Today's Food for Thought

New Book on Manson Killings and the Intelligence munity (UPDATED on 7/23/’19)

In FTR #809, we highlighted evidentiary tributaries running between the assassinations of both Kennedy brothers and the Manson crimes, the assassination of Robert F. Kennedy, in particular. The Reeve Whitson connection may have some connection to the information discussed in that program. A new book about the Manson Family and their killings highlights the probability that elements of the intelligence munity may have had involvement with the group and its development. One of the most striking of the apparent intelligence munity connections to the Manson investigation is the aforementioned Reeve Whitson. Reeve Whitson: 1.--Was alleged by Iranian immigrant Shahrokh Hatami to have phoned him with knowledge of the killings of Sharon Tate, et al, before the crime was reported by the news media and before law enforcement even arrived at the crime scene!; 2.--Was alleged by the LAPD's top investigator and Sharon Tate's father (a Colonel in Army intelligence) to have been deeply involved with the Manson investigation; 3.--Was alleged by attorney Neil Cummings to have maintained some kind of surveillance on the Cielo Drive home, as part of some sort of work he was doing for the intelligence munity; 4.--Was confirmed as an officer of the CIA by his own ex-wife; 5.--Was known to have felt that he was--in the end--betrayed by the faction of the CIA for which he worked; 6.--Was associated, through his intelligence work with Otto Skorzeny and his wife Ilse; 7.--Was the special adviser to the chairman of the board of the Thyssen firm, also as part of his intelligence work; 8.--Was apparently a close associate of retired General Curtis LeMay, George Wallace's Vice-Presidential candidate in 1968; 9.--Was associated with LeMay when the latter became vice-president of a missile parts manufacturer, which was headed by Mihai Patrichi. Patrichi was a former Romanian army general and a member of the Romanian Iron Guard, part of the Gehlen "Org" and the GOP. Read more »

News & Supplemental

For The Record

Surveillance Valley, Part 6: Double Agents, Part 2 (Foxes Guarding the Online Privacy Henhouse, Part 3)

FTR #1080

MP3: FTR #1080.

Latest Program Recorded is: FTR #1081 Surveillance Valley, Part 7: Yasha Levine Gets the Jim Garrison/Gary Webb Treatment. 

Mr. Emory has how finished and published AFA #39: “The World Will be Plunged into an Abyss . . . .”   Mr. Emory VERY much hopes listeners and readers will closely examine, record and disseminate this information. It may well be what the Nazi future will look like, up to a point.

You can subscribe to the ments made on programs and posts–an excellent source of information in, and of, itself HERE.

Dave Emory’s entire life-time of work is avail-able on a flash drive that can be obtained here. The new drive is a 32-gigabyte drive that is current as of the programs and articles posted by autumn of 2017.

Please consider supporting the WORK DAVE EMORY DOES.

In this program, we resume discussion and analysis of the consummately important recent book Surveillance Valley: The Secret Military History of the Internet by Yasha Levine. In the previous program, we noted, among other points of analysis, the decisive role of Eddie “The Friendly Spook” Snowden in promoting the intelligence-agency crafted Tor network.

In addition to Tor, the Open Technology Fund (read “CIA”) helped finance the Signal app for mobile phones. It, too, is fundamentally promised. ” . . . . . . . . The Tor project remained the best-known privacy app funded by the Open Technology Fund, but it was quickly joined by another: Signal, an encrypted mobile phone messaging app for the iPhone and Android. . . .”

Not surprisingly, the CIA’s Eddie “The Friendly Spook” Snowden was a big promoter of Signal, as well as Tor: ” . . . . People at the ACLU claimed that Signal made federal agents weep. The Electronic Frontier Foundation added Signal alongside Tor to its Surveillance Self-Defense guide. Fight for the Future, a Silicon Valley-funded privacy activist organization, described Signal and Tor as ‘NSA-proof’ and urged people to use them. Edward Snowden was the bo’s biggest and most famous booster and repeatedly took to Twitter to tell his three million followers that he used Signal and Tor every day, and that they should do the same to protect themselves from government surveillance. ‘Use Tor, Use Signal,’ he tweeted out.

“With endorsements like these, Signal quickly became the go-to app for political activists around the world. Egypt, Russia, Syria, and even the United States—millions downloaded Signal, and it became the munication app of choice for those who hoped to avoid police surveillance. Feminist collectives, anti-President Donald Trump protesters, munists, anarchists, radical animal rights organizations, Black Lives Matter activists—all flocked to Signal. Many were heeding Snowden’s advice: ‘Organize. partmentalize to limit promise. Encrypt everything, from calls to texts (use Signal as a first step.)’ . . . .”

Yasha Levine sums up the fundamental contradictions inherent  in this dynamic: ” . . . . If you stepped back to survey the scene, the entire landscape of this new Internet Freedom privacy movement looked absurd. Cold War-era organizations spun off from the CIA now funding the global movement against government surveillance? Google and Facebook, panies that ran private surveillance networks and worked hand in hand with the NSA, deploying government-funded privacy tech to protect their users from government surveillance? Privacy activists working with Silicon Valley and the US government to fight government surveillance—and with the support of Edward Snowden himself? . . . .”

Following Snowden’s promotion of OTF’s Tor and Signal technologies, OTF was at a zenith: ” . . . . After Edward Snowden, OTF was triumphant. It didn’t mention the leaker by name in its promotional materials, but it profited from the crypto culture he promoted and benefited from his direct endorsement of the crypto tools it financed. It boasted that its partnership with both Silicon Valley and respected privacy activists meant that hundreds of millions of people could use the privacy tools the US government had brought to market. And OTF promised that this was just a start: ‘By leveraging social network effects, we expect to expand to a billion regular users taking advantage of OTF-supported tools and Internet Freedom technologies by 2015. . . .’

As eventually became clear, the Tor network was easily breached. It is a safe bet that the fascists grouped around the Pirate Bay site (on which WikiLeaks held forth), had breached Tor’s “secrecy,” in addition to the obvious fact that intelligence services could penetrate it at will.

With this in mind, John Young’s rumination about WikiLeaks sound more and more substantive.

In all probability, WikiLeaks was a huge data mining operation both by the very intelligence agencies who were ostensibly targeted by WikiLeaks, and the Fascist International network around Carl Lundstrom, Daniel Friberg, David Duke et al.

In FTR #’s 756 and 831 we noted Snowden’s fascist views and connections. Levine merely characterizes him as a “right-wing libertarian,” but there is MUCH MORE TO IT THAN  THAT!

Snowden downplayed the fundamental role of the Big Tech firms in aiding and abetting government surveillance, in addition to their own massive surveillance and resultant data mining. ” . . . . There, while living under state protection at an undisclosed location in Moscow, he swept Silicon Valley’s role in Internet surveillance under the rug. Asked about it by Washington Post reporter Barton Gellman, who had first reported on the NSA’s PRISM program, Snowden shrugged off the danger posed by panies like Google and Facebook. The reason? Because private panies do not have the power to arrest, jail, or kill people. ‘Twitter doesn’t put warheads on foreheads,’ he joked. . . .”

Embodying his “corporatist” and Technocratic Fascist point of view, Snowden championed the Big Tech firms as bulwarks against government Internet surveillance, despite the only-too-obvious fact (reinforced by the documents he leaked) that Big Tech is–and always has been–in bed with, and actively collaborating with, the very government intelligence agencies conducting that surveillance: ” . . . . The only islands of safety were the private data centers controlled by private panies—Google, Apple, Facebook. These were the cyber-fortresses and walled cities that offered sanctuary to the masses. In this chaotic landscape, puter engineers and cryptographers played the role of selfless galloping knights and wizard-warriors whose job was to protect the weak folk of the Internet: the young, the old and infirm, families. It was their duty to ride out, weapons aloft, and convey people and their precious data safely from fortress to fortress, not letting any of the information fall into the hands of government spies. He called on them to start a people’s privacy war, rallying them to go forth and liberate the Internet, to reclaim it from the governments of the world. . . .”

The nauseating head of Facebook–Mark Zuckerberg–has decried the intelligence munity’s use of the Internet for data mining. In FTR #1077, we highlighted the Cambridge Analytica affair, and Facebook’s full cooperation with that project at every turn.

Other Big Tech firms had similar reactions. “. . . . . ‘We hadn’t even heard of PRISM before yesterday,’ Mark Zuckerberg wrote in a Facebook post. He blamed the government and positioned Facebook as a victim. “I’ve called President Obama to express my frustration over the damage the government is creating for all of our future. Unfortunately, it seems like it will take a very long time for true full reform.’ Apple,  Microsoft, Google, and Yahoo! All reacted in much the same way, denying the allegations and painting themselves as the victims of government overreach. ‘It’s tremendously disappointing that the government sort of secretly did all this stuff and didn’t tell us. We can’t have a democracy if we’re having to protect you and our users from the government,’ Larry Page told Charlie Rose in an interview on CBS. . . . .”

We present the conclusion of the main part of the book, with Levine’s summation of the inextricable nature and symbiosis between the Internet, the tech firms and the so-called “privacy munity.”

The key points of discussion and analysis of Levine’s book (as a whole) include:

  1. The Internet is a weapon, developed for counter-insurgency purposes.
  2. Big Tech firms network with the very intelligence services they publicly decry.
  3. Big Tech firms that data mine their customers on a nearly unimaginable scale do so as a direct, operational extension of the very surveillance function upon which  the Internet is predicated.
  4. The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum were developed by the very intelligence services they are supposed to deflect.
  5. The technologies touted by the so-called “Privacy Activists” such as Edward Snowden and Jacob Applebaum–such as the Tor Internet function and the Signal mobile phone app– are readily accessible to the very intelligence services they are supposed to deflect.
  6. The organizations that promote the alleged virtues of Snowden, Applebaum, Tor, Signal et al are linked to the very intelligence services they would have us believe they oppose.
  7. Big Tech firms embrace “Internet Freedom” as a distraction from their own willful and all-embracing data mining and their ongoing conscious collaboration with the very intelligence services they publicly decry.

NB: Mr. Levine does not go into the fascistic character of Snowden, Assange, Greenwald et al. Some of those shows: Greenwald–FTR #888, Snowden–FTR #’s 756, 831, Assange and WikiLeaks–FTR #’s 732, 745, 755, 917.

“. . . . Then there was the fact that Signal ran on Amazon’s servers, which meant that all its data were available to a partner in the NSA’s PRISM surveillance program. Equally problematic, Signal needed Apple and Google to install and run the app on people’s mobile phones. Both panies were, and as far as we know still are, partners in PRISM as well. ‘Google usually has root access to the phone, there’s the issue of integrity,’ writes Sander Venema, a respected developer and secure—technology trainer, in a blog post explaining why he no longer remends people use Signal for encrypted chat. ‘Google is still cooperating with the NSA and other intelligence agencies. PRISM is also still a thing. I’m pretty sure that Google could serve a specially modified update or version of Signal to specific target for surveillance, and they would be none the wiser that they installed malware on their phones.’ . . .

. . . . So, although the app encrypted the content of people’s messages, it also marked them with a flashing red sign: ‘Follow Me, I Have Something to Hide.’ (Indeed, activists protesting at the Democratic National Convention in Philadelphia in 2016 told me that they were bewildered by the fact that police seemed to know and anticipate their every move despite their having used Signal to organize. . . .”

” . . . . For many Internet panies, including Google and Facebook, surveillance is the business model. It is the base on which their corporate and economic power rests. Disentangle surveillance and profit, and these panies would collapse. Limit data collection, an the panies would see investors flee and their stock prices plummet. [Italics are mine–D.E.]

“Silicon Valley fears a political solution to privacy. Internet Freedom and crypto offer an acceptable alternative. Tools like Signal and Tor provide a false solution to the privacy problem, focusing people’s attention on government surveillance and distracting them from the private spying carried out by the Internet panies they use every day. All the while, crypto tools give people a [false] sense that they’re doing something to protect themselves, a feeling of personal empowerment and control. And all those crypto radicals? Well, they just enhance the illusion, heightening the impression of risk and danger. With Signal or Tor installed, using an iPhone or Android suddenly bees edgy and radical. So instead of pushing for political and democratic solutions to surveillance, we outsource our privacy politics to crypto apps–software made by the very same powerful entities that these apps are supposed to protect us from. . . .”

DEPARTMENTS

30+ years on the Radio

Dave Emory's weekly For The Record program examines the interconnecting historical processes, people and institutions which shape the plex geopolitical landscape.

Subscribe

Listen

Ask your local station to carry the show.

Latest ‘For The Record’ Posts

FTR #1081 Surveillance Valley, Part 7: Yasha Levine Gets the Jim Garrison/Gary Webb Treatment
Jul 30 We emphasize the treatment afforded Yasha Levine. As might be expected, Levine received the Jim Garrison/Gary Webb treatment. The retribution directed at Yasha Levine epitomizes... Read more »
FTR #1080 Surveillance Valley, Part 6: Double Agents, Part 2 (Foxes Guarding the Online Privacy Henhouse, Part 3)
Jul 23 In this program, we resume discussion and analysis of the consummately important recent book Surveillance Valley: The Secret Military History of the Internet by Yasha... Read more »
FTR #1079 Surveillance Valley, Part 5: Double Agents (Foxes Guarding the Online Privacy Henhouse, Part 2)
Jul 17 Continuing with our examination of Yasha Levine's seminal volume?Surveillance Valley, we continue our analysis of the individuals, institutions and technologies central to the so-called "online... Read more »
FTR #1078 Surveillance Valley, Part 4: Tor Up (Foxes Guarding the Online Privacy Henhouse, Part 1.)
Jul 9 Yasha Levine's summation of the inextricable nature and symbiosis between the Internet, the tech firms and the so-called "privacy munity" include: 1.--The Internet is a weapon,... Read more »
FTR #1077 Surveillance Valley, Part 3: Cambridge Analytica, Democracy and Counterinsurgency
Jul 2 Continuing the discussion from FTR #1076, the broadcast recaps key aspects of analysis of the Cambridge Analytica scandal. In our last program, we noted that both... Read more »

Pterrafractyl's Nest

John Roberts Gives Bad Faith Blessing to Hyper-Partisan Gerrymandering, Paving Way for the Kochstitution. There was an ominous warning about the direction American Democracy was heading When David Frum John Roberts just handed this billionaire faction a massive legal victory in Rucho vs mon Cause: federal courts can't rule on whether or not district lines are drawn in an overly-partisan manner. It's up to each state on its own. And as we're going to see, Republicans already dominate the control of state governments and now state legislatures can gerrymander their own districts without fear of federal meddling. Beyond that, the Kochs and ALEC are working on removing state courts from overseeing redistricting maps too. And to top it off, the Kochs are aggressively pushing for a constitutional convention that could easily turn into a 'runaway' convention. And if there's a constitutional convention, whichever party controls the most states is going to control the oute of the convention. So the Supreme Court just turbocharged the Kochs' capture of state assemblies, the House of Representatives, and eventually the Constitution. Read more »

The 99% Dynamic

Fascism and the Dangers of Economic Concentration
1980 broadcast highlights economic concentration and its historical relationship to fascism. Read more »
ลงทะเบียนฟรี วิธีเล่นบาคาร่า| ทดลองใช้ฟรี วิธีเล่นเกมยิงปลาโชคดี| ส่งเงินบาทไทย เครดิต ฟรี 350| ลงทะเบียนฟรี คา สิ โน 99| ส่งเงินบาทไทย เกมส์ ออนไลน์ คา สิ โน| ทดลองใช้ฟรี sbobet ทดลองเล่นฟรี| ส่งเงินบาทไทย หมายเลขเกมสล็อต| ลงทะเบียนฟรี คาสิโนออนไลน์ได้เงินจริง | ทดลองใช้ฟรี รูเล็ตออนไลน์ มือถือ| เงินฟรี สูตรเล่นเกมยิงปลา| สมัครงานคาสิโนปอยเปต 2019| โปรโมชั่น บาคาร่า เทคนิค| ทดลองใช้ฟรี ทดลอง เล่น ฟรี sbobet| เดิมพันฟรี เกมได้เงินจริง ไม่ฝาก| ลงทะเบียนฟรี เปิด ยูสเซอร์ ขั้น ต่ำ 50 บาท| เดิมพันฟรี แจก เครดิต ฟรี 2000 ไม่ ต้อง ฝาก| เงินฟรี เครดิตฟรี| ทดลองใช้ฟรี เว็บพนันบอล ดีที่สุด| เงินฟรี เล่น ให้ ชนะ คา สิ โน| ทดลองใช้ฟรี คาสิโนออนไลน์จีคลับ| เงินฟรี dafapoker ดี ไหม| ทดลองใช้ฟรี คาสิโน มีอะไรบ้าง| เงินฟรี สล็อตออนไลน์ มือถือ777| ทดลองใช้ฟรี เล่นเกมได้เงินจริง 2019| เงินฟรี สล็อตออนไลน์มือถือฟรี| ฝากเงินขั้นต่ำ50| ลงทะเบียนฟรี แจ็คพอตสล็อตออนไลน์| เดิมพันฟรี เปิดยูสเซอร์ฟรี| ลงทะเบียนฟรี 21 ฟรีเครดิต| ส่งเงินบาทไทย การนำทางหน้าเว็บ| ลงทะเบียนฟรี เว็บ คา สิ โน เปิด ใหม่| ส่งเงินบาทไทย ทดลอง เล่น คา สิ โน ออนไลน์| ทดลองใช้ฟรี โปร สล็อต| เงินฟรี เครดิตฟรีล่าสุด2019| สูตรบาคาร่า w88| ทดลองใช้ฟรี royal1688 ผ่าน มือถือ| ส่งเงินบาทไทย วิธี เอาชนะ สล็อต แมชชีน| โปรโมชั่น เปิด แอ ป ได้ เงิน| เกมออนไลน์| ลงทะเบียนฟรี นักพนันบอลอาชีพ| เงินฟรี แอดไลน์รับเครดิตฟรี 100 บาท| http://www.shengweichaju.com/vv9dbb/ http://iz62eeo.icu http://www.qicheyidai.com/zzz/653.html http://xa1optu.site http://www.china-shuangyi.com http://j1ikoqt.site