In previous programs, we have noted that the Uyghur “independence” movement is inextricably linked with elements of U.S. intelligence, as well as a potpourri of fascists of various stripes. A “New York Times” article positions Adrian Zenz as an authority on the Uyghurs. Zenz’s prominence as an “expert” on the Uyghurs comes by virtue of his position with the Victims of Communism Memorial Foundation, ” . . . . an outgrowth of the National Captive Nations Committee, a group founded by Ukrainian nationalist Lev Dobriansky to lobby against any effort for detente with the Soviet Union. Its co-chairman, Yaroslav Stetsko, was a top leader of the fascist OUN‑B militia that fought alongside Nazi Germany during its occupation of Ukraine in World War Two. . . .” OUN/B’s founder was Stepan Bandera, pictured at right. Just as the Network of Chinese Human Rights Defenders based their report on interviews with eight individuals out of a population of 20 million, Zenz based his estimate on a single report by a TV station that broadcasts material from Al-Qaeda and ISIS-linked elements and individuals: ” . . . . Zenz arrived at his estimate ‘over 1 million’ in a dubious manner. He based it on a single report by Istiqlal TV, a Uyghur exile media organization based in Turkey . . . . Far from an impartial journalistic organization, Istiqlal TV advances the separatist cause while playing host to an assortment of extremist figures. One such character who often appears on Istiqlal TV is Abdulkadir Yapuquan, a reported leader of the East Turkestan Islamic Movement (ETIM), a separatist group that aims to establish an independent homeland in Xinjiang called East Turkestan. . . . ETIM has been designated as a terrorist organization with ties to al-Qaeda by the US, European Union, and UN Security Council’s Al-Qaida Sanctions Committee. The Associated Press has reported that since ‘2013, thousands of Uighurs… have traveled to Syria to train with the Uighur militant group Turkistan Islamic Party and fight alongside al-Qaida,’ with ‘several hundred join[ing] the Islamic State.’ . . .”
This program continues discussion of the Uyghurs/“Uighurs” and the destabilization of China. This ongoing effort is one of an array of covert and overt operations against China.
Discussed in numerous programs, the Uighurs (also spelled Uyghurs) are heavily overlapped with various fascist elements. All of these are present in the history of the World Uyghur Congress.
1.–The narco-fascist regime of Chiang Kai-shek.
2.–The Grey Wolves, youth wing of the National Action Party. The group was a key element of the Turkish “Stay Behind” movement.
3.–Various Islamic terrorist offshoots of the Muslim Brotherhood, including Al-Qaeda and the Islamic State.
4.–The Anti-Bolshevik Bloc of Nations milieu, directly evolved from the Third Reich and the Gehlen organization.
5.–The Dalai Lama and his SS/Third Reich heritage.
Of great significance, once again, is the decisive presence of the National Endowment for Democracy, a U.S. intelligence cut-out founded by William Casey.
American and Western media draw on an American regime-change operation for much of their coverage–that organization is the World Uyghur [“Uighur”] Congress and numerous subsidiary elements.
Exemplifying the WUC milieu is Rushan Abas: ” . . . . Another influential organization spun out of the WUC network is the Campaign for Uyghurs. This group is headed by Rushan Abbas, the former Vice President of the UAA. Promoted simply as a Uyghur ‘human rights activist’ by Western media outlets including the supposedly adversarial Democracy Now!, Abbas is, in fact, a longtime US government and military operative. Abbas boasts in her bio of her ‘extensive experience working with US government agencies, including Homeland Security, Department of Defense, Department of State, and various US intelligence agencies.’ While working for the military contractor L3 Technologies, Abbas served the US government and the Bush administration’s so-called war on terror as a ‘consultant at Guantanamo Bay supporting Operation Enduring Freedom.’ Abbas ‘also worked as a linguist and translator for several federal agencies including work for the US State Department in Guantanamo Bay, Cuba and for President George W. Bush and former First Lady Laura Bush’. Like so many of her colleagues, Abbas enjoyed a stint at Radio Free Asia. While Abbas once shared her history of collaboration with the US government in the open, she has attempted to scrub biographic information from her online presence following a disastrous publicity appearance in December 2019. During a Reddit’s ‘Ask Me Anything’ question and answer forum, participants blasted Abbas as a ‘CIA asset’ and frequent US government collaborator, prompting her attempt to disappear her bio from the internet. . . .”
The ostensibly “peaceful’ intent of the WUC can be evaluated against the background of the comments of former WUC Vice-President Seyit Tumturk: ” . . . . In 2018, Tümturk declared that Chinese Uyghurs view Turkish ‘state requests as orders.’ He then proclaimed that hundreds of thousands of Chinese Uyghurs were ready to enlist in the Turkish army and join Turkey’s illegal and brutal invasion of Northern Syria ‘to fight for God’ – if ordered to do so by Erdogan. . . . Shortly after Tumturk’s comments, Uyghur militants dressed in Turkish military fatigues and on the Turkish side of the Syrian border released a video in which they threatened to wage war against China: ‘Listen you dog bastards, do you see this? We will triumph!’ one fighter exclaimed. ‘We will kill you all. Listen up Chinese civilians, get out of our East Turkestan. I am warning you. We shall return and we will be victorious.’ . . .”
The program concludes with a look at the political history of William Casey, on whose watch as CIA director many of the U.S. intelligence fronts involved with the Uyghur destabilization effort were developed.
Key Aspects of Analysis of Casey Include: Casey’s Wall Street legal background and the manner in which it dovetailed with William Donovan and the OSS (America’s World War II intelligence service); Casey’s networking with Landsdale and others involved with the recovery of Golden Lily loot, in the Philippines, in particular; Casey’s possible role as a key implementer of the Black Eagle Fund; Casey’s role in setting up Capital Cities, a company that eventually bought ABC in 1985; Casey’s position as Capital Cities’ largest stockholder, including in 1985, when he was CIA director; the probability that Capital Cities was an intelligence front; Casey’s key positions in the Nixon Administration–Chairman of the SEC, Under Secretary of State for Economic Affairs and head of the Export-Import Bank; the probability that Casey was with CIA throughout his post-World War II career; Casey’s friendship with both Allen and John Foster Dulles; Casey’s knowledge of how to “privatize” the CIA; Casey’s role as the handler of Ferdinand Marcos and his Golden Lily bullion; Reagan’s signing of Executive Order 12333, authorizing the CIA to enter into private relationships with PMF’s (private military foundations) for intelligence purposes, while permitting those relationships to be kept secret.
The program begins with review of Nazi/Gehlen/ABN links to anti-China efforts in Hong Kong and Xinjiang province.
In numerous programs, we have noted international networking between the Ukrainian Nazi Azov Battalion and elements around the world:
Azov is part of the “Intermarium Revival” that is seen as using Nazification of the Ukraine “pivot point” as a springboard for a global Nazi takeover.
American Nazis and white supremacists are among the elements networking with Azov and then “bringing it all back home” to their native lands.
Azov Battalion and Pravy Sektor (“Right Sector”) elements have decamped to Hong Kong, networking with the so-called “Pro-Democracy” forces and working on behalf of EU NGOs. This was discussed in FTR #1103.
Azov’s Hong Kong compatriots have adopted the OUN/B slogan, now the official salute of the Ukrainian police and military. ” . . . . The interest has been mutual, with Hong Kong’s ‘democrats’ drawing inspiration from Ukraine’s pro-Western Euromaidan ‘revolution’ that has empowered far-right, fascistic forces. Hong Kong protesters have embraced the slogan ‘Glory to Hong Kong’, adapted from ‘Slava Ukrayini’ or ‘Glory to Ukraine’, a slogan invented by Ukrainian fascists and used by Nazi collaborators during WWII that was re-popularized by the Euromaidan movement. . . . ”
Joshua Wong–“boy wonder” and darling of the American MSM–has doubled down on affinity with Ukraine: ” . . . . ‘No matter the differences between Ukraine and Hong Kong, our fights for freedom and democracy are the same,’ Joshua Wong told The Kyiv Post in 2019. ‘[W]e have to learn from Ukrainians… and show solidarity. Ukraine confronted the force of Russia — we are facing the force of Beijing.’ . . . .”
The Hong Kong iteration of the OUN/UPA salute has become an anthem. In its coverage of the banning of that song by the Chinese authorities, The New York Times [predictably] fails to discuss the heritage of the slogan/song, nor the nature of the Ukrainian Nazi “troubadours” who brought it to Hong Kong.
In this context, it is important to remember that the National Endowment for Democracy–a U.S. intelligence “cut-out” founded by former CIA director William Casey–has helped finance the “pro-Democracy” forces in Hong Kong.
One of the leading propagandists concerning “mass incarceration of the Uighurs” is Adrian Zenz, a dogmatic End Times Christian, German national and “senior fellow in China studies at the far-right Victims of Communism Memorial Foundation, which was established by the US government in 1983.”
The Victims of Communism Memorial Foundation is an offshoot of the milieu of the OUN/B. ” . . . . an outgrowth of the National Captive Nations Committee, a group founded by Ukrainian nationalist Lev Dobriansky to lobby against any effort for detente with the Soviet Union. Its co-chairman, Yaroslav Stetsko, was a top leader of the fascist OUN‑B militia that fought alongside Nazi Germany during its occupation of Ukraine in World War Two. . . .” A key figure in the Azov Battalion (elements of which were present in Hong Kong) is Roman Zvarych, the personal secretary for Stetsko in the early 1980’s.
” . . . . formerly Yaroslav Stetsko’s private secretary, the U.S.-born Roman Zvarych (1953), represents a younger generation of the Ukrainian émigré community active during the Cold War and a direct link from the ABN to the Azov Battalion. . . . Zvarych participated in the activities of the Anti-Bolshevik Bloc of Nations in the 1980s. . . . In February 2005, after Viktor Yushchenko’s election, Zvarych was appointed Minister of Justice. . . . According to Andriy Biletsky, the first commander of the Azov battalion, a civil paramilitary unit created in the wake of the Euromaidan, Zvarych was head of the headquarters of the Azov Central Committee in 2015 and supported the Azov battalion with ‘volunteers’ and political advice through his Zvarych Foundation. . . .”
Networking with Isa Yusuf Alptekin at the Bandung (Indonesia) conference was Ruzi (or “Ruzy”) Nazar, an Uzbek national who fought in various Third Reich military formations, including the SS Dirlewanger Brigade. After the war, Nazar was a CIA operative networking with the National Action Party (or National Movement Party) of Alparslan Turkes.
Nazar represented the Anti-Bolshevik Bloc of Nations at the 1984 WACL conference in Dallas.
Discussed in numerous programs, the Uighurs (also spelled Uyghurs) are heavily overlapped with various fascist elements. All of these are present in the history of the World Uyghur Congress.
1.–The narco-fascist regime of Chiang Kai-shek.
2.–The Grey Wolves, youth wing of the National Action Party. The group was a key element of the Turkish “Stay Behind” movement.
3.–Various Islamic terrorist offshoots of the Muslim Brotherhood, including Al-Qaeda and the Islamic State.
4.–As seen above, the Anti-Bolshevik Bloc of Nations milieu, directly evolved from the Third Reich and the Gehlen organization.
5.–The SS/CIA/Third Reich milieu of the Dalai Lama.
Of great significance, once again, is the decisive presence of the National Endowment for Democracy, a U.S. intelligence cut-out founded by William Casey.
American and Western media draw on an American regime-change operation for much of their coverage–that organization is the World Uyghur [“Uighur”] Congress and numerous subsidiary elements.
Exemplifying the WUC milieu is Rushan Abas: ” . . . . Another influential organization spun out of the WUC network is the Campaign for Uyghurs. This group is headed by Rushan Abbas, the former Vice President of the UAA. Promoted simply as a Uyghur ‘human rights activist’ by Western media outlets including the supposedly adversarial Democracy Now!, Abbas is, in fact, a longtime US government and military operative. Abbas boasts in her bio of her ‘extensive experience working with US government agencies, including Homeland Security, Department of Defense, Department of State, and various US intelligence agencies.’ While working for the military contractor L3 Technologies, Abbas served the US government and the Bush administration’s so-called war on terror as a ‘consultant at Guantanamo Bay supporting Operation Enduring Freedom.’ Abbas ‘also worked as a linguist and translator for several federal agencies including work for the US State Department in Guantanamo Bay, Cuba and for President George W. Bush and former First Lady Laura Bush’. Like so many of her colleagues, Abbas enjoyed a stint at Radio Free Asia. While Abbas once shared her history of collaboration with the US government in the open, she has attempted to scrub biographic information from her online presence following a disastrous publicity appearance in December 2019. During a Reddit’s ‘Ask Me Anything’ question and answer forum, participants blasted Abbas as a ‘CIA asset’ and frequent US government collaborator, prompting her attempt to disappear her bio from the internet. . . .”
The ostensibly “peaceful’ intent of the WUC can be evaluated against the background of the comments of former WUC Vice-President Seyit Tumturk: ” . . . . In 2018, Tümturk declared that Chinese Uyghurs view Turkish ‘state requests as orders.’ He then proclaimed that hundreds of thousands of Chinese Uyghurs were ready to enlist in the Turkish army and join Turkey’s illegal and brutal invasion of Northern Syria “to fight for God” – if ordered to do so by Erdogan. . . . Shortly after Tumturk’s comments, Uyghur militants dressed in Turkish military fatigues and on the Turkish side of the Syrian border released a video in which they threatened to wage war against China: ‘Listen you dog bastards, do you see this? We will triumph!’ one fighter exclaimed. ‘We will kill you all. Listen up Chinese civilians, get out of our East Turkestan. I am warning you. We shall return and we will be victorious.’ . . .”
“A nation of sheep will beget a government of wolves.”–Edward R. Murrow
This program is an overview of a number of overlapping considerations in the Covid-19 outbreak, which Mr. Emory calls a “Bio-Psy-Op.” These overlapping areas will be presented in a series of programs: FTR #1126 Bio-Psy-Op Apocalypse Now, Part 2: The Democracy-Killing Virus; FTR #1127 Bio-Psy-Op Apocalypse Now, Part 3: The Eugenic Virus; FTR #1128 Bio-Psy-Op Apocalypse Now, Part 4: The Wealth-Concentrating Virus; FTR #1129 Bio-Psy-Op Apocalypse Now, Part 5: Walkin’ the Coronavirus; FTR #1130 Bio-Psy-Op Apocalypse Now, Part 6: Context–The China-Killing Virus; FTR #1131 Bio-Psy-Op Apocalypse, Part 7: Pinchback’s Perspective and FTR #1132 Bio-Psy-Op Apocalypse Now, Part 8: The Nazi Virus.
Before discussing the Covid-19 “op,” per se, we memorialized the brilliant Kevin Coogan, author of “Dreamer of the Day: Francis Parker Yockey and the Postwar Fascist International,” as well as numerous articles. Kevin passed away on 2/27/2020 in New York City. We do not know the cause. Kevin was a brilliant writer and analyst and will be sorely missed.
In For The Record #233, we examined Kevin’s analysis of “The Order,” a fascist/mystical concept that was formulated, in part by fascist mystic Julius Evola. Evola was a dominant philosophical and ideological influence on Steve Bannon, at the epicenter of the anti-China effort. (Mr. Emory misspoke himself–the program is FTR #233, not #312.)
The concept of three-dimensional chess derives from the old “Star Trek” television series, in which the officers played a variation of chess that involved playing on three different levels. Understanding the “Bio-Psy-Op” similarly involves thinking and awareness on at least three levels.
An op-ed column in The New York Times by Bret Stephens goes to the essence of this “bio-psy-op.” ” . . . . The only certainty is that, in the midst of a crisis, politicians are rarely penalized for predicting the worst possible outcome. If it comes to pass, they seem prophetic. If it doesn’t, they take credit for averting catastrophe. In the meantime, they seek to enhance their powers. . . . we might face not a recession but a full-blown depression, which would be financially ruinous for hundreds of millions and have its own disastrous knock-on effects in mental, emotional, and physical health, including for the elderly and sick who already face the greatest risks from the virus. . . .”
Key points of discussion and analysis, which will be developed at much greater length and in much greater detail in the series of programs noted above, including some of the articles which will figure into the analysis:
1.–Exemplifying the profound psychological aspects of the Covid-19 Psy-Op is the phenomenon of the hoarding of toilet paper. Mr. Emory views this as a deep Freudian/anal response to feelings of helplessness on the part of citizens. Toilet paper is of no help against the virus, but is symptomatic of a deep-seated personality dynamic seeking to manifest some measure of social control. This was the subject of a recent New Yorker piece. ” . . . . ‘Controlling cleanliness around B.M.s is the earliest way the child asserts control,’ Andrea Greenman, the president of the Contemporary Freudian Society, said. ‘The fact that now we are all presumably losing control creates a regressive push to a very early time. So, I guess that translates in the unconscious to ‘If I have a lifelong supply of toilet paper, I’ll never be out of control, never be a helpless, dirty child again.’ ’ . . . .”
2.–FTR #1126 Bio-Psy-Op Apocalypse Now, Part 2: The Democracy-Killing Virus: The Covid-19 “op” is leading to the attenuation or elimination of democracy all over the world. In addition to draconian powers proposed by “ex” CIA officer and Attorney General William Barr, Trump has boasted about powers granted to him “that people don’t even know about.” Abroad, fascists and autocrats from Viktor Orban to Narendra Modi are using the Covid-19 outbreak to cement control. Even Great Britain has manifested emergency powers that one critic termed “Eye-Watering.” Civil liberties are taking a beating, with “Pandemic Surveillance” enabling a massive erosion of privacy that is unlikely to abate. There are questions about whether the elections will be held in November. (“Trump Has Emergency Powers We Aren’t Allowed to Know About” by Elizabeth Gotein and Andrew Boyle; The New York Times; 4/10/2020.; “DOJ seeks new emergency powers amid coronavirus pandemic” by Betsy Woodruff Swan; Politico; 03/21/2020; “Exclusive: Inside the Military’s Top Secret Plans If the Coronavirus Cripples Government” by William M. Arkin; Newsweek; 3/18/2020; “Exclusive: U.S. Military Activates Its Never-Before-Used Federal Response to Combat Coronavirus Outbreak” by William M. Arkin; Newsweek; 2/27/2020.; “For Autocrats and Others, Coronavirus Is a Chance to Grab Even More Power” by Selam Gebrikadan; The New York Times; 3/30/2020.; “Media Dissent Fades as Modi Tightens Grip” by Vindu Goel and Jeffrey Gettleman;The New York Times; 4/3/2020.; “Coronavirus Surveillance Is Entering Dystopian Territory” by Eric Lutz; Vanity Fair; 4/9/2020.
3.–FTR #1127 Bio-Psy-Op Apocalypse Now, Part 3: The Eugenic Virus: The disproportionate damage being inflicted by the pandemic on minorities–African-Americans and Latinos in particular, has received considerable discussion. Economically disadvantaged to a considerable extent and subject to the physiological, psychological and behavioral liabilities stemming from that state of affairs, they are more vulnerable to the ravages of the virus. In addition, “social-distancing” is a luxury that many poor people can not afford. Another major consideration concerns the rationing of health care. People with disabilities are afraid they will be shunted “to the back of the line” when it comes time for them to receive proper treatment. The elderly are falling ill and dying all over the world. (“People with Disabilities Are Afraid They Will Be Discriminated Against Because of Coronavirus” by Rick Jervais; USA Today; 3/26/2020.; “Who Should Be Saved First? Experts Offer Medical Guidance” by Austin Frakt; The New York Times; 3/24/2020.; “Early Data Shows African Americans Contracting and Dying of Coronavirus at an Alarming Rate” by Akilah Johnson and Talia Buford; ProPublica; 4/3/2020.; “Social Distancing Is A Privilege” by Charles Blow; The New York Times; 4/5/2020. ; “Scapegoating New York Means Ignoring Its Desperate Need” by Kim Phillips-Fein; The New York Times; 4/5/2020.
4.–FTR #1128 Bio-Psy-Op Apocalypse Now, Part 4: The Wealth-Concentrating Virus: In FTR #‘s 1111 and 1112, among other programs, we spoke of the networking and investing of Steve Bannon, J. Kyle Bass and Tommy Hicks, Jr. Bass, you will recall, is asymmetrically invested with regard to the economies in Hong Kong and China. He has certainly made money, as have many others. With the Federal Reserve estimating unemployment at rates that may reach 32% and economist Paul Krugman opining that this downturn will be three to five times as bad as the 2008 financial collapse, those who do have money will be able to buy up assets at pennies on the dollar. An article in The Guardian discusses hedge fund returns of as much as 4,000+ percent for some firms. The possibility of “insider knowledge” of the coming pandemic suggests itself. It should be noted that J. Kyle Bass made his fortune betting against the subprime housing market. In this program, we will discuss his role in helping to bring down Bear Stearns in the 2008 collapse. A former employee of that ill-fated company, Bass leaked damaging information about Bear Stearns to a Wall Street Journal reporter, thereby precipitating the collapse of the firm. (“Coronavirus job losses could total 47 million, unemployment rate may hit 32%, Fed estimates” by Jeff Cox; CNBC; 03/30/2020; “Hedge funds ‘raking in billions’ during coronavirus crisis” by Rupert Neate Wealth and Jasper Jolly; The Guardian; 04/09/2020.; “WSJ: ‘Twas Kyle Bass that Killed Bear Stearns” by Thornton McEnery; Dealbreaker.com; 3/29/2016 [Updated on 1/14/2019.]; “Nassim Taleb-Advised Universa Tail Fund Returned 3,600% in March” by Erik Schatzker; Bloomberg; 04/08/2020; “How A Goat Farmer Built A Doomsday Machine That Just Booked A 4,144% Return” by Antoine Gara; Forbes; 04/13/2020.
5.–FTR #1129 Bio-Psy-Op Apocalypse Now, Part 5: Walkin’ The Coronavirus: In the Nazi tract Serpent’s Walk–which we have discussed for decades–the SS go underground (which they did), buy into the opinion-forming media (which they did) and, infiltrate the military (which they have done), and, after a terrorist attack by genetically-engineered viruses decimates large parts of the United States, martial law is declared and the Nazis take over. From Serpent’s Walk: “. . . . ‘Yes. Well. ‘Pacov’ stands for ‘Pandemic Communicable Virus,’ one of the uglier results of military experimentation with recombinant DNA. Do you know what that is?’. . . . ‘Very well, let me tell you in layman’s terms.’ Mulder extended a hand to shush Wrench, who had started to speak. ‘Pacov consists of two separate re-workings of two DNA chains of existing viruses. It’s a piggy-back weapon, a two-stage operation. You send in the first stage. The vectors . . . agents of transmission . . . for Pacov‑1 are extensive. It travels through the air, the water, or directly from person-to-person and is highly contagious. It spreads for hundreds of miles, if conditions are optimal. Pacov‑1 produces only a mild, flu-like infection that disappears within a day or two. Public health authorities would overlook it, never consider it a serious epidemic, and even if they did they’d have to look carefully to isolate it. Once a victim is over the ‘flu,’ Pacov‑1 becomes dormant and almost undetectable. A month or two later, you send in the second stage: Pacov‑2 is also a virus, just as contagious as the first, and just as harmless by itself. It reacts with Pacov‑1 to produce a powerful coagulant. . . . you die within three minutes. No warning, no vaccine, no cure. Those not exposed to both stages remain unharmed. . . . Pacov‑2 goes inert, like Pacov‑1 within a week or two. Then you get your victim’s country, all his property, in undamaged condition. . . . and a lot of corpses to bury.’ . . . .”
6.–FTR #1130: Bio-Psy-Op Apocalypse Now, Part 6: Context–the China-Killing Virus: Analyzes the Covid-19 outbreak in the context of the anti-China, full-court press, highlighted in, among other, programs, FTR #‘s 1089 through 1095, 1103, 1104, 1105. (“Unleash the Privateers” by Colonel Mark Cancion (USMC—Retired) and Brandon Schwartz; U.S. Naval Institute Magazine; April 2020 [Vol. 146/2/1,406; “Inside the World Uyghur Congress: The US-backed right-wing regime change network seeking the ‘fall of China’” by Ajit Singh; The Gray Zone; 03/05/2020; “Coronavirus Alarm Blends Yellow Peril and Red Scare” by Joshua Cho; Fairness and Accuracy in Reporting; 3/6/2020.)
7.–FTR #1131 Bio-Psy-Op Apocalypse, Part 7: Pinchback’s Perspective: ” . . . .Baragona was a Nazi from Fort Sill. . . . Garrison also obtained a transcript of a letter written by Ferrie to Baragona. Next to Baragona’s name, Garrison wrote: ‘Note Baragona is important.’ The letter had been sent to Garrison by Glenn Pinchback, and a carbon copy was sent to Mendel Rivers, a congressman from Georgia. (Pinchback worked in the Operations Command at Fort Sill, where he intercepted mail.) In the letter, Ferrie shared his dream of the re-unification of Germany and living in a world where all the currency was in Deutschmarks. Pinchback’s summation of the letter described a ‘Neo-Nazi plot to enslave America in the name of anti-Communism,’ and ‘a neo-Nazi plot gargantuan in scope.’ The Ferrie letter spoke of the need to kill all the Kennedys and Martin Luther King, Jr. . . . Pinchback also reportedly obtained a letter from David Ferrie to Baragona confessing his role in the assassination of Robert Gehrig, who was a Nazi and Fort Sill soldier. . . .”
8.–FTR #1132 Bio-Psy-Op Apocalypse Now, Part 8: The Nazi Virus: This program will synthesize the various aspects of the “Bio-Psy-Op Apocalypse Now” series, demonstrating how the various conceptual components set forth herein constitute a Nazi “Full-Spectrum Dominance.”
This program continues with examination of centrifugal political and geo-political forces at work in the apparently ongoing destabilization of China.
This is a complex topic, involving subjects dealt with at great length in past programs over the years. We recommend using the search function on this website (using quotation marks) to gain a deeper understanding of what Mr. Emory calls “The Earth Island Boogie.”
By the same token, understanding that concept involves obtaining a grasp of Pan-Turkism and some of its manifestations in the Uighur milieu inside China.
This description has links to key programs that will flesh out the listeners’ understanding.
We begin an analysis of the use of the Turkophone, Muslim Uighurs as a destabilizing element in China’s mineral and petroleum-rich Xinjiang semiautonomous region.
Linked to Al-Qaeda, the Muslim Brotherhood and contributing to the jihadist milieu in Syria, the Uighurs also figure into the Pan-Turkist milieu covered in, among other programs: AFA #14, as well as FTR #‘s 720, 723, 819, 857, 862, 863, 878, 879, 884, 885, 886, 911.
Note that the geographical focal point of the Uighur separatist/jihadist activity not only encompasses mineral and resource-rich Xinjiang province, but lies in the area China has designated as an important area for their “Belt and Road Initiative.” That initiative is a program designed to build rail connections across what is known as “The Earth Island,” a project which appears to entail deep alarm on the part of interests in the West.
” . . . . The Uighur separatist spectrum is overlapped by the Uighur jihadi milieu, who link the issue of Xinjiang’s secession from China to that of forming a Salafist theocracy. Uighur jihadis have long since expanded their radius of actions beyond China’s borders. This first drew public attention, when it was reported that, in ‘the war on terror,’ which began in 2002, the United States had been holding more than 20 Uighurs in their torture chambers at Guantanámo. The last of the prisoners were released only in late 2013. Uighur jihadis have long since expanded beyond their Afghanistan engagement to other regions of the world. . . . Uighur jihadis’ activities have also been registered in other Southeast Asian countries, such as Malaysia and Indonesia — from where quite a few continue on to Turkey, to support the IS or al Qaeda. Last year, China had estimated that up to 300 Uighurs are fighting in the ranks of IS, while Syrian government officials set the figures at up to 5,000 Uighurs who are operating in various jihadi militias in Syria. Regardless of the accuracy of these estimates, experts are certain that a large contingent of Uighur militias are fighting within the ranks of IS and al Qaeda. An analysis published by the International Center for Counter-Terrorism in The Hague warns that the Uighur jihadi threat is largely underestimated in the West.[9] . . . . For China, this terrorism is that much more serious, because Xinjiang is a strategically important region. That autonomous region comprises central sectors of the ‘New Silk Road’ (‘Belt and Road Initiative,’ BRI) project, currently Beijing’s most important foreign policy mega-project. Unrest in Xinjiang threatens not only the People’s Republic of China’s domestic tranquility, but also its rise in world policy. This unrest is being systematically fanned from abroad. Turkey, under President Recep Tayyip Erdoğan has assumed a prominent role. While still mayor of Istanbul and long before becoming Turkey’s president, Erdoğan had declared that ‘East Turkestan is not only the homeland of the Turkic peoples, but also the cradle of Turkic history, civilization, and culture. The martyrs of East Turkestan are our martyrs.’[10] Uighur jihadis have regularly used Turkey as a safe haven. In his talk with german-foreign-policy.com, the German expert on intelligence services, Erich Schmidt-Eenboom confirmed that Ankara’s intelligence service has repeatedly ‘sought to support secessionist attempts’ in Xinjiang.[11] . . . .”
The Uighur/Al Qaeda/Muslim Brotherhood/jihadist milieu is also discussed in, among other programs, FTR #‘s 348, 549, 550, 615.
Next, we detail the long history of NATO and related elements using the Uighurs to destabilize China, with Germany as an epicenter of Uighur activity.
We review the terrorism against members of the Han Chinese majority in Xinjiang by Uighurs.
” . . . . Already since the 1990s, Xinjiang has been faced with terrorist attacks by members of the Turkic-speaking Uighur minority, fighting to secede this autonomous region from China, to found “East Turkestan.” Some seek an eventual fusion with the Turkic-speaking countries of Central Asia. The attacks that became known in the West included a Uighur terrorist attack at a coal mine in Xinjiang in September 2015. The assailants deliberately targeted non-Turkic-speaking workers — especially those of China’s majority Han population — slaughtering them with long knives. According to western media reports, at least 50 people died in the attack.[7] March 1, 2014 eight Uighur terrorists armed also with knives attacked civilian travelers in a train station of Kunming, the capital of Yunnan Province, killing 31 and wounding around 150, some seriously. There have also been recurring pogroms targeting Han Chinese. For example, in July 2009, several thousand Uighur in Xinjiang’s capital, Urumqi, attacked Han Chinese. According to official figures, 197 people were killed; however, observers calculate the actual body count to be much higher. . . . ”
As highlighted in, among other programs, FTR #‘s 547, 548, 549, 550, the Uighurs are part of a centripetal destabilization effort against China, utilizing the Dalai Lama’s SS-linked milieu, elements of CIA, and the Hapsburg-controlled UNPO to effect the partial dismemberment of that country.
We conclude with discussion about the Hong Kong Shanghai Banking Corporation. A major British bank, the growth of its largesse was inextricably linked with the opium trade Britain forced on China through the Opium Wars.
The bank perpetuated it’s involvement with major narcotics trafficking, laundering funds for contemporary drug cartels.
Ultimately, the bank became a vehicle for the financing of elements of Al-Qaeda and jihadism. We wonder if perhaps jihadist elements of the Uighurs may be receiving funding through the institution?
We begin with an excerpt of a New York Times article what epitomizes the propagandized and unintentionally ironic tone of our media with regard to China.
The article mocks the Chinese assertion that the U.S. is involved with unrest with Hong Kong, remarking that China ” . . . . has a long history of blaming ‘foreign forces’ for challenges it has faced internally. . . .” This comes from the publication that has unwaveringly flogged the “Russia-Gate” nonsense.
The article also pooh-poohs Chinese assertion that the National Endowment for Democracy was working with the CIA to sponsor unrest in Hong Kong.
In FTR #s 1091 and 1092, we noted the involvement of the National Endowment for Democracy with key players in the Hong Kong drama, as well as their networking with major U.S. politicians, including Mike Pence and Mike Pompeo.
In past programs, we have discussed the National Endowment For Democracy, a “kinder, gentler” U.S. intelligence manifestation.
NED has supplemented the decades-old tradition of CIA destabilization and overthrow of governments that the U.S. views with a jaundiced eye.
The Chinese analysis of the role of the NED is accurate. “. . . . One of the NED co-founders, Allen Weinstein, explained its purpose to the Washington Post: ‘A lot of what we do today was done covertly 25 years ago by the CIA.’ . . . . ”
Next, we examine an informative post from German Foreign Policy, which notes that pending legislation in the U.S. Congress would economically damage U.S. and German commercial interests, as well as hurting Hong Kong’s economy.
We conclude with a topic we have covered before and will explore at greater length in our next broadcast. We begin an analysis of the use of the Turkophone, Muslim Uighurs as a destabilizing element in China’s mineral and petroleum-rich Xinjiang semiautonomous region.
Linked to Al-Qaeda, the Muslim Brotherhood and contributing to the jihadist milieu in Syria, the Uighurs also figure into the Pan-Turkist milieu covered in, among other programs: AFA #14, as well as FTR #‘s 720, 723, 819, 857, 862, 863, 878, 879, 884, 885, 886, 911.
The Uighur/Al Qaeda/Muslim Brotherhood/jihadist milieu is discussed in, among other programs, FTR #‘s 348, 549, 550, 615.
Continuing our look at global fascism, we visit Hong Kong and (by extension) China, where an intelligence community destabilization effort is underway. That effort is utilizing Islamic fascists in the Uighur community in Xinjiang Province and the Falun Gong, a fascist mind control cult that has developed close operational links with the Trump administration, Steve Bannon and the Broadcasting Board of Governors (a CIA “derivative.”)
Beginning our sojourn in Hong Kong, we review the prevalence of the Pepe the Frog icon in the Hong Kong protests. “The New York Times’ ” disclaimer that the protesters are not “alt-right” should be seen in perspective.
With Steve Bannon at the epicenter of the anti-China movement, Pepe’s presence in Hong Kong is not surprising.
Note Bannon and company’s networking with the Falun Gong cult.
In our long series predicated on Yasha Levine’s “Surveillance Valley,” we noted the Internet Freedom movement and its fundamental position as part of the intelligence community’s “soft power” propaganda and regime change arsenal.
Yasha Levine sums up the fundamental contradictions inherent in this dynamic: ” . . . . If you stepped back to survey the scene, the entire landscape of this new Internet Freedom privacy movement looked absurd. Cold War-era organizations spun off from the CIA now funding the global movement against government surveillance? Google and Facebook, companies that ran private surveillance networks and worked hand in hand with the NSA, deploying government-funded privacy tech to protect their users from government surveillance? Privacy activists working with Silicon Valley and the US government to fight government surveillance—and with the support of Edward Snowden himself? . . . .”
In China, Falun Gong is among the recipients of Broadcasting Board of Governors money. Recall that the BBG is a CIA “derivative.”: ” . . . .It also funded several small outfits run by practitioners of Falun gong, a controversial Chinese anticommunist cult banned in China whose leader believes that humans are being corrupted by aliens from other dimensions and that people of mixed blood are subhumans and unfit for salvation. . . . ”
After excerpting a puff piece that lionizes Falun Gong in their struggles with the Chinese, we highlight the beliefs of the organization.
The Falun Gong teaches that: post menopausal women can regain menstruation, considered mandatory for spiritual evolution; gays are demonized; mixed race people are demonized; cult members are discouraged from seeking modern medical treatment; space aliens are inhabiting human bodies and are responsible for modern technology such as airplanes and computers; tiny beings are said to be invading human bodies and causing “bad karma;” master Li Hongzhi knows the secrets of the universe; master Li Hongzhi can levitate and walk through walls; master Li Hongzhi can install a physical “Falun”–swastika–in the abdomen of followers which revolves in various directions; Falun Gong teaching demonizes feminists and popular music; there will be a “Judgement Day” on which communists and others deemed unworthy by master Li Hongzhi will be neutralized.
We conclude with part of an article which will be presented and analyzed at greater length in our next program.
Falun Gong–largely through its Epoch Times newspaper–has established a major social media presence and is a key ally of President Trump’s re-election effort: “. . . . In April, at the height of its ad spending, videos from the Epoch Media Group, which includes The Epoch Times and digital video outlet New Tang Dynasty, or NTD, combined for around 3 billion views on Facebook, YouTube and Twitter, ranking 11th among all video creators across platforms and outranking every other traditional news publisher, according to data from the social media analytics company Tubular. That engagement has made The Epoch Times a favorite of the Trump family and a key component of the president’s re-election campaign
In this program, we resume discussion and analysis of the consummately important recent book Surveillance Valley: The Secret Military History of the Internet by Yasha Levine. In the previous program, we noted, among other points of analysis, the decisive role of Eddie “The Friendly Spook” Snowden in promoting the intelligence-agency crafted Tor network.
In addition to Tor, the Open Technology Fund (read “CIA”) helped finance the Signal app for mobile phones. It, too, is fundamentally compromised. ” . . . . . . . . The Tor project remained the best-known privacy app funded by the Open Technology Fund, but it was quickly joined by another: Signal, an encrypted mobile phone messaging app for the iPhone and Android. . . .”
Not surprisingly, the CIA’s Eddie “The Friendly Spook” Snowden was a big promoter of Signal, as well as Tor: ” . . . . People at the ACLU claimed that Signal made federal agents weep. The Electronic Frontier Foundation added Signal alongside Tor to its Surveillance Self-Defense guide. Fight for the Future, a Silicon Valley-funded privacy activist organization, described Signal and Tor as ‘NSA-proof’ and urged people to use them. Edward Snowden was the combo’s biggest and most famous booster and repeatedly took to Twitter to tell his three million followers that he used Signal and Tor every day, and that they should do the same to protect themselves from government surveillance. ‘Use Tor, Use Signal,’ he tweeted out.
“With endorsements like these, Signal quickly became the go-to app for political activists around the world. Egypt, Russia, Syria, and even the United States—millions downloaded Signal, and it became the communication app of choice for those who hoped to avoid police surveillance. Feminist collectives, anti-President Donald Trump protesters, communists, anarchists, radical animal rights organizations, Black Lives Matter activists—all flocked to Signal. Many were heeding Snowden’s advice: ‘Organize. Compartmentalize to limit compromise. Encrypt everything, from calls to texts (use Signal as a first step.)’ . . . .”
Yasha Levine sums up the fundamental contradictions inherent in this dynamic: ” . . . . If you stepped back to survey the scene, the entire landscape of this new Internet Freedom privacy movement looked absurd. Cold War-era organizations spun off from the CIA now funding the global movement against government surveillance? Google and Facebook, companies that ran private surveillance networks and worked hand in hand with the NSA, deploying government-funded privacy tech to protect their users from government surveillance? Privacy activists working with Silicon Valley and the US government to fight government surveillance—and with the support of Edward Snowden himself? . . . .”
Following Snowden’s promotion of OTF’s Tor and Signal technologies, OTF was at a zenith: ” . . . . After Edward Snowden, OTF was triumphant. It didn’t mention the leaker by name in its promotional materials, but it profited from the crypto culture he promoted and benefited from his direct endorsement of the crypto tools it financed. It boasted that its partnership with both Silicon Valley and respected privacy activists meant that hundreds of millions of people could use the privacy tools the US government had brought to market. And OTF promised that this was just a start: ‘By leveraging social network effects, we expect to expand to a billion regular users taking advantage of OTF-supported tools and Internet Freedom technologies by 2015. . . .’
As eventually became clear, the Tor network was easily breached. It is a safe bet that the fascists grouped around the Pirate Bay site (on which WikiLeaks held forth), had breached Tor’s “secrecy,” in addition to the obvious fact that intelligence services could penetrate it at will.
With this in mind, John Young’s rumination about WikiLeaks sound more and more substantive.
In all probability, WikiLeaks was a huge data mining operation both by the very intelligence agencies who were ostensibly targeted by WikiLeaks, and the Fascist International network around Carl Lundstrom, Daniel Friberg, David Duke et al.
In FTR #‘s 756 and 831 we noted Snowden’s fascist views and connections. Levine merely characterizes him as a “right-wing libertarian,” but there is MUCH MORE TO IT THAN THAT!
Snowden downplayed the fundamental role of the Big Tech firms in aiding and abetting government surveillance, in addition to their own massive surveillance and resultant data mining. ” . . . . There, while living under state protection at an undisclosed location in Moscow, he swept Silicon Valley’s role in Internet surveillance under the rug. Asked about it by Washington Post reporter Barton Gellman, who had first reported on the NSA’s PRISM program, Snowden shrugged off the danger posed by companies like Google and Facebook. The reason? Because private companies do not have the power to arrest, jail, or kill people. ‘Twitter doesn’t put warheads on foreheads,’ he joked. . . .”
Embodying his “corporatist” and Technocratic Fascist point of view, Snowden championed the Big Tech firms as bulwarks against government Internet surveillance, despite the only-too-obvious fact (reinforced by the documents he leaked) that Big Tech is–and always has been–in bed with, and actively collaborating with, the very government intelligence agencies conducting that surveillance: ” . . . . The only islands of safety were the private data centers controlled by private companies—Google, Apple, Facebook. These were the cyber-fortresses and walled cities that offered sanctuary to the masses. In this chaotic landscape, computer engineers and cryptographers played the role of selfless galloping knights and wizard-warriors whose job was to protect the weak folk of the Internet: the young, the old and infirm, families. It was their duty to ride out, weapons aloft, and convey people and their precious data safely from fortress to fortress, not letting any of the information fall into the hands of government spies. He called on them to start a people’s privacy war, rallying them to go forth and liberate the Internet, to reclaim it from the governments of the world. . . .”
The nauseating head of Facebook–Mark Zuckerberg–has decried the intelligence community’s use of the Internet for data mining. In FTR #1077, we highlighted the Cambridge Analytica affair, and Facebook’s full cooperation with that project at every turn.
Other Big Tech firms had similar reactions. “. . . . . ‘We hadn’t even heard of PRISM before yesterday,’ Mark Zuckerberg wrote in a Facebook post. He blamed the government and positioned Facebook as a victim. “I’ve called President Obama to express my frustration over the damage the government is creating for all of our future. Unfortunately, it seems like it will take a very long time for true full reform.’ Apple, Microsoft, Google, and Yahoo! All reacted in much the same way, denying the allegations and painting themselves as the victims of government overreach. ‘It’s tremendously disappointing that the government sort of secretly did all this stuff and didn’t tell us. We can’t have a democracy if we’re having to protect you and our users from the government,’ Larry Page told Charlie Rose in an interview on CBS. . . . .”
We present the conclusion of the main part of the book, with Levine’s summation of the inextricable nature and symbiosis between the Internet, the tech firms and the so-called “privacy community.”
The key points of discussion and analysis of Levine’s book (as a whole) include:
1.–The Internet is a weapon, developed for counter-insurgency purposes.
2.–Big Tech firms network with the very intelligence services they publicly decry.
3.–Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which the Internet is predicated.
4.–The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect.
5.–The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect.
6.–The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose.
7.–Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.
NB: Mr. Levine does not go into the fascistic character of Snowden, Assange, Greenwald et al. Some of those shows: Greenwald–FTR #888, Snowden–FTR #‘s 756, 831, Assange and WikiLeaks–FTR #‘s 732, 745, 755, 917.
“. . . . Then there was the fact that Signal ran on Amazon’s servers, which meant that all its data were available to a partner in the NSA’s PRISM surveillance program. Equally problematic, Signal needed Apple and Google to install and run the app on people’s mobile phones. Both companies were, and as far as we know still are, partners in PRISM as well. ‘Google usually has root access to the phone, there’s the issue of integrity,’ writes Sander Venema, a respected developer and secure—technology trainer, in a blog post explaining why he no longer recommends people use Signal for encrypted chat. ‘Google is still cooperating with the NSA and other intelligence agencies. PRISM is also still a thing. I’m pretty sure that Google could serve a specially modified update or version of Signal to specific target for surveillance, and they would be none the wiser that they installed malware on their phones.’ . . .
. . . . So, although the app encrypted the content of people’s messages, it also marked them with a flashing red sign: ‘Follow Me, I Have Something to Hide.’ (Indeed, activists protesting at the Democratic National Convention in Philadelphia in 2016 told me that they were bewildered by the fact that police seemed to know and anticipate their every move despite their having used Signal to organize. . . .”
” . . . . For many Internet companies, including Google and Facebook, surveillance is the business model. It is the base on which their corporate and economic power rests. Disentangle surveillance and profit, and these companies would collapse. Limit data collection, an the companies would see investors flee and their stock prices plummet. [Italics are mine–D.E.]
“Silicon Valley fears a political solution to privacy. Internet Freedom and crypto offer an acceptable alternative. Tools like Signal and Tor provide a false solution to the privacy problem, focusing people’s attention on government surveillance and distracting them from the private spying carried out by the Internet companies they use every day. All the while, crypto tools give people a [false] sense that they’re doing something to protect themselves, a feeling of personal empowerment and control. And all those crypto radicals? Well, they just enhance the illusion, heightening the impression of risk and danger. With Signal or Tor installed, using an iPhone or Android suddenly becomes edgy and radical. So instead of pushing for political and democratic solutions to surveillance, we outsource our privacy politics to crypto apps–software made by the very same powerful entities that these apps are supposed to protect us from. . . .”
Continuing with our examination of Yasha Levine’s seminal volume Surveillance Valley, we continue our analysis of the individuals, institutions and technologies central to the so-called “online privacy” effort. The Tor Project, the Electronic Frontier Foundation, the Broadcasting Board of Governors and its Open Technology Fund and Jacob Appelbaum are all the opposite of what they have been represented as being.
We begin with information overlapped from our last program, highlighting how Jacob Appelbaum and the Tor network hooked up with WikiLeaks.
Tor, Appelbaum, Assange and WikiLeaks:
1.–Became increasingly intertwined, enjoying accolades from many, apparently unsuspecting, groups: ” . . . . His [Appelbaum’s] association with WikiLeaks and Assange boosted the Tor Project’s public profile and radical credentials. Support and accolades poured in from journalists, privacy organizations, and government watchdogs. The American Civil Liberties Union partnered with Appelbaum on an Internet privacy project, and New York’s Whitney Museum—one of the leading modern art museums in the world—invited him for a ‘Surveillance Teach-In.’ The Electronic Frontier Foundation gave Tor its Pioneer Award, and Roger Dingledine made in on Foreign Policy magazine’s Top 100 Global Thinkers for protecting ‘anyone and everyone from the dangers of Big Brother.’ . . . .”
2.– Differed fundamentally from the accepted text: ” . . . . With Julian Assange endorsing Tor, reporters assumed that the US government saw the anonymity nonprofit as a threat. But internal documents obtained through FOIA from the Broadcasting Board of Governors, as well as analysis of Tor’s government contracts paint a different picture. They reveal that Appelbaum and Dingledine worked with Assange on securing WikiLeaks with Tor since late 2008 and that they kept their handlers at the BBG informed about their relationship and even provided information about the inner workings of WikiLeaks’s secure submission system. . . .”
3.–Did not adversely affect the government funding of Tor at all, as might be expected by the superficial apparent reality of the situation: ” . . . . Perhaps most telling was that support from the BBG [read “CIA”–D.E.] continued even after WikiLeaks began publishing classified government information and Appelbaum became the target of a larger Department of Justice investigation into WikiLeaks. For example, on July 31, 2010, CNET reported that Appelbaum had been detained at the Las Vegas airport and questioned about his relationship with WikiLeaks. News of the detention made headlines around the world, once again highlighting Appelbaum’s close ties to Julian Assange. And a week later, Tor’s executive director Andrew Lewman, clearly worried that this might affect Tor’s funding, emailed Ken Berman at the BBG in the hopes of smoothing things over and answering ‘any questions you may have about the recent press regarding Jake and WikiLeaks.’ But Lewman was in for a pleasant surprise: Roger Dingledine had been keeping folks at the BBG in the loop, and everything seemed to be okay. ‘Great stuff, thx. Roger answered a number of questions when he met us this week in DC,’ Berman replied. . . .”
4.–” . . . . In 2011 contracts came in without a hitch–$150,000 from the Broadcasting Board of Governors and $227,118 from the State Department. Tor was even able to snag a big chunk of money from the Pentagon: a new $503,706 annual contract from the Space and Naval Warfare Systems Command, an elite information and intelligence unit that houses a top-secret cyber-warfare division.The Navy was passed through SRI, the old Stanford military contractor that had done counterinsurgency, networking, and chemical weapons work for ARPA back in the 1960s and 1970s. The funds were part of a larger Navy ‘Command, Control, Communcations, Computers, Intelligence, Surveillance, and Reconnaissance’ program to improve military operations. A year later, Tor would see its government contracts more than double to $2.2 million: $353,000 from the State Department, $876,099 from the US Navy, and $937,800 from the Broadcasting Board of Governors. . . .”
In this context, we recall some earlier observations about WikiLeaks. John Young, one of WikiLeaks’ founders turned critic of the organization harbors deep suspicions concerning the group. ” . . . they’re acting like a cult. They’re acting like a religion. They’re acting like a government. They’re acting like a bunch of spies. They’re hiding their identity. They don’t account for the money. They promise all sorts of good things. They seldom let you know what they’re really up to. . .There was suspicion from day one that this was entrapment run by someone unknown to suck a number of people into a trap. So we actually don’t know. But it’s certainly a standard counterintelligence technique. And they’re usually pretty elaborate and pretty carefully run. They’ll even prosecute people as part of the cover story. That actually was talked about at (Sunday’s) panel. They’ll try to conceal who was informing and betraying others by pretending to prosecute them. . . .” The Tor/Appelbaum/BBG (read “CIA”)/WikiLeaks nexus may very well be proof of Young’s suspicions.
Appelbaum, WikiLeaks and Tor became fundamental to the operations of Eddie “The Friendly Spook” Snowden. In past discussion, we have noted that in the summer of 2009, when Snowden made his decision to disclose the NSA documents, he was working for the very same CIA from which the Broadcasting Board of Governors and its Open Technology Fund were derived. Jacob Appelbaum was funded by BBG, as was Tor. ” . . . . From the start, the Tor Project stood at the center of Snowden’s story. The leaker’s endorsement and promotion introduced the project to a global audience, boosting Tor’s worldwide user base from one million to six million almost overnight and injecting it into the heart of a burgeoning privacy movement. In Russia, where the BBG and Dingledine had tried but failed to recruit activists for their Tor deployment plan, use of the software increased from twenty thousand daily connections to somewhere around two hundred thousand.
“During a promotional campaign for the Tor Project, Snowden said: ‘Without Tor, the streets of the Internet become like the streets of a very heavily surveilled city. There are surveillance cameras everywhere, and if the adversary simply takes enough time, they can follow the tapes back and see everything you’ve done. With Tor, we have private spaces and private lives, where we can choose who we want to associate with and how, without the fear of what that is going to look like if it is abused. The design of the Tor system is structured in such a way that even if the US Government wanted to subvert it, it couldn’t.’ Snowden didn’t talk about Tor’s continued government funding, nor did he address an apparent contradiction: why the US government would fund a program that supposedly limited its own power. Whatever Snowden’s private thought on the matter, his endorsement gave Tor the highest possible seal of approval. It was like a Hacker’s Medal of Valor. With Snowden’s backing, no one even thought to question Tor’s radical antigovernment bona fides. . . .”
Next, we review information about the so-called “Arab Spring.” In FTR #‘s 733 through 739, we presented our view that the so-called Arab Spring was a U.S. intelligence operation, aimed at placing the Brotherhood in power in Muslim countries dominated either by a secular dictator or absolute monarchy.
Yasha Levine has highlighted the role of U.S. tech personnel in training and prepping the Arab Spring online activists. As we have noted in the past, the so-called Arab Spring might have been better thought of as “The Muslim Brotherhood Spring,” as the neo-liberal, privatization ideology of Brotherhood economic icon Ibn Khaldun was fundamental to the operation.
The economic goals of the Arab Spring “op” were reviewed in, among other programs, FTR #‘s 1025 and 1026.
Recall while reading the following excerpts of this remarkable and important book, that:
1.–The Tor network was developed by, and used and compromised by, elements of U.S. intelligence.
2.–One of the primary advocates and sponsors of the Tor network is the Broadcasting Board of Governors. As we saw in FTR #‘s 891, 895, is an extension of the CIA.
3.–Jacob Appelbaum has been financed by the Broadcasting Board of Governors, advocates use of the Tor network, has helped WikiLeaks with its extensive use of the Tor network, and is an ideological acolyte of Ayn Rand.
The Arab Spring provided motivation for enhanced U.S. funding for Internet Freedom. The Open Technology Fund, like the BBG a CIA “derivative,” was at the center of this: ” . . . . The motivation for this expansion came out of the Arab Spring. The idea was to make sure the US government would maintain its technological advantage in the censorship arms race that began in the early 2000s, but the funds were also going into developing a new generation of tools aimed at leveraging the power of the Internet to help foreign opposition activists organize into cohesive political movements. The BBG’s $25.5 million cut of the cash more than doubled the agency’s anticensorship technology budget from the previous year, and the BBG funneled the money into the Open Technology Fund, a new organization it had created within Radio Free Asia to fund Internet Freedom technologies in the wake of the Arab Spring. . . .”
The fundamental position of BBG and OTF (read “CIA”) to the so-called online privacy community was concisely expressed by Yasha Levine: ” . . . . From behind this hip and connected exterior, BBG and Radio Free Asia built a vertically integrated incubator for Internet Freedom technologies, pouring millions into projects big and small, including everything from evading censorship to helping political organizing, protests, and movement building. With its deep pockets and its recruitment of big-name privacy activists, the Open Technology Fund didn’t just thrust itself into the privacy movement. In many ways, it WAS the privacy movement. . . .”
Yasha Levine’s summation of the inextricable nature and symbiosis between the Internet, the tech firms and the so-called “privacy community” include:
1.–The Internet is a weapon, developed for counter-insurgency purposes.
2.–Big Tech firms network with the very intelligence services they publicly decry.
3.–Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which the Internet is predicated.
4.–The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect.
5.–The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect.
6.–The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose.
7.–Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.
After detailing the history of the development of the Internet by the national security establishment, Levine presents the story of the development of the Tor network.
Key points of analysis and discussion:
1.–Tor’s Silicon Valley backing: ” . . . . Privacy groups funded by companies like Google and Facebook, including the Electronic Frontier Foundation and Fight for the Future, were some of Tor’s biggest and most dedicated backers. Google had directly bankrolled its development, paying out generous grants to college students who worked at Tor during their summer vacations. Why would an Internet company whose entire business rested on tracking people online promote and help develop a powerful privacy tool? Something didn’t add up. . . .”
2.–Not surprisingly, Tor does not shield users from orgiastic data mining by Silicon Valley tech giants: ” . . . . Tor works only if people are dedicated to maintaining a strict anonymous Internet routine: using only dummy email addresses and bogus accounts, carrying out all financial transactions in Bitcoin and other cryptocurrencies, and never mentioning their real name in emails or messages. For the vast majority of people on the Internet—those who use Gmail, interact with Facebook friends, and shop on Amazon—you reveal your identity. These companies know who you are. They know your name, your shipping address, your credit card information. They continue to scan your emails, map your social networks, and compile dossiers. Tor or not, once you enter your account name and password, Tor’s anonymity technology becomes useless. . . .”
3.–Silicon Valley’s support for Tor is something of a “false bromide”: ” . . . . After all, Snowden’s leaked documents revealed that anything Internet companies had, the NSA had as well. I was puzzled, but at least I understood why Tor had backing from Silicon Valley: it offered a false sense of privacy, while not posing a threat to the industry’s underlying surveillance model. . . .”
4.–Tor is, in fact, financed by elements of the very same intelligence community and national security establishment that supposedly frustrated/“locked out” by Tor! ” . . . . But as I analyzed the organization’s financial documents, I found that the opposite was true. Tor had come out of a joint US Navy—DARPA military project in the early 2000s and continued to rely on a series of federal contracts after it was spun off into a private nonprofit. This funding came from the Pentagon, the State Department, and at least one organization that derived from the CIA. These contracts added up to several million dollars a year and, most years, accounted for more than 90 percent of Tor’s operating budget. Tor was a federal military contractor. It even had its own federal contracting number. . . This included Tor’s founder, Roger Dingledine, who spent a summer working at the NSA and who had brought Tor to life under a series of DARPA and Navy contracts. . . .”
Widely regarded as a champion of Internet freedom and privacy, the Electronic Frontier Foundation helped finance Tor and championed its use.
Key elements of discussion and analysis of the EFF/Tor alliance include:
1.–EFF’s early financing of Tor: ” . . . . . . . . In 2004, [Roger] Dingledine struck out on his own, spinning the military onion routing project into a non-profit corporation called the Tor Project and, while still funded by DARPA and the Navy, began scratching around for private funding. He got help from an unexpected ally: the Electronic Frontier Foundation (EFF), which gave Tor almost a quarter million dollars to keep it going while Dingledine looked for other private sponsors. The EFF even hosted Tor’s website. . . .”
2.–The EFF’s effusive praise for the fundamentally compromised Tor Project: ” . . . . ‘The Tor Project is a perfect fit for EFF, because one of our primary goals is to protect the privacy and anonymity of Internet users. Tor can help people exercise their First Amendment right to free, anonymous speech online.’ EFF’s technology manager Chris Palmer explained in a 2004 press release, which curiously failed to mention that Tor was developed primarily for military intelligence use and was still actively funded by the Pentagon. . . .”
3.–The EFF’s history of working with elements of the national security establishment: ” . . . . In 1994, EFF worked with the FBI to pass the Communications Assistance for Law Enforcement Act, which required all telecommunications companies to build their equipment so that it could be wiretapped by the FBI. In 1999, EFF worked to support NATO’s bombing campaign in Kosovo with something called the ‘Kosovo Privacy Support,’ which aimed to keep the region’s Internet access open during military action. Selling a Pentagon intelligence project as a grassroots privacy tool—it didn’t seem all that wild. . . .”
4.–In FTR #854, we noted that EFF co-founder John Perry Barlow was far more than a Grateful Dead lyricist/hippie icon: ” . . . . Indeed, in 2002, a few years before it funded Tor, EFF cofounder [John] Perry Barlow casually admitted that he had been consulting for intelligence agencies for a decade. It seemed that the worlds of soldiers, spies, and privacy weren’t as far apart as they appeared. . . .”
5.–EFF’s gravitas in the online privacy community lent Tor great credibility: ” . . . . EFF’s support for Tor was a big deal. The organization commanded respect in Silicon Valley and was widely seen as the ACLU of the Internet Age. The fact that it backed Tor meant that no hard questions would be asked about the anonymity tool’s military origins as it transitioned to the civilian world. And that’s exactly what happened. . . .”
In FTR #‘s 891 and 895, we noted the primary position of the Broadcasting Board of Governors in the development of the so-called “privacy” networks. The BBG is a CIA offshoot: “. . . . The BBG might have had a bland sounding name and professed a noble mission to inform the world and spread democracy. In truth, the organization was an outgrowth of the Central Intelligence Agency. . . . The bulk of the BBG is no longer funded from the CIA’s black budget, but the agency’s original cold War goal and purpose—subversion and psychological operations directed against countries deemed hostile to US interests—remain the same. The only thing that did change about the BBG is that today, more of its broadcasts are taking place online . . . .”
After documenting Radio Free Europe’s growth from the Nazi/Vichy run Radio France during World War II and RCA’s David Sarnoff’s involvement with the Transradio Consortium (which communicated vital intelligence to the Axis during the war), the program highlights the involvement of Gehlen operatives in the operations of Radio Free Europe, the seminal CIA broadcasting outlets.
The BBG (read “CIA”) became a major backer of the Tor Project: ” . . . . . . . . It was Wednesday morning, February 8, 2006, when Roger Dingledine got the email he had been badly waiting for. The Broadcasting Board of Governors had finally agreed to back the Tor Project. . . . Within a year, the agency increased Tor’s contract to a quarter million dollars, and then bumped it up again to almost a million just a few years later. The relationship also led to major contracts with other federal agencies, boosting Tor’s meager operating budget to several million dollars a year. . . .”
Yasha Levine sums up the essence of the Tor Project: ” . . . . The Tor Project was not a radical indie organization fighting The Man. For all intents and purposes, it was The Man. Or, at least, The Man’s right hand. . . . internal correspondence reveals Tor’s close collaboration with the BBG and multiple other wings of the US government, in particular those that dealt with foreign policy and soft-power projection. Messages describe meetings, trainings, and conferences with the NSA, CIA, FBI and State Department. . . . The funding record tells the story even more precisely. . . . Tor was subsisting almost exclusively on government contracts. By 2008, that included contracts with DARPA, the Navy, the BBG, and the State Department as well as Stanford Research Institute’s Cyber-Threat Analytics program. . . .”
Next, we begin chronicling the career of Jacob Appelbaum. A devotee of Ayn Rand, he became one of Tor’s most important employees and promoters. “. . . . Within months of getting the job, he assumed the role of official Tor Project spokesman and began promoting Tor as a powerful weapon against government oppression. . . . Over the next several years, Dingledine’s reports back to the BBG [read “CIA”–D.E.] were filled with descriptions of Appelbaum’s successful outreach. . . .”
Introducing a topic to be more fully explored in our next program, we note Appelbaum’s pivotal role in the WikiLeaks operation and his role in the adoption of Tor by WikiLeaks: ” . . . . Appelbaum decided to attach himself to the WikiLeaks cause. He spent a few weeks with Assange and the original WikiLeaks crew in Iceland as they prepared their first major release and helped secure the site’s anonymous submissions system using Tor’s hidden service feature, which hid the physical location of WikiLeaks servers and in theory made them much less susceptible to surveillance and attack. From then on, the WikiLeaks site proudly advertised Tor: ‘secure, anonymous, distributed network for maximum security.’ . . . . Appelbaum did his best to be Assange’s right-hand man. He served as the organization’s official American representative and bailed the founder of WikiLeaks out of tough spots when the heat from US authorities got too hot. Appelbaum became so intertwined with WikiLeaks that apparently some staffers talked about him leading the organization if something were to happen to Assange. . . . Assange gave Appelbaum and Tor wide credit for helping WikiLeaks. ‘Jake has been a tireless promoter behind the scenes of our cause,’ he told a reporter. ‘Tor’s importance to WikiLeaks cannot be underestimated.’ With those words, Appelbaum and the Tor Project became central heroes in the WikiLeaks saga, right behind Assange. . . .”
Recent Comments