Greenwald financial angel Pierre Omidyar’s new partnership with the National Endowment for Democracy (a U.S. intelligence proxy element); the push by the punisher battalions for Poroshenko to declare war (something he can’t do if the country is to receive badly-needed aid from the IMF); the links between Julian Assange assistant Joran Jermas (aka “Israel Shamir”) and the Nazi-inspired anti-Semitic MAUP group in Ukraine (at which David Duke teaches); the arrest of a member of parliament from the Sweden Democrats for apparent involvement in a bomb plot; review of the Sweden Democrats’ financing by Carl Lundstrom.
This next installment of our discussions with Peter Levenda about “The Hitler Legacy” begins with discussion of individuals and organizations that comprised the postwar Nazi underground. Focused largely on the SS, these organizations were vehicles for the perpetuation of the Nazi struggle against the Allies (including the U.S. and Britain) at the same time as they interfaced with powerful elements of Western intelligence, who used them as Cold Warriors. Part of the Cold War strategy pursued by the U.S. was to resucitate (for a third time) the “global jihadist” strategy devised by Max von Oppenheim during the First World War. Seeking the “believing” Muslims as proxy warriors against the atheistic communists, powerful elements of CIA and the State Department enlisted the Muslim Brotherhood in this struggle. “Weaponized religion” was also used in Asia, where the Third Reich had already established a working relationship with the Dalai Lama and Tibetan Buddhists, with SS officers of primary significance in the Nazis’ dealings with “His Holiness.” Key points of discussion include: the career of Otto Ernst Remer; the remarkable career of Francois Genoud; the Dalai Lama’s SS associate Bruno Beger’s atrocities war crimes; the Dalai Lama’s SS tutor–Heinrich Harrer–and his work for elements of U.S. and Western intelligence after the war.
An “information warfare” offensive being overseen behalf of Ukraine by a U.S. and Special Forces vet named Joe Harding is targeting American journalists critical of the OUN/B heirs brought to power by the Maidan coup. Labeled as “dupes” of enemy propaganda, or worse, they are now apparently being targeted by various propaganda and cyber-war techniques, a sinister development that we fear might be accompanied by violence. Historical and political reality is being stood on its head, a la “Serpent’s Walk,” with anyone with the mettle to tell the unvarnished truth about events in Ukraine facing “cyber-McCarthyism.” All of the contents of this website as of 12/19/2014–Dave Emory’s 35+ years of research and broadcasting–as well as hours of videotaped lectures are available on a 32GB flash drive. Dave offers his programs and articles for free–your support is very much appreciated.