BILDERBERG, CYBER-SECURITY, AND THE LATEST IN THE SNOWDEN AFFAIR

At the top of the list of this year's Bilderberg meeting agenda (at least the one they've put on their website), are artificial intelligence and cyber-security. Indeed, cyber-security has just vaulted to almost the top of the list of olgarchical concerns> As they meet, a story has broken that American electronic and human intelligence may have been severely compromised via hackers who have found personnel lists of people in sensitive intelligence positions:

Snowden may have some clarifying to do after bombshell reports that Russia and China accessed NSA files

Officials: Second hack exposed military and intel data

From the first article, we note the following:

Times reports that Russia and China de-encrypted files stolen by the former NSA contractor Edward Snowden, forcing the UK intelligence service MI6 to pull officers out of live operations in hostile countries.

"Western intelligence agencies say they have been forced into the rescue operations after Moscow gained access to more than [1 million] classified files," The London paper, citing senior UK officials, reports.

The reader will also note that the map at the end of this first article shows the nations that are the chief target of the NSA electronic surveillance program, among them the major continental European powers and the Middle East. We'll get back to that.

From the second article we note the following:
"Hackers linked to China have gained access to the sensitive background information submitted by intelligence and military personnel for security clearances, U.S. officials said Friday, describing a cyberbreach of federal records dramatically worse than first acknowledged."
And:
"This tells the Chinese the identities of almost everybody who has got a United States security clearance," said Joel Brenner, a former top U.S. counterintelligence official. "That makes it very hard for any of those people to function as an intelligence officer. The database also tells the Chinese an enormous amount of information about almost everyone with a security clearance. That's a gold mine. It helps you approach and recruit spies."
The short story here is that the Obama administration is facing an intelligence crisis of a potential scale the likes of which no western intelligence agency or apparatus has faced since the Russian penetration of British intelligence and various departments of the American government during and immediately after World War Two. One needs to think in terms of Alger Hiss, Klaus Fuchs, and Kim Philby, but on a much much larger scale. One need only recall that in the wake of the Yuri Nosenko case, CIA counter-intelligence guru James Jesus Angleton virtually turned the agency inside out and upside down hunting a Soviet mole whom he believed had penetrated the agency, a mole which was (allegedly) never found.
On the larger scale, however, the consequences are even more far-reaching. As the first article notes in the map that is included with article, the USA has intelligence swap arrangements with Canada, the United Kingdom, Australia, and New Zealand and with the signals and human intelligence apparati of those nations. In short, the potential breach here may not just be limited to the USA, but the potential exists for it spread to Britain's GCHQ and Canada's RCMP and other agencies, either in the form of compromising their operations and security, or in the form of blowback as those nations tighten the spigots on how much information is exchanged with the USA.
There is a wider context in which these events must be seen, and those are the stories from the last two years of the hacking of Sony, various banks, and (I would submit), the physical and quite professional attack on a California electrical substation in the southern tip of the Silicon Valley region, and the severing of internet connections between Phoenix and Flagstaff, Arizona, last year. One might also mention the curious incident of the take-down of air traffic control computers in Salt Lake City, which disrupted air traffic in the southwestern USA for some hours, an incident which also had disturbing footprints of covert operations.
So what's the high octane speculation here? For a number of months I have been concerned that American heavy-handed actions in the Ukraine via covert operations, a coup against a legitimate (and admittedly very corrupt) government, to install yet another (very corrupt) government, was to invite a retaliation from Russia in our own back yard. Covert operations, I have been trying to warn, are a game two can play. With the growing evidence that the BRICSA bloc means business, and is coordinating its financial policy and institutions, there is every reason to assume that this entails similar secret intelligence and covert operations agreements, particularly between Russia and China. Or to put it as country simple as possible: it looks like those covert operations games in our own back yard have just begun. Expect it to spread, and, like all such operations, expect it to use cutouts for more "physical work." The problem that the Obama administration now faces, is that cynicism and distrust  have reached such epic proportions, that official statements of potential foreign involvement in such operations must overcome inherent public distrust, and the only way to do that is with irrefutable evidence and proof, and that would mean disclosing yet more intelligence sources and methods.
Welcome to Cold War, 2.0.
See you on the flip side...
Posted in

Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and "strange stuff". His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into "alternative history and science".

19 Comments

  1. Robert Barricklow on June 17, 2015 at 4:02 pm

    As the Establishment absolutely loathes completion, I found this article concerning cyber security particularly satisfying:

    http://rt.com/news/267835-social-network-anonymous-minds/



    • DanaThomas on June 18, 2015 at 1:52 am

      This sounds very good, but “Anonymous” may
      Yet a profiler be. And so until
      Better evidence may from the matix emerge
      Like an Eponymous contributor here
      Yet again I remain: “Skeptical Terminally”.



      • Robert Barricklow on June 18, 2015 at 10:43 am

        Unfortunately, just as the “citizen” has become “suspect”, and stripped searched at will, by virtually privatized law enforcement agencies[in business for themselves/corporate governance]; so too has the information the “citizen” becomes “aware” of.
        As Rod Sterling, in the Twilight Zone said, “This is not a new world: It is simply an extension of what began in the old one[read ancient civilization]. It has patterned itself after every dictator who has ever planted the ripping imprint of a boot on the pages of history since the beginning of time. It has refinement, technological advancements, and a more sophisticated approach to the destruction of human freedom. But like every one of the super states that preceded it, it has one iron rule: Logic is an enemy, and truth is a menace.”



  2. Guygrr on June 16, 2015 at 8:27 am

    Maybe Snowden didn’t intentionally give up the files. There had to be some stipulation for the Russians to let him into the country. Even if he no longer had the physical/digital files on his person or stored somewhere, it’s possible the Russians have a way to extract the information from him using energetics, provided he actually read/saw the file in question.



    • Lost on June 17, 2015 at 5:24 am

      There’s no evidence Snowden read every file he took/copied.

      And if such technology exists, wouldn’t it be better to focus it at servers in the NSA, or other current NSA employees.

      Then nothing disclosed in the Snowden files so far has been any great surprise. In other words, Russia and other powers, were aware of this tracking and data retention years ago.

      The tech you’re describing, if it exists, is a much much bigger secret and would likely never be wasted on such minor disclosures.

      No party uses that kind of thing for something so insignificant.



      • 8thdegreeofj on June 19, 2015 at 1:18 pm

        I’ll second that comment Lost.

        I would also say that just like the public face of the military in the USA, the public Russian scientists are not even privy to information regarding energetics. And on the chance that Snowden is a trojan horse the Russians would not be showing their cards to this guy. Which includes using it as a weapon of information extraction on him.

        Having said that, there is at least one convinced American who believes that Russian energetics (perhaps better referred to as psychotronic energetics) was used on him and that of course is retired Lt.Col. Tom Bearden.



        • Lost on June 20, 2015 at 12:58 pm

          8th,

          My guess is that Bearden is allowed to publish as a distraction.

          Not that everything he says is wrong, but many parties, including some in the USA, have very similar weapons, some developed as early as the later 19th century.

          But few parties having any great control of these weapons, and other related tech, would ever want to tip their hand about having such weapons.

          Clearly, one version of these weapons was used to turn the World Trade Center into powder, and then a different version was used to convince 1/3 of the US public that invading Iraq was a good idea. The large 2003 east coast black out was likely induced with related weapons.

          But how the US reacts is not an indication of what the US controls.



  3. Lost on June 16, 2015 at 6:12 am

    More and more evidence of the Business Insider “reporting” being based entirely on lies published by Murdoch’s Sunday Times of London.

    And the London Times reporter while admitting to the “error” still can’t explain where or how Russia “got” the files the Times claims Russia did.

    It’s a smear job.

    http://www.salon.com/2015/06/15/its_an_utter_lie_glenn_greenwald_slams_rupert_murdoch_owned_papers_edward_snowden_smear/

    Does anyone in his right mind really think Snowden would have been stupid enough to travel with the files when he left Hong Kong? Well, clearly Murdoch thinks his readers stupid enough to think that of the far smarter Snowden.



  4. Lost on June 14, 2015 at 6:45 pm

    Here’s Greenwald’s answer to the pack of lies published by the Murdoch Times of London:

    https://firstlook.org/theintercept/2015/06/14/sunday-times-report-snowden-files-journalism-worst-also-filled-falsehoods/

    And here’s the text of the Times of London story that Business Insider bases its “reporting” on:

    https://archive.is/BkuMM#selection-855.0-865.204



  5. DownunderET on June 14, 2015 at 2:56 pm

    Being hacked is embarrassing, I mean all those guys who build “fire walls” must be copping hell from their bosses. You’d kinda think that the US has the finest computer geeks on the planet, well isn’t the US the smartest and best country in the world, well just ask Obama, he knows it is.
    It seems that Russia and China have “outstanding’ capabilities, and now the game is being played to see who can outhack the hackers. Maybe Joseph can answer some of the questions, well he is a HACK FROM SOUTH DAKOTA !!!

    I couldn’t resist it………..whoops.



  6. nines on June 14, 2015 at 1:23 pm

    Almost certainly just propaganda… an out and out lie… OR the activation of the reason he was sent on the mission to begin with. Those are the choices.



  7. basta on June 14, 2015 at 12:51 pm

    Oh, and by the way, just who are these “hostile countries” that have scared the bejeebers out of the Five Eyes and have their knickers all in a knot?

    I’m just so sick of parsing the propaganda; what drudgery! At least they could be a bit creative and make this a bit less of a rote exercise of decrypting bovine droppings.



  8. emlong on June 14, 2015 at 11:33 am

    Hey, how about this idea – “Intelligence?” Let’s go back to the Murrah building bombing and then the 9/11 false flag and sort out what intelligence “lapses” happened and who really was behind them. I just dare you.



  9. marcos toledo on June 14, 2015 at 10:11 am

    So it’s back to the Yellow Peril and Moscow Gold and lets not forget Ali Baba and his Forty Thieves. If you believe these stories there beach front property in Arizona and there is that bridge in Brooklyn for sale. Let our oligarchs come out of the closet and finally declare themselves Masters Of The World and we the rest of us their property for their use only.



  10. basta on June 14, 2015 at 9:34 am

    For once I agree with Lost, that charging Snowden with these lapses is simply yet another attempt to smear him.

    I’ve read lots of reports about how sloppily protected sensite .gov networks are, even the NSA’s. Default or weak passwords on peripheral machines and bad architecture let the hackers wander in and roam around with impunity. Add to that that China makes the actual components — memory, chips, routers, motherboards, hard drives, etc — that run all these networks and don’t think they aren’t putting in backdoors either — as the NSA was caught doing a few months ago, by waylaying computer orders from FedEx and UPS.

    And an axiom of any computer network that is not completely autonomous is that it is always vulnerable to being hacked. Finally, this is just more propaganda to rachet up the hysteria and gain yet more funding to make more contractors more money. And so it goes.

    And Bilderberg is a satanist’s conclave, as far as I’m concerned. Greatest concentration of pure evil on earth since Pol Pot dined alone.



  11. loisg on June 14, 2015 at 8:43 am

    Oh, great news, now it’s not just the NSA we have to worry about, but it’s the Chinese and the Russians too. Kind of makes one wonder what the game is here, that they would be spying on so many citizens, after all, one government spying on another is old news, but spying on all these citizens is another matter.
    Do you think this is a result if Snowden’s involvement? Wouldn’t the government have changed all its access codes after his disclosures? Seems like they would have really upped the security measures surrounding all this information. Or did they leave some information accessible just to see how other countries tried to access it, or to allow them to see some misinformation that they put out there, which could then be used for propaganda purposes? Just wondering, because something about this doesn’t make sense.



  12. Robert Barricklow on June 14, 2015 at 8:10 am

    Snowden is the Osama Been Dead Again of the intelligence bogey men. If it isn’t Snowden; it’s the Chinese.
    And what U.S. Intelligence agency? There are two divisions: the Keystone Cops Public mainstream façade; the private hidden international/finance/national security interface side.

    Those Russian & Chinese Intelligence are masters in that gentleman’s[?] game.



  13. Rick on June 14, 2015 at 8:06 am

    I would really like to see at least one if not a series of discussions with Joseph, John Hogue, Catherine Austin Fitts, and Whitley Strieber on current events. One and a half to two hours long at a time.



  14. Lost on June 14, 2015 at 5:52 am

    That first “article” and the Times of London “reporting” linked is just a variation of an effort to smear Mr Snowden going back years now.

    There’s never been any evidence what so ever that China and Russia had any access to the files Snowden gave to Greenwald.

    In other words, that first article is just a variation of a not well backed up lie that’s been told for years.



Help the Community Grow

Please understand a donation is a gift and does not confer membership or license to audiobooks. To become a paid member, visit member registration.

Upcoming Events