Is The NSA The Real President Of The United States?

spying2
Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
Jon Rappoport
February 16, 2017

The US intelligence community continues its war to kick Donald Trump to the curb and destroy his presidency.

Obviously, the NSA, the CIA, and their silent partners want to continue to run this country.

So they spy and leak, spy and leak.

We’ll get to the guts of the problem in a minute, but first a word from Bill Binney.

Breitbart: “William Binney, a former highly placed NSA official turned whistleblower, contended in an exclusive interview today that the National Security Agency (NSA) is ‘absolutely’ monitoring the phone calls of President Donald Trump.”

“Binney was an architect of the NSA’s surveillance program. He became a famed whistleblower when he resigned on October 31, 2001 after spending more than 30 years with the agency.”

“Asked whether he believes the NSA is tapping Trump, Binney replied: ‘Absolutely. How did they get the phone call between the president and the president of Australia? Or the one that he made with Mexico? Those are not targeted foreigners’.”

“Binney further contended the NSA may have been behind a data leak that might have revealed that Michael Flynn, Trump’s national security adviser, allegedly misled Vice President Mike Pence and other Trump administration officials about the contents of his phone calls with Russia’s ambassador to Washington.”

“Regarding Flynn’s case, Binney stated of the NSA”:

“’If they weren’t behind it, they certainly had the data. Now the difference here is that FBI and CIA have direct access inside the NSA databases. So, they may be able to go directly in there and see that material there. And NSA doesn’t monitor that. They don’t even monitor their own people going into databases’.”

“So, they don’t monitor what CIA and FBI do. And there’s no oversight or attempted oversight by any of the committees or even the FISA court. So, any way you look at it, ultimately the NSA is responsible because they are doing the collection on everybody inside the United States. Phone calls. Emails. All of that stuff’.”

“Utilizing data provided by whistleblower Edward Snowden, the Guardian and Washington Post in June 2013 released a series of articles reporting that the NSA was collecting the telephone records of millions of Americans.”

“…’they [the NSA, Binney said]] are given too much money anyway. When they are given too much money, they get to do wild and crazy things. And this is wild and crazy. Violations of the Constitution’s 4th, 5th, and 6th amendments’.”

—end of Breitbart clip—

—Nearly two years ago, on April 19, 2014, I wrote: “Taking the overall [NSA] scheme to another level, consider this: those same [NSA] heavy hitters who have unfettered access to financial information can also choose, at opportune moments, to expose certain scandals [e.g., Michael Flynn] and crimes. In this way, they can, at their whim, cripple governments [e.g., the Trump administration]…”

Now we come to the guts of the problem. Here is my complete article from April 10, 2014:

The Surveillance State has created an apparatus whose implications are staggering. It’s a different world now. And sometimes it takes a writer of fiction to flesh out the larger landscape.

Brad Thor’s novel, Black List, posits the existence of a monster corporation, ATS, that stands alongside the NSA in collecting information on every move we make. ATS’ intelligence-gathering capability is unmatched anywhere in the world.

On pages 117-118 of Black List, Thor makes a stunning inference that, on reflection, is as obvious as the fingers on your hand:

“For years ATS had been using its technological superiority to conduct massive insider trading. Since the early 1980s, the company had spied on anyone and everyone in the financial world. They listened in on phone calls, intercepted faxes, and evolved right along with the technology, hacking internal computer networks and e-mail accounts. They created mountains of ‘black dollars’ for themselves, which they washed through various programs they were running under secret contract, far from the prying eyes of financial regulators.”

“Those black dollars were invested into hard assets around the world, as well as in the stock market, through sham, offshore corporations. They also funneled the money into reams of promising R&D projects, which eventually would be turned around and sold to the Pentagon or the CIA.”

“In short, ATS had created its own license to print money and had assured itself a place beyond examination or reproach.”

In real life, whether the prime criminal source is one monster- corporation or a consortium of companies, or elite banks, or the NSA itself, the outcome would be the same.

It would be as Thor describes it.

We think about total surveillance as being directed at private citizens, but the capability has unlimited payoffs when it targets financial markets and the people who have intimate knowledge of them.

“Total security awareness” programs of surveillance are ideal spying ops in the financial arena, designed to suck up millions of bits of inside information, then utilizing them to make investments and suck up billions (trillions?) of dollars.

It gives new meaning to “the rich get richer.”

Taking the overall scheme to another level, consider this: those same heavy hitters who have unfettered access to financial information can also choose, at opportune moments, to expose certain scandals and crimes (not their own, of course).

In this way, they can, at their whim, cripple governments, banks, and corporations. They can cripple investment houses, insurance companies, and hedge funds. Or, alternatively, they can merely blackmail these organizations.

We think we know how scandals are exposed by the press, but actually we don’t. Tips are given to people who give them to other people. Usually, the first clue that starts the ball rolling comes from a source who remains in the shadows.

What we are talking about here is the creation and managing of realities on all sides, including the choice of when and where and how to provide a glimpse of a crime or scandal.

It’s likely that the probe Ron Paul had been pushing—audit the Federal Reserve—has already been done by those who control unlimited global surveillance [NSA]. They already know far more than any Congressional investigation will uncover. If they know the deepest truths, they can use them to blackmail, manipulate, and control the Fed itself.

The information matrix can be tapped into and plumbed, and it can also be used to dispense choice clusters of data that end up constituting the media reality of painted pictures which, every day, tell billions of people “what’s news.”

In this global-surveillance world, we need to ask new questions and think along different lines now.

For example, how long before the mortgage-derivative crisis hit did the Masters of Surveillance know, from spying on bank records, that insupportable debt was accumulating at a lethal pace? What did they…

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Advertisements

That Russian Hacking Thing: A “Third Force” Trying To Stir…

Source: GizaDeathStar.com
Dr. Joseph P. Farrell
January 25, 2017

Now that the election in the USA is over, it’s worth looking back on that hacking meme. And it is “safe” to do so now, aside from the hysteria that was taking place. As I watched all of it, it struck me as extremely odd that the whole hacking meme seemed disturbingly contrived. We were supposed to believe that “Russia did it,” an idea I found ridiculous then and still do. Then, there was the murder of Democratic national committee staffer Seth Rich. Many theorized that he was behind some of the damning leaks to Wikileaks, and there was the usual amount of conspiracy theory that the unfortunate Mr. Rich was yet another victim in the long list of dead bodies that seem to follow the Clintons around; it was another “Arkancide.” Well, I have my doubts about that too (though I certainly don’t have any doubts about the criminality and corruption of the Clintons). Why? For the simple reason that “offing people” when in the middle of a presidential campaign would be too risky. Best to wait until after the election, and dump the body in a park in Washington DC and claim it was suicide.

To put it as bluntly as possible, there was an element of theater to all this I found very disturbing; it was all… well, too convenient. The real goal, it seemed to me, was not to favor Darth Hillary or “The Donald,” but rather, to work up USA-Russia tensions into a fine frothy lather of hysteria. It looked, if I may put it even more bluntly, very much like the pattern of the alleged postwar Nazi document, The Madrid Circular, that I reviewed in my book The Third Way: create maximum maneuvering room for your merry band of postwar Fascist buddies by maximizing tensions between Russia and the USA. The Clinton-Trump-Putin theater looked and felt too contrived to me.

In that regard, consider the following article shared by G.L.R.:

Security Threats to Russia: The Analysis of the 2016 FSB Press Releases (Part 3 – Hacking & Other Challenges)

http://www.newsbud.com/2017/01/12/security-threats-to-russia-the-analysis-of-the-2016-fsb-press-releases-part-3-hacking-other-challenges/embed/#?secret=ffIAc7xmB3

Mr. G.L.R. drew my attention to these passages, and I pass this focus along to you:

The FSB press release published on July 30 dealt more specifically with the issue of cyberattacks and cyber-espionage.[4] In fact, it reported that the FSB specialists were able to uncover an especially damaging virus program infiltrated into the network of more than 20 organizations on the territory of Russia. These organizations included the Russian government, military, and academic institutions and even the sectors of the Russian military-industrial complex.

The FSB did not comment as to where this malicious software could have come from. It just stated that it resembled the software found in other cyberattacks around the world. In my opinion, the description of the way that the virus infected the victims’ computers and the damage it caused resembled very much the hacks perpetrated in the U.S., both on the Democratic National Committee (DNC) and on Hillary Clinton’s campaign manager John Podesta. Considering the timing of the release (the end of July), just after the Democratic National Convention in Philadelphia was over and the full extent of the U.S. hacks became publicly known, it definitely raises several very significant questions.

First, was this massive hacking of the Russian “critical infrastructure” a retaliation by the U.S. intelligence agencies for the DNC and Podesta hacks allegedly perpetrated by the Russian military intelligence agency (GRU)? And if so, will the hacked emails and information be made publicly available? Will be we soon be reading the embarrassing details of the Russian government and military officials’ undercover dealings?

Or, alternatively, was this perhaps done by a third party which also hacked the DNC and Podesta? Following in the footsteps of the James Bond classic “From Russia, with Love,” is there perhaps a secret (criminal) network which uses the rogue elements of different intelligence communities to amplify the confrontation between the U.S. and Russia? To get the U.S. to blame Russia and, likewise, Russia to blame the U.S. for criminal deeds actually perpetrated by this hidden network. This of course is a mere speculation. But the coincidence of the almost simultaneous cyber-attacks cannot be denied. (Emphasis added)

In other words, while the corporate controlled media in the USSA was howling about Russian hacking of the Clinton campaign and wringing its hands over Russian influence on the election(overlooking, conveniently, Frau Merkel’s contributions to Darth Hillary’s campaign), Russia itself was being hacked at exactly the same time.

Notably, the FSB (Federalnaya Sluzhba Bezhopaznosmu) is admitting not only the hacks, but their extensive nature, but not indicating any point of origin. We may take this as…

Continue Reading At: GizaDeathStar.com
___________________________________________

About Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.