Resuming analysis from our last program, we begin by reviewing and supplementing discussion about the continuity of Nazism and fascism around the political and historical milieu of Subhas Chandra Bose.
Surya Kumar Bose is president of the Indo-German association. (S.K. Bose is the grandnephew and acolyte of Subhas Chandra Bose.) ” . . . . Surya, who has a software consultancy business in Hamburg and is president of the Indo-German Association . . . .”
We note the genesis of the Indo-German association in Germany during World War II: ” . . . . ‘The DIG was set up on September 11, 1942, by Subhash Chandra Bose at Hotel Atlanta in Hamburg.’ . . . . Bose recounts, adding that the DIG today is the largest bilateral organisation in Germany, with 27 branches. As a consultant he often guides Germans keen on working in the booming Indian IT sector. He is also a founder-member of the German-Indian Round Table, an informal gathering that seeks to further mutual business interests. . . .”
Note, also, Surya Kuma Bose’s networking with Alexander Werth, the German translator for Subhas Chandra Bose’s German forces, which were folded into the Waffen SS at the end of World War II. ” . . . . Back in the day, Netaji’s stay in Germany had proved instrumental in shaping his struggle. Decades later, that legacy would play a pivotal role in shaping his grandnephew’s career. Bose came to Germany on the advice of Alexander Werth, Netaji’s German interpreter in the Indian Legion. . . .”
In an audio segment from 1985 (contained in FTR #1068), we accessed information from Spies and Traitors of World War II by Kurt Singer. That volume, written just after World War II, notes the participation in the German-Indian Society of German intelligence chief Admiral Wilhelm Canaris (head of the Abwehr.) This makes the DIG an element of political, economic, military and intelligence continuity from the World War II period to the present.
Recapping information about what we feel is an “Illegal Immigrant Psy-Op,” we review the pivotal role of a fake Facebook account in the generation of the immigrant caravan that became a propaganda football for Team Trump in the run-up to the 2018 mid-term elections.
We also noted the murder of Mollie Tibbetts, allegedly by Christian Rivera. Bearing similarities to the mind-control of RFK assassination patsy Sirhan Sirhan and the apparent role of the Polka-Dot-Dress Girl in that gambit, Rivera “blacked out” and has no memory of the murder.
Next we review Glenn Greenwald’s pivotal role in running legal interference for the leaderless resistance strategy, the literature published by the National Alliance, in particular.
We then briefly detail the leaderless resistance strategy as set forth by Louis Beam, noting that the Internet, social media, chat groups and bulletin boards dramatically amplify the reach of that strategy.
“The Turner Diaries,” published by the National Alliance, is highly influential in the milieu of the leaderless resistance. A novel, it was crafted as an instructional manual and tool of ideological inspiration to the Nazi movement.
Depicting a successful Nazi uprising against what is portrayed as ZOG (Zionist Occupation Government), the book opens with the confiscation of firearms by the authorities.
Although reaction to the recent shootings in El Paso and Dayton will not lead to the confiscation of firearms, any moves toward gun control will be portrayed as such in the fascist media and internet echo chamber.
In that context, we note that New Zealand shooter Brenton Tarrant intended his action to inspire gun control measures in the U.S., which he felt would lead to a Nazi uprising.
We conclude with review of Tarrant’s stay in Ukraine, and possible networking with the Azov Battalion.
Resuming analysis of AOC’s highly questionable credentials, we note the shady circumstances of her victory over long-time incumbent Joe Crowley: ” . . . . she capitalized on an extremely low primary turnout to eek out a 57% vs. 43% (15,897 vs. 11,761) victory. And while it is true that the young candidate deployed an impressive grassroots canvassing strategy, the devil is in the details— including dirty local politics, vitriolic campaign rhetoric, far left agitators, and an intensive Facebook advertising blitz in the lead up to the primary. . . .”
She drew on the support of disgraced and convicted abuser Hiram Monserrate, and deflected criticism with her standard retreat into identity politics: ” . . . . Part of the local controversy revolved around the involvement of disgraced ex-Queens politician Hiram Monserrate. A domestic abuser who spent time in prison on a corruption conviction, Monserrate has feuded with Crowley for years. During their contentious primary, Crowley accused Ocasio-Cortez of seeking support from the ex-con, even speaking at an event held at a Democrat Club he runs in Queens. . . . Monserrate told the New York Post ‘there were a group of us, in the (club) and other community activists I have been working with for years who understood that we would do our part to get rid of Joe Crowley…We were in support of Alexandria’s campaign.’ . . . .”
In our series on Surveillance Valley (FTR #‘s 1075 through 1081) we noted that the Internet is an information weapon, conceived in the context of counterinsurgency and solidified in applications of counter-democracy. The rise and operations of AOC are inextricably linked with the Internet, social media, in particular.
AOC’s campaign drew on Internet resources, and interests outside of her district: ” . . . . In fact, the vast majority of Ocasio-Cortez campaign donations have come from out-of-district and out-of-state. Of particular note is Blue America PAC, a “collaboration between the authors/publishers of DownWithTyranny.com, Hullabaloo.com and CrooksandLiars.com.” The PAC made an $11,000 independent expenditure in opposition to Joe Crowley, creating the website QueensAgainstCrowley.com. . . . The meme-heavy social media pages for the PAC’s various websites pushed out vitriolic blog and social media posts during the primary, using budget graphics with British-English copy to promote hashtags like #AbolishICE #Berniewouldhavewon and #MobBossCrowley. . . .”
Drawing momentum, in part, from foreign trolls and bots, AOC’s signature “Abolish Ice” campaign plays right into the hands of Team Trump and the racist/xenophobic right. ” . . . . . For anyone engaging with Ocasio-Cortez’ social media posts, the foreign bot and troll activity is noticeably synchronized and pervasive. There’s no better example than the #AbolishICE campaign she championed as her number one primary issue and has helped take national. Much of her social media content has focused on the “Abolish ICE solution” to immigration reform while accusing “Boss Crowley” and other Democrats of being “Pro-ICE”. In the one month lead up to the June primary, Ocasio-Cortez’ campaign spent over $80,000 on Facebook advertising — the largest of her expenditures. . . .”
Next, we note AOC has quoted and defended Eva Peron. Although this may well just be another manifestation of identity politics, it is worth noting that Eva Peron (nee Eva Duarte) was a Nazi spy prior to, and during, World War II, and a Bormann/Vatican agent after that:
” . . . . . . . .The all-conquering Evita left Spain for Rome on June 25, 1947. Father Benitez would smooth her way in the Vatican with the aid of Bishop Alois Hudal [one of the key members of the Vatican/Nazi “Ratline”]. Two days after she arrived she was given an audience with pope Pius XII, spending twenty minutes with the Holy Father–“a time usually allotted by Vatican protocol to queens.” However, there was a more sinister side to the Rome trip. Using Bishop Hudal as an intermediary, she arranged to meet Bormann in an Italian villa at Rapallo provided for her use by [Argentine shipping billionaire Alberto] Dodero. The shipowner was also present at the meeting, as was Eva’s brother Juan Duarte. There, she and her former paymaster cut the deal that guaranteed that his Fuhrer’s safe haven would continue to remain safe, and allowed Bormann to leave Europe at last for a new life in South America. . . . ”
Next, the discussion turns to Peter Thiel and his Palantir firm, the alpha predator of the high-tech surveillance jungle. As we have seen and as we will review, there is reason to suspect that “Mr. AOC”–“Subhas Chandra” Chakrabarti–is a Thiel protege.
Palantir is one of the firms pivotally involved with facilitating ICE’s activities: ” . . . . The database created by Palantir uses information pulled from the DHS, FBI and other sources to build profiles of people who have crossed the border, including ‘schooling, family relationships, employment information, phone records, immigration history, foreign exchange program status, personal connections, biometric traits, criminal records, and home and work addresses,’ the Intercept reported last year. . . . . Policing software provided by Palantir and Forensic Logic’s COPLINK program enables Information sharing between ICE and state and local law enforcement. . . . Palantir software has been implemented by DHS fusion centers across California, as well as by police departments in Los Angeles, Long Beach, and Burbank; and sheriff’s departments in Sacramento, Ventura, and Los Angeles counties. The company has received more than $50 million from these agencies since 2009, mostly financed by DHS grants, the report shows. . . .”
We then review substantive evidence of Thiel/Palantir/Chakrabarti networking:
1.–Chakrabarti worked for Bridgewater Associates: ” . . . . After graduating from Harvard, Mr. Chakrabarti worked for a year as a technology associate at the hedge fund Bridgewater Associates, and then moved to Silicon Valley to help found the technology company Stripe. . . .”
2.–Bridgewater Associates was a major source of the venture capital to launch Palantir.
3.–Former FBI director James Comey was the chief counsel for Bridgewater Associates. As FBI director, Comey was instrumental in handling the election to Trump.
4.–It appears that Chakrabarti’s stint as head of product development at Stripe may well have been as a Thiel protege.
Reviewing information from past broadcasts, there are indications that the scapegoating of illegal immigrants by Team Trump is part of a “psy-op,” with AOC helping to generate “black propaganda” by branding the Democratic Party as “Illegal Immigrants R Us.”
In FTR #718, we warned [back in 2010] that Facebook was not the cuddly little entity it was perceived to be but a potential engine of fascism enabling. Momentum for the remarkably timed immigrant caravan that became a focal point for Trump/GOP/Fox News propaganda during the 2018 midterm elections was generated by a fake Facebook account, which mimicked a Honduran politician/human rights activist, Bartolo Fuentes. Significant aspects of the event:
1.–” . . . . Facebook has admitted the account was an imposter account impersonating a prominent Honduran politician. But it is refusing to release information about the account, who may have set it up or what country it originated from. . . .”
2.–” . . . . In response to a query from BuzzFeed News, a Facebook spokesperson said the phony account ‘was removed for violating [the company’s] misrepresentation policy,’ but declined to share any further information, such as what country it originated from, what email address was used to open it, or any other details that might reveal who was behind it. Facebook added that, barring a subpoena or request from law enforcement, it does not share such information out of respect for the privacy of its users. Fuentes said he believes it’s important to find out who was behind the rogue account — but hasn’t gotten any answers from Facebook. ‘Who knows how many messages could have been sent and who received them?’ . . . .”
4.–” . . . . Fuentes has been unable to get any information from Facebook about the account, but one small detail stood out. Whoever created it listed the Honduran capital of Tegucigalpa as Fuentes’s hometown, rather than the San Pedro Sula suburb of El Progreso. That might seem like a minor error, but it’s the sort of mistake a foreigner — not a Honduran — would make about the well-known former lawmaker, whose left-wing party stands in opposition to the current president’s administration. . . . ”
5.–” . . . . It operated entirely in Spanish and precisely targeted influencers within the migrant rights community. And rather than criticize or undermine the caravan — as other online campaigns would later attempt to do — it was used to legitimize the event, making a loosely structured grassroots event appear to be a well-organized effort by an established migrant group with a proven track record of successfully bringing Central American people to the US border. . . .”
6.–” . . . . before the account got started not many people seemed to be joining. Only after the account kicked into gear did enthusiasm and participation spike. The account also claimed falsely that the caravan was being led by a migrant rights organization called Pueblo Sin Fronteras. Later, once the caravan swelled to a massive scale, the Pueblo Sin Fronteras did get involved, though in a support rather than leadership role. . . .”
7.–” . . . . It appears that this account helped the caravan gain key momentum to the point where its size became a self-fulfilling prophecy, spurring even more to join and groups which hadn’t been supportive to get involved. . . .”
8.–” . . . . It’s hard to believe one Facebook account could play that decisive a role. But the account seems to have been sophisticated. And it is equally difficult to believe that a sophisticated operator or organization would have gone to such trouble and limited their efforts to a single imposter account. . . .”
In the summer of 2018, we highlighted the first degree murder charge laid against an “illegal” Mexican migrant worker following the discovery of a deceased white Iowa college girl Mollie Tibbetts. This became propaganda fodder for Team Trump.
We note in this context that:
1.–The announcement of Rivera’s arrest for the Tibbetts murder happened on the same day that Paul Manafort’s conviction was announced and Michael Cohen pleaded guilty. Might we be looking at an “op,” intended to eclipse the negative publicity from the the Manafort/Cohen judicial events?
2.–Rivera exhibited possible symptoms of being subjected to mind control, not unlike Sirhan Sirhan. ” . . . . Investigators say Rivera followed Mollie in his dark Chevy Malibu as she went for a run around 7.30pm on July 18. He ‘blacked out’ and attacked her after she threatened to call the police unless he left her alone, officers said. . . . It is not yet clear how Mollie died. . . . Rivera told police that after seeing her, he pulled over and parked his car to get out and run with her. . . . Mollie grabbed her phone and threatened to call the police before running off ahead. The suspect said that made him ‘panic’ and he chased after her. That’s when he ‘blacked out.’ He claims he remembers nothing from then until he was back in his car, driving. He then noticed one of her earphones sitting on his lap and blood in the car then remembered he’d stuffed her in the truck. . . . ‘He followed her and seemed to be drawn to her on that particular day. For whatever reason he chose to abduct her,’ Iowa Department of Criminal Investigation special agent Rick Ryan said on Tuesday afternoon. . . . ‘Rivera stated that she grabbed her phone and said: ‘I’m gonna call the police.’ . . . . ‘Rivera said he then panicked and he got mad and that he ‘blocked’ his memory which is what he does when he gets very upset and doesn’t remember anything after that until he came to at an intersection.’ . . .”
4.–Just as Sirhan had been in a right-wing milieu prior to the Robert Kennedy assassination, so, too, was Rivera: ” . . . . The prominent Republican family which owns the farm where Mollie Tibbetts’ alleged killer worked have insisted that he passed background checks for migrant workers. Christhian Rivera, 24, who is from Mexico, was charged with first degree murder on Tuesday after leading police to a corn field where Mollie’s body was dumped. Dane Lang, co-owner of Yarrabee Farms along with Eric Lang, confirmed that Rivera had worked there for four years and was an employee ‘of good standing.’ Dane’s brother is Craig Lang, former president of the Iowa Farm Bureau Federation and the Iowa Board of Regents, and a 2018 Republican candidate for state secretary of agriculture. . . .”
5.–Trump cited the Tibbetts murder in a Charleston, West Virginia, rally that day: ” . . . . President Donald Trump chirped in during his Tuesday address at a rally in Charleston, West Virginia, blaming immigration laws for Mollie’s death. ‘You heard about today with the illegal alien coming in very sadly from Mexico,’ he said. ‘And you saw what happened to that incredible beautiful young woman. ‘Should’ve never happened, illegally in our country. We’ve had a huge impact but the laws are so bad. The immigration laws are such a disgrace. ‘We are getting them changed but we have to get more Republicans.’ Gov. Kim Reynolds complained about the ‘broken’ immigration system that allowed a ‘predator’ to live in her state. . . .”
In a transition to our next program, we underscore the decisive role of Glenn Greenwald in paving the legal road for the realization of the “Leaderless Resistance” strategy that dominates the contemporary political landscape.
We note in this context:
Citizen Greenwald’s views on immigration echo those of Donald Trump: “ . . . . ‘The parade of evils caused by illegal immigration is widely known,’ Greenwald wrote in 2005. The facts, to him, were indisputable: ‘illegal immigration wreaks havoc economically, socially, and culturally; makes a mockery of the rule of law; and is disgraceful just on basic fairness grounds alone.’ Defending the nativist congressman Tom Tancredo from charges of racism, Greenwald wrote of ‘unmanageably endless hordes of people [who] pour over the border in numbers far too large to assimilate, and who consequently have no need, motivation or ability to assimilate.’ Those hordes, Greenwald wrote, posed a threat to ‘middle-class suburban voters.’ . . . .”
In FTR #456, we noted “The Turner Diaries” and: 1) Author William Luther Pierce’s 1998 foreshadowing of the 9/11 attacks; 2) the fact that the climactic episode of the book is a low-level, suicide aerial attack on the Pentagon; 3) The suicide attack on the Pentagon takes place on November 9th (the Nazi day of destiny that would be written “9/11” by a German); 4) the protagonist–Earl Turner–desires the destruction of a 100-story skyscraper in mid-town Manhattan; 5) the uprising by the Nazi group The Order begins with the Government confiscating firearms. Calls by so-called progressives for Gun Control play right into the hands of the Leaderless Resistance, who will distort and propagandize any firearms legislation in such a way as to reinforce their ideology. Christchurch New Zealand shooter Brenton Tarraant intended his crime, in part, to spur calls for gun control, which he felt would lead to civil war.
We emphasize the treatment afforded Yasha Levine. As might be expected, Levine received the Jim Garrison/Gary Webb treatment. The retribution directed at Yasha Levine epitomizes why Mr. Emory refers to the so-called progressive sector as “so-called.”
” . . . . The threats and attacks had begun sometime overnight while I slept. By morning, they had reached a vicious and murderous pitch. There were calls for my death—by fire, by suffocation, by having my throat slit by razor blades. People I had never met called me a rapist, and alleged that I took delight in beating women and forcing people to have sex with me. I was accused of homophobia. Anonymous people filed bogus claims with my editor. Allegations that I was a CIA agent poured in, as did claims that I worked with British intelligence. The fact that I had been born in the Soviet Union didn’t do me any favors; naturally, I was accused of being an FSB spy and of working for Russia’s successor to the KGB. I was informed that my name was added to a dark net assassination list—a site where people could place anonymous bids for my murder. The roaming eye of the Internet hate machine had suddenly fixed on me. . . .”
In addition to online bullying, slander and veiled and direct threats, the so-called “privacy activists” joined in pillorying Yasha Levine: ” . . . . Micah Lee, the former EFF technologist who helped Edward Snowden communicate securely with journalists and who now works at The Intercept, attacked me as a conspiracy theorist and accused me and my colleagues at Pando of being sexist bullies, he claimed that my reporting was motivated not by a desire to get at the truth but by a malicious impulse to harass a female Tor developer. Although Lee conceded that my information about Tor’s government funding was correct, he counter intuitively argued that it didn’t matter. . . .
” . . . . Journalists, experts, and technologists from groups like the ACLU, the EFF, Freedom of the Press Foundation and The Intercept and employees of the Tor Project joined in to attack my reporting. Unlike Lee, most did not attempt to engage my reporting but employed a range of familiar PR smear tactics—tactics you usually see used by corporate flacks, not principled privacy activists. They took to social media, telling anyone who showed interest in my articles that they should ignore them instead. Then, when that didn’t work, they tried to discredit my reporting with ridicule, misdirection, and crude insults. . . .
” . . . . A respected ACLU privacy expert, who now works as a congressional staffer, called me “a conspiracy theorist who sees black helicopters everywhere” and compared my reporting about Tor to the Protocols of the Elders of Zion. As someone who escaped state-sponsored anti-Semitism in the Soviet Union, I found the comparison extremely offensive, especially coming from the ACLU. The Protocols were an anti-Semitic forgery disseminated by the Russian Tsar’s secret police that unleashed waves of deadly pogroms against Jews across the Russian Empire in the early twentieth century. Tor employees put forth a torrent of childish insults, calling me a ‘dumb Stalinist state-felcher’ and a ‘fucktard’s fucktard.’ They accused me of being funded by spies to undermine faith in cryptography. One of them claimed that I was a rapist, and hurled homophobic insults about the various ways in which I had supposedly performed sexual favors for a male colleague.
“In the way that these Internet hazing sessions, go, the campaign evolved and spread. Strange people began threatening me and my colleagues on social media. Some accused me of having blood on my hands and of racking up an “activist body count”–that people were actually dying because of my reporting undermined trust in Tor.The attacks widened to include regular readers and social media users, anyone who had the nerve to ask questions about Tor’s funding sources. An employee of the Tor Project went so far as to dox an anonymous Twitter user, exposing his real identity and contacting his employer in the hopes of getting him fired from his job as a junior pharmacist.
It was bizarre. I watched all this unfold in real time but had no idea how to respond. Even more disconcerting was that the attacks soon expanded to include libelous stories placed in reputable media outlets. The Guardian published a story by a freelancer accusing me of running an online sexual harassment and bullying campaign. The Los Angeles Review of Books, generally a good journal of arts and culture, ran an essay by a freelancer alleging that my reporting was funded by the CIA. Paul Carr, my editor at Pando, lodged official complaints and demanded to know how these reporters came to their conclusions. Both publications ultimately retracted their statements and printed corrections. An editor at the Guardian apologized and described the article as a ‘fuck up.’ But the online attacks continued. . . .”
Program Highlights Include:
1.–The role of Eddie Snowden in misattributing the Shadow Brokers non-hack to Russia.
2.–Snowden’s foreshadowing of the alleged Russian “hack” of the Macron campaign”: ” . . . . ‘That could have significant foreign policy consequences,’ Snowden wrote on Twitter. ‘Particularly if any of those operations targeted US allies. Particularly if any of those operations targeted elections.’ . . .”
3.–James Bamford’s analysis of WikiLeaker/Tor promoter/BBG associate Jacob Apelbaum as the most likely source of the Shadow Brokers non-hack.
The ludicrous nature of the “Russia-did it” hypothesis concerning the Macron hacks: ” . . . . The hacked documents in the ‘Macron hack’ not only contained Cyrillic text in the metadata, but also contained the name of the last person to modify the documents. That name, ‘Roshka Georgiy Petrovichan’, is an employee at Evrika, a large IT company that does work for the Russian government, including the FSB (Russian intelligence.) Also found in the metadata is the email of the person who uploaded the files to ‘archive.org’, and that email address, frankmacher1@gmx.de, is registered with a German free webmail provider used previously in 2016 phishing attacks against the CDU in Germany that have been attributed to APT28. It would appear that the ‘Russian hackers’ not only left clues suggesting it was Russian hackers behind the hack, but they decided to name names this time–their own names. . . .”
4.–Neo-Nazi and Glenn Greenwald and Laura Poitras associate Andrew Auerenheimer’s role in modifying the documents in the Macron hack: ” . . . . Shortly after an anonymous user of the 4chan.org discussion forum posted fake documents purporting to show Mr. Macron had set up an undisclosed shell company in the Caribbean, the user directed people to visit nouveaumartel.com for updates on the French election. That website, according to research by web-security provider Virtualroad.org, is registered by ‘Weevlos,’ a known online alias of Andrew Auernheimer, an American hacker who gained notoriety three years ago when a U.S. appeals court vacated his conviction for computer fraud. The site also is hosted by a server in Latvia that hosts the Daily Stormer, a neo-Nazi news site that identifies its administrator as ‘Weev,’ another online alias of Mr. Aeurnheimer, Virtualroad.org says. ‘We strongly believe that the fake offshore documents were created by someone with control of the Daily Stormer server,’ said Tord Lundström, a computer forensics investigator at Virtualroad.org. . . .”
5.–French cybersecurity chief Guillaume Poupard negated the assertion that Russia hacked the Macron campaign: ” . . . . The head of the French government’s cyber security agency, which investigated leaks from President Emmanuel Macron’s election campaign, says they found no trace of a notorious Russian hacking group behind the attack. . . . ”
In this program, we resume discussion and analysis of the consummately important recent book Surveillance Valley: The Secret Military History of the Internet by Yasha Levine. In the previous program, we noted, among other points of analysis, the decisive role of Eddie “The Friendly Spook” Snowden in promoting the intelligence-agency crafted Tor network.
In addition to Tor, the Open Technology Fund (read “CIA”) helped finance the Signal app for mobile phones. It, too, is fundamentally compromised. ” . . . . . . . . The Tor project remained the best-known privacy app funded by the Open Technology Fund, but it was quickly joined by another: Signal, an encrypted mobile phone messaging app for the iPhone and Android. . . .”
Not surprisingly, the CIA’s Eddie “The Friendly Spook” Snowden was a big promoter of Signal, as well as Tor: ” . . . . People at the ACLU claimed that Signal made federal agents weep. The Electronic Frontier Foundation added Signal alongside Tor to its Surveillance Self-Defense guide. Fight for the Future, a Silicon Valley-funded privacy activist organization, described Signal and Tor as ‘NSA-proof’ and urged people to use them. Edward Snowden was the combo’s biggest and most famous booster and repeatedly took to Twitter to tell his three million followers that he used Signal and Tor every day, and that they should do the same to protect themselves from government surveillance. ‘Use Tor, Use Signal,’ he tweeted out.
“With endorsements like these, Signal quickly became the go-to app for political activists around the world. Egypt, Russia, Syria, and even the United States—millions downloaded Signal, and it became the communication app of choice for those who hoped to avoid police surveillance. Feminist collectives, anti-President Donald Trump protesters, communists, anarchists, radical animal rights organizations, Black Lives Matter activists—all flocked to Signal. Many were heeding Snowden’s advice: ‘Organize. Compartmentalize to limit compromise. Encrypt everything, from calls to texts (use Signal as a first step.)’ . . . .”
Yasha Levine sums up the fundamental contradictions inherent in this dynamic: ” . . . . If you stepped back to survey the scene, the entire landscape of this new Internet Freedom privacy movement looked absurd. Cold War-era organizations spun off from the CIA now funding the global movement against government surveillance? Google and Facebook, companies that ran private surveillance networks and worked hand in hand with the NSA, deploying government-funded privacy tech to protect their users from government surveillance? Privacy activists working with Silicon Valley and the US government to fight government surveillance—and with the support of Edward Snowden himself? . . . .”
Following Snowden’s promotion of OTF’s Tor and Signal technologies, OTF was at a zenith: ” . . . . After Edward Snowden, OTF was triumphant. It didn’t mention the leaker by name in its promotional materials, but it profited from the crypto culture he promoted and benefited from his direct endorsement of the crypto tools it financed. It boasted that its partnership with both Silicon Valley and respected privacy activists meant that hundreds of millions of people could use the privacy tools the US government had brought to market. And OTF promised that this was just a start: ‘By leveraging social network effects, we expect to expand to a billion regular users taking advantage of OTF-supported tools and Internet Freedom technologies by 2015. . . .’
As eventually became clear, the Tor network was easily breached. It is a safe bet that the fascists grouped around the Pirate Bay site (on which WikiLeaks held forth), had breached Tor’s “secrecy,” in addition to the obvious fact that intelligence services could penetrate it at will.
With this in mind, John Young’s rumination about WikiLeaks sound more and more substantive.
In all probability, WikiLeaks was a huge data mining operation both by the very intelligence agencies who were ostensibly targeted by WikiLeaks, and the Fascist International network around Carl Lundstrom, Daniel Friberg, David Duke et al.
In FTR #‘s 756 and 831 we noted Snowden’s fascist views and connections. Levine merely characterizes him as a “right-wing libertarian,” but there is MUCH MORE TO IT THAN THAT!
Snowden downplayed the fundamental role of the Big Tech firms in aiding and abetting government surveillance, in addition to their own massive surveillance and resultant data mining. ” . . . . There, while living under state protection at an undisclosed location in Moscow, he swept Silicon Valley’s role in Internet surveillance under the rug. Asked about it by Washington Post reporter Barton Gellman, who had first reported on the NSA’s PRISM program, Snowden shrugged off the danger posed by companies like Google and Facebook. The reason? Because private companies do not have the power to arrest, jail, or kill people. ‘Twitter doesn’t put warheads on foreheads,’ he joked. . . .”
Embodying his “corporatist” and Technocratic Fascist point of view, Snowden championed the Big Tech firms as bulwarks against government Internet surveillance, despite the only-too-obvious fact (reinforced by the documents he leaked) that Big Tech is–and always has been–in bed with, and actively collaborating with, the very government intelligence agencies conducting that surveillance: ” . . . . The only islands of safety were the private data centers controlled by private companies—Google, Apple, Facebook. These were the cyber-fortresses and walled cities that offered sanctuary to the masses. In this chaotic landscape, computer engineers and cryptographers played the role of selfless galloping knights and wizard-warriors whose job was to protect the weak folk of the Internet: the young, the old and infirm, families. It was their duty to ride out, weapons aloft, and convey people and their precious data safely from fortress to fortress, not letting any of the information fall into the hands of government spies. He called on them to start a people’s privacy war, rallying them to go forth and liberate the Internet, to reclaim it from the governments of the world. . . .”
The nauseating head of Facebook–Mark Zuckerberg–has decried the intelligence community’s use of the Internet for data mining. In FTR #1077, we highlighted the Cambridge Analytica affair, and Facebook’s full cooperation with that project at every turn.
Other Big Tech firms had similar reactions. “. . . . . ‘We hadn’t even heard of PRISM before yesterday,’ Mark Zuckerberg wrote in a Facebook post. He blamed the government and positioned Facebook as a victim. “I’ve called President Obama to express my frustration over the damage the government is creating for all of our future. Unfortunately, it seems like it will take a very long time for true full reform.’ Apple, Microsoft, Google, and Yahoo! All reacted in much the same way, denying the allegations and painting themselves as the victims of government overreach. ‘It’s tremendously disappointing that the government sort of secretly did all this stuff and didn’t tell us. We can’t have a democracy if we’re having to protect you and our users from the government,’ Larry Page told Charlie Rose in an interview on CBS. . . . .”
We present the conclusion of the main part of the book, with Levine’s summation of the inextricable nature and symbiosis between the Internet, the tech firms and the so-called “privacy community.”
The key points of discussion and analysis of Levine’s book (as a whole) include:
1.–The Internet is a weapon, developed for counter-insurgency purposes.
2.–Big Tech firms network with the very intelligence services they publicly decry.
3.–Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which the Internet is predicated.
4.–The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect.
5.–The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect.
6.–The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose.
7.–Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.
NB: Mr. Levine does not go into the fascistic character of Snowden, Assange, Greenwald et al. Some of those shows: Greenwald–FTR #888, Snowden–FTR #‘s 756, 831, Assange and WikiLeaks–FTR #‘s 732, 745, 755, 917.
“. . . . Then there was the fact that Signal ran on Amazon’s servers, which meant that all its data were available to a partner in the NSA’s PRISM surveillance program. Equally problematic, Signal needed Apple and Google to install and run the app on people’s mobile phones. Both companies were, and as far as we know still are, partners in PRISM as well. ‘Google usually has root access to the phone, there’s the issue of integrity,’ writes Sander Venema, a respected developer and secure—technology trainer, in a blog post explaining why he no longer recommends people use Signal for encrypted chat. ‘Google is still cooperating with the NSA and other intelligence agencies. PRISM is also still a thing. I’m pretty sure that Google could serve a specially modified update or version of Signal to specific target for surveillance, and they would be none the wiser that they installed malware on their phones.’ . . .
. . . . So, although the app encrypted the content of people’s messages, it also marked them with a flashing red sign: ‘Follow Me, I Have Something to Hide.’ (Indeed, activists protesting at the Democratic National Convention in Philadelphia in 2016 told me that they were bewildered by the fact that police seemed to know and anticipate their every move despite their having used Signal to organize. . . .”
” . . . . For many Internet companies, including Google and Facebook, surveillance is the business model. It is the base on which their corporate and economic power rests. Disentangle surveillance and profit, and these companies would collapse. Limit data collection, an the companies would see investors flee and their stock prices plummet. [Italics are mine–D.E.]
“Silicon Valley fears a political solution to privacy. Internet Freedom and crypto offer an acceptable alternative. Tools like Signal and Tor provide a false solution to the privacy problem, focusing people’s attention on government surveillance and distracting them from the private spying carried out by the Internet companies they use every day. All the while, crypto tools give people a [false] sense that they’re doing something to protect themselves, a feeling of personal empowerment and control. And all those crypto radicals? Well, they just enhance the illusion, heightening the impression of risk and danger. With Signal or Tor installed, using an iPhone or Android suddenly becomes edgy and radical. So instead of pushing for political and democratic solutions to surveillance, we outsource our privacy politics to crypto apps–software made by the very same powerful entities that these apps are supposed to protect us from. . . .”
Continuing with our examination of Yasha Levine’s seminal volume Surveillance Valley, we continue our analysis of the individuals, institutions and technologies central to the so-called “online privacy” effort. The Tor Project, the Electronic Frontier Foundation, the Broadcasting Board of Governors and its Open Technology Fund and Jacob Appelbaum are all the opposite of what they have been represented as being.
We begin with information overlapped from our last program, highlighting how Jacob Appelbaum and the Tor network hooked up with WikiLeaks.
Tor, Appelbaum, Assange and WikiLeaks:
1.–Became increasingly intertwined, enjoying accolades from many, apparently unsuspecting, groups: ” . . . . His [Appelbaum’s] association with WikiLeaks and Assange boosted the Tor Project’s public profile and radical credentials. Support and accolades poured in from journalists, privacy organizations, and government watchdogs. The American Civil Liberties Union partnered with Appelbaum on an Internet privacy project, and New York’s Whitney Museum—one of the leading modern art museums in the world—invited him for a ‘Surveillance Teach-In.’ The Electronic Frontier Foundation gave Tor its Pioneer Award, and Roger Dingledine made in on Foreign Policy magazine’s Top 100 Global Thinkers for protecting ‘anyone and everyone from the dangers of Big Brother.’ . . . .”
2.– Differed fundamentally from the accepted text: ” . . . . With Julian Assange endorsing Tor, reporters assumed that the US government saw the anonymity nonprofit as a threat. But internal documents obtained through FOIA from the Broadcasting Board of Governors, as well as analysis of Tor’s government contracts paint a different picture. They reveal that Appelbaum and Dingledine worked with Assange on securing WikiLeaks with Tor since late 2008 and that they kept their handlers at the BBG informed about their relationship and even provided information about the inner workings of WikiLeaks’s secure submission system. . . .”
3.–Did not adversely affect the government funding of Tor at all, as might be expected by the superficial apparent reality of the situation: ” . . . . Perhaps most telling was that support from the BBG [read “CIA”–D.E.] continued even after WikiLeaks began publishing classified government information and Appelbaum became the target of a larger Department of Justice investigation into WikiLeaks. For example, on July 31, 2010, CNET reported that Appelbaum had been detained at the Las Vegas airport and questioned about his relationship with WikiLeaks. News of the detention made headlines around the world, once again highlighting Appelbaum’s close ties to Julian Assange. And a week later, Tor’s executive director Andrew Lewman, clearly worried that this might affect Tor’s funding, emailed Ken Berman at the BBG in the hopes of smoothing things over and answering ‘any questions you may have about the recent press regarding Jake and WikiLeaks.’ But Lewman was in for a pleasant surprise: Roger Dingledine had been keeping folks at the BBG in the loop, and everything seemed to be okay. ‘Great stuff, thx. Roger answered a number of questions when he met us this week in DC,’ Berman replied. . . .”
4.–” . . . . In 2011 contracts came in without a hitch–$150,000 from the Broadcasting Board of Governors and $227,118 from the State Department. Tor was even able to snag a big chunk of money from the Pentagon: a new $503,706 annual contract from the Space and Naval Warfare Systems Command, an elite information and intelligence unit that houses a top-secret cyber-warfare division.The Navy was passed through SRI, the old Stanford military contractor that had done counterinsurgency, networking, and chemical weapons work for ARPA back in the 1960s and 1970s. The funds were part of a larger Navy ‘Command, Control, Communcations, Computers, Intelligence, Surveillance, and Reconnaissance’ program to improve military operations. A year later, Tor would see its government contracts more than double to $2.2 million: $353,000 from the State Department, $876,099 from the US Navy, and $937,800 from the Broadcasting Board of Governors. . . .”
In this context, we recall some earlier observations about WikiLeaks. John Young, one of WikiLeaks’ founders turned critic of the organization harbors deep suspicions concerning the group. ” . . . they’re acting like a cult. They’re acting like a religion. They’re acting like a government. They’re acting like a bunch of spies. They’re hiding their identity. They don’t account for the money. They promise all sorts of good things. They seldom let you know what they’re really up to. . .There was suspicion from day one that this was entrapment run by someone unknown to suck a number of people into a trap. So we actually don’t know. But it’s certainly a standard counterintelligence technique. And they’re usually pretty elaborate and pretty carefully run. They’ll even prosecute people as part of the cover story. That actually was talked about at (Sunday’s) panel. They’ll try to conceal who was informing and betraying others by pretending to prosecute them. . . .” The Tor/Appelbaum/BBG (read “CIA”)/WikiLeaks nexus may very well be proof of Young’s suspicions.
Appelbaum, WikiLeaks and Tor became fundamental to the operations of Eddie “The Friendly Spook” Snowden. In past discussion, we have noted that in the summer of 2009, when Snowden made his decision to disclose the NSA documents, he was working for the very same CIA from which the Broadcasting Board of Governors and its Open Technology Fund were derived. Jacob Appelbaum was funded by BBG, as was Tor. ” . . . . From the start, the Tor Project stood at the center of Snowden’s story. The leaker’s endorsement and promotion introduced the project to a global audience, boosting Tor’s worldwide user base from one million to six million almost overnight and injecting it into the heart of a burgeoning privacy movement. In Russia, where the BBG and Dingledine had tried but failed to recruit activists for their Tor deployment plan, use of the software increased from twenty thousand daily connections to somewhere around two hundred thousand.
“During a promotional campaign for the Tor Project, Snowden said: ‘Without Tor, the streets of the Internet become like the streets of a very heavily surveilled city. There are surveillance cameras everywhere, and if the adversary simply takes enough time, they can follow the tapes back and see everything you’ve done. With Tor, we have private spaces and private lives, where we can choose who we want to associate with and how, without the fear of what that is going to look like if it is abused. The design of the Tor system is structured in such a way that even if the US Government wanted to subvert it, it couldn’t.’ Snowden didn’t talk about Tor’s continued government funding, nor did he address an apparent contradiction: why the US government would fund a program that supposedly limited its own power. Whatever Snowden’s private thought on the matter, his endorsement gave Tor the highest possible seal of approval. It was like a Hacker’s Medal of Valor. With Snowden’s backing, no one even thought to question Tor’s radical antigovernment bona fides. . . .”
Next, we review information about the so-called “Arab Spring.” In FTR #‘s 733 through 739, we presented our view that the so-called Arab Spring was a U.S. intelligence operation, aimed at placing the Brotherhood in power in Muslim countries dominated either by a secular dictator or absolute monarchy.
Yasha Levine has highlighted the role of U.S. tech personnel in training and prepping the Arab Spring online activists. As we have noted in the past, the so-called Arab Spring might have been better thought of as “The Muslim Brotherhood Spring,” as the neo-liberal, privatization ideology of Brotherhood economic icon Ibn Khaldun was fundamental to the operation.
The economic goals of the Arab Spring “op” were reviewed in, among other programs, FTR #‘s 1025 and 1026.
Recall while reading the following excerpts of this remarkable and important book, that:
1.–The Tor network was developed by, and used and compromised by, elements of U.S. intelligence.
2.–One of the primary advocates and sponsors of the Tor network is the Broadcasting Board of Governors. As we saw in FTR #‘s 891, 895, is an extension of the CIA.
3.–Jacob Appelbaum has been financed by the Broadcasting Board of Governors, advocates use of the Tor network, has helped WikiLeaks with its extensive use of the Tor network, and is an ideological acolyte of Ayn Rand.
The Arab Spring provided motivation for enhanced U.S. funding for Internet Freedom. The Open Technology Fund, like the BBG a CIA “derivative,” was at the center of this: ” . . . . The motivation for this expansion came out of the Arab Spring. The idea was to make sure the US government would maintain its technological advantage in the censorship arms race that began in the early 2000s, but the funds were also going into developing a new generation of tools aimed at leveraging the power of the Internet to help foreign opposition activists organize into cohesive political movements. The BBG’s $25.5 million cut of the cash more than doubled the agency’s anticensorship technology budget from the previous year, and the BBG funneled the money into the Open Technology Fund, a new organization it had created within Radio Free Asia to fund Internet Freedom technologies in the wake of the Arab Spring. . . .”
The fundamental position of BBG and OTF (read “CIA”) to the so-called online privacy community was concisely expressed by Yasha Levine: ” . . . . From behind this hip and connected exterior, BBG and Radio Free Asia built a vertically integrated incubator for Internet Freedom technologies, pouring millions into projects big and small, including everything from evading censorship to helping political organizing, protests, and movement building. With its deep pockets and its recruitment of big-name privacy activists, the Open Technology Fund didn’t just thrust itself into the privacy movement. In many ways, it WAS the privacy movement. . . .”
Yasha Levine’s summation of the inextricable nature and symbiosis between the Internet, the tech firms and the so-called “privacy community” include:
1.–The Internet is a weapon, developed for counter-insurgency purposes.
2.–Big Tech firms network with the very intelligence services they publicly decry.
3.–Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which the Internet is predicated.
4.–The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect.
5.–The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect.
6.–The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose.
7.–Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.
After detailing the history of the development of the Internet by the national security establishment, Levine presents the story of the development of the Tor network.
Key points of analysis and discussion:
1.–Tor’s Silicon Valley backing: ” . . . . Privacy groups funded by companies like Google and Facebook, including the Electronic Frontier Foundation and Fight for the Future, were some of Tor’s biggest and most dedicated backers. Google had directly bankrolled its development, paying out generous grants to college students who worked at Tor during their summer vacations. Why would an Internet company whose entire business rested on tracking people online promote and help develop a powerful privacy tool? Something didn’t add up. . . .”
2.–Not surprisingly, Tor does not shield users from orgiastic data mining by Silicon Valley tech giants: ” . . . . Tor works only if people are dedicated to maintaining a strict anonymous Internet routine: using only dummy email addresses and bogus accounts, carrying out all financial transactions in Bitcoin and other cryptocurrencies, and never mentioning their real name in emails or messages. For the vast majority of people on the Internet—those who use Gmail, interact with Facebook friends, and shop on Amazon—you reveal your identity. These companies know who you are. They know your name, your shipping address, your credit card information. They continue to scan your emails, map your social networks, and compile dossiers. Tor or not, once you enter your account name and password, Tor’s anonymity technology becomes useless. . . .”
3.–Silicon Valley’s support for Tor is something of a “false bromide”: ” . . . . After all, Snowden’s leaked documents revealed that anything Internet companies had, the NSA had as well. I was puzzled, but at least I understood why Tor had backing from Silicon Valley: it offered a false sense of privacy, while not posing a threat to the industry’s underlying surveillance model. . . .”
4.–Tor is, in fact, financed by elements of the very same intelligence community and national security establishment that supposedly frustrated/“locked out” by Tor! ” . . . . But as I analyzed the organization’s financial documents, I found that the opposite was true. Tor had come out of a joint US Navy—DARPA military project in the early 2000s and continued to rely on a series of federal contracts after it was spun off into a private nonprofit. This funding came from the Pentagon, the State Department, and at least one organization that derived from the CIA. These contracts added up to several million dollars a year and, most years, accounted for more than 90 percent of Tor’s operating budget. Tor was a federal military contractor. It even had its own federal contracting number. . . This included Tor’s founder, Roger Dingledine, who spent a summer working at the NSA and who had brought Tor to life under a series of DARPA and Navy contracts. . . .”
Widely regarded as a champion of Internet freedom and privacy, the Electronic Frontier Foundation helped finance Tor and championed its use.
Key elements of discussion and analysis of the EFF/Tor alliance include:
1.–EFF’s early financing of Tor: ” . . . . . . . . In 2004, [Roger] Dingledine struck out on his own, spinning the military onion routing project into a non-profit corporation called the Tor Project and, while still funded by DARPA and the Navy, began scratching around for private funding. He got help from an unexpected ally: the Electronic Frontier Foundation (EFF), which gave Tor almost a quarter million dollars to keep it going while Dingledine looked for other private sponsors. The EFF even hosted Tor’s website. . . .”
2.–The EFF’s effusive praise for the fundamentally compromised Tor Project: ” . . . . ‘The Tor Project is a perfect fit for EFF, because one of our primary goals is to protect the privacy and anonymity of Internet users. Tor can help people exercise their First Amendment right to free, anonymous speech online.’ EFF’s technology manager Chris Palmer explained in a 2004 press release, which curiously failed to mention that Tor was developed primarily for military intelligence use and was still actively funded by the Pentagon. . . .”
3.–The EFF’s history of working with elements of the national security establishment: ” . . . . In 1994, EFF worked with the FBI to pass the Communications Assistance for Law Enforcement Act, which required all telecommunications companies to build their equipment so that it could be wiretapped by the FBI. In 1999, EFF worked to support NATO’s bombing campaign in Kosovo with something called the ‘Kosovo Privacy Support,’ which aimed to keep the region’s Internet access open during military action. Selling a Pentagon intelligence project as a grassroots privacy tool—it didn’t seem all that wild. . . .”
4.–In FTR #854, we noted that EFF co-founder John Perry Barlow was far more than a Grateful Dead lyricist/hippie icon: ” . . . . Indeed, in 2002, a few years before it funded Tor, EFF cofounder [John] Perry Barlow casually admitted that he had been consulting for intelligence agencies for a decade. It seemed that the worlds of soldiers, spies, and privacy weren’t as far apart as they appeared. . . .”
5.–EFF’s gravitas in the online privacy community lent Tor great credibility: ” . . . . EFF’s support for Tor was a big deal. The organization commanded respect in Silicon Valley and was widely seen as the ACLU of the Internet Age. The fact that it backed Tor meant that no hard questions would be asked about the anonymity tool’s military origins as it transitioned to the civilian world. And that’s exactly what happened. . . .”
In FTR #‘s 891 and 895, we noted the primary position of the Broadcasting Board of Governors in the development of the so-called “privacy” networks. The BBG is a CIA offshoot: “. . . . The BBG might have had a bland sounding name and professed a noble mission to inform the world and spread democracy. In truth, the organization was an outgrowth of the Central Intelligence Agency. . . . The bulk of the BBG is no longer funded from the CIA’s black budget, but the agency’s original cold War goal and purpose—subversion and psychological operations directed against countries deemed hostile to US interests—remain the same. The only thing that did change about the BBG is that today, more of its broadcasts are taking place online . . . .”
After documenting Radio Free Europe’s growth from the Nazi/Vichy run Radio France during World War II and RCA’s David Sarnoff’s involvement with the Transradio Consortium (which communicated vital intelligence to the Axis during the war), the program highlights the involvement of Gehlen operatives in the operations of Radio Free Europe, the seminal CIA broadcasting outlets.
The BBG (read “CIA”) became a major backer of the Tor Project: ” . . . . . . . . It was Wednesday morning, February 8, 2006, when Roger Dingledine got the email he had been badly waiting for. The Broadcasting Board of Governors had finally agreed to back the Tor Project. . . . Within a year, the agency increased Tor’s contract to a quarter million dollars, and then bumped it up again to almost a million just a few years later. The relationship also led to major contracts with other federal agencies, boosting Tor’s meager operating budget to several million dollars a year. . . .”
Yasha Levine sums up the essence of the Tor Project: ” . . . . The Tor Project was not a radical indie organization fighting The Man. For all intents and purposes, it was The Man. Or, at least, The Man’s right hand. . . . internal correspondence reveals Tor’s close collaboration with the BBG and multiple other wings of the US government, in particular those that dealt with foreign policy and soft-power projection. Messages describe meetings, trainings, and conferences with the NSA, CIA, FBI and State Department. . . . The funding record tells the story even more precisely. . . . Tor was subsisting almost exclusively on government contracts. By 2008, that included contracts with DARPA, the Navy, the BBG, and the State Department as well as Stanford Research Institute’s Cyber-Threat Analytics program. . . .”
Next, we begin chronicling the career of Jacob Appelbaum. A devotee of Ayn Rand, he became one of Tor’s most important employees and promoters. “. . . . Within months of getting the job, he assumed the role of official Tor Project spokesman and began promoting Tor as a powerful weapon against government oppression. . . . Over the next several years, Dingledine’s reports back to the BBG [read “CIA”–D.E.] were filled with descriptions of Appelbaum’s successful outreach. . . .”
Introducing a topic to be more fully explored in our next program, we note Appelbaum’s pivotal role in the WikiLeaks operation and his role in the adoption of Tor by WikiLeaks: ” . . . . Appelbaum decided to attach himself to the WikiLeaks cause. He spent a few weeks with Assange and the original WikiLeaks crew in Iceland as they prepared their first major release and helped secure the site’s anonymous submissions system using Tor’s hidden service feature, which hid the physical location of WikiLeaks servers and in theory made them much less susceptible to surveillance and attack. From then on, the WikiLeaks site proudly advertised Tor: ‘secure, anonymous, distributed network for maximum security.’ . . . . Appelbaum did his best to be Assange’s right-hand man. He served as the organization’s official American representative and bailed the founder of WikiLeaks out of tough spots when the heat from US authorities got too hot. Appelbaum became so intertwined with WikiLeaks that apparently some staffers talked about him leading the organization if something were to happen to Assange. . . . Assange gave Appelbaum and Tor wide credit for helping WikiLeaks. ‘Jake has been a tireless promoter behind the scenes of our cause,’ he told a reporter. ‘Tor’s importance to WikiLeaks cannot be underestimated.’ With those words, Appelbaum and the Tor Project became central heroes in the WikiLeaks saga, right behind Assange. . . .”
We have spoken repeatedly about the Nazi tract “Serpent’s Walk,” in which the Third Reich goes underground, buys into the opinion-forming media and, eventually, takes over.
Hitler, the Third Reich and their actions are glorified and memorialized. The essence of the book is synopsized on the back cover:
“It assumes that Hitler’s warrior elite — the SS — didn’t give up their struggle for a White world when they lost the Second World War. Instead their survivors went underground and adopted some of their tactics of their enemies: they began building their economic muscle and buying into the opinion-forming media. A century after the war they are ready to challenge the democrats and Jews for the hearts and minds of White Americans, who have begun to have their fill of government-enforced multi-culturalism and ‘equality.’ ”
Something analogous is happening in Ukraine and India.
In Ukraine, fascism in being remade as a heroic bulwark against communism and Russia. In India, it is being remade as a liberating anti-colonial, anti-imperial force.
In FTR #889, we noted that Pierre Omidyar, a darling of the so-called “progressive” sector for his founding of The Intercept, was deeply involved with the financing of the ascent of both Narendra Modi’s Hindutva fascist BJP and the OUN/B successor organizations in Ukraine.
Omidyar’s anointment as an icon of investigative reporting could not be more ironic, in that journalists and critics of his fascist allies in Ukraine and India are being repressed and murdered, thereby furthering the suppression of truth in those societies. This suppression of truth feeds in to the “Serpent’s Walk” scenario.
In a long series dealing largely with apparent fascist elements and spooks grouped around the “socialists” on the left-wing of the Democratic Party, as well as a supplemental Food For Thought post, we hypothesized about, among other things, a marriage between the Hindutva fascism of Narendra Modi, his BJP and the RSS (the organization that murdered Mahatma Gandhi and which was modeled after Mussolini’s blackshirts) and the “Boseian” fascism of Subhas Chandra Bose.
Noting that Hitler was viewed favorably by many Indians, business students in particular, and that Mein Kampf was a best-seller in India, we have discussed Modi’s introduction of a school textbook when he governed Gujarat that glorified Hitler.
It appears that the marriage between Modi’s Hindutva fascism and “Boseian” fascism has been effected, with Modi renaming three Islands as a tribute to Bose and glorifying Bose and his Axis fighting forces in a disgusting commemorative ceremony.
Key elements of discussion and analysis include:
1.–“Prime minister Narendra Modi on Sunday announced the renaming of three islands of Andaman and Nicobar archipelago as a tribute to Netaji Subhas Chandra Bose. . . .The Ross Island was renamed as Netaji Subhas Chandra Bose Dweep, the Neil Island as Shaheed Dweep and the Havelock Island as Swaraj Dweep. . . . “ ‘When it comes to heroes of the freedom struggle, we take the name of Netaji Subhas Chandra Bose with pride. The first prime minister of the Azad Hind government Subhash Babu had made India’s independence resolution on the soil of Andaman,’ he said.”
2.–Modi began his speech by asking the people in the ground to switch on the flashlights of their mobile phones to honour Bose.
3.–Thousands of mobile flashlights were then switched on providing a visual delight.
Donning the Azad Hind Fauj (Indian National Army) cap, he addressed a public meeting at Netaji Stadium on the occasion of the 75th anniversary of the hoisting of the Tricolour by Bose.
4.–At the stadium, the PM also released a commemorative stamp, its first-day cover and a Rs 75 coin.He also announced setting up of a deemed university named after Bose.
5.–The Andaman and Nicobar islands are not just a symbol of India’s natural beauty, but are also like a place of pilgrimage for Indians, said Modi.Modi also visited the Marina Park and hoisted a national flag on a 150-feet high mast, besides paying floral tribute at Netaji’s statue.
6.–On December 30, 1943, Bose had suggested that Andaman and Nicobar Islands be renamed as Shahid and Swaraj Dweep respectively.
7.–During World War II, the Japanese had captured the Andaman and Nicobar Islands, and Netaji came here as the Azad Hind Fauz led by him was an ally of the Japanese force.
8.–“ ‘The historical event of 30th December 1943 has been completed today after 75 years,’ Modi said. . . .”
The 1943 renaming of the Andaman Islands was done during the brutal Japanese occupation of that territory:
” . . . . [KR] Ganesh [the MP from the Andaman and Nicobar Islands] Ganesh pointed out to the House that the local people of the Andamans were imprisoned and tortured by the Japanese in the same Cellular Jail in Port Blair where Netaji Bose raised the flag of a free India for the first time in December 1943. [MP] Samar Guha was unaware of this, as were most other members of Parliament. He wanted to know if the atrocities by the Japanese occupation forces on the local people had taken place before or after Bose’s visit. Ganesh’s reply was, “Before, during and after.” . . . . ‘Japanese troops acted harshly against local populations. The Japanese military police were especially feared. Food and vital necessities were confiscated by the occupiers causing widespread misery and starvation by the end of the war.’ The situation was the same in Port Blair and surrounding villages and nearby islands such as Neil Island and Havelock Island. I have come across many stories of the fear of the Kempeitai, the Japanese military police – of the arrests, the beatings, the hunger, the fear and anxiety that had gripped the people with hundreds in jail for suspicion of spying for the British. . . .”
We have repeatedly made the point that the dimensions of official lying in the West were of truly Orwellian proportions–documented World War II history was being dismissed as “Russian propaganda” or “Kremlin propaganda.” The snake is doing wind sprints in Ukraine.
Next, we begin reading and analysis of an article about the rise of fascism in Ukraine that details the numerous, multi-faceted examples of the capture of Ukrainian society and government by the OUN/B successor organizations elevated to power through the Maidan coup. (This will be continued in our next program.)
Points of analysis and discussion include:
* The elevation of the neo-Nazi Azov Battalion that was formally incorporated into Ukraine’s armed forces yet remains a neo-Nazi battalion.
* Azov is now engaged in policing with its National Druzhina street patrol units that have engaged in anti-Roma pogroms
* Azov’s campaign to turn Ukraine into an international hub of white supremacy
* Andriy Parubiy’s role in creating Ukraine’s Nazi Party that he continues to embrace and that’s routinely ignored as he has become the parliament speaker
* The deputy minister of the Interior—which controls the National Police—is a veteran of Azov, Vadim Troyan
* Government sponsorship of historical revisionism and holocaust denial though agencies like Ukrainian Institute of National Memory
* Torchlight parades are now normal
* Within several years, an entire generation will be indoctrinated to worship Holocaust perpetrators as national heroes
* Books that criticize the now-glorified WWII Nazi collaborators like Stepan Bandera are getting banned
* Public officials make threats against Ukraine’s Jewish community with no repercussions
* The neo-Nazi C14’s street patrol gangs are both responsible for anti-Roma pogroms and also the recipient of government funds to run a children’s educational camp. Last October, C14 leader Serhiy Bondar was welcomed at America House Kyiv, a center run by the US government
* It’s open season on the LGBT community and far right groups routinely attack LGBT gatherings
* Ukraine is extremely dangerous for journalists and the government has supported the doxxing and intimidation of journalist by the far right like Myrovorets group
* The government is trying to repeal laws protecting the many minority languages used in Ukraine
In FTR #‘s 733 through 739, we presented our view that the so-called Arab Spring was a U.S. intelligence operation, aimed at placing the Brotherhood in power in Muslim countries dominated either by a secular dictator or absolute monarchy.
Continuing analysis from our previous program, this broadcast delves further into the networking between the Muslim Brotherhood and Al-Qaeda. Against the background of the occupation of Idlib Province in Syria by Al-Qaeda, we highlight the apparent role of Morsi’s government and the Muslim Brotherhood in the events surrounding the 2012 attack on the U.S. Embassy in Benghazi, Libya.
The overthrow of Khadafy in Libya was an outgrowth of the so-called Arab Spring, as was the precipitation of the civil war in Syria. Of particular significance is the fact that the GOP-led investigations of the Benghazi attack led directly to both the investigation of Hillary Clinton’s e‑mails and the decisively significant FBI tampering with the 2016 election, as well as the alleged “hack” of Hillary’s e‑mails!
An Egyptian newspaper published what were said to be intercepted recordings of Morsi communicating conspiratorially with Muhammad al-Zawahiri, the the brother of Ayman al-Zawahiri, the head of Al-Qaeda. Much of this checks out with information that is already on the public record.
Note the networking of GOP Senators John McCain and Lindsay Graham with Khairat El-Shater of the Egyptian Muslim Brotherhood while he was in prison, as well as the alleged links between the Egyptian Brotherhood and the cells involved in attacking the U.S. Embassy in Libya.
What we may well be looking at is a gambit along the lines of what has become known as the October Surprise–collusion between the Iranian Islamists and George H.W. Bush/CIA/GOP to (among other things) destabilize the Carter administration and 1980 re-election campaign.
In addition, we wonder about a deal having been struck to have Al-Qaeda fight against Bashar Assad in Syria, while avoiding attacks inside the U.S.?
Of primary focus in the material below is Khairat El-Shater (transliterated spellings of his name differ.) El-Shater:
1.–Was the number two man in the Muslim Brotherhood, though not formerly a member of Morsi’s government.
2.–Networked with U.S. Ambassador Anne Patterson and GOP Senators John McCain and Lindsay Graham and Khairat El-Shater (alternatively transliterated with two “t’s” and/or an “al”), shortly after Morsi was deposed. ” . . . . It is interesting to note here that, prior to these revelations, U.S. ambassador Anne Patterson was seen visiting with Khairat El-Shater—even though he held no position in the Morsi government—and after the ousting and imprisonment of Morsi and leading Brotherhood members, Sens. John McCain and Lindsay Graham made it a point to visit the civilian Shater in his prison cell and urged the Egyptian government to release him. . . .”
3.–Was deeply involved in mobilizing Al-Qaeda on behalf of Morsi and the Brotherhood: ” . . . . Also on that same first day of the revolution, Khairat al-Shater, Deputy Leader of the Brotherhood, had a meeting with a delegate of jihadi fighters and reiterated Morsi’s request that all jihadis come to the aid of the presidency and the Brotherhood. . . . ”
4.–Was the apparent source of a $50 million contribution by the Brotherhood to Al Qaeda: ” . . . . That the Muslim Brotherhood’s international wing, including through the agency of Khairat al-Shater, had provided $50 million to al-Qaeda in part to support the Muslim Brotherhood in Egypt. . . .”
5.–Had the passport of the alleged leader of the Benghazi attack in his home when he was arrested: ” . . . . Most recently, on July 29, 2013, Ahmed Musa, a prominent Egyptian political insider and analyst made several assertions on Tahrir TV that further connected the dots. . . . Musa insisted that he had absolute knowledge that the murderer of Chris Stevens was Mohsin al-‘Azzazi, whose passport was found in Brotherhood leader Khairat El-Shater’s home, when the latter was arrested. . . .”
6.–Epitomized the GOP-beloved, corporatist economic ideology and lifestyle: ” . . . . Arguably the most powerful man in the Muslim Brotherhood is Khairat El-Shater, a multimillionaire tycoon whose financial interests extend into electronics, manufacturing and retail. A strong advocate of privatization, Al-Shater is one of a cadre of Muslim Brotherhood businessmen who helped finance the Brotherhood’s Freedom and Justice Party’s impressive electoral victory this winter and is now crafting the FJP’s economic agenda. . . . . . . . the Brotherhood’s ideology actually has more in common with America’s Republican Party than with al-Qaida. Few Americans know it but the Brotherhood is a free-market party led by wealthy businessmen whose economic agenda embraces privatization and foreign investment while spurning labor unions and the redistribution of wealth. Like the Republicans in the U.S., the financial interests of the party’s leadership of businessmen and professionals diverge sharply from those of its poor, socially conservative followers. . . .”
This broadcast begins with conclusion of reading of a key article that was featured in our last program.
Key points of analysis in discussion of the Morsi/Zawahiri/Brotherhood connection include:
1.–Muhamed Zawahiri’s promise to bolster Morsi’s government with military support, in exchange for Morsi steering Egypt in the direction of Sharia law. ” . . . . The call ended in agreement that al-Qaeda would support the Brotherhood, including its international branches, under the understanding that Morsi would soon implement full Sharia in Egypt. After this, Muhammad Zawahiri and Khairat al-Shater, the number-two man of the Muslim Brotherhood organization, reportedly met regularly. . . .”
2.–Morsi’s agreement with Zawahiri’s proposal. ” . . . . Zawahiri further requested that Morsi allow them to develop training camps in Sinai in order to support the Brotherhood through trained militants. Along with saying that the Brotherhood intended to form a ‘revolutionary guard’ to protect him against any coup, Morsi added that, in return for al-Qaeda’s and its affiliates’ support, not only would he allow them to have such training camps, but he would facilitate their development in Sinai and give them four facilities to use along the Egyptian-Libyan border. . . .”
3.–The networking between U.S. Ambassador Anne Patterson and GOP Senators John McCain and Lindsay Graham and Khairat El-Shater (alternatively transliterated with two “t’s”), shortly after Morsi was deposed. ” . . . . It is interesting to note here that, prior to these revelations, U.S. ambassador Anne Patterson was seen visiting with Khairat al-Shater—even though he held no position in the Morsi government—and after the ousting and imprisonment of Morsi and leading Brotherhood members, Sens. John McCain and Lindsay Graham made it a point to visit the civilian Shater in his prison cell and urged the Egyptian government to release him. . . .”
4.–Note that Morsi sanctioned and Brotherhood-aided Al-Qaeda militants were apparently involved in the Behghazi attacks that led to the Benghazi investigation, the Hillary e‑mails non-scandal and all that followed: ” . . . . According to a Libyan Arabic report I translated back in June 2013, those who attacked the U.S. consulate in Benghazi, killing Americans, including Ambassador Chris Stevens, were from jihadi cells that had been formed in Libya through Egyptian Muslim Brotherhood support. Those interrogated named Morsi and other top Brotherhood leadership as accomplices. . . . ”
5.–Khairat El-Shater was deeply involved in mobilizing Al-Qaeda on behalf of Morsi and the Brotherhood: ” . . . . Also on that same first day of the revolution, Khairat al-Shater, Deputy Leader of the Brotherhood, had a meeting with a delegate of jihadi fighters and reiterated Morsi’s request that all jihadis come to the aid of the presidency and the Brotherhood. . . . ”
6.–Khairat El-Shater was the apparent source of a $50 million contribution by the Brotherhood to Al Qaeda: ” . . . . That the Muslim Brotherhood’s international wing, including through the agency of Khairat al-Shater, had provided $50 million to al-Qaeda in part to support the Muslim Brotherhood in Egypt. . . .”
7.–Next, we highlight another important article from Raymond Ibrahim about the Morsi/Al-Qaeda connection to the Benghazi attack. Supplementing the information about networking between U.S. Ambassador to Egypt Anne Patterson, John McCain, Lindsay Graham and Khairat al-Shater, we note that:
1.–The Benghazi attackers were apparently linked to Morsi and the Brotherhood: ” . . . . days after the Benghazi attack back in September 2012, Muslim Brotherhood connections appeared. A video made during the consulate attack records people approaching the beleaguered U.S. compound; one of them yells to the besiegers in an Egyptian dialect, ‘Don’t shoot—Dr. Morsi sent us!’ apparently a reference to the former Islamist president. . . .”
2.–The passport of the alleged leader of the Benghazi attack was found in the home of McCain/Graham contact Kharat al-Shater’s home when he was arrested: ” . . . . Most recently, on July 29, 2013, Ahmed Musa, a prominent Egyptian political insider and analyst made several assertions on Tahrir TV that further connected the dots. . . . Musa insisted that he had absolute knowledge that the murderer of Chris Stevens was Mohsin al-‘Azzazi, whose passport was found in Brotherhood leader Khairat El-Shater’s home, when the latter was arrested. . . .”
3.–The attack on the U.S. Embassy may well have been intended to take Chris Stevens hostage, in order to use him as potential barter for the Blind Sheikh: ” . . . . The day before the embassy attacks, based on little known but legitimate Arabic reports, I wrote an article titled ‘Jihadis Threaten to Burn U.S. Embassy in Cairo,’ explaining how Islamists—including al-Qaeda—were threatening to attack the U.S. embassy in Cairo unless the notorious Blind Sheikh—an Islamist hero held in prison in the U.S. in connection to the first World Trade Center bombing—was released. The date September 11 was also deliberately chosen to attack the embassy to commemorate the ‘heroic’ September 11, 2001 al-Qaeda strikes on America. . . .”
4.–The United States: ” . . . . first with Anne Patterson, and now with Senators John McCain and Lindsay Graham, keep pressuring Egypt to release Brotherhood leaders; McCain personally even visited the civilian El-Shater, whose raided home revealed the passport of Azzazi, whom Musa claims is the murderer of Stevens. . . .”
Following the Benghazi discussion, we recap an article about the Brotherhood and apparent Al-Qaeda/Benghazi collaborator Khairat El-Shater, noting the powerful resonance between his and the Muslim Brotherhood’s values and those of the GOP and the corporate community:
1.–” . . . . the Brotherhood’s ideology actually has more in common with America’s Republican Party than with al-Qaida. Few Americans know it but the Brotherhood is a free-market party led by wealthy businessmen whose economic agenda embraces privatization and foreign investment while spurning labor unions and the redistribution of wealth. Like the Republicans in the U.S., the financial interests of the party’s leadership of businessmen and professionals diverge sharply from those of its poor, socially conservative followers. . . .”
2.–” . . . . Arguably the most powerful man in the Muslim Brotherhood is Khairat El-Shater, a multimillionaire tycoon whose financial interests extend into electronics, manufacturing and retail. A strong advocate of privatization, Al-Shater is one of a cadre of Muslim Brotherhood businessmen who helped finance the Brotherhood’s Freedom and Justice Party’s impressive electoral victory this winter and is now crafting the FJP’s economic agenda. . . .”
We conclude with information about the training of activists in high-tech and social media in order to launch the Arab Spring.
In a remarkable and very important new book, Yasha Levine has highlighted the role of U.S. tech personnel in training and prepping the Arab Spring online activists.
Note while reading the following excerpts of this remarkable and important book, that:
1.–The Tor network was developed by, and used and compromised by, elements of U.S. intelligence.
2.–One of the primary advocates and sponsors of the Tor network is the Broadcasting Board of Governors. As we saw in FTR #‘s 891, 895, is an extension of the CIA.
3.–Jacob Appelbaum has been financed by the Broadcasting Board of Governors, advocates use of the Tor network, has helped WikiLeaks with its extensive use of the Tor network, and is a theoretical accolyte of Ayn Rand.
In FTR #1015, we noted the issuing of school textbooks glorifying Nazism while Narendra Modi headed the Indian state of Gujarat. In FTR #998, among other programs, we noted John Conyers’ active opposition to the OUN/B successor organizations in power in Ukraine, and his ouster by the #MeToo movement, which displays symptomatic features of an “op.” Of particular interest is the apparent role of far right blogger Mike “Misogyny Gets You Laid” Cernovich–an interesting person to signal the destruction of one of the few actively anti-fascist lawmakers by on ostensibly “progressive” political movement. It is interesting and significant that Modi also co-sponsored a House Resolution condemning Modi’s support for Nazi racism and ideology. ” . . . . The sponsor, Rep. John Conyers (D‑MI) said the State Department ‘has discussed the role of Modi and his government in promoting attitudes of racial supremacy, racial hatred, and the legacy of Nazism through his government’s support of school textbooks in which Nazism is glorified.’ The resolution said Modi revised school textbooks, which mentioned the ‘charismatic personality of Hitler the Supremo’ and failed to acknowledge the horrors of the Holocaust. . . .” Worth noting in this context is the fact that Pierre Omidyar actively assisted the rise of both the OUN/B fascists in Ukraine and Modi’s BJP/RSS fascists in India, as discussed in FTR #889.
Recent Comments