Full Awareness of our current paradigm is being exposed in many different forms through a network of whistleblowers, to expose the truth.
Edward "Snowjob" Snowden
Let's consider the now infamous whistleblower known as Edward Snowden, here is a high school drop-out, sub contractor that is able to infiltrate the ultra Above Top Secret security system of the NSA and download millions of pages of compromising data, armed with nothing more than a flash drive. Operation Snow Job, The Edward Snowden Story will speculate about how the espionage 'Crime of the Century' could have been accomplished by an intelligence sub-contractor with just a top security clearance and no outside help.
Surely the public isn't supposed to accept the notion that he did this on his own without insider help, they really don't expect us to accept this fairy tale, do they?
Then, not only does he get away with this espionage Crime of the Century but is able to elude numerous intelligence agencies, while hip hopping across the globe using commercial air travel to the sanctuary of Russia, even though the U.S. Fake Stream Media is able to track his every move, hello, anybody home?
Perhaps the most damaging part of the story is that he does all this, risking not only his life but those of his families and friends, all because he cannot live with his conscious knowing, what most of us have suspected for decades, that the United States is spying on its own citizens and other countries, WOW, who writes this stuff?
"I don't want to live in a society that does these sort of things," Snowden has said. "I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under. ... I can't in good conscience allow the U.S. government to destroy privacy, Internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building."
I have said for decades, telling anyone that would listen that if intelligence agencies had the power to surveil private citizens without their knowledge and nobody would ever know, they would do so in a heartbeat, this is a no brainer. Remember the rumor that Cricket phones were created by the Government to listen to your conversations, ever wonder why drug dealers never used these cheap throw away phones?
This kind of technology has existed for literally decades and can be installed in normal everyday house hold appliances, your refrigerator, dishwasher, TV and computer or any electronic device.
After all even if you took apart every appliance in the house would the average Joe even know what to look for?
Does anyone really think the little camera on your computer is merely one way, just for taking pictures of you and cannot be accessed through software from the manufacturer, get real, put a piece of duct tape over it right now or put some clothes on, lol!
Twenty years ago I told an IT Tech Guru about my theory of the NSA, CIA, DIA or other Intelligence agencies installing listening and surveillance technology in computers and cell phones and he laughed telling me that kind of technology would require software and computers that simple do not exist.
When the Edward Snowden story broke, he called me even though I hadn't heard from him in a decade and apologized for laughing at me. I simple told him if I was right about that (something he considered nonsense even though he considered himself an expert), consider all the other theories I have shared with you that you told me were impossible . . . there was dead silence on the phone while he contemplated this.
Since I had his attention I asked him if he had ever heard of On-Star and of course he said he had. I said, consider the technology that is able to unlock your car door remotely from miles away, what other parts of your car could they control . . . again dead silence. I told him every new car built since 2005 has On-Star technology, if they could install this technology in your car could they not also install listening devices in it as well, sure they could.
Need to get rid of a pesky reporter digging too deep into a story, does he have a new car? Could they simple hack into the On-Star system and press the accelerator to the floor or disable your brakes . . . I bet they could.
I reminded him that even he accepted the idea that most technology developed by Intelligence Agencies and the Military is almost thirty years ahead of what the public is allowed to use and that he should consider this information before he dismisses silly notions that you don't want to believe but deep down know is possible.
Consider the information from this story before you store your most secret financial and incriminating information on you computer.
WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines -- and can also create a digital highway for launching cyberattacks.
While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.
Let me give you guys a little advice and I know you do it because I have seen it for myself on many peoples computers, DO NOT STORE YOUR PASSWORDS ON YOUR COMPUTER, period end of story! Everything you have ever put on your computer can be retrieved, regardless of if you have thrown it away.
Interview on NBC
"I may have lost my ability to travel," Snowden said. "But I've gained the ability to go to sleep at night and to put my head on the pillow and feel comfortable that I've done the right thing even when it was the hard thing. And I'm comfortable with that."
— Edward Snowden
Snowden Had Inside Help
In an article by the NY Times it is suggested that Edward Snowden may have been working for a foreign intelligence agency. The article Congressional Leaders Suggest Earlier Snowden Link to Russia is designed to cast the blame for this espionage 'crime of the century' on foreign powers and away from any incompetence by the NSA.
This article describes what Representative Mike Rogers, Republican of Michigan had to say about Snowden as a foreign operative;
" . . . as a man who, from the beginning, might have knowingly or unknowingly been directed by a foreign intelligence service. He said the mass of military data in the Snowden trove clearly had nothing to do with privacy or the reach of intelligence services, and he suggested that Mr. Snowden’s possession of a “go bag” to get out of Hawaii, and his smooth entry into Hong Kong, indicated preplanning beyond his individual capacity."
However I submit to my readers that this is merely a disinformation tactic designed to confuse and misdirect public opinion. If a foreign agent with low level security clearance can so thoroughly expose the United States Intelligence apparatus with such ease, then the United States is in Big Trouble.
It is far more likely that he had insider help from a competing intelligence agency here in the U.S., most likely the CIA, which has been rumored to have been aligning itself with the Secret Alliance to over-throw The Cabal. This whole story reeks of insider help and is very reminiscent of Timothy McVeigh, an expendable pawn in a much larger game and they even look alike.
Edward Snowden is hired by the Central Intelligence Agency (CIA) as a technical expert ( IT Tech) in 2006 and receives a top level security clearance. From 2007 to 2009 he is posted in Geneva, Switzerland, under diplomatic cover as an IT and cyber security expert, which gives him access to a wide variety of classified documents.
During this time he becomes disillusioned about how Intelligence Agencies go about influencing citizens to cooperate into giving up information. He tells the story of one operation in which CIA operatives get a high ranking bank employee drunk at a local bar, encourage him to drive home, tip off the local police to pull him over and arrest him for drunken driving and then come to his rescue to make it all go away, if he shares secret banking information with them.
After being criticized by superiors with an official reprimand on his record, for accessing files he was unauthorized to having access to and supposedly leaking them and yet no investigation is conducted (really?), he leaves the CIA and goes to work for Dell as a private contractor, in 2012. According to the CIA's own documents, he is one of over 850,000 people with top-secret security clearance, working in the private sector, which of course begs the question of whether this "official reprimand" is only a cover story for a CIA operative.
Over the course of the next two years he works for Dell in both the CIA branch and the NSA branch or division of Dell, a somewhat highly suspicious maneuver, for a supposedly disgruntled employee of the Intelligence Services, are we seeing a pattern? In March of 2012, Edward Snowden moves to Hawaii to work at a NSA facility there as a Dell employee. By December of 2012 he reaches out to reporter and columnist Glenn Greenwald of The Guardian and in early 2013 to documentary filmmaker Laura Poitras.
Stop and Think . . .
Now let's stop right here . . . and think about this for a second . . . shall we?
Supposedly, this disgruntled ex-CIA/NSA employee, working in the private sector on a NSA facility, that already has a reprimand for supposedly breaking into secure documents and leaking them, reaches out to two reporters about Intelligence eavesdropping and surveillance programs and yet we are supposed to accept that neither the CIA nor the NSA is aware of this . . . What is wrong with this picture?
The Snow Job
Let's assume for the moment that Edward Snowden was savvy enough to either contact these two journalists, through encrypted messages or through snail mail because obviously if you're about to blow the whistle on Intelligence Agencies ability to electronically eavesdrop on the world's electronic mail, you wouldn't contact them through the internet or phone.
In March 2013 he becomes a private contractor with Booz Allen Hamilton while still working at the same NSA Facility in Hawaii, this folks is a major red flag. He takes a leave of absence for medical reasons related to epilepsy in May of 2013, how convenient, and flies to Hong Kong, well known for its liberal society and reluctance to extradite people wanted by the United States.
Greenwald and Piotras arrive in Hong Kong June 2, 2013 and by June 5, 2013 the first of many articles are published in The Guardian from documents provided by Snowden detailing the NSAs collection of email and telephone metadata from Verizon.
The next day, June 6, 2013, both the Washington Post and The Guardian publish articles about the NSA program known as PRISM, which "forces" the biggest United States internet companies to hand over personal internet data from domestic users.
June 8, The Guardian publishes an article revealing the NSA collected 3 Billion pieces of intelligence from inside the USA in February, 2013 alone.
June 9, 2013 The Guardian identifies Edward Snowden as the source of the NSA leaks.
Regardless of the veracity behind this exposure by the Snowden Documents of the NSA, it has accomplished its goal of awakening the American people to The Cabals use of nefarious tactics to further enslave the public, mission accomplished. However if we considered that he is merely a pawn in a much larger chess game that goes well beyond our understanding of the moves and strategy, then this scenario makes a lot more sense.
They are patriots who DO want to tell us the truth -- and improve our world. Secrecy is a burden that most of these personnel would love to release -- even just in their day-to-day life at home with their families. I do believe a positive international alliance is orchestrating this ever-increasing disclosure of new information -- behind the scenes. Some members of this alliance are still working within the intelligence services themselves as well -- under deep cover, in fear for their lives.
— David Wilcock
Timeline of Data Dumps
Here is a timeline of the major release of information from the documents Edward Snowden collected from the NSA Top Secret files and brief description of each. Remember these are just few of the highlights of the thousands of documents revealed over a two year period.
June 6, 2013, - Using a Top Secret court order the NSA collected millions of telephone records from Verizon wireless customers.
June 7, 2013, - Using the program code named PRISM, the NSA collected private information from internet companies such as Google and Face-book.
June 7, 2013, - President Obama outlines a plan, in an 18 page memo, for Intelligence Agencies to commit cyber-attacks on Overseas targets.
June 8, 2013, - Details emerge about a program called Boundless Informant, which gives the NSA real-time intelligence on the coverage assets in certain regions using heat-map signature.
June 13, 2013, - Documents reveal the NSA routinely hacks civilian and military computers in Hong Kong and China, which indicates they knew where Edward Snowden was staying when he fled there, from Hawaii in 2012.
June 16, 2013, - Britain's GCHQ intercepted internet and phone conversations of all foreign diplomats and politicians attended the G-20 summit in London in 2009.
June 27, 2013, - The NSA uses a program, code name Evil Olive, to track and store American citizens internet meta-data.
June 30, 2013, - The NSA spies on millions of phone calls, emails, and text messages of ordinary German citizens.
July 6, 2013, - A program known as Fairview allows the NSA to collect internet and telephone data from Brazilian citizens.
July 6, 2013, - Monitoring stations in Australia and New Zealand feed data back to NSA's XKeyscore program.
July 9, 2013, - Documents reveal that the NSA collects and stores, internet and telephone data, from all the South American countries, including private citizens and Governments.
July 31, 2013, - Using the Xkeyscore program and PRISM database NSA agents can surf through a massive digital database of online chatrooms, emails and browsing histories in real time. This gives them literally real-time access to the World Wide Web.
August 1, 2013, - The US Government pays Great Britain's GCHQ $155 million dollars for access and use to their world wide network of spying programs, which access underground and undersea fiber-optic cables.
August 2, 2013, - The world's seven largest telecommunication companies give GCHQ complete unlimited access to their undersea network of fiber-optic cables.
August 9, 2013, - An internal NSA document reveals a loophole that allows the agency to search internet and telephone communications of any USA citizen without a warrant.
August 29, 2013, - Documents reveal the budget for the 16 United States Above Top Secret "Black Operations" as exceeding $52 Billion dollars and that the NSA alone pays US Companies hundreds of millions of dollars to have access to their networks. What's wrong with this picture?
August 30, 2013, - Documents reveal the United States carried out 231 cyber attacks domestically and abroad in 2011.
September 5, 2013, - A joint investigation reveals that the NSA using super computers, court orders is able to defeat most encryption software.
September 7, 2013, - NSA documents show the NSA can access all smart-phones on the market regardless of the maker.
October 14, 2013, - The NSA has collected over 250 million United States citizen's contact lists from Gmail and Yahoo.
October 27, 2013, - The NSA has over 80 surveillance stations located around the world.
November 23, 2013, - The NSA infects 50,000 computer networks world wide with malware designed to steal sensitive information.
December 20, 2013, - The NSA secretly pays RSA $10 million dollars to create backdoor into their encryption software.
January 2, 2014, - With a $80 Million dollar budget the NSA is working on constructing a super computer that can break any new encryption codes, anywhere, anytime.
January 14, 2014, - Using radio transmitters and flash drives the NSA can access computers not connected to the internet.
January 27, 2014, - The NSA scoops up personal data from cell phone users by mining apps such as Angry Birds.
March 12, 2014, - The NSA has sophisticated malware that can actually be used, for example as a fake Face-book server, to steal a targets personal information.
April 4, 2014, - The NSA and GCHQ discuss ways to create deception and propaganda by pushing false stories and messages on social media sites.
May 12, 2014, - The NSA routinely intercepts routers, servers and other computer networking equipment, implanting "back door" surveillance equipment, then repackages them with a factory seal and ships them out.
May 31, 2014, - The NSA harvests millions of faces from web images for their facial recognition database.
Now try to remember this is just a small sample of the millions of documents Edward Snowden was able to steal from the NSA and that it is now at least four years old. So while many of us suspected this kind of surveillance was going on, I don't think anyone realized the extensive reach nor the sophistication the NSA had developed.
Edward Snowden, Traitor vs Whistleblower?
Two Broken Legs . . . Really?
I even question the two broken legs story, it seems a little too convenient for me but of course I question everything so this shouldn't be a surprise to my readers.
Let's consider shall we, the story of this high-school drop out with mad-nerd IT skills, trying to become a special forces operative, because he is inspired by the events of 9/11 . . . who writes this stuff?
He becomes a CIA operative and almost immediately is sent undercover to Switzerland, Tom Clancy eat your heart out. While there he is reprimanded for supposedly stealing top secret documents and leaking them but no investigation is conducted and he is just allowed to go into the private sector to work for Dell . . . OK?
From there it is off to Hawaii, for a $200,000 a year job being an IT Tech, does this sound right to you, is this the reality you guys live in? From there he steals 1.5 million documents using a flash drive, right under the noses of the NSA and flies commercial to Hong Kong as his hideout from the Bad Guys . . . WOW!
No wonder its a movie, it writes itself!
Edward Snowden The Movie
Regardless of his own personal motives, Operation Snow Job, The Edward Snowden Story, will go down in the history of this country as one of the greatest intelligence crimes of the new century. It has garnered a lot of media attention and publicity and I do not think this was an accident, in fact I think this was its primary purpose.
Now this story may very well have been merely an intelligence turf war, one intelligence group exposing another for the purpose of distracting America's attention away from them. However I submit to my readers that it was part of a long term strategy to expose censorship, the distortion of our Constitutional rights of privacy, evasive intrusions into our right to free speech and even our rights to bear arms.
It is no accident that Edward Snowden got the jobs he did, had access to the sensitive information he downloaded or was able to elude the NSA throughout his journey across the globe, eventually finding a sanctuary in Russia. This was a planned operation from the get go, even down to his cover story of doing this to protect his conscious, so that he could sleep at night, after all we only have his word and few others that he is even in Russia.
While he was in Hong Kong revealing his material to the world, he was living the life of luxury, with seemingly no worries of the NSA busting down his door. Let's remember, according to him the NSA has had for years the kind of evasive hacker software and intelligence network to track anyone, anywhere in real time and Edward was not hidden away in some cave but in a luxury hotel in one of the busiest electronic centers in the world, Hong Kong.
His own disclosure showed that the NSA had already hacked into every major network in Hong Kong and yet we are to accept the notion they could not find him . . . uh . . . what's wrong with this picture?
According to his own admissions he spent three weeks in one hotel room, in the middle of one of the busiest cities in the world and only left the room three times, while the biggest Intelligence Network in the world couldn't find him but two very public journalist had complete access to him, things that make you go Hmmm?
Then he hops on a commercial plane to Ecuador but ends up getting "stuck' in Moscow, where he has been ever since . . . or so we are told. I don't know about you guys but that sounds like a made for TV movie or some outlandish Tom Clancy novel.
In light of Steve Pieczenik's recent videos about silent coup's let's re-examine this quote taken from the Brain Williams interview aired on NBC News and remember if groups within the United States Intelligence apparatus want to send a message not only to its own operatives but the American public as well, how would they articulate it . . . think about it?
When Williams asked, "Do you see yourself as a patriot," Snowden answered immediately.
"I do," he said. "I think patriot is a word that's -- that's thrown around so much that it can devalued nowadays. But being a patriot doesn't mean prioritizing service to government above all else. Being a patriot means knowing when to protect your country, knowing when to protect your Constitution, knowing when to protect your countrymen from the -- the violations of and encroachments of adversaries. And those adversaries don't have to be foreign countries. They can be bad policies. They can be officials who, you know, need a little bit more accountability. They can be mistakes of government and — and simple overreach and — and things that — that should never have been tried, or — or that went wrong."
I think Operation Snow Job, The Edward Snowden Story, is really about sending a message not just to the American people but the entire world, that we need to create transparency now before its too late. I hope you have enjoyed reading this as much as I have had in writing this article. Let's try to remember, one person can make a difference, simply by taking a stand for what they think is the moral and ethical behavior of a true hero!
At many stages of the game the general choice is available; what to do now that there is no coercion? Epigrammatically, it may be said: Tactics are what you do when there is something to do. Strategy is what you do when there is nothing to do. That isolation, however, is rare. Strategy is a feature, albeit unobserved, of most good tactical play. It is latent – not patent.’
— Gerald Abrahams - 1965
© 2016 somethgblue
Pamela Jason, on June 21, 2017:
Shazzam, great article love's it right on, nobody see's with more Pure and Abject Clarity/Dzogchen than you do, asking question's and not accepting the usual superficial, Bravo Sierra, that comes our way.. AWESOME share post.. Keep it up Blue!
pam jason on March 09, 2017:
Well written and articulated
no stone left unturned.. Nice work Blue
BC.ManDingo on November 23, 2016:
"One Of The Greatest Cons Ever Played On The Public"
Snowden's NSA Stories are and were a Ruse to sell Cyber-Security Contracts Worldwide.
A series of cover story stratagems offered up by the Obama Administration;
Bringing NSA Clandestine Operations into the light of day on a World Stage.
Outcome: Raised Public Awareness and made intelligence collection and
dissemination unpalatable to public tastes through Media outlets.
"Honesty and Truth is Always Stranger than Fiction" BC.ManDingo.
Doris James MizBejabbers from Beautiful South on November 07, 2016:
Yep, and I've been working on that for several years. How 'bout you?
somethgblue (author) from Shelbyville, Tennessee on November 07, 2016:
Agreed and perhaps we could find an answer to that by learning telepathy which would not require the use of electronic devices. I betchya it is all about practice and opening up the Pineal Gland.
Doris James MizBejabbers from Beautiful South on November 07, 2016:
Blue, you have brought out several things in this article, which I hold to be very suspicious. One is the high school dropout becoming a high-paid computer nerd. From what I know about the CIA, they hire not very educated people to take the fall when something goes wrong. Oswald, McVeigh, Snowden, perhaps? Also, from what you are saying, Dell is playing a suspicious role in intelligence shenanigans. Dell has gone from “Dude, it’s a Dell” to “Dude, it’s a Dud,” so maybe that explains some quality issues.
BTW, I’ve heard that Russia is getting tired of protecting Snowden and may be cutting him loose soon. Don’t these dummys know that when their usefulness is used up, they are sitting ducks?
Personally, it is very easy to believe that we citizens are being spied upon. In the 1990s we bought a really neat old-fashioned style wall phone, which didn’t last but a couple of years. My husband, an electronics engineer, took the phone apart to see if he could repair it. Inside the receiver was a an extra microphone that had nothing to do with the phone’s voice mic. It was about the size of a nickel, and my husband recognized it as a “bug”. Needless to say, he took apart our other phones, and fortunately, found none in our regular “Ma Bell” phones. But we still refrained from talking about anything controversial in a room with a telephone in it. Maybe we should check out our other appliances, too.
I agree that we have given up too much of our privacy, which has been blamed on the NSA and 9-11, but I don’t think people realize that the issue began before 9-11. The problem is that we need to reach a balance between true national security and the public’s right to know.
Jack Lee from Yorktown NY on November 07, 2016:
Somethgblue, You missed the biggest point of the Snowdon whistleblower event. He exposed the NSA for breaking our laws on surveillance. That by itself is the key point. History teaches us when a government agency is un-checked, it leads to very bad things. I may not agree with the path Snowden took to do what he did, but in my mind, he did sacrifice personally to expose corruption and crime against the American people. He did the job that the media was suppose to do in the past. As we all know, the media is not looking out for us and in fact with the wikileaks revelations, they are complicit in deceiving the American people and covering up for politicians of party they support.
Suzie from Carson City on November 06, 2016:
Blue....I responded to your email. Thank you so much, dear friend. I would LOVE to be included.....but.....well, I'll wait for your response!
somethgblue (author) from Shelbyville, Tennessee on November 06, 2016:
Thank you and I have missed you, I have been spending to much time with my secret FB group I created.
I will invite you but be prepared for having you socks blown off, we talk about some amazing stuff.
Right now we are discussing the therapeutic and veracity merits of Reverse Speech. It has been proven to be the ultimate lie detector test, really amazing stuff.
Suzie from Carson City on November 06, 2016:
blue....I've missed our interaction. I take the blame~just haven't been online as much as before.
I definitely am not surprised by your admission that you question everything. This fact is thoroughly apparent in your fascinating work. It's the way we should ALL be. However, only the few like yourself will then take and time, energy & brain power to look deeply into a particular issue. It takes a special curious and overly intelligent individual.
Snowden? I will admit that I fully appreciate the TRUTH being exposed . We have every right to know what goes on around us by whom, how and why! Secrets, covert operation, all the spying....it's too creepy and simply WRONG. I can't decide whether I believe he worked alone in this disclosure, but I tend to think if there was someone else, we'd know by now.
I will say that my favorite person of all ( next to YOU, of course) at this point and time is Julian Assange. He's a hero for exposing all the corruption most of us have always suspected. We have the RIGHT to know. Period!
somethgblue (author) from Shelbyville, Tennessee on November 06, 2016:
Have you read The Eight by Katherine Neville, I just finished the sequel called The Fire, which was really good. About the Montglane Chess Service and immortality, just a fascinating read how she weaves history into the tapestry of her story.
Thanks for sharing!
It's interesting how when you begin to research ideas your perspective of the events often change to reveal a deeper understanding.
Nadine May from Cape Town, Western Cape, South Africa on November 06, 2016:
That was a very thought provoking article Daniel, and yes it has made me starting to question if he is indeed merely a pawn in a much larger chess game. I will share it.
somethgblue (author) from Shelbyville, Tennessee on November 06, 2016:
It is like Seal Team Six, if you publicly get rid of those in the know then they can't be interviewed and have a change of heart and reveal it is one big con job or this case snow job.
Do you really think Seal Team Six died in a helicopter crash, I don't?
CJ Kelly from the PNW on November 06, 2016:
Here's my issue with Snowden:
Why did he run away? I still think if he had stayed and fought (after going public first), he would be a bigger hero today. That's why many don't look at him in the same light. He's in Moscow. I realize paranoia may have played with his mind and he thought he might be killed. Gotta wonder what Greenwald really told him.
Endless topic. Sharing.