Operation Snow Job: The Edward Snowden Story
Edward "Snowjob" Snowden
Let's consider the now infamous whistleblower known as Edward Snowden, here is a high school drop-out, sub contractor that is able to infiltrate the ultra Above Top Secret security system of the NSA and download millions of pages of compromising data, armed with nothing more than a flash drive. Operation Snow Job, The Edward Snowden Story will speculate about how the espionage 'Crime of the Century' could have been accomplished by an intelligence sub-contractor with just a top security clearance and no outside help.
Surely the public isn't supposed to accept the notion that he did this on his own without insider help, they really don't expect us to accept this fairy tale, do they?
Then, not only does he get away with this espionage Crime of the Century but is able to elude numerous intelligence agencies, while hip hopping across the globe using commercial air travel to the sanctuary of Russia, even though the U.S. Fake Stream Media is able to track his every move, hello, anybody home?
Perhaps the most damaging part of the story is that he does all this, risking not only his life but those of his families and friends, all because he cannot live with his conscious knowing, what most of us have suspected for decades, that the United States is spying on its own citizens and other countries, WOW, who writes this stuff?
"I don't want to live in a society that does these sort of things," Snowden has said. "I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under. ... I can't in good conscience allow the U.S. government to destroy privacy, Internet freedom and basic liberties for people around the world with this massive surveillance machine they're secretly building."
I have said for decades, telling anyone that would listen that if intelligence agencies had the power to surveil private citizens without their knowledge and nobody would ever know, they would do so in a heartbeat, this is a no brainer. Remember the rumor that Cricket phones were created by the Government to listen to your conversations, ever wonder why drug dealers never used these cheap throw away phones?
This kind of technology has existed for literally decades and can be installed in normal everyday house hold appliances, your refrigerator, dishwasher, TV and computer or any electronic device.
After all even if you took apart every appliance in the house would the average Joe even know what to look for?
Does anyone really think the little camera on your computer is merely one way, just for taking pictures of you and cannot be accessed through software from the manufacturer, get real, put a piece of duct tape over it right now or put some clothes on, lol!
Twenty years ago I told an IT Tech Guru about my theory of the NSA, CIA, DIA or other Intelligence agencies installing listening and surveillance technology in computers and cell phones and he laughed telling me that kind of technology would require software and computers that simple do not exist.
When the Edward Snowden story broke, he called me even though I hadn't heard from him in a decade and apologized for laughing at me. I simple told him if I was right about that (something he considered nonsense even though he considered himself an expert), consider all the other theories I have shared with you that you told me were impossible . . . there was dead silence on the phone while he contemplated this.
Since I had his attention I asked him if he had ever heard of On-Star and of course he said he had. I said, consider the technology that is able to unlock your car door remotely from miles away, what other parts of your car could they control . . . again dead silence. I told him every new car built since 2005 has On-Star technology, if they could install this technology in your car could they not also install listening devices in it as well, sure they could.
Need to get rid of a pesky reporter digging too deep into a story, does he have a new car? Could they simple hack into the On-Star system and press the accelerator to the floor or disable your brakes . . . I bet they could.
I reminded him that even he accepted the idea that most technology developed by Intelligence Agencies and the Military is almost thirty years ahead of what the public is allowed to use and that he should consider this information before he dismisses silly notions that you don't want to believe but deep down know is possible.
Consider the information from this story before you store your most secret financial and incriminating information on you computer.
WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines -- and can also create a digital highway for launching cyberattacks.
While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.
Let me give you guys a little advice and I know you do it because I have seen it for myself on many peoples computers, DO NOT STORE YOUR PASSWORDS ON YOUR COMPUTER, period end of story! Everything you have ever put on your computer can be retrieved, regardless of if you have thrown it away.
"I may have lost my ability to travel," Snowden said. "But I've gained the ability to go to sleep at night and to put my head on the pillow and feel comfortable that I've done the right thing even when it was the hard thing. And I'm comfortable with that."— Edward Snowden
Smart Meters and Survellience
Snowden Had Inside Help
In an article by the NY Times it is suggested that Edward Snowden may have been working for a foreign intelligence agency. The article Congressional Leaders Suggest Earlier Snowden Link to Russia is designed to cast the blame for this espionage 'crime of the century' on foreign powers and away from any incompetence by the NSA.
This article describes what Representative Mike Rogers, Republican of Michigan had to say about Snowden as a foreign operative;
" . . . as a man who, from the beginning, might have knowingly or unknowingly been directed by a foreign intelligence service. He said the mass of military data in the Snowden trove clearly had nothing to do with privacy or the reach of intelligence services, and he suggested that Mr. Snowden’s possession of a “go bag” to get out of Hawaii, and his smooth entry into Hong Kong, indicated preplanning beyond his individual capacity."
However I submit to my readers that this is merely a disinformation tactic designed to confuse and misdirect public opinion. If a foreign agent with low level security clearance can so thoroughly expose the United States Intelligence apparatus with such ease, then the United States is in Big Trouble.
It is far more likely that he had insider help from a competing intelligence agency here in the U.S., most likely the CIA, which has been rumored to have been aligning itself with the Secret Alliance to over-throw The Cabal. This whole story reeks of insider help and is very reminiscent of Timothy McVeigh, an expendable pawn in a much larger game and they even look alike.
Edward Snowden is hired by the Central Intelligence Agency (CIA) as a technical expert ( IT Tech) in 2006 and receives a top level security clearance. From 2007 to 2009 he is posted in Geneva, Switzerland, under diplomatic cover as an IT and cyber security expert, which gives him access to a wide variety of classified documents.
During this time he becomes disillusioned about how Intelligence Agencies go about influencing citizens to cooperate into giving up information. He tells the story of one operation in which CIA operatives get a high ranking bank employee drunk at a local bar, encourage him to drive home, tip off the local police to pull him over and arrest him for drunken driving and then come to his rescue to make it all go away, if he shares secret banking information with them.
After being criticized by superiors with an official reprimand on his record, for accessing files he was unauthorized to having access to and supposedly leaking them and yet no investigation is conducted (really?), he leaves the CIA and goes to work for Dell as a private contractor, in 2012. According to the CIA's own documents, he is one of over 850,000 people with top-secret security clearance, working in the private sector, which of course begs the question of whether this "official reprimand" is only a cover story for a CIA operative.
Over the course of the next two years he works for Dell in both the CIA branch and the NSA branch or division of Dell, a somewhat highly suspicious maneuver, for a supposedly disgruntled employee of the Intelligence Services, are we seeing a pattern? In March of 2012, Edward Snowden moves to Hawaii to work at a NSA facility there as a Dell employee. By December of 2012 he reaches out to reporter and columnist Glenn Greenwald of The Guardian and in early 2013 to documentary filmmaker Laura Poitras.
Stop and Think . . .
Now let's stop right here . . . and think about this for a second . . . shall we?
Supposedly, this disgruntled ex-CIA/NSA employee, working in the private sector on a NSA facility, that already has a reprimand for supposedly breaking into secure documents and leaking them, reaches out to two reporters about Intelligence eavesdropping and surveillance programs and yet we are supposed to accept that neither the CIA nor the NSA is aware of this . . . What is wrong with this picture?
The Snow Job
Let's assume for the moment that Edward Snowden was savvy enough to either contact these two journalists, through encrypted messages or through snail mail because obviously if you're about to blow the whistle on Intelligence Agencies ability to electronically eavesdrop on the world's electronic mail, you wouldn't contact them through the internet or phone.
In March 2013 he becomes a private contractor with Booz Allen Hamilton while still working at the same NSA Facility in Hawaii, this folks is a major red flag. He takes a leave of absence for medical reasons related to epilepsy in May of 2013, how convenient, and flies to Hong Kong, well known for its liberal society and reluctance to extradite people wanted by the United States.
Greenwald and Piotras arrive in Hong Kong June 2, 2013 and by June 5, 2013 the first of many articles are published in The Guardian from documents provided by Snowden detailing the NSAs collection of email and telephone metadata from Verizon.
The next day, June 6, 2013, both the Washington Post and The Guardian publish articles about the NSA program known as PRISM, which "forces" the biggest United States internet companies to hand over personal internet data from domestic users.
June 8, The Guardian publishes an article revealing the NSA collected 3 Billion pieces of intelligence from inside the USA in February, 2013 alone.
June 9, 2013 The Guardian identifies Edward Snowden as the source of the NSA leaks.
Regardless of the veracity behind this exposure by the Snowden Documents of the NSA, it has accomplished its goal of awakening the American people to The Cabals use of nefarious tactics to further enslave the public, mission accomplished. However if we considered that he is merely a pawn in a much larger chess game that goes well beyond our understanding of the moves and strategy, then this scenario makes a lot more sense.
They are patriots who DO want to tell us the truth -- and improve our world. Secrecy is a burden that most of these personnel would love to release -- even just in their day-to-day life at home with their families. I do believe a positive international alliance is orchestrating this ever-increasing disclosure of new information -- behind the scenes. Some members of this alliance are still working within the intelligence services themselves as well -- under deep cover, in fear for their lives.— David Wilcock
Timeline of Data Dumps
Here is a timeline of the major release of information from the documents Edward Snowden collected from the NSA Top Secret files and brief description of each. Remember these are just few of the highlights of the thousands of documents revealed over a two year period.
June 6, 2013, - Using a Top Secret court order the NSA collected millions of telephone records from Verizon wireless customers.
June 7, 2013, - Using the program code named PRISM, the NSA collected private information from internet companies such as Google and Face-book.
June 7, 2013, - President Obama outlines a plan, in an 18 page memo, for Intelligence Agencies to commit cyber-attacks on Overseas targets.
June 8, 2013, - Details emerge about a program called Boundless Informant, which gives the NSA real-time intelligence on the coverage assets in certain regions using heat-map signature.
June 13, 2013, - Documents reveal the NSA routinely hacks civilian and military computers in Hong Kong and China, which indicates they knew where Edward Snowden was staying when he fled there, from Hawaii in 2012.
June 16, 2013, - Britain's GCHQ intercepted internet and phone conversations of all foreign diplomats and politicians attended the G-20 summit in London in 2009.
June 27, 2013, - The NSA uses a program, code name Evil Olive, to track and store American citizens internet meta-data.
June 30, 2013, - The NSA spies on millions of phone calls, emails, and text messages of ordinary German citizens.
July 6, 2013, - A program known as Fairview allows the NSA to collect internet and telephone data from Brazilian citizens.
July 6, 2013, - Monitoring stations in Australia and New Zealand feed data back to NSA's XKeyscore program.
July 9, 2013, - Documents reveal that the NSA collects and stores, internet and telephone data, from all the South American countries, including private citizens and Governments.
July 31, 2013, - Using the Xkeyscore program and PRISM database NSA agents can surf through a massive digital database of online chatrooms, emails and browsing histories in real time. This gives them literally real-time access to the World Wide Web.
August 1, 2013, - The US Government pays Great Britain's GCHQ $155 million dollars for access and use to their world wide network of spying programs, which access underground and undersea fiber-optic cables.
August 2, 2013, - The world's seven largest telecommunication companies give GCHQ complete unlimited access to their undersea network of fiber-optic cables.
August 9, 2013, - An internal NSA document reveals a loophole that allows the agency to search internet and telephone communications of any USA citizen without a warrant.
August 29, 2013, - Documents reveal the budget for the 16 United States Above Top Secret "Black Operations" as exceeding $52 Billion dollars and that the NSA alone pays US Companies hundreds of millions of dollars to have access to their networks. What's wrong with this picture?
August 30, 2013, - Documents reveal the United States carried out 231 cyber attacks domestically and abroad in 2011.
September 5, 2013, - A joint investigation reveals that the NSA using super computers, court orders is able to defeat most encryption software.
September 7, 2013, - NSA documents show the NSA can access all smart-phones on the market regardless of the maker.
October 14, 2013, - The NSA has collected over 250 million United States citizen's contact lists from Gmail and Yahoo.
October 27, 2013, - The NSA has over 80 surveillance stations located around the world.
November 23, 2013, - The NSA infects 50,000 computer networks world wide with malware designed to steal sensitive information.
December 20, 2013, - The NSA secretly pays RSA $10 million dollars to create backdoor into their encryption software.
January 2, 2014, - With a $80 Million dollar budget the NSA is working on constructing a super computer that can break any new encryption codes, anywhere, anytime.
January 14, 2014, - Using radio transmitters and flash drives the NSA can access computers not connected to the internet.
January 27, 2014, - The NSA scoops up personal data from cell phone users by mining apps such as Angry Birds.
March 12, 2014, - The NSA has sophisticated malware that can actually be used, for example as a fake Face-book server, to steal a targets personal information.
April 4, 2014, - The NSA and GCHQ discuss ways to create deception and propaganda by pushing false stories and messages on social media sites.
May 12, 2014, - The NSA routinely intercepts routers, servers and other computer networking equipment, implanting "back door" surveillance equipment, then repackages them with a factory seal and ships them out.
May 31, 2014, - The NSA harvests millions of faces from web images for their facial recognition database.
Now try to remember this is just a small sample of the millions of documents Edward Snowden was able to steal from the NSA and that it is now at least four years old. So while many of us suspected this kind of surveillance was going on, I don't think anyone realized the extensive reach nor the sophistication the NSA had developed.
"I know the media likes to personalise political debates, and I know the government will demonise me . . . I really want the focus to be on these documents and the debate which I hope this will trigger among citizens around the globe about what kind of world we want to live in." He added: "My sole motive is to inform the public as to that which is done in their name and that which is done against them."
Edward Snowden, Traitor vs Whistleblower?
Is Edward Snowden a traitor of the United States?See results without voting
Two Broken Legs . . . Really?
I even question the two broken legs story, it seems a little too convenient for me but of course I question everything so this shouldn't be a surprise to my readers.
Let's consider shall we, the story of this high-school drop out with mad-nerd IT skills, trying to become a special forces operative, because he is inspired by the events of 9/11 . . . who writes this stuff?
He becomes a CIA operative and almost immediately is sent undercover to Switzerland, Tom Clancy eat your heart out. While there he is reprimanded for supposedly stealing top secret documents and leaking them but no investigation is conducted and he is just allowed to go into the private sector to work for Dell . . . OK?
From there it is off to Hawaii, for a $200,000 a year job being an IT Tech, does this sound right to you, is this the reality you guys live in? From there he steals 1.5 million documents using a flash drive, right under the noses of the NSA and flies commercial to Hong Kong as his hideout from the Bad Guys . . . WOW!
No wonder its a movie, it writes itself!
Edward Snowden The Movie
- Censorship Lives In 2012
Censorship Lives In 2012 and is the only power the elite rich have left to keep the awakening public from their doorstep. Knowing full well the deceit and betrayal they have committed against humanity they continue to spread disinformation and confus
- Hypnotizing The Masses Through Electronic Mind Control
Every new electronic device, from smart phones to refrigerators have micro-processors embedded in them that not only listen but transmit and can be remotely controlled through the internet.
- Censorship Denial Is All Smoke and Mirrors
A sample of censored stories, misleading information and denial. From 9/11 to Chem-trails the public has been denied information from MainStream Media outlets.
- Censorship on the Internet from Latest Terrorist Attacks
A look at how current events and terrorist acts are used to curb our constitutional rights, from new laws on civil liberties to internet censorship.
Regardless of his own personal motives, Operation Snow Job, The Edward Snowden Story, will go down in the history of this country as one of the greatest intelligence crimes of the new century. It has garnered a lot of media attention and publicity and I do not think this was an accident, in fact I think this was its primary purpose.
Now this story may very well have been merely an intelligence turf war, one intelligence group exposing another for the purpose of distracting America's attention away from them. However I submit to my readers that it was part of a long term strategy to expose censorship, the distortion of our Constitutional rights of privacy, evasive intrusions into our right to free speech and even our rights to bear arms.
It is no accident that Edward Snowden got the jobs he did, had access to the sensitive information he downloaded or was able to elude the NSA throughout his journey across the globe, eventually finding a sanctuary in Russia. This was a planned operation from the get go, even down to his cover story of doing this to protect his conscious, so that he could sleep at night, after all we only have his word and few others that he is even in Russia.
While he was in Hong Kong revealing his material to the world, he was living the life of luxury, with seemingly no worries of the NSA busting down his door. Let's remember, according to him the NSA has had for years the kind of evasive hacker software and intelligence network to track anyone, anywhere in real time and Edward was not hidden away in some cave but in a luxury hotel in one of the busiest electronic centers in the world, Hong Kong.
His own disclosure showed that the NSA had already hacked into every major network in Hong Kong and yet we are to accept the notion they could not find him . . . uh . . . what's wrong with this picture?
According to his own admissions he spent three weeks in one hotel room, in the middle of one of the busiest cities in the world and only left the room three times, while the biggest Intelligence Network in the world couldn't find him but two very public journalist had complete access to him, things that make you go Hmmm?
Then he hops on a commercial plane to Ecuador but ends up getting "stuck' in Moscow, where he has been ever since . . . or so we are told. I don't know about you guys but that sounds like a made for TV movie or some outlandish Tom Clancy novel.
In light of Steve Pieczenik's recent videos about silent coup's let's re-examine this quote taken from the Brain Williams interview aired on NBC News and remember if groups within the United States Intelligence apparatus want to send a message not only to its own operatives but the American public as well, how would they articulate it . . . think about it?
When Williams asked, "Do you see yourself as a patriot," Snowden answered immediately.
"I do," he said. "I think patriot is a word that's -- that's thrown around so much that it can devalued nowadays. But being a patriot doesn't mean prioritizing service to government above all else. Being a patriot means knowing when to protect your country, knowing when to protect your Constitution, knowing when to protect your countrymen from the -- the violations of and encroachments of adversaries. And those adversaries don't have to be foreign countries. They can be bad policies. They can be officials who, you know, need a little bit more accountability. They can be mistakes of government and — and simple overreach and — and things that — that should never have been tried, or — or that went wrong."
I think Operation Snow Job, The Edward Snowden Story, is really about sending a message not just to the American people but the entire world, that we need to create transparency now before its too late. I hope you have enjoyed reading this as much as I have had in writing this article. Let's try to remember, one person can make a difference, simply by taking a stand for what they think is the moral and ethical behavior of a true hero!
At many stages of the game the general choice is available; what to do now that there is no coercion? Epigrammatically, it may be said: Tactics are what you do when there is something to do. Strategy is what you do when there is nothing to do. That isolation, however, is rare. Strategy is a feature, albeit unobserved, of most good tactical play. It is latent – not patent.’— Gerald Abrahams - 1965
© 2016 somethgblue