Snowden–whom we think is being directed by BND (as well as by an element of CIA)–engaged in his “op” in order to justify a pre-arranged economic offensive against the American IT sector. As we noted in our series on Eddie the Friendly Spook, the Snowden “op” is an act of economic and political warfare against the United States. Now, we note an article that chronicles serious damage to the U.S. high-tech economy as a result of Snowden’s “op.”
Updating our long, detailed discussion of The Adventures of Eddie the Friendly Spook [Snowden] aka “The Peach Fuzz Fascist”, we note a number of things, including: more information that Snowden’s so-called “disclosures” were actually intended to justify a pre-arranged German, EU and Brazilian IT economic warfare offensive against the United States; Snowden’s consummate hypocrisy in disclosing information to Nazi fellow-travelers Glenn Greenwald and Julian Assange that neither should possess; Greenwald’s flacking for the Muslim Brotherhood; German protege and Luxembourg EU Commissioner Viviane Reding’s championing of an EU intelligence agency designed to do exactly what the hypocritical EU complains about when done by the NSA and GCHQ; the recent (declined) offer of inclusion of Germany into the Five Eyes Club; Palantir’s role in spying on Facebook users for the military.
German and Brazilian drives to update and popularize their IT sectors, supposedly in response to Edward Snowden’s “disclosures,” can be safely assumed to have been anticipated quite some time ago. The Snowden “psy-op” is almost certainly a device for propagandizing on behalf of the German/Brazilian drive, which constitutes economic warfare under the circumstances. Snowden’s Russian sojourn appears to have been arranged by WikiLeaks, which also appears to have arranged his flight to China from Hawaii. Throwing Obama’s “reboot” with Russia under the bus, the Snowden “op” is probably part of the broader operation that brought the Nazi heirs to the OUN/B to power in the Ukraine.
A vitally important post by “Pterrafractyl” frames some considerations that have serious implications. Are Germany and Brazil beginning an economic warfare campaign against the U.S. tech industry? Are they planning on cooperating with criminal and terrorist elements in this regard? Note that a Brazilian banker was recently found with undecipherable encrypted files.
Angela Merkel made an ominous announcement last week. She wants to move ahead with walling off the EU’s web traffic and begin a “massive” counter-espionage campaign against the US and its Five Eyes partners. Brazil is moving ahead with its plans to remake the internet, including local data storage requirements and state-encrypted web services similar to Germany’s new anti-NSA state-backed email services. So domestic spying could be on the rise, the internet itself is at risk, and state-encryption services are now being offered as an anti-NSA panacea. Mainstreamed unbreakable encryption is also coming without a debate. An old enemy of privacy, the Clipper Chip, has returned in a new form. And its own arch-nemeses, the Four Horsemen of the Infopocalypse, are back too. And there are no obvious ways to uninvite these guests without a long talk
This broadcast continues and updates analysis of “L’Affaire Snowden”–a “psy-op” assembled for propaganda purposes and resultant political effect. The “op” is intended to: destabilize the Obama administration and U.S. diplomacy and foreign policy; degrade U.S. high-tech and internet business and (consequently) the U.S. economy; justify Germany’s inclusion in the “Five Eyes” agreement and justify expansion of German electronic surveillance; destabilize and weaken the National Security Agency and the GCHQ; eclipse German economic warfare against other European countries and highlight the United States as the “International Public Enemy #1.”
With last week’s Snowden-leak that the NSA can break a large amount of the encryption used across the web using a variety of backdoors and secret agreements with manufacturers, there’s now a push in Congress for legal restrictions on the use of these built in backdoors. Whether or not that happens, keep in mind that the custom-made backdoors are always going to be possibly open to any interested parties.
Recent Comments