Fake and Faker: Assange and Snowden

 

By VT Senior Editors

July 8, 2013

 

FAKE AND FAKER

Julian Assange (Wikileaks) and Edward Snowden are NWO con-men!

It was with a mix of concern and amusement that The Anti New York Times viewed the blind public acceptance of, first, the “WikiLeaks” fraud, and now, the Ed Snowden scam. Even more troubling was the hasty eagerness with which so many of our constitutionalist, libertarian, and “conspiracy theorist” brethren fell for the twin ‘whistleblower” scams. The Anti New York Timesis pleased to present “Fake & Faker”, an important expose of two very dangerous scams being run by the New World Order Gang.

BEFORE WE BEGIN, LET US ESTABLISH 3 UNDENIABLE, IRON TRUTHS REGARDING THE MSM (Mainstream Media)

IRON TRUTH # 1

The mission of the Global MSM is to steer the peoples’ thoughts and opinions in the direction desired by the ruling class. The MSM would NEVER hype a story, or an individual, that poses a true threat to the ruling class which it serves. Remember the silent treatment given to Ron Paul?

IRON TRUTH # 3

When all of the MSM start pushing/hyping the same given narrative, of any given issue, all at the same time, understand that the ruling class is selling you something!

APRIL 2010 / WIKILEAKS BURSTS ONTO THE WORLD STAGE

The release of a video, showing Iraqis being murdered,

gave WikiLeaks credibility as a whistle-blowing operation.

In April 2010, Julian Assange’s WikiLeaks publishes graphic gunsight footage from a 3 year old Baghdad airstrike in which Iraqi journalists were murdered by a U.S. helicopter. Though these types of incidents were already well known, the MSM treats the video as if it is the breaking story of the century!

 

2011 / WIKILEAKS RELEASES MORE DOCUMENTS

A good con-man must win the people’s confidence before he makes his sting. By exposing a certain amount of wasteful military spending and U.S. brutality (limited hangout), Assange’s WikiLeaks wins the trust of many liberty loving, justice seeking Americans, as well as Europeans and Arabs. He is also condemned by certain U.S. politicians & journalists. This condemnation (some of it feigned, some of it genuine) is known in intelligence circles as “sheep-dipping”, and also serves to build his credibility.

The MSM makes an instant international super-star of the shady Austrailian Assange!

LATE 2010 – 2011 / WIKILEAKS SWITCHES GEARS!

After gaining the world’s trust with his controlled attacks against the U.S. government, Assange, a CIA (and/or Mossad) operative, aims his WikiLeaks whistle-blowing weapon at the true intended targets. Leaked documents no longer embarass America. But very damaging information about corruption within the governments of Tunisia, Egypt, and Yemen are “leaked” to “assets” within the Arab press.

GOOGLE: WIKILEAKS EGYPT

GOOGLE: WIKILEAKS TUNISIA

Leaks aimed at embarrassing Syria and Algeria are also released.

GOOGLE: WIKILEAKS SYRIA

GOOGLE: WIKILEAKS ALGERIA

Wasn’t the original mission of WikiLeaks to expose U.S. aggression and oppression in the Middle East? Why did Assange suddenly target certain Arab states?

“ARAB SPRING” TOPPLES TUNISIA, EGYPT, YEMEN & LIBYA – WAR ALSO BREAKS OUT IN SYRIA – WIKILEAKS CLAIMS CREDIT!

What a coincidence! All of the governments targeted byAssange’s WikiLeaks become victims of the “Arab Spring”. The MSM Fairy Tale tells us that the “Arab Spring” was a “spontaneous” uprising of the people, that started in Tunisia, and later spread to other nations.

The reality is that the Globalist-Zionist Axis had targeted certain government for regime change. Expansionist Israel benefits from weakened Arab states in turmoil. The Globalists also seek to crush any state that either dares to assert some degree of independence, or that gets to chummy with Russia and/or China. The NWO Gang’s formula for conducting “regime change” within the targeted states is as follows:

STEP 1: Assange’s WikiLeaks feeds very embarassing leaks to “assets” within the Arab press.

STEP 2: The targeted regime suddenly becomes very unpopular.

STEP 3: Internal subversives (provacateurs) kick off the “spontaneous demonstrations”.

STEP 4: Ordinary citizens swell the ranks of the protestors.

STEP 5: Paid traitors within the government and military force the government to resign. 5a: (In Libya & Syria, paid terrorist mercenaries (“rebels”) fight against the loyal military.)

STEP 6: The MSM then claims that “people power” has triumphed over tyranny.

Amnesty International hails WikiLeaks and Guardian as Arab spring ‘catalysts’

(The Guardian is the same newspaper now working with “whistle-blower” Edward Snowden!)

WIKILEAKS TARGETS RUSSIA’S PUTIN, AND HIS CLOSE PERSONAL FRIEND, BERLUSCONI OF ITALY

The Globo-Zionist Axis hates Putin of Russia. Not only is mighty Russia refusing to hand over its sovereignty to the NWO Gang, but Putin is blocking the much anticipated war against Syria and Iran. So it comes as no surprise that WikiLeaks has also leaked on Putin, and his close personal friend, Silvio Berluconi of Italy. Putin remains as strong as ever, but Berlusconi was removed from office after Wikileaks ruined him.

GOOGLE: WIKILEAKS PUTIN

GOOGLE” WIKILEAKS BERLUSCONI

the loss of his vacation buddy Berlusconi (thanks to WikiLeaks), Putin lost his only true friend in Western Europe.

The “heroic” whistle-blower / leaker Julian Assange, with the help of the MSM, suckers in the entire world with his “anti-American / anti-war” leaks. He then uses this “street-cred” to attack the rivals of the U.S. / Israel / NATO Axis of Evil, setting the Middle East on fire in the process. Wikileaks represents the most brilliant psy-op since the 9/11 attacks (brought to you by the same planners!) For its audacity, ingenuity, and destructive power, it will be hard to top Julian Assange. Who can ever be a bigger FAKE than Assange?……..

……Enter, Mr. Edward Snowden.

SUMMER 2013 / MSM DROPS THE EDWARD

SNOWDEN HYPE-BOMB UPON THE WORLD!

In a sudden media blitz roll out, eerily similar to that of Julian Assange, a Mr. Edward Snowden is introduced to the world as another “heroic” whistle-blower. The vehicle which Snowden uses to expose government wrong doing is a homosexual, socialist, lawyer-turned-journalist named Glen Greenwald of The Guardian Newspaper (UK) – the same newspaper that PROUDLY boasts of its role in bringing about the “Arab Spring”!

Exactly as was the case with Assange, Snowden’s revelations of NSA spying upon the public amount to all hype and no substance. It is already well known that the NSA can listen to phone calls and read E-mails!

Exactly as was the case with Assange, Snowden becomes a “fugitive”. No explanation is given as to how he managed to escape, or how a fugitive was able to get on a plane. Snowden flees to CIA-infested Hong Kong where his “cause” is supported by a bizarre instant flash-mob equipped with professionally made bi-lingual banners and picket signs!

Exactly as was the case with Assange, Snowden becomes an international star.

Exactly as was the case with Assange, Snowden (and Greenwald) are cleverly, and theatrically condemned (sheep-dipped) by certain hated Americans (Diane Feinstein, Donald Trump, George Bush I (an ex CIA Director))

Below: Glen Greenwald (right) and the odious David Gregory stage a controlled “Professional Wrestling” spat on NBC’s “Meet The Press” – Greenwald’s “sheep-dipping” as an “anti-Establishment”, crusading journalist is now complete.

SNOWDEN,HOLED UP IN MOSCOW AIRPORT, IS IN CONTACT WITH JULIAN ASSANGE!

If Assange himself is a fugitive, how does he manage to say in the spotlight? How did Snowden come in contact with him? We read in the July 6 USA Today:

“Assange, who once published thousands of illegally obtained U.S. government diplomatic communications on his website, acknowledged Monday that he is coordinating efforts to help National Security Agency (NSA) leaker Edward Snowden evade U.S. justice.” (full article here)

SAY WHAT???!!!Is the scrawny, weirdo Julian Assange some sort of international King-Pin that he can “coordinate efforts” – across continents – to help a fugitive, while he himself is a fugitive? We have already established that Assange is a fake. The fact that Snowden is hooked up with him pretty much tells us all we need to know about him as well…….But there is more!

“As the U.S. government presses Moscow to extradite former National Security Agency contractor Edward Snowden, America’s most wanted leaker has a plan B. The former NSA systems administrator has already given encoded files containing an archive of the secrets he lifted from his old employer to several people.”

Exactly like Assange, Snowden has files to release. It is evident that these files contain damaging information. Who is the target this time? Foreign governments? American officials? How does an government contractor just walk out with so many files? Why would this young man destroy his life, defying the Feds and condemning himself to fugitive status – just to tell us what we already knew? Oh, that’s right….he is a “hero” and a “patriot”.

Can you smell the Hollywood BULLSHIT? What is the game this time? Wikileaks 2? Or is the goal tocreate civilian oversight over the military run NSA? I’s too early in the game to know for sure what the Snowden trick is all ab out. But understand this, it is a dirty trick of some sort!

THE SHADY BRUCE FEIN HOOKS UP WITHSNOWDEN’S “FATHER”

Lon Snowden, the man purporting to be Ed Snowden’s father has teamed up with DC insider lawyer Bruce Fein to write an “open letter” to Snowden. The letter published

in Glen Greenwald’s sleazy Guardian) smacks of contrived drama and self righteous corniness. Fein & Snowden invoke the names of the founding fathers and patriots Thomas Paine, Paul Rever as well as places of sacrifice such as Valley Force, Cemetery Ridge and Omaha Beach.

The “libertarian” Bruce Fein is a speaking-tour pal of the socialist Greenwald, and wassuspected by an FBI whistleblower Sibel Edmonds (a real whistle-blower that the MSM ignores!)of being an infiltrator embedded within the 2012 Ron Paul campaign.

“Wikileaks is the Mossad, Stupid, Not the Russians, We are playing them like a fiddle…” Assange (sort of)

By VT Senior Editors

November 3, 2016

7

340

[Editor’s note:  John Pilger was identified long ago as an Israel operative by author Jeff Gates.  Wikileaks by VT and Zbigniew Brzezinski.  RT was identified some time ago as “penetrated.”  Both RT and Sputnik News have been used and, to some extent, “turned” to seem propaganda-like, more than usual and to make them an easy target.  This is huge damage to Russia. g]

In a John Pilger Special, to be exclusively broadcast by RT on Saturday courtesy of Dartmouth Films, whistleblower Julian Assange categorically denied that the troves of US Democratic Party and Clinton work and staff emails released this year have come from the Russian government.

“The Clinton camp has been able to project a neo-McCarthyist hysteria that Russia is responsible for everything. Hillary Clinton has stated multiple times, falsely, that 17 US intelligence agencies had assessed that Russia was the source of our publications. That’s false – we can say that the Russian government is not the source,” Assange told the veteran Australian broadcaster as part of a 25-minute John Pilger Special, courtesy of Dartmouth Films.

Assange ‘sorry for Clinton as a personality’ (John Pilger exclusive, courtesy of Dartmouth films)

An error occurred.

Try watching this video on www.youtube.com, or enable JavaScript if it is disabled in your browser.

Assange, who spoke with Pilger at the Ecuadorian Embassy in London, where he has been for four years, also accused the US presidential candidate of being a pawn of behind-the-scenes interests, and voiced doubts about her physical fitness to take charge of the White House.

Assange claims ‘crazed’ Clinton campaign tried to hack WikiLeaks

“Hillary Clinton is just one person. I actually feel quite sorry for Hillary Clinton as a person, because I see someone who is eaten alive by their ambitions, tormented literally to the point where they become sick – for example faint – as a result of going on, and going with their ambitions. But she represents a whole network of people, and a whole network of relationships with particular states.”

Over the past nine months, WikiLeaks uploaded over 30,000 emails from Hillary Clinton’s private email server, while she was Secretary of State. This was followed by nearly 20,000 emails sent to and by members of the US Democratic National Committee, exposing the party leadership’s dismissive attitude to Bernie Sanders, and his outsider primaries campaign.

Finally, last month, WikiLeaks posted over 50,000 emails connected to John Podesta, Bill Clinton’s chief of staff, and a close associate of the current presidential frontrunner.

The Homeland Security Department and Office of the Director of National Intelligence posted a joint statement in October, claiming they were “confident” that the Russian government “directed” this year’s leaks.

Moscow has rejected the accusation, with presidential press secretary Dmitry Peskov calling the claims “nonsense,” while Foreign Ministry spokeswoman Maria Zakharova said the “public bickering with Russia” before the US election is probably a “smokescreen” to draw the voters’ attention away from serious domestic issues.

NSA hasn’t closed security windows Snowden climbed through

31 JUL 2018

Don’t show me this again

Previous: Football team in trouble over unauthorized access to rivals’ videos

Next: SamSam: The (almost) $6 million ransomware

by Lisa Vaas

0
Share on Facebook
Share on Twitter
Share on Google+
Share on LinkedIn
Share on Reddit

Whether you think he’s a principled patriot or a traitor to his country, you have to give him credit for something: thanks to the former contractor for the US National Security Agency (NSA) Edward Snowden, we learned a lot about secret spying programs.

Aside from the obvious – vast data collection programs that included PRISM, Tempura, Upstream, XKeyscore and the NSA’s powerful facial recognition program – we learned something crucial about the country’s elite spy agency: it had holes in its own data security big enough to let a contractor walk through with massive troves of sensitive data.

According to an audit from the NSA Inspector General’s office, as of March 2018, some of those holes were still open.

Of course, the audit, published for public consumption, contains only declassified information, and it doesn’t give details. Be that as it may, starting on page 29, the audit enumerates significant outstanding inspection recommendations regarding the NSA’s failure to secure the internet and the enterprise, as well as to address insider threats.

In a nutshell:

1 The NSA’s system security plans are “often inaccurate and/or incomplete.”

2 Two-person access controls haven’t been properly implemented at data centers and equipment rooms.

3 Removable media isn’t being properly scanned for viruses.

Snowden didn’t get his trove of documents via malware, so no. 3 – allowing things like random USB drives to be plugged into network computers – isn’t relevant in his particular case. But it’s certainly relevant to all the places that have inflicted themselves with malware by plugging in stray sticks.

Naked Security has been banging away at this nail for years. Seven years ago, Sophos bought a stash of USB keys from a lost property auction as an experiment. 66% of them contained malware, and not a single one was encrypted.

That’s so 2011, you might think. But Sophos’s very own CISO, Ross McKerchar, said removable storage as a threat vector is still as fresh as a dangerous daisy:

Removable storage is a massive concern. While it’s a less common (but still real!) malware infection vector now, the biggest risk these days is data leakage.

So the NSA isn’t scanning removable storage, eh? Perhaps it should follow IBM’s lead: in May, it banned USB drives entirely.

If the idea of banning these convenient pocket storage gizmos is too daunting, the NSA – and any organization, for that matter, be it large or small – should at least be encrypting the devices.

As far as no. 1 goes – inaccurate or incomplete security plans – we know that Snowden worked in an agency outpost in Hawaii that hadn’t been upgraded with modern security measures.

In 2014, the New York Times reported that NSA officials insisted that if Snowden had been working from NSA headquarters, in Maryland, his activity would likely have been flagged by monitors designed to detect when a huge volume of data was being accessed and downloaded.

 

 

DEEP LEARNING

FOR DEEPER CYBERSECURITY

Watch Video

One senior intelligence official told the Times that investigators had surmised that Snowden used cheap, widely available web crawler software designed to automatically search, index and back up a website in order to scrape data out of NSA systems while he went about his day job.

There were more details available in a damning report that came out last year: the August 2016 DOD Inspector General’s report on the National Security Agency’s (NSA) implementation of the “Secure-the-Net” initiative.

The “Secure-the-Net” (STN) initiative was launched post-Snowden and included 40 specific recommendations “focused on insider threats to NSA systems, data, and infrastructure”. Seven of those recommendations were designed to “secure network access, protect against insider threats and provide increased oversight of the personnel with privileged access”.

The seven STN initiatives were:

• Develop and document a new system administration model.

• Assess the number of system administrators across the enterprise.

• Implement two-person access control over data centers and machine rooms.

• Implement two-stage authentication control for system administration.

• Reduce the number of persons with Privileged Access.

• Reduce the number of authorized data transfer agents (those authorized to use removable media).

• Oversee privileged user activities.

It’s not that the NSA didn’t attempt to implement all that, the report found: rather, it did a half-assed job at it.

For example:

[The] NSA did not effectively implement the three privileged access related STN initiatives… because it did not develop an STN strategy that detailed a structured framework and methodology to implement the initiatives and measure completeness.

With respect to two-factor authentication (2FA), the NSA implemented it for system admins, but not for those with privileged access. As we well know, Snowden bypassed the then-present privileged access controls and conned his colleagues into giving him their credentials – which he then went on to use to expand his access.

As we noted at the time of the 2016 report – which was acquired by the Times through a Freedom of Information Act (FOIA) – 2FA would have required the owner of the credentials to have been participatory in Snowden’s use of their credentials. In other words, the NSA managed to leave open the very window that Snowden climbed through to harvest the data he stole.

Furthermore, the report chastised the NSA for not having a clue about how many individuals had privileged access in 2014, nor in 2016, and nor could the NSA document how the purge/pruning had been carried out. That meant the inspection team couldn’t find out exactly how many people had privileged access.

Edward Snowden isn’t the only fury that’s flown through the NSA’s open windows. In November, we learned that a group calling itself the Shadow Brokers has since 2016 been dumping exploits and tools collected, hoarded and used by the NSA hacking group Tailored Access Operations (TAO). The Shadow Brokers put the TAO tools up for auction a mere week before the DOD Inspector General’s damning report.

Preventing insider threats is an ongoing problem, as demonstrated by the arrest of NSA contractor Reality Winner in 2016. Winner managed to take a highly classified document assessing and discussing the Russian military intelligence entity’s (the GRU’s) hand in meddling in the US election and used her privileged access to print it out. Then, she mailed it to a media outlet. Once the NSA saw the document, the agency quickly determined who had access and printed the document, and who’d been in contact with a media outlet.

What they couldn’t figure out: why Winner had privileged access to information about which she had no “need to know”.

There’s definitely been progress made at the NSA. But has there been enough progress to stop another Edward Snowden? The most recent audit suggests the answer is no.

By the sounds of it, the holes Snowden walked through are still big and gaping – somebody else could well walk right through them.

Holy WikiLeaks, Batman!

In Russia, Julian Assange can’t tell them anything they don’t know.

MIKHAIL METZEL/AFP/Getty Images

MIKHAIL METZEL/AFP/Getty Images

MOSCOW—Journalists here spent the weekend tensely awaiting the WikiLeaks data dump, having been tipped off that there would be a Russian bombshell in the mix. Would the documents finally reveal just how much of Gazprom Vladimir Putin owned, or how much money he really had? Would they shed light on his personal life? On who really killed Alexander Litvinenko, or all those journalists? Instead we found outthat Putin is an “alpha dog”; that President Dmitry Medvedev is not an independent actor; that, by comparison, he is “pale” and “indecisive”; that he is Robin to Putin’s Batman; that the Russian state resembles the Soprano clan; that Putin is extremely close to Italian Prime Minister Silvio Berlusconi. This was about as shocking as the attendant revelation that 9/11 still haunts American politics. Who didn’t already know that Putin is Batman?

What we learned, besides a few new shades and details, is that American diplomats in Moscow rely on a lot of the same sources Western journalists do in trying to decipher the Kremlin — sources like the Russian press, which is a lot more intrepid than the West gives it credit for. They also don’t seem to spend much time actually deciphering the Kremlin; mostly the cablers were preoccupied with the gossip coming from the bulldogs under the rug or the spiders in a jar or the “heads in a soup” or whatever metaphors such circles use. We discover, for instance, that Russian first lady Svetlana Medvedeva keeps a blacklist of bureaucrats who don’t respect her husband. Does that mean anything real, and do these chinovniki actually suffer for earning her wrath? Unclear. “I would ask whether there’s anything really sensational here, whether there’s anything here that isn’t already in the newspapers,” a Moscow source familiar with the situation but unable to comment officially on the leak, told me.

In fact, there seems little chance that the latest, biggest document vomit will derail America’s largely productive relationship with Moscow, an achievement that Barack Obama can justifiably flaunt as perhaps his sole untarnished triumph as president. The official response has ranged from strong condemnation to disdain — “imaginary Hollywood characters do not require comment,” Medvedev’s spokeswoman said, and Foreign Minister Sergei Lavrov called the cables “amusing reading” — and this, given both sides’ interest in not rocking the reset boat, is also not a surprise.

In addition to the fact that much of the information in the cables — even the intertwining of the Russian police and organized crime — has been widely reported in the Russian press, officials on both sides say they weren’t really caught off guard. “When the U.S. found out what would be published, they got in touch, they warned the respective governments and asked not to make this into a big deal,” says Sergei Markov, a Russian parliamentarian who specializes in foreign policy. “The authors of these cables are not exactly policymakers. I think the Russians see and know the difference,” says a senior Obama administration official who was not authorized to speak to the press.

As for the potential for diplomatic awkwardness now that everyone knows America thinks Medvedev wears green tights, few Russia watchers seemed concerned. “In Russia, unlike in America, where optimism reigns, the views on politics are extremely cynical,” says Fyodor Lukyanov, editor of Russia in Global Affairs. “No one is surprised that diplomats say these kinds of things.” (Lukyanov added that only Medvedev stood to be offended. “Putin is likely to be flattered,” he says. “He has built his whole political image on being the alpha dog.”) There is also a practical matter preventing any kind of real offense, the American side was quick to point out. “I personally don’t see what the big deal is,” the Obama official says. “They intercept our phones and emails enough to make this not surprising.” Besides, those Batman-Robin analogies, he adds, were the work of “Bushies.” “Obama doesn’t treat Medvedev as Robin,” he says.

And while Obama may face political repercussions at home for the leaked information, on the Russian side no one really cares, given how little new information was revealed — except, of course, the fact that Chechen president and deranged boy-warrior Ramzan Kadyrov gives gold bullion as wedding gifts. We did not learn, for instance, anything new or definitive about how power is distributed between Medvedev’s Kremlin and Putin’s White House, about how Medvedev feels about his role in the tandem, or about his future ambitions — or whether anyone who matters cares. Given the banality of the disclosures, the Russians are likely to respond the way they know best: purging. “We will draw internal conclusions,” says Markov. “Most likely, they’ll look at the cables to see who spoke a little too frankly with the Americans and a couple department heads or deputy ministers will be fired.”

In the meantime, the Americans await a new batch of data, one that could actually make a big impact. “To be honest, I was much more worried about what might have been in there,” the Obama official told me. “But this roller-coaster ride isn’t done yet.” And while the Wikicoaster climbs the next over-anticipated hill, the Russians, for once, radiate a bystander’s innocent pity. “We feel sympathy and awkwardness,” a Russian diplomat told the Interfax news agency, because “rooting around in diplomatic dirty laundry is not very pleasant.”

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s