Introduction: Bringing up to date a number of points of inquiry, the program details the profound role of Peter Thiel’s professional orbit in the make-up of Team Trump.
Profoundly influenced by the writings and views of Third Reich theoretician Carl Schmitt, Thiel is at least as well-positioned as former PayPal buddy Elon Musk to profit from the incoming Trump administration.
Of particular significance is the ABN milieu’s crafting of a curriculum to be taught to school children!
“. . . . The Victims of Communism Memorial Foundation is an outgrowth of the National Captive Nations Committee, a group founded by Ukrainian nationalist Lev Dobriansky to lobby against any effort for detente with the Soviet Union. Its co-chairman, Yaroslav Stetsko, was a top leader of the fascist OUN‑B militia that fought alongside Nazi Germany during its occupation of Ukraine in World War Two. Together, the two helped found the World Anti-Communist League that was described by journalist Joe Conason as ‘the organizational haven for neo-Nazis, fascists, and anti-Semitic extremists from two dozen countries.’. . .”
The curriculum manifests fascist ideology: ” . . . . Its methodology was also universally panned, with many pointing out that the tens of millions of Soviet and Nazi losses during World War II were attributed to communist ideology. This means that both Adolf Hitler himself and many of his victims are counted towards the vastly overinflated figure. . . . The principal organization promoting the 100 million figure today is the Victims of Communism Memorial Foundation . . . . The group, set up by the U.S. government in 1993, added all worldwide Covid-19 deaths to the victims of communism list, arguing that the coronavirus was a communist disease because it originated in China. . . .”
Ante Pavelic
Photo Credit: Wikipedia.org
The Victims of Communism Memorial Foundation lionizes fascists and Nazis: ” . . . . Those included Roman Shukhevych, a Ukrainian nationalist and Nazi collaborator, as well as Ante Pavelić who ran a Nazi puppet regime in Croatia and is considered a chief perpetrator of the Holocaust in the Balkans . . . .”
Discussion and Analysis Includes: An alleged Chinese hack that will benefit Elon Musk’s Starlink; A Musk associate named by Trump to head NASA; The founding of a firm called Sauron by a Thiel associate; Speculation about the possible effects of Luigi Mangione’s alleged murder of UnitedHealth Care CEO Thompson; The possible appointment of RFK, Jr’s campaign manager “ex” CIA agent Amaryllis Fox to be a Deputy Director of CIA; Fox’s long, close association with Tulsi Gabbard; Elon Musk’s social media support of the AfD; The pro-AfD posts of the accused Magdeburg Christmas massacre “perp;” The chronicling of the ascent of Mr. Julani (Al-Qaeda, ISIS) in Syria in September of 2018; Mr. Julani’s being minted as Syrian head of state following the fall of Asad; The assassination of Russian General Kirillov, who opined that Covid was an American BW weapon.
Mr. Emory’s Patreon site features the first two articles he has written (on the U.S./Russian pipeline war and Lithuanian fascism through the years), as well as highlighting numerous goings on in the world, including Covid-19. Dr. Jeffrey Sachs “pretty convinced” Covid came from a U.S. Bio-Lab. WFMU-FM is podcasting For The Record–You can subscribe to the podcast HERE. Mr. Emory emphatically recommends that listeners/readers get the 32GB flash drive containing all of Mr. Emory’s 43 years on the air, plus a library of old anti-fascist books on easy-to-download PDF files.
In the latest Patreon talks–three, one-hour presentations per week–Mr. Emory compares the military inculcation of Japanese youth in the pre-World War II period with the submersion of American boys in a cognitive military culture presented by movies, TV, video-games and the Internet. In addition, we review the role of Mohammed Al-Zawahiri–the late Ayman’s brother–with the Egyptian Muslim Brotherhood, al-Qaeda, and the attack on the U.S. Embassy in Benghazi. Ukrainian television anchor quotes Adolf Eichmann verbatim in this video from UKRAINE 24. This video of Ukraine’s top military medical officer discussing an order to castrate Russian males is an eye-opener. WFMU-FM is podcasting For The Record–You can subscribe to the podcast HERE. Mr. Emory emphatically recommends that listeners/readers get the 32GB flash drive containing all of Mr. Emory’s 43 years on the air, plus a library of old anti-fascist books on easy-to-download PDF files.
Exemplifying the disinformation surrounding Ukraine, Russia et al is the remarkable charge that Putin/Russia influenced the outcome of the 2016 election. Hillary Clinton got almost three million more votes than Donald Trump. Putin/Russia did not create the electoral college. Facebook posts from Russia were 40,000 out of 3 trillion posts–a few hundreds of one percent of the posts in that period. THAT influenced the election?!! Cambridge Analytica, Peter Thiel, Facebook, Palantir helped keep potential Clinton voters at home, targeting potential Sanders voters. Ukrainian television anchor quotes Adolf Eichmann verbatim in this video from UKRAINE 24. WFMU-FM is podcasting For The Record–You can subscribe to the podcast HERE. Mr. Emory emphatically recommends that listeners/readers get the 32GB flash drive containing all of Mr. Emory’s 43 years on the air, plus a library of old anti-fascist books on easy-to-download PDF files.
In numerous programs we have noted the decisively important position of avowed China hawk Avril Haines. Ms. Haines is the Director of National Intelligence, and, as such, is in charge of the “investigation” into the “Lab-Leak Theory.” The U.S. is now alleging that China hacked key Microsoft email infrastructure. Note in that context, that we have learned that the CIA’s hacking tools are specifically crafted to mask CIA authorship of the attacks. Most significantly, for our purposes, is the fact that the Agency’s hacking tools are engineered in such a way as to permit the authors of the event to represent themselves as Chinese, among other nationalities. ” . . . . These tools could make it more difficult for anti-virus companies and forensic investigators to attribute hacks to the CIA. Could this call the source of previous hacks into question? It appears that yes, this might be used to disguise the CIA’s own hacks to appear as if they were Russian, Chinese, or from specific other countries. . . .”
After review of Carl Lundstrom’s financing of the Sweden Democrats, as well as his central role in financing the Pirate Bay site (which hosted WikiLeaks, courtesy of Joran Jermas/Israel Shamir), we delve into the operations of Lundstrom’s Sweden Democrat associates.
Utilizing the anti-immigrant theme utilized with great effect by fascists around the world, the Sweden Democrats are gaining ground on the Swedish political landscape.
Key points of discussion include: The Nazi origins of the Sweden Democrats; the Waffen SS background of one of the party’s founders; networking of the Sweden Democrats with fascists and reactionaries in other countries, including the U.S., France and Germany; the pivotal role of the internet in advancing the fortunes of the Sweden Democrats.
Next, we examine the rise of Jair Bolsonaro’s fascist government.
Again, in recent programs, we have examined the profound role of online technology. in the promotion of fascism, as well as overlapping areas of intelligence activity. In that context, it is vital to remember that the Internet was developed as a weapon, with the focus of the technology being counterinsurgency.
In Brazil, the rise of Jair Bolsonaro’s fascist government received decisive momentum from YouTube, which is transforming the political landscape in Brazil, as it is in this country.
” . . . .In colorful, far-right rants, Mr. Moura accused feminists, teachers and mainstream politicians of waging vast conspiracies. Mr. Dominguez was hooked.
As his time on the site grew, YouTube recommended videos from other far-right figures. One was a lawmaker named Jair Bolsonaro, then a marginal figure in national politics — but a star in YouTube’s far-right community in Brazil, where the platform has become more widely watched than all but one TV channel. Last year, he became President Bolsonaro.
‘YouTube became the social media platform of the Brazilian right,’ said Mr. Dominguez, now a lanky 17-year-old who says he, too, plans to seek political office. . . .”
Two excerpts from the story below encapsulate and epitomize the growing, successful manifestation of internet fascism: “An Ecosystem of Hate” and the “Dictatorship of the ‘Like’ ”
“. . . . An Ecosystem of Hate
. . . . As the far right rose, many of its leading voices had learned to weaponize the conspiracy videos, offering their vast audiences a target: people to blame. Eventually, the YouTube conspiracists turned their spotlight on Debora Diniz, a women’s rights activist whose abortion advocacy had long made her a target of the far right.
Bernardo Küster, a YouTube star whose homemade rants had won him 750,000 subscribers and an endorsement from Mr. Bolsonaro, accused her of involvement in the supposed Zika plots.
As far-right and conspiracy channels began citing one another, YouTube’s recommendation system learned to string their videos together.
However implausible any individual rumor might be on its own, joined together, they created the impression that dozens of disparate sources were revealing the same terrifying truth.
‘It feels like the connection is made by the viewer, but the connection is made by the system,’ Ms. Diniz said.
Threats of rape and torture filled Ms. Diniz’s phone and email. Some cited her daily routines. Many echoed claims from Mr. Küster’s videos, she said.
Mr. Küster gleefully mentioned, though never explicitly endorsed, the threats. That kept him just within YouTube’s rules.
When the university where Ms. Diniz taught received a warning that a gunman would shoot her and her students, and the police said they could no longer guarantee her safety, she left Brazil. . . .
. . . . ‘The Dictatorship of the Like’
Ground zero for politics by YouTube may be the São Paulo headquarters of Movimento Brasil Livre, which formed to agitate for the 2016 impeachment of the left-wing President Dilma Rousseff. Its members trend young, middle-class, right-wing and extremely online.
Renan Santos, the group’s national coordinator, gestured to a door marked ‘the YouTube Division’ and said, ‘This is the heart of things.’
Inside, eight young men poked at editing software. One was stylizing an image of Benito Mussolini for a video arguing that fascism had been wrongly blamed on the right.
. . . . The group’s co-founder, a man-bunned former rock guitarist name Pedro D’Eyrot, said ‘we have something here that we call the dictatorship of the like.’
Reality, he said, is shaped by whatever message goes most viral. Even as he spoke, a two-hour YouTube video was captivating the nation. Titled ‘1964’ for the year of Brazil’s military coup, it argued that the takeover had been necessary to save Brazil from communism.
Mr. Dominguez, the teenager learning to play guitar, said the video persuaded him that his teachers had fabricated the horrors of military rule.
Ms. Borges, the history teacher vilified on YouTube, said it brought back memories of military curfews, disappeared activists and police beatings. ‘I don’t think I’ve had my last beating,’ she said. . . .”
Beginning an overview of burgeoning fascism around the world, this program commences with further documentation of the operation and heritage of fascism in Ukraine.
We begin with discussion of a Kyiv legal decision maintaining that the C14 militia of the Svoboda organization is not a neo-Nazi organization.
A lawyer for C14 asserts that the group, while nationalist, is not neo-Nazi in nature and labeling it a neo-Nazi group hurt its “business reputation”.
The Kyiv City Commercial Court agreed, ruling that Hromadske TV couldn’t establish that C14 – a group named after David Lane’s “14 words” white supremacist slogan – was actually a neo-Nazi group. As a result, Hromadske TV has to retract its tweet and pay 3,500 hryvnyas ($136) in court fees for C14.
This despite the fact noted in the article below that: ” . . . . [C14’s] own members have admitted to joining it because of its neo-Nazi ideology . . . .”
It’s a sign of how far along the mainstreaming of Ukraine’s neo-Nazi groups is in Ukraine: If you call the open neo-Nazis “neo-Nazis”, they can sue you and win.
As the article also notes, C14’s youth cadre is funded by the Ukrainian government: “ . . . . Nevertheless, C14 has received state funding for two years running from the Ministry of Youth and Sport to conduct “national-patriotic education” courses at summer camps for the country’s youth. . . . .”
In FTR #907,we noted the profound presence of the Ukrainian fascists in the United States, as well as their operational connections to the Third Reich. In FTR #1072, we noted the Ukrainian youth cadre in the U.S., and its affiliation with the OUN/B milieu in Ukraine.
Our next story fleshes out these connections, noting:
1. The CYM organization and its presence in the U.S.
2. The decisive involvement of post-World War II emigres in the growth of that movement.
3. CYM’s close affiliation with the OUN/B.
4. CYM’s uniformed, military orientation: ” . . . . Among the most popular activities are military-style games where campers are divided into two teams that have to dodge or capture their opponents by moving stealthily and organizing ambushes. . . . .”
Next, we highlight the fascist ascent in the Baltic states.
In Estonia, the EKRE party is implementing a fascist agenda, capitalizing on an anti-immigrant theme, in a country that has had little immigration.
In addition, the party has targeted the LGBT milieu and “globalization,” as well as resuscitating Nazi economic theory and practice.
After review of Carl Lundstrom’s financing of the Sweden Democrats, as well as Lundstrom’s central role in financing the Pirate Bay site (which hosted WikiLeaks, courtesy of Julian Assange’s fascist associate Joran Jermas/Israel Shamir), we delve into the operations of Lundstrom’s associates.
Utilizing the anti-immigrant theme utilized with great effect by fascists around the world, the Sweden Democrats are gaining ground on the Swedish political landscape.
Key points of discussion include: The Nazi origins of the Sweden Democrats; the Waffen SS background of one of the party’s founders; networking of the Sweden Democrats with fascists and reactionaries in other countries, including the U.S., France and Germany.
We emphasize the treatment afforded Yasha Levine. As might be expected, Levine received the Jim Garrison/Gary Webb treatment. The retribution directed at Yasha Levine epitomizes why Mr. Emory refers to the so-called progressive sector as “so-called.”
” . . . . The threats and attacks had begun sometime overnight while I slept. By morning, they had reached a vicious and murderous pitch. There were calls for my death—by fire, by suffocation, by having my throat slit by razor blades. People I had never met called me a rapist, and alleged that I took delight in beating women and forcing people to have sex with me. I was accused of homophobia. Anonymous people filed bogus claims with my editor. Allegations that I was a CIA agent poured in, as did claims that I worked with British intelligence. The fact that I had been born in the Soviet Union didn’t do me any favors; naturally, I was accused of being an FSB spy and of working for Russia’s successor to the KGB. I was informed that my name was added to a dark net assassination list—a site where people could place anonymous bids for my murder. The roaming eye of the Internet hate machine had suddenly fixed on me. . . .”
In addition to online bullying, slander and veiled and direct threats, the so-called “privacy activists” joined in pillorying Yasha Levine: ” . . . . Micah Lee, the former EFF technologist who helped Edward Snowden communicate securely with journalists and who now works at The Intercept, attacked me as a conspiracy theorist and accused me and my colleagues at Pando of being sexist bullies, he claimed that my reporting was motivated not by a desire to get at the truth but by a malicious impulse to harass a female Tor developer. Although Lee conceded that my information about Tor’s government funding was correct, he counter intuitively argued that it didn’t matter. . . .
” . . . . Journalists, experts, and technologists from groups like the ACLU, the EFF, Freedom of the Press Foundation and The Intercept and employees of the Tor Project joined in to attack my reporting. Unlike Lee, most did not attempt to engage my reporting but employed a range of familiar PR smear tactics—tactics you usually see used by corporate flacks, not principled privacy activists. They took to social media, telling anyone who showed interest in my articles that they should ignore them instead. Then, when that didn’t work, they tried to discredit my reporting with ridicule, misdirection, and crude insults. . . .
” . . . . A respected ACLU privacy expert, who now works as a congressional staffer, called me “a conspiracy theorist who sees black helicopters everywhere” and compared my reporting about Tor to the Protocols of the Elders of Zion. As someone who escaped state-sponsored anti-Semitism in the Soviet Union, I found the comparison extremely offensive, especially coming from the ACLU. The Protocols were an anti-Semitic forgery disseminated by the Russian Tsar’s secret police that unleashed waves of deadly pogroms against Jews across the Russian Empire in the early twentieth century. Tor employees put forth a torrent of childish insults, calling me a ‘dumb Stalinist state-felcher’ and a ‘fucktard’s fucktard.’ They accused me of being funded by spies to undermine faith in cryptography. One of them claimed that I was a rapist, and hurled homophobic insults about the various ways in which I had supposedly performed sexual favors for a male colleague.
“In the way that these Internet hazing sessions, go, the campaign evolved and spread. Strange people began threatening me and my colleagues on social media. Some accused me of having blood on my hands and of racking up an “activist body count”–that people were actually dying because of my reporting undermined trust in Tor.The attacks widened to include regular readers and social media users, anyone who had the nerve to ask questions about Tor’s funding sources. An employee of the Tor Project went so far as to dox an anonymous Twitter user, exposing his real identity and contacting his employer in the hopes of getting him fired from his job as a junior pharmacist.
It was bizarre. I watched all this unfold in real time but had no idea how to respond. Even more disconcerting was that the attacks soon expanded to include libelous stories placed in reputable media outlets. The Guardian published a story by a freelancer accusing me of running an online sexual harassment and bullying campaign. The Los Angeles Review of Books, generally a good journal of arts and culture, ran an essay by a freelancer alleging that my reporting was funded by the CIA. Paul Carr, my editor at Pando, lodged official complaints and demanded to know how these reporters came to their conclusions. Both publications ultimately retracted their statements and printed corrections. An editor at the Guardian apologized and described the article as a ‘fuck up.’ But the online attacks continued. . . .”
Program Highlights Include:
1.–The role of Eddie Snowden in misattributing the Shadow Brokers non-hack to Russia.
2.–Snowden’s foreshadowing of the alleged Russian “hack” of the Macron campaign”: ” . . . . ‘That could have significant foreign policy consequences,’ Snowden wrote on Twitter. ‘Particularly if any of those operations targeted US allies. Particularly if any of those operations targeted elections.’ . . .”
3.–James Bamford’s analysis of WikiLeaker/Tor promoter/BBG associate Jacob Apelbaum as the most likely source of the Shadow Brokers non-hack.
The ludicrous nature of the “Russia-did it” hypothesis concerning the Macron hacks: ” . . . . The hacked documents in the ‘Macron hack’ not only contained Cyrillic text in the metadata, but also contained the name of the last person to modify the documents. That name, ‘Roshka Georgiy Petrovichan’, is an employee at Evrika, a large IT company that does work for the Russian government, including the FSB (Russian intelligence.) Also found in the metadata is the email of the person who uploaded the files to ‘archive.org’, and that email address, frankmacher1@gmx.de, is registered with a German free webmail provider used previously in 2016 phishing attacks against the CDU in Germany that have been attributed to APT28. It would appear that the ‘Russian hackers’ not only left clues suggesting it was Russian hackers behind the hack, but they decided to name names this time–their own names. . . .”
4.–Neo-Nazi and Glenn Greenwald and Laura Poitras associate Andrew Auerenheimer’s role in modifying the documents in the Macron hack: ” . . . . Shortly after an anonymous user of the 4chan.org discussion forum posted fake documents purporting to show Mr. Macron had set up an undisclosed shell company in the Caribbean, the user directed people to visit nouveaumartel.com for updates on the French election. That website, according to research by web-security provider Virtualroad.org, is registered by ‘Weevlos,’ a known online alias of Andrew Auernheimer, an American hacker who gained notoriety three years ago when a U.S. appeals court vacated his conviction for computer fraud. The site also is hosted by a server in Latvia that hosts the Daily Stormer, a neo-Nazi news site that identifies its administrator as ‘Weev,’ another online alias of Mr. Aeurnheimer, Virtualroad.org says. ‘We strongly believe that the fake offshore documents were created by someone with control of the Daily Stormer server,’ said Tord Lundström, a computer forensics investigator at Virtualroad.org. . . .”
5.–French cybersecurity chief Guillaume Poupard negated the assertion that Russia hacked the Macron campaign: ” . . . . The head of the French government’s cyber security agency, which investigated leaks from President Emmanuel Macron’s election campaign, says they found no trace of a notorious Russian hacking group behind the attack. . . . ”
In this program, we resume discussion and analysis of the consummately important recent book Surveillance Valley: The Secret Military History of the Internet by Yasha Levine. In the previous program, we noted, among other points of analysis, the decisive role of Eddie “The Friendly Spook” Snowden in promoting the intelligence-agency crafted Tor network.
In addition to Tor, the Open Technology Fund (read “CIA”) helped finance the Signal app for mobile phones. It, too, is fundamentally compromised. ” . . . . . . . . The Tor project remained the best-known privacy app funded by the Open Technology Fund, but it was quickly joined by another: Signal, an encrypted mobile phone messaging app for the iPhone and Android. . . .”
Not surprisingly, the CIA’s Eddie “The Friendly Spook” Snowden was a big promoter of Signal, as well as Tor: ” . . . . People at the ACLU claimed that Signal made federal agents weep. The Electronic Frontier Foundation added Signal alongside Tor to its Surveillance Self-Defense guide. Fight for the Future, a Silicon Valley-funded privacy activist organization, described Signal and Tor as ‘NSA-proof’ and urged people to use them. Edward Snowden was the combo’s biggest and most famous booster and repeatedly took to Twitter to tell his three million followers that he used Signal and Tor every day, and that they should do the same to protect themselves from government surveillance. ‘Use Tor, Use Signal,’ he tweeted out.
“With endorsements like these, Signal quickly became the go-to app for political activists around the world. Egypt, Russia, Syria, and even the United States—millions downloaded Signal, and it became the communication app of choice for those who hoped to avoid police surveillance. Feminist collectives, anti-President Donald Trump protesters, communists, anarchists, radical animal rights organizations, Black Lives Matter activists—all flocked to Signal. Many were heeding Snowden’s advice: ‘Organize. Compartmentalize to limit compromise. Encrypt everything, from calls to texts (use Signal as a first step.)’ . . . .”
Yasha Levine sums up the fundamental contradictions inherent in this dynamic: ” . . . . If you stepped back to survey the scene, the entire landscape of this new Internet Freedom privacy movement looked absurd. Cold War-era organizations spun off from the CIA now funding the global movement against government surveillance? Google and Facebook, companies that ran private surveillance networks and worked hand in hand with the NSA, deploying government-funded privacy tech to protect their users from government surveillance? Privacy activists working with Silicon Valley and the US government to fight government surveillance—and with the support of Edward Snowden himself? . . . .”
Following Snowden’s promotion of OTF’s Tor and Signal technologies, OTF was at a zenith: ” . . . . After Edward Snowden, OTF was triumphant. It didn’t mention the leaker by name in its promotional materials, but it profited from the crypto culture he promoted and benefited from his direct endorsement of the crypto tools it financed. It boasted that its partnership with both Silicon Valley and respected privacy activists meant that hundreds of millions of people could use the privacy tools the US government had brought to market. And OTF promised that this was just a start: ‘By leveraging social network effects, we expect to expand to a billion regular users taking advantage of OTF-supported tools and Internet Freedom technologies by 2015. . . .’
As eventually became clear, the Tor network was easily breached. It is a safe bet that the fascists grouped around the Pirate Bay site (on which WikiLeaks held forth), had breached Tor’s “secrecy,” in addition to the obvious fact that intelligence services could penetrate it at will.
With this in mind, John Young’s rumination about WikiLeaks sound more and more substantive.
In all probability, WikiLeaks was a huge data mining operation both by the very intelligence agencies who were ostensibly targeted by WikiLeaks, and the Fascist International network around Carl Lundstrom, Daniel Friberg, David Duke et al.
In FTR #‘s 756 and 831 we noted Snowden’s fascist views and connections. Levine merely characterizes him as a “right-wing libertarian,” but there is MUCH MORE TO IT THAN THAT!
Snowden downplayed the fundamental role of the Big Tech firms in aiding and abetting government surveillance, in addition to their own massive surveillance and resultant data mining. ” . . . . There, while living under state protection at an undisclosed location in Moscow, he swept Silicon Valley’s role in Internet surveillance under the rug. Asked about it by Washington Post reporter Barton Gellman, who had first reported on the NSA’s PRISM program, Snowden shrugged off the danger posed by companies like Google and Facebook. The reason? Because private companies do not have the power to arrest, jail, or kill people. ‘Twitter doesn’t put warheads on foreheads,’ he joked. . . .”
Embodying his “corporatist” and Technocratic Fascist point of view, Snowden championed the Big Tech firms as bulwarks against government Internet surveillance, despite the only-too-obvious fact (reinforced by the documents he leaked) that Big Tech is–and always has been–in bed with, and actively collaborating with, the very government intelligence agencies conducting that surveillance: ” . . . . The only islands of safety were the private data centers controlled by private companies—Google, Apple, Facebook. These were the cyber-fortresses and walled cities that offered sanctuary to the masses. In this chaotic landscape, computer engineers and cryptographers played the role of selfless galloping knights and wizard-warriors whose job was to protect the weak folk of the Internet: the young, the old and infirm, families. It was their duty to ride out, weapons aloft, and convey people and their precious data safely from fortress to fortress, not letting any of the information fall into the hands of government spies. He called on them to start a people’s privacy war, rallying them to go forth and liberate the Internet, to reclaim it from the governments of the world. . . .”
The nauseating head of Facebook–Mark Zuckerberg–has decried the intelligence community’s use of the Internet for data mining. In FTR #1077, we highlighted the Cambridge Analytica affair, and Facebook’s full cooperation with that project at every turn.
Other Big Tech firms had similar reactions. “. . . . . ‘We hadn’t even heard of PRISM before yesterday,’ Mark Zuckerberg wrote in a Facebook post. He blamed the government and positioned Facebook as a victim. “I’ve called President Obama to express my frustration over the damage the government is creating for all of our future. Unfortunately, it seems like it will take a very long time for true full reform.’ Apple, Microsoft, Google, and Yahoo! All reacted in much the same way, denying the allegations and painting themselves as the victims of government overreach. ‘It’s tremendously disappointing that the government sort of secretly did all this stuff and didn’t tell us. We can’t have a democracy if we’re having to protect you and our users from the government,’ Larry Page told Charlie Rose in an interview on CBS. . . . .”
We present the conclusion of the main part of the book, with Levine’s summation of the inextricable nature and symbiosis between the Internet, the tech firms and the so-called “privacy community.”
The key points of discussion and analysis of Levine’s book (as a whole) include:
1.–The Internet is a weapon, developed for counter-insurgency purposes.
2.–Big Tech firms network with the very intelligence services they publicly decry.
3.–Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which the Internet is predicated.
4.–The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect.
5.–The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect.
6.–The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose.
7.–Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.
NB: Mr. Levine does not go into the fascistic character of Snowden, Assange, Greenwald et al. Some of those shows: Greenwald–FTR #888, Snowden–FTR #‘s 756, 831, Assange and WikiLeaks–FTR #‘s 732, 745, 755, 917.
“. . . . Then there was the fact that Signal ran on Amazon’s servers, which meant that all its data were available to a partner in the NSA’s PRISM surveillance program. Equally problematic, Signal needed Apple and Google to install and run the app on people’s mobile phones. Both companies were, and as far as we know still are, partners in PRISM as well. ‘Google usually has root access to the phone, there’s the issue of integrity,’ writes Sander Venema, a respected developer and secure—technology trainer, in a blog post explaining why he no longer recommends people use Signal for encrypted chat. ‘Google is still cooperating with the NSA and other intelligence agencies. PRISM is also still a thing. I’m pretty sure that Google could serve a specially modified update or version of Signal to specific target for surveillance, and they would be none the wiser that they installed malware on their phones.’ . . .
. . . . So, although the app encrypted the content of people’s messages, it also marked them with a flashing red sign: ‘Follow Me, I Have Something to Hide.’ (Indeed, activists protesting at the Democratic National Convention in Philadelphia in 2016 told me that they were bewildered by the fact that police seemed to know and anticipate their every move despite their having used Signal to organize. . . .”
” . . . . For many Internet companies, including Google and Facebook, surveillance is the business model. It is the base on which their corporate and economic power rests. Disentangle surveillance and profit, and these companies would collapse. Limit data collection, an the companies would see investors flee and their stock prices plummet. [Italics are mine–D.E.]
“Silicon Valley fears a political solution to privacy. Internet Freedom and crypto offer an acceptable alternative. Tools like Signal and Tor provide a false solution to the privacy problem, focusing people’s attention on government surveillance and distracting them from the private spying carried out by the Internet companies they use every day. All the while, crypto tools give people a [false] sense that they’re doing something to protect themselves, a feeling of personal empowerment and control. And all those crypto radicals? Well, they just enhance the illusion, heightening the impression of risk and danger. With Signal or Tor installed, using an iPhone or Android suddenly becomes edgy and radical. So instead of pushing for political and democratic solutions to surveillance, we outsource our privacy politics to crypto apps–software made by the very same powerful entities that these apps are supposed to protect us from. . . .”
Continuing with our examination of Yasha Levine’s seminal volume Surveillance Valley, we continue our analysis of the individuals, institutions and technologies central to the so-called “online privacy” effort. The Tor Project, the Electronic Frontier Foundation, the Broadcasting Board of Governors and its Open Technology Fund and Jacob Appelbaum are all the opposite of what they have been represented as being.
We begin with information overlapped from our last program, highlighting how Jacob Appelbaum and the Tor network hooked up with WikiLeaks.
Tor, Appelbaum, Assange and WikiLeaks:
1.–Became increasingly intertwined, enjoying accolades from many, apparently unsuspecting, groups: ” . . . . His [Appelbaum’s] association with WikiLeaks and Assange boosted the Tor Project’s public profile and radical credentials. Support and accolades poured in from journalists, privacy organizations, and government watchdogs. The American Civil Liberties Union partnered with Appelbaum on an Internet privacy project, and New York’s Whitney Museum—one of the leading modern art museums in the world—invited him for a ‘Surveillance Teach-In.’ The Electronic Frontier Foundation gave Tor its Pioneer Award, and Roger Dingledine made in on Foreign Policy magazine’s Top 100 Global Thinkers for protecting ‘anyone and everyone from the dangers of Big Brother.’ . . . .”
2.– Differed fundamentally from the accepted text: ” . . . . With Julian Assange endorsing Tor, reporters assumed that the US government saw the anonymity nonprofit as a threat. But internal documents obtained through FOIA from the Broadcasting Board of Governors, as well as analysis of Tor’s government contracts paint a different picture. They reveal that Appelbaum and Dingledine worked with Assange on securing WikiLeaks with Tor since late 2008 and that they kept their handlers at the BBG informed about their relationship and even provided information about the inner workings of WikiLeaks’s secure submission system. . . .”
3.–Did not adversely affect the government funding of Tor at all, as might be expected by the superficial apparent reality of the situation: ” . . . . Perhaps most telling was that support from the BBG [read “CIA”–D.E.] continued even after WikiLeaks began publishing classified government information and Appelbaum became the target of a larger Department of Justice investigation into WikiLeaks. For example, on July 31, 2010, CNET reported that Appelbaum had been detained at the Las Vegas airport and questioned about his relationship with WikiLeaks. News of the detention made headlines around the world, once again highlighting Appelbaum’s close ties to Julian Assange. And a week later, Tor’s executive director Andrew Lewman, clearly worried that this might affect Tor’s funding, emailed Ken Berman at the BBG in the hopes of smoothing things over and answering ‘any questions you may have about the recent press regarding Jake and WikiLeaks.’ But Lewman was in for a pleasant surprise: Roger Dingledine had been keeping folks at the BBG in the loop, and everything seemed to be okay. ‘Great stuff, thx. Roger answered a number of questions when he met us this week in DC,’ Berman replied. . . .”
4.–” . . . . In 2011 contracts came in without a hitch–$150,000 from the Broadcasting Board of Governors and $227,118 from the State Department. Tor was even able to snag a big chunk of money from the Pentagon: a new $503,706 annual contract from the Space and Naval Warfare Systems Command, an elite information and intelligence unit that houses a top-secret cyber-warfare division.The Navy was passed through SRI, the old Stanford military contractor that had done counterinsurgency, networking, and chemical weapons work for ARPA back in the 1960s and 1970s. The funds were part of a larger Navy ‘Command, Control, Communcations, Computers, Intelligence, Surveillance, and Reconnaissance’ program to improve military operations. A year later, Tor would see its government contracts more than double to $2.2 million: $353,000 from the State Department, $876,099 from the US Navy, and $937,800 from the Broadcasting Board of Governors. . . .”
In this context, we recall some earlier observations about WikiLeaks. John Young, one of WikiLeaks’ founders turned critic of the organization harbors deep suspicions concerning the group. ” . . . they’re acting like a cult. They’re acting like a religion. They’re acting like a government. They’re acting like a bunch of spies. They’re hiding their identity. They don’t account for the money. They promise all sorts of good things. They seldom let you know what they’re really up to. . .There was suspicion from day one that this was entrapment run by someone unknown to suck a number of people into a trap. So we actually don’t know. But it’s certainly a standard counterintelligence technique. And they’re usually pretty elaborate and pretty carefully run. They’ll even prosecute people as part of the cover story. That actually was talked about at (Sunday’s) panel. They’ll try to conceal who was informing and betraying others by pretending to prosecute them. . . .” The Tor/Appelbaum/BBG (read “CIA”)/WikiLeaks nexus may very well be proof of Young’s suspicions.
Appelbaum, WikiLeaks and Tor became fundamental to the operations of Eddie “The Friendly Spook” Snowden. In past discussion, we have noted that in the summer of 2009, when Snowden made his decision to disclose the NSA documents, he was working for the very same CIA from which the Broadcasting Board of Governors and its Open Technology Fund were derived. Jacob Appelbaum was funded by BBG, as was Tor. ” . . . . From the start, the Tor Project stood at the center of Snowden’s story. The leaker’s endorsement and promotion introduced the project to a global audience, boosting Tor’s worldwide user base from one million to six million almost overnight and injecting it into the heart of a burgeoning privacy movement. In Russia, where the BBG and Dingledine had tried but failed to recruit activists for their Tor deployment plan, use of the software increased from twenty thousand daily connections to somewhere around two hundred thousand.
“During a promotional campaign for the Tor Project, Snowden said: ‘Without Tor, the streets of the Internet become like the streets of a very heavily surveilled city. There are surveillance cameras everywhere, and if the adversary simply takes enough time, they can follow the tapes back and see everything you’ve done. With Tor, we have private spaces and private lives, where we can choose who we want to associate with and how, without the fear of what that is going to look like if it is abused. The design of the Tor system is structured in such a way that even if the US Government wanted to subvert it, it couldn’t.’ Snowden didn’t talk about Tor’s continued government funding, nor did he address an apparent contradiction: why the US government would fund a program that supposedly limited its own power. Whatever Snowden’s private thought on the matter, his endorsement gave Tor the highest possible seal of approval. It was like a Hacker’s Medal of Valor. With Snowden’s backing, no one even thought to question Tor’s radical antigovernment bona fides. . . .”
Next, we review information about the so-called “Arab Spring.” In FTR #‘s 733 through 739, we presented our view that the so-called Arab Spring was a U.S. intelligence operation, aimed at placing the Brotherhood in power in Muslim countries dominated either by a secular dictator or absolute monarchy.
Yasha Levine has highlighted the role of U.S. tech personnel in training and prepping the Arab Spring online activists. As we have noted in the past, the so-called Arab Spring might have been better thought of as “The Muslim Brotherhood Spring,” as the neo-liberal, privatization ideology of Brotherhood economic icon Ibn Khaldun was fundamental to the operation.
The economic goals of the Arab Spring “op” were reviewed in, among other programs, FTR #‘s 1025 and 1026.
Recall while reading the following excerpts of this remarkable and important book, that:
1.–The Tor network was developed by, and used and compromised by, elements of U.S. intelligence.
2.–One of the primary advocates and sponsors of the Tor network is the Broadcasting Board of Governors. As we saw in FTR #‘s 891, 895, is an extension of the CIA.
3.–Jacob Appelbaum has been financed by the Broadcasting Board of Governors, advocates use of the Tor network, has helped WikiLeaks with its extensive use of the Tor network, and is an ideological acolyte of Ayn Rand.
The Arab Spring provided motivation for enhanced U.S. funding for Internet Freedom. The Open Technology Fund, like the BBG a CIA “derivative,” was at the center of this: ” . . . . The motivation for this expansion came out of the Arab Spring. The idea was to make sure the US government would maintain its technological advantage in the censorship arms race that began in the early 2000s, but the funds were also going into developing a new generation of tools aimed at leveraging the power of the Internet to help foreign opposition activists organize into cohesive political movements. The BBG’s $25.5 million cut of the cash more than doubled the agency’s anticensorship technology budget from the previous year, and the BBG funneled the money into the Open Technology Fund, a new organization it had created within Radio Free Asia to fund Internet Freedom technologies in the wake of the Arab Spring. . . .”
The fundamental position of BBG and OTF (read “CIA”) to the so-called online privacy community was concisely expressed by Yasha Levine: ” . . . . From behind this hip and connected exterior, BBG and Radio Free Asia built a vertically integrated incubator for Internet Freedom technologies, pouring millions into projects big and small, including everything from evading censorship to helping political organizing, protests, and movement building. With its deep pockets and its recruitment of big-name privacy activists, the Open Technology Fund didn’t just thrust itself into the privacy movement. In many ways, it WAS the privacy movement. . . .”
Recent Comments