On Edward Snowden and Brit Spook, Gareth Williams By Trowbridge H. Ford

15 06 2013

Finally waking from my slumber, thanks to the alleged spying and disappearance of CIA/NSA agent Edward Snowden.

(1)

Seems he went missing with a lot of information that his handlers thought would interest the Chinese Ministry of State Security, not only its mass data mining of the messages of Americans but also its hacking of Chinese sites.

It was believed that Beijing would be happy to take the spy/leaker in, like Sweden was happy to take in leaker/spy David Hemler before the Palme assassination, and the Chinese were most happy to take in leaker/spy Gareth Williams after he learned of the Manhattan 11 fiasco.

While Hemler’s spying led nowhere, resulting in his languishing away in Sweden for all these years, Wlliams was discovered to be a massive problem, and was cruelly murdered by CIA and NSA.

Snowden seems to have been a leaker like Hemler, a leaker whose revelations did nothing to help Sweden while his feedback to NSA apparently let Washington know that Stockholm was not prepared for the Palme shooting – the surprise which was planned to result in a non-nuclear conclusion to the Cold WAr, and would have if it had not been for the spying that the Agency’s Rick Ames, the Bureau’s Robert Hanssen, et al. did for Moscow, and the counter measures it took to prevent what it would have won if it had gone ahead.

Snowden seems to be a replacement for Williams, but he is only interested in making Beijing look like a plotting Yellow Peril – what a Chinese mainland newspaper, The Global News as I recall, has completely scuttled by announcing that its Ministry of State Security recruited Snowden as a spy, probably through some kind of honey trap.

The Denver Post got onto the story, even posting it on its web site, thanks to the prodding of its Pulitzer prize-winning photographer Steven R. Nickerson. Nickerson must have read my articles about what happened to Williams et al., and thought that Snowden’s disappearance was something similar.

Where I was brought into the picture was about two weeks ago when persons claiming to be from the Bureau asked by repeated phone calls on my international land-line if I was Steven Nickerson or knew him or had been dealing with him.

While the callers may well have been from some other agency, most likely the CIA and NSA, and hoping by acting like the FBI would scare me into making damaging admissions, I ignored the questions until, in utter disgust, I denied everything.

Clearly the callers not only hoped to connect me to Nickerson’s revelations but also to make it look like I am a deep Chinese agent.

The CIA has never gotten over its failed attempts to kill me, and the Bureau still hasn’t gotten over its failed attempts to set me up as ‘Jihad Jane’s lover/assassin of Swedish cartoonist Lars Vilks.

 

(2)

Seems Snowden’s helping British spook Gareth Williams hack the lap top computers of the Manhattan 11 – what resulted in his being killed when he threatened to tell China’s Ministry of State Security all about it – is what caused Snowden to look for other work in 2009.

By that time Williams colleague at GCHQ, Gudrun Loftus, had also been killed because she was preparing to take up his mission of exposing how Anglo-American data-miners had been abusing their powers.

When the CIA/NSA decided to set Snowden up as another victim of an apparent Chinese honey-trap, he too decided to go on the warpath, fearing that he too might be murdered because of what he had done, and knew, as he alluded in an interview with the Washington Post’s Barton Gelman.

By going public with all the information he had hurriedly gathered, he stopped any plans to kill him, and made attempts to extradite him more difficult.

He has learned a lot about being his own spy/whistle-blower in order to survive.






The Guardian has NSA surveillance revelations A – Z

9 06 2013

Edward Snowden: the whistleblower behind the NSA surveillance revelations

The NSA Files

The RegisterForget phones, PRISM plan shows internet firms give NSA everything

cryptome has more . . .

ALSO -

America’s Eight Most Unwanted Terrorists
by David R. Hoffman





ABC – Domestic Drones Inch Closer to the Sky Near You

16 02 2013

The Federal Aviation Administration announced Thursday that it is seeking proposals from states, universities and other organizations for six sites where unmanned aircraft systems will be tested – a major step for integrating domestic drones into the U.S. airspace system.

“Our focus is on maintaining and improving the safety and efficiency of the world’s largest aviation system,” Transportation Secretary Ray LaHood said in a statement Thursday. “This research will give us valuable information about how best to ensure the safe introduction of this advanced technology into our nation’s(!!!) skies.” . . . .  (more + video from newscast)

http://abcnews.go.com/blogs/politics/2013/02/domestic-drones-inch-closer-to-sky-near-you/

“Our focus is on maintaining and improving the safety
and efficiency of the world’s largest aviation system,” < TRANSLATION: “Our focus is on maintaining
and improving the safety and efficiency of the world’s largest SPYING system for Big Brother.”





Next Post

21 07 2012

flyingcuttlefish:

Fab! Just fab!

Originally posted on THE GOVERNMENT RAG MAYDAY BLOG:

OFFICIAL DISTRESS CALL TO THE UNITED STATES CITIZENS

 

Attention all MAYDAY MILITARY MOVEMENT Note: All Mayday – The Official Distress Call for the U.S. Citizens will be now located on this blog.

Please visit our Home page The Government Rag to read the Daily’s Headlines & News  - http://www.thegovernmentrag.com 

UPDATE 16JUL2012 - NSA Whistleblower: Spy Agency Gathering Info on ‘Virtually Every US Citizen’

The NSA’s domestic surveillance activities are violating fundamental rights to privacy and due process

(AntiWar – John Glaser) - National Security Agency whistleblower William Binney said on Friday that the US government is secretly gathering information “about virtually every US citizen in the country,” in “a very dangerous process” that violates Americans’ privacy.

NSA Headquarters

Binney, who resigned from the NSA in 2001 over its sweeping domestic surveillance program, delivered a keynote address at the HOPE Number 9 hackers conference in New York.

“They’re pulling together all the data…

View original 298 more words





Massive expansion of domestic spying under Obama

11 07 2012

From WSWS -

By Niall Green

Cell phone companies reported that US government bodies, including federal, state and local law enforcement agencies and courts, made at least 1.3 million demands for subscriber information in 2011.

According to a report in the New York Times, telecommunications companies routinely hand over thousands of pieces of information every day about their customers, including the contents of text messages and caller locations. One of the largest carriers, AT&T, responds to more than 700 government requests for information each day, while another major cell phone company, Sprint, reported that it had received an average of 1,500 government requests each day last year.

Nine telecom companies reported evidence of this pervasive state surveillance of their customers in response to an inquiry from a congressional committee investigating the increased use of phone tapping and other forms of data mining. The Times reports that because of incomplete record-keeping, the actual number of government demands for cell phone users’ private information was almost certainly far higher than the 1.3 million figure reported to Congress. . . (more)

http://wsws.org/articles/2012/jul2012/tapp-j10.shtml

ALSO -

An inquiry by Congressional Representative Edward Markey (D-Mass) has revealed that the number of requests wireless carriers receive from US law enforcement for information about their customers has increased steadily, but just how often the police use mobile phones to track individuals’ whereabouts remains unclear. . . .





WikiLeaks: How Mass Surveillance Contractors Share Your Data with the State

27 12 2011

This article shows why activists need to avoid electronic communucation. All of it.

[snip]  . . . .   Surveillance companies like SS8 in the U.S., Hacking Team in Italy and Vupen in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on ‘voiceprints’. Blue Coat in the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online.

Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011. . . .

 . . . .  In January 2011, the National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store terabytes of domestic and foreign intelligence data forever and process it for years to come.

Telecommunication companies are forthcoming when it comes to disclosing client information to the authorities – no matter the country. Headlines during August’s unrest in the UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates. . . . “

http://wikileaks.org/the-spyfiles.html





Public Info: F.B.I. files on Elenor Roosevelt

28 09 2011

These old files [PDF format] availble from the FBI website say a lot more about the FBI than they do about the first lady.

For a sample of the Hoover-era mindset (not a bit diminished today) see

http://vault.fbi.gov/Eleanor%20Roosevelt/Eleanor%20Roosevelt%20Part%2028%20of%2037