Canadian Awareness Network
Aug 13, 2014
Matrix: Who is Edward Snowden?
By Jon Rappoport
July 8, 2013
This article is a compilation of a number of pieces I’ve written about Ed Snowden and the NSA. It doesn’t replace them, but it hits the high points…
Let’s begin here: If you absolutely must have a hero, watch Superman movies.
If your need for a hero is so great, so cloying, so heavy, so juicy that it swamps your curiosity, don’t read this.
If you can’t separate Snowden’s minor revelations from the question of who he is, if you can’t entertain the notion that covert ops and intelligence-agency games are reeking with cover stories, false trails, and limited hangouts, you need more fun in your life.
NSA? CIA? These guys live for high-level bullshit. They get down on their knees and worship it. They fall into a suicidal funk if they aren’t lying on at least three or four levels at once.
Okay. Let’s look at Snowden’s brief history as reported by The Guardian. Are there any holes?
Is the Pope Catholic?
In 2003, at age 19, without a high school diploma, Snowden enlists in the Army. He begins a training program to join the Special Forces. At what point after enlistment can a new soldier start this elite training program?
Snowden breaks both legs in an exercise. He’s discharged from the Army. Is that automatic? How about healing and then resuming service?
If he was accepted in the Special Forces training program because he had special computer skills, then why discharge him simply because he broke both legs?
“Sorry, Ed, but with two broken legs we just don’t think you can hack into terrorist data anymore. You were good, but not now. Try Walmart. They always have openings.”
Circa 2003, Snowden gets a job as a security guard for an NSA facility at the University of Maryland. He specifically wanted to work for NSA? It was just a generic job opening he found out about?
Snowden shifts jobs. Boom. He’s now in the CIA, in IT. He has no high school diploma. He’s a young computer genius.
In 2007, Snowden is sent to Geneva. He’s only 23 years old. The CIA gives him diplomatic cover there. He’s put in charge of maintaining computer-network security. Major job. Obviously, he has access to a wide range of classified documents. Sound a little odd? He’s just a kid. Maybe he has his GED. Otherwise, he still doesn’t have a high school diploma.
Snowden says that during this period, in Geneva, one of the incidents that really sours him on the CIA is the “turning of a Swiss banker.” One night, CIA guys get a banker drunk, encourage him to drive home, the banker gets busted, the CIA guys help him out, then with that bond formed, they eventually get the banker to reveal deep secrets to the Agency.
This sours Snowden? He’s that naïve? He doesn’t know by now that the CIA does this sort of thing all the time? He’s shocked? He “didn’t sign up for this?” Come on.
In 2009, Snowden leaves the CIA. Why? Presumably because he’s disillusioned. It should noted here that Snowden claimed he could do very heavy damage to the entire US intelligence community in 2008, but decided to wait because he thought Obama, just coming into the presidency, might keep his “transparency” promise.
After two years with the CIA in Geneva, Snowden really had the capability to take down the whole US inter-agency intelligence network, or a major chunk of it?
If you buy that without further inquiry, I have condos for sale on the dark side of the moon.
In 2009, Snowden leaves the CIA and goes to work in the private sector. Dell, Booze Allen Hamilton. In this latter job, Snowden is assigned to work at the NSA.
He’s an outsider, but, again, he claims to have so much access to so much sensitive NSA data that he can take down the whole US intelligence network in a single day. The. Whole. US. Intelligence. Network.
This is Ed Snowden’s sketchy legend. It’s all red flags, alarm bells, sirens, flashing lights.
Then we have the crowning piece: they solved the riddle: Ed Snowden was able to steal thousands of highly protected NSA documents because…he had a thumb drive.
It’s the weapon that breached the inner sanctum of the most sophisticated information agency in the world.
It’s the weapon to which the NSA, with all its resources, remains utterly vulnerable. Can’t defeat it.
Not only did Snowden stroll into NSA with a thumb drive, he knew how to navigate all the security layers put in place to stop people from stealing classified documents.
“Let’s see. We have a new guy coming to work for us here at NSA today? Oh, whiz kid. Ed Snowden. Outside contractor. Booz Allen. He’s not really a full-time employee of the NSA. Twenty-nine years old. No high school diploma. Has a GED. He worked for the CIA and quit. Hmm. Why did he quit? Oh, never mind, who cares? No problem.
“Tell you what. Let’s give this kid access to our most sensitive data. Sure. Why not? Everything. That stuff we keep behind 986 walls? Where you have to pledge the life of your first-born against the possibility you’ll go rogue? Let Snowden see it all. Sure. What the hell. I’m feeling charitable. He seems like a nice kid.”
NSA is the most awesome spying agency ever devised in this world. If you cross the street in Podunk, Anywhere, USA, to buy an ice cream soda, on a Tuesday afternoon in July, they know.
They know whether you sit at the counter and drink that soda or take it and move to the only table in the store. They know whether you lick the foam from the top of the glass with your tongue or pick the foam with your straw and then lick it.
They know if you keep the receipt for the soda or leave it on the counter.
They know whether you’re wearing shoes or sneakers. They know the brand of your underwear. They know your shaving cream, and precisely which container it came out of.
But this agency, with all its vast power and its dollars…
Can’t track one of its own, a man who came to work every day, a man who made up a story about needing treatment in Hong Kong for epilepsy and then skipped the country.
Just can’t find him.
[...CONTINUE READING THIS ARTICLE]
Jul 2, 2014
[click here for part 1]
This episode is part 2 about Bitcoin, cryptography and online security and safety and is called Anonymous Bitcoin, Cryptography and Online Safety: It’s being released on Wednesday, July 2, 2014, and was recorded yesterday on Tuesday, July 1, 2014.
Kristov Atlas is a network security and privacy researcher who studies crypto-currencies. He is the author of Anonymous Bitcoin: How to Keep Your Ƀ All to Yourself, a practical guide to maximizing financial privacy with Bitcoin. Kristov is also a correspondent for the World Crypto Network, appearing regularly on the the weekly roundtable show “The Bitcoin Group”, and host of “Dark News”, a show about un-censorship technologies.
References to this episode:
Anonymous Bitcoin book:
Dark News Show:
Send Bitcoin donations for this episode to:
Please make other forms of donations here:
Donations. This episode is brought to you by:
This episode is video only.
by Frankie Gotz
Canadian Awareness Network
Apr 23, 2014
A retired U.S Air Force veteran by the name of Ross McNutt owns a company called Persistent Surveillance Systems (PSS) based out of Ohio USA.
On the PSS website it writes, “Persistent Surveillance Systems provides Wide-Area Surveillance Sensors and Services that enable continuous, second-by-second video monitoring of a city-sized area. Because of the very high-resolution nature of PSS’s sensors (up to 200 megapixels), vehicle and pedestrian activity can be tracked over a 16 square-mile area. If an event-of-interest happens within this area (a murder, for example), users can rewind the event to identify the perpetrator’s place-of-origin, meeting locations, accomplices, driving routes, and final destination. PSS’s HAWKEYE sensor has been used in countless major crime investigations, and has been used to backtrack criminals for officers to apprehend.”
Video Report from LeakSourceNews below:
The operation involves flying a small civilian aircraft high in the sky (10,000 feet) with cameras pointed at desired locations. There are three types of cameras or sensors available for wide range surveillance from sky:
[...CONTINUE READING THIS ARTICLE]
Friends of Syria
Jul 26, 2014
A security researcher considered to be among the foremost experts in his field says that more than a half-billion mobile devices running Apple’s latest iOS operating system contain secret backdoors.
Jonathan Zdziarski, also known by his online alias “NerveGas,” told the audience attending his Friday morning presentation at the Hackers on Planet Earth conference in New York City that around 600 million Apple devices, including iPhones and tablets, contain hidden features that allow data to be surreptitiously slurped from those devices.
During Zdziarski’s HOPE presentation, “Identifying Backdoors, Attack Points and Surveillance Mechanisms in iOS Devices,” the researcher revealed that several undocumented forensic services are installed on every new iPhone and iPad, making it easier that ever for a third-party to pull data from those devices in order to compromise a target and take hold of their personal information, including pictures, text messages, voice recordings and more.
Among the hidden functions running on iOS devices, Zdziarski said, are programs called “pcapd,” “file_relay” and “file_relay.” If used properly, he added, those programs can allow anyone with the right means and methodology to pull staggering amounts of data from a targeted phone, even when the rightful owner suspects the device is sufficiently locked.
Zdziarski has previously exploited older versions of the iOS operating system and authored several books on mobile security. Even after raising multiple questions with Apple, however, he said he has yet to figure out why, exactly, the tech giant ships iOS devices with programs that appear to do nothing other than leak digital data.
According to the slides Zdziarski presented during Friday’s talk, there’s little reason to believe the functions are used to run diagnostics or help developers.
“Most services are not referenced by any known Apple software,” one slide says in part, and “the raw format of the data makes it impossible to put data back onto the phone, making useless for Genius Bar or carrier tech purposes.”
“The personal nature of the data makes it very unlikely as a debugging mechanism,” he added.
According to the researcher, evidence of the mysterious programs raises more questions than it does answers.
“Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?” he asked in one slide. “Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone? Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?”
“Apple really needs to step up and explain what these services are doing,” Zdziarski told Ars Technia on Monday after his HOPE presentation was hailed over the weekend by the conference’s attendees as a highlight of the three-day event. “I can’t come up with a better word than ‘backdoor’ to describe file relay, but I’m willing to listen to whatever other explanation Apple has. At the end of the day, though, there’s a lot of insecure stuff running on the phone giving up a lot of data that should never be given up. Apple really needs to fix that.”
Indeed, Apple responded on late Tuesday by saying that the tree functions in question are “diagnostic capabilities to help enterprise IT departments, developers and AppleCare troubleshoot issues.”
“Apple has, in a traditional sense, admitted to having back doors on the device specifically for their own use,” Zdziarski responded quickly on his blog. “Perhaps people misunderstand the term ‘back door’ due to the stigma Hollywood has given them, but I have never accused these ‘hidden access methods’ as being intended for anything malicious, and I’ve made repeated statements that I haven’t accused Apple of working with NSA. That doesn’t mean, however that the government can’t take advantage of back doors to access the same information. What does concern me is that Apple appears to be completely misleading about some of these (especially file relay), and not addressing the issues I raised on others.”
“I give Apple credit for acknowledging these services, and at least trying to give an answer to people who want to know why these services are there – prior to this, there was no documentation about file relay whatsoever, or its 44 data services to copy off personal data. They appear to be misleading about its capabilities, however, in downplaying them, and this concerns me,” he added.
On Apple’s part, the company said they have “never worked with any government agency from any country to create a backdoor in any of our products of services.”
The Corbett Report
Dec 20, 2013
Podcast: Play in new window | Download | Embed
In this blockbuster no-holds-barred conversation, Sibel Edmonds, Guillermo Jimenez and James Corbett discuss Edmonds’ recent series of articles on Glenn Greenwald and his connection to billionaire Pierre Omidyar. We talk about the NSA/PayPal connection and Greenwald’s refusal to discuss this issue, and Edmonds reveals specific examples of publicly documented cases that Greenwald has been covering up for years.
Jan 29, 2014
So Disney Jr., the Disney brand aimed at preschoolers, apparently has a cartoon named Special Agent Oso (http://disneyjunior.com/special-agent…) that features a nanny state ladybug drone named Shutterbug which comes complete with a little camera that transmits video up to a satellite that then sends that data in to headquarters for analysis…”She’s always in flight, on the case both day and night.” (The “case,” in this case, is an infraction involving a parent leaving her daughter in a parked car in their driveway without a seat belt on…)
Even die hard Disney fans that hate on us for reporting on them will have a hard time ignoring the obvious big brother propaganda and indoctrination going on in this creepy, creeeepy cartoon.
There’s even a theme song…but we warn you; it’s the stuff Orwell’s nightmares were made of — http://www.youtube.com/watch?v=9hLowm…
Original article up at 21st Century Wire: http://21stcenturywire.com/2014/01/29…
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
Nov 24, 2012
OUTSTANDING VIDEO . . .
Genetic Modification of all Life!!! New Documentary Film
Enslavement of the human race
This is part of the Endgame but not all . . .MUST WATCH
The State of our World
‘Trans Formation’ By Max Igan
Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering -Film
The latest film by Max Igan, one of the greatest humans to ever walk this planet. This man deserves his rightful place in the history books, right next to the greatest minds of all time. http://thecrowhouse.com/home.html
Max Igan’s YouTube Channel:
http://thecrowhouse.com/home.html [Max Igan's Website]
Electromagnitism and Chemtrails
Transhumanism is – http://www.wordwebonline.com/search.p…
Trans Humanism genetic modification of all life nano technology. HAARP nanotechnology nano transformation trans formation humanism is. Nanoparticles nanotech what is nanotechnology. Future technology transformation
by Brandon Turbeville
Jun 12, 2014
Mimi Al-Laham (SyrianGirl)
In the Orwellian world of post 9/11 hysteria and the Global War On Terror, speaking truth is a revolutionary act. Indeed, such is evidenced by the fact that speaking out against terrorism is now enough to cause you to be labeled as a supporter of terrorism. At least, that is, in certain instances.
This is particularly the case with Mimi Al-Laham, (aka SyrianGirl), a young Syrian woman who has been active on YouTube, social media, and her own website in speaking out about the Western-backed destabilization of Syria.
Laham has consistently denounced the death squads operating inside Syria as terrorists and agents of the West as well as identified the so-called rebellion as being nothing more than a Western – organized, funded, and directed campaign against the Syrian government , all documented fact. For more information on this topic, please see my book, The Road To Damascus, The Anglo-American Assault On Syria.
However, her statements against terrorism, beheadings, rapes, slavery, and wholesale slaughter have caused her to be labelled as a potential “extremist” and purveyor of “extremist rhetoric.” For that reason, Australian security agencies have been closely monitoring Laham’s online statements and, presumably, much more than that.
Australian Institute of Criminology’s Shandon Harris-Hogan said that such statements and online behavior should be watched for “signs of an escalation in rhetoric or calls for violence” and that “When it crosses that line, particularly into encouraging, facilitating or preparing for violence, that’s when it’s going to particularly hit the radar of security services.”
[...CONTINUE READING THIS ARTICLE]