ECONOMIC IMPACT OF EDWARD SNOWDEN REVELATIONS AND ECONOMIC PIRACY
When Edward Joseph Snowden took out files from CIA/NSA databases, he knew that he was collecting evidence to implicate CIA/NSA in the widespread, illegal and unconstitutional surveillance of millions and billions of people in USA and around the world.
But what Edward Snowden did not know and the world as yet does not know is that the surveillance programme was not meant to invade privacy of individuals. It is a small perk. In reality, this surveillance programme is the biggest theft and financial loot in the history of mankind. This theft and loot is worth anywhere between 5 and 6 Trillion US dollars for USA, UK, Canada, Australia, Newzealand, Germany and India combined. These are the 'SIX EYES’ if you exclude USA, which is the mastermind.
Each of the ‘SIX EYES’ countries have a specialised agency which systemically collects data in its own country and surrounding countries and analyse it at the NSA which is the mastermind.
&&& In Australia, the ‘EYE’ is “Australian Signals Directorate” (ASD). The Australian Defence Satellite communications station near Geraldton, Australia is operated by the ASD. HMAS station outside Canberra is also operated by ASD. ASD also operates the Shoal bay receiving station near Darwin.
ASD collects internet and telephone data from virtually all of South-East Asia including Japan and China.
&&& In Newzealand, the ‘EYE’ is “Government Communications Security Bureau (GCSB). It operates the Walhopal station near Bleinheim.
GCSB collects internet and telephone data from Japan and China and supplements the ASD.
&&& In Canada, the ‘EYE’ is “Communications Security Establishment” (CSE). It was previously known as “Communications Security Establishment Canada” (CSEC).
CSE collects data between Europe and North America and supplements NSA.
&&& In UK, the ‘EYE’ is “Government Communications Headquarters” (GCHQ).
GCHQ collects data from all 57 countries whose data cables pass through or near UK.
GCHQ is collecting all data transmitted to and from UK and Northern Europe via the undersea fibre optic telecommunications cable SEA-ME-WE-3. GCHQ has infiltrated TAT 14 (Europe USA cable), Atlantic crossing 1 (Europe USA cable), Circe South ( France UK ), Circe North ( The Netherlands-UK), Flag Atlantic-1, Flag Europe-Asia, SE-ME-WE-4 (Southeast Asia-middle east-western europe), Solaras (Ireland-UK), UK-France 3, UK-Netherlands 14, Ulysses (Europe-UK), Yellow (UK-USA) and Pan European crossing.
TEMPORA is a british black ops surveillance program established in 2011 by GCHQ that gathers mountains of phone and internet traffic by tapping into fibre optic cables.
GCHQ can listen to phone calls, read E mails and text messages, see what websites Internet users from around the world are visiting. It can also retain and analyse nearly the entire European Internet traffic.
GCHQ infiltrated and hacked and virtually took control of the Verizon business, British Telecommunications, Vodafone cable, Global Crossing, Level3, Viatel, Interoute and probably many more.
&&& In Germany, the ‘EYE’ is “BundesNachrichtendionst” (BND), which is the “German Foreign Intelligence” and BFV (German Domestic Intelligence).
Both have have access to XKeyscore. BND gave Mira 4 and Veras hacking and intercepting programs.
BND collects its data at Bad Aibling station near Munich.
&&& In India the Indian government has set up a separate branch of the Enforcement Directorate, Research & Analysis Wing (RAW) and Central Economic Intelligence Bureau (CEIB).
This division collects all internet and telephone data from all around the country and from other countries in the Indian subcontinent.
In difficult situations, NSA helps ‘Indian Eye’. In one instance NSA collected 13.5 billion pieces of information in just one moth for the government of India.
$$$$ NSA is the mastermind to which all the above eyes pass their data, after preliminary analysis of their own, for a final analysis and to be put to practical uses.
NSA operates several programs and has a massive staff and almost unlimited budget. This is to analyse the data and put it to practical uses, mainly economic.
NSA has cable intercept programs like BLARNEY, FAIRVIEW, OAKSTAR & STORMBREW (Upstream collection).
NSA has a special division for special source operations- “Corporate Partner Access” (CPA). Its duty and purpose is to ‘leverage unique key corporate partnerships to gain access to high capacity international fibre-optic cables, switches and/or routes throughout the world’.
^^^PRISM is a downstream program through which NSA collects data from Google, Facebook, Apple, Yahoo and others. It also allows court approved front door access to American’s Google and Yahoo accounts. It collects massive amounts of data from these internet companies like E mail content, search histories and file transfers. The government can access live information, photo, video chats and data from social networks directly through the company’s servers, without requiring consent or individual court orders.
^^^ ECI or Exceptionally Controlled Information is used to cover the NSA corporate partners. These documents were not even cleared to Edward Snowden, who had almost complete access to all NSA files. Some cover names for ECI are Artifice, Lithium and Serenade.
^^^ 'Steel Knight’ is a NSA partner facility.
^^^ BOUNDLESS INFORMANT is a NSA call database. With secret court orders, it forces companies like ‘Verizon’ to hand NSA millions of American’s phone and internet records.
^^^ XKeyScore: is a analytical tool that allows NSA to collect ‘almost anything done on the internet’. It allows analysts to search the widest reaching collection of online data including E mails, social media activity, browser history, without authorisation or review by a court or NSA personnel.
NSA was harvesting millions of E mails and instant messaging contact lists, searching E mail content, tracking and mapping the location of cell phones, undermining attempts at encryption by its anti-encryption program BULLRUN. The NSA was using cookies to piggyback on the same tools used by internet advertisers to pinpoint targets for government hacking.
^^^ MUSCULAR surveillance program was being used by the NSA for tapping undersea cables for secretly tapping into Yahoo and Google data centres to collect information of hundreds of millions of account holders.
— NSA was also secretly tracking the online sexual activity of people so that they could later blackmail them into political, social, and financial submission.
NSA was paying US private tech companies for clandestine access to their communications networking. This type of budgeting and payment probably ran into billions of US dollars which might be very difficult to refuse for smaller and upstart companies.
NSA formed the “SIGNIT Strategy 2012-2016” to ‘dramatically increase mastery of the global network’ and ‘acquire capabilities to gather intelligence on anyone, anytime, anywhere’.
NSA in cooperation with the GCHQ, has plans to infect millions of computers with malware using a program called “TURBINE”
NSA had a program ‘QUANTUMHAND’, through which it set up a facebook server to intercept communications.
NSA developed a cyber warfare program ’MONSTERMIND’ that would automate the process of hunting for the beginning of a foreign cyberattack but instead of simply detecting and killing the malware at the point of entry, it would automatically fire back, with no human involvement.
NSA has capacity to tap ‘Smartphone data’. NSA can access contacts list, SMS, user location, and more on the three most popular mobile platforms.
The NSA can monitor International Financial transactions: “Follow the money” branch of the NSA has several means of accessing the internet data traffic of the “Society of Worldwide Interbank Financial Telecommunication” (SWIFT). It is a cooperative used by more than 8000 banks worldwide for their international transactions. NSA also follows the internal processes of credit card companies like VISA and MASTERMIND.
The NSA aims to defeat internet privacy and security encryption. NSA works covertly with tech companies to insert secret vulnerabilities known as backdoors or trapdoors into commercial encryption, when used to protect Emails, banking and medical records.
NSA uses the wide network of US embassies and consulates worldwide to put its spies in place and move its programs and hardware into the country through diplomatic immunity and than bugs and controls the internet and telephone traffic in each of the country, USA has a embassy or consulate.
NSA runs a “Special Collection Service” (SCS) in over 80 US consulates and embassies worldwide. The purpose is to spy and collect political, financial and military information from the host country. To this end NSA uses implants like ‘GENIE’, which are used to bug computers in foreign countries.
NSA also runs the “Deep Pocket Inspection” (DPI) or “Interception Modernisation Program” (IMP), which keeps ‘black boxes’ at various internet server providers, thus vacuuming signals from upto 200 fibre optic cables at all points of entry into Britain.
NSA has developed a program ‘Dishfire’, which collects nearly 200 million text messages everyday.
NSA also uses a program ‘MYSTIC’ through which it collects all phone calls in the Bahamas and Afghanistan.
As I have given so much about the clandestine and often criminal activities of the NSA, lets know something about its original purpose. NSA is NATIONAL SECURITY AGENCY of the USA formed in November 4 1952 and is headquartered in Fort Meade, Maryland and works under the ‘United States Department of Defence’.
As defined by NSA, its an intelligence agency of US government responsible for global monitoring, collection and processing of information and data for foreign intelligence and counterintelligence purposes, called Signals Intelligence (SIGINT). NSA is concurrently charged with protecting the US government communications and information systems against penetration and network warfare.
From the above discussion its perfectly clear that NSA is masterminding, with the subordination of GCHQ (Britain), ASD (Australia), GCSB (Newzealand), CSE (Canada), BND (Germany), CEIB, RAW (India); the biggest and mightiest Industrial, Economic, Political, Military Espionage ring in the world and together they are responsible for swindling nearly 5-6 Trillion US dollars in favour of these countries, out of which nearly 80% goes to the USA.
The contention of NSA that it is acquiring this information against terrorism is completely false. because the places from which its sabotaging this information are terrorist free. Almost all terrorists who have caused terrorism have come from Saudi Arabia, Yemen, Indian subcontinent and Africa or at most some from these places have migrated to USA or Europe.
Thus, all sabotage cyber and telecommunication information that NSA and its 6 EYES (UK, GERMANY, AUSTRALIA,CANADA, NEWZEALAND & INDIA) are collecting is for one purpose only >>> economic piracy of nearly 5-6 Trillion US dollars.
The reader has to understand that nearly 15 to 20 % of US GDP comes from the internet, 5 to 10% from telecommunications including computers and hardware and software and 15 to 20 % from the Stock Exchanges, not just in USA but through out the world.
The USA maintains two of the largest Stock Exchanges in the world.
*** NYSE or New York Stock Exchange has a $ 10.1 trillion capitalisation from just the domestic NYSE listed companies.
*** NASDAQ (which stood for NATIONAL ASSOCIATION OF SECURITIES DEALERS AUTOMATED QUOTATIONS), New York is world’s third largest stock exchange. It is the largest electronic screen based equity securities trading market in the USA. It has about 3800 company and corporations listed. It has more handling volume per hour than any other sock exchange.
The first point of interest is that NYSE and NASDAQ are the most high profile stock exchanges in the world and companies listed here are thought to be safe, both by US investors and investors worldwide. This is the image that has been developed and dispersed by the media managers of these stock exchanges.
Now if both US internal investors or foreign investors want to invest in these stock exchanges, they can do so either through the internet or phone. Also the money transaction will involve the internet. Both these are monitored by the NSA. As soon as NSA gets such information, they pass it to their own financial manipulation wing, which makes its own investment decision, based on the information received and books a profit. This is similar to the “Government of India run Harshad Mehta Scam”, I have described in my last article.
Thus, NYSE and NASDAQ are always kept in prime condition for US and foreign investors to invest and for NSA to take advantage and book profits.
But NSA also collects lots of personal information from around the world about people like movie celebrities, sports stars, politicians, financially rich etc., which may include compromising photos, videos, audios, etc.. NSA uses them through its blackmail division to manoeuvre these clients to either give financial bonus or do some tangible work beneficial to the NSA or USA.
The result of blackmailing sports stars may include fixing their matches, losing to USA or US Players etc.
Politicians make decisions. Getting blackmail information about them enables NSA to make them support policies helpful and friendly to USA and US businesses.
In many situations, NSA gets advance information about what the political leaders are contemplating in a particular International situation and the NSA support team goes out to manipulate them to change their views in accordance with US foreign policy goals and objectives.
It is very conceivable, because they collect such information, that many of the multi-billion or mluti-million dollar frauds on the internet are conducted by the NSA through its fraud division.
The GCHQ does similar sabotage and financial manipulation in the London Stock Exchange. It also does similar manipulation to NSA, with the private information it collects.
Same way, other eyes also profit similarly. In addition, NSA pays them handsomely from time to time for some exceptional information, they pass to the NSA.
The working of the ‘Indian EYE’, I have already described in my previous article.
In today’s world, Internet and telephone have become such important tools for our day to day life that life cannot be imagined without them. But, who would like their every conversation, every photo, every remark being monitored and recorded by NSA or GCHQ or whatever. It is unacceptable. To have informed us about this, we owe a great deal to Mr.Edward Snowden, who with exemplary courage, bravely, high moral thoughts and good of the society at heart single handedly exposed the biggest financial loot and theft in the history of mankind.
To quote Edward Snowden:
“I don’t want to live in a society that does these sort of things (Surveillance of its citizens). I do not want to live in a world where everything I do and say is recorded. My sole motive is to inform the public as to that which is done in their name and that which is done against them”
Now, I will show the reader that even though what Edward Snowden has done is absolutely right in terms of moral and international legal terms, because he has exposed the biggest theft and loot in the history of mankind, which is worth between 5-6 Trillion US dollars each year.
But, Edward Snowden won’t get justice in the uSA because US government has passed enough laws to protect this illegal activity of NSA, which is being done directly under the supervision of the government of the United States.
## The Foreign Intelligence Act of 1978 (FISA) was specific to curtail NSA against insiders. It set FISA court to acquire warrant against domestic target by joining FBI & NSA.
The laws which target Edward Snowden in the case are:
## 2008 FISA Amendment Act: renewed in 2012, this allows the collection of communication without a warrant, where at least one of the communicators is a non-US citizen.
## Section 215 of 2001 Patriot Act: It sets free NSA to collect bulk E mails records domestically. NSA interpreted this as allowing them to collect phone metadata as well. It can collect tangible things that aid in a terrorism or espionage investigation.
## Executive order 12333: this order broadly authorises the collection of all information for the purpose of ‘national defence’, not prohibited by other applicable laws.
## Patriot Act 2001: Section 214, 216 amends FISA to allow collection of certain wire or electronic communications metadata, relevant to a terrorist or espionage investigation.
## FISA amendments act of 2008: sections 703, 704 amends FISA and establishes procedures for targeting US Persons overseas.
## National Security Letter: National Security Letters are administrative subpoenas that allow the FBI to compel the recipient to divulge subscriber and billing information relevant to a national security investigation. These letters require no judicial review and the recipient is prohibited from revealing the contents or existence of the letter.
## FISA court order: these orders are issued to compel entities to furnish information the government has requested. The court operates in secrecy and is not subject to public oversight.
FISA court and its proceedings are secret and its nearly impossible to challenge the interpretation of the law. The government is the only petitioner before the court.
The FISA judges are appointed by the chief justice of the US supreme court under political supervision and their impartiality and fairness cannot be guaranteed.
Edward Snowden, who worked as a contract employee for consulting firm ‘BOOZ Allen Hamilton’ inside the NSA centre in Hawaii, exposed global surveillance programs, many of them run by the NSA and the 6 EYES in cooperation with telecommunication companies and European governments.
Because of this the US department of Justice charged him with theft of government property, unauthorised communication of national defence information and wilful communication of classified intelligence to unauthorised person.
If you see the above charges, the same charges multiplied by a factor of 6 Trillion US dollars/year is applicable on the NSA and the US Government, not to talk of other EYES.
Though Edward Snowden is living in Russia with a asylum of 4 years but he must get justice, which is full freedom and civic rights in USA and prosecution of NSA and US government employees for the 6 Trillion US dollars loot every year they have been doing with impunity for at least two decades now.
The public opinion around the world is much in favour of Edward Snowden but in his home country and 6 EYE countries, the opinion is divided because they were benefitting from 6 Trillion US dollar loot every year, which has been exposed by the Snowden revelations.
Here I am suggesting some remedies by which this naked and shameless looting of 6 Trillion US dollars by USA and 6 EYES can be stopped and a sense of propriety and justice established around the world:
@@ It is time for the internet to diversify. Instead of all servers being placed in USA, all should be removed and placed in various proportions in Russia, Japan, Austria, China, Malaysia or Indonesia, Argentina and State of Mesopotamia and Chaldea. This will end the monopoly of USA on internet servers and prevent the above described misuse.
@@ An International Committee of Internet should be set up which will have 100 board members and only one from USA. It will select its Chairman and form policies to reform the rules of Internet to protect privacy and prevent Internet sabotage and economic privacy.
@@ The money for this revamp will come from countries which will host the servers and 50% will come from other member countries.
@@ Any such trick as presently the NSA and 6 EYES are employing will result in cutting the internet supply to the country. Any repeated offence will result in permanent cutting of internet connection.
@@ BY International law, companies will be prohibited from creating backdoors or trapdoors in their products. If any is found at any later date, fines upto 80% of the profits will be imposed.
@@ A International court of Internet justice to be set up in either Europe or the State of Mesopotamia and Chaldea. It will have a 10 judge bench, which will decide all internet disputes within a fixed timeframe.
@@ It will be the responsibility of the private internet companies like facebook, google, twitter to remove terrorist propaganda material. If they do not do so, the Internet ethics commission can impose heavy fines on them or they can be taken to the International court of Internet Justice.
@@Strong copyright and patent rights on the internet. Necessary software programmes to be developed so that copyright and patent right violators are immediately caught and either banned from internet or heavily fined.
@@ Social media sites like facebook, google plus, Pinterest, Linkedin, Myspace etc. should have strong screening procedures while admitting new users. This can be in the form of the phone verification or a Identity card verification like driving license, passport, PAN card, Bank passbook etc.
@@ Any hacking into financial institutes like banks, credit cards etc. should be punishable by heavy fines and long term imprisonments.
@@ Establishment of a well trained cyberspace police force in each country with significant internet reach, to address consumer grievances. In addition, a International cyberspace police force to help track and capture International cyber criminals.
@@ Establishment of a International Technical Regulatory body (ITRB), which will check devices like laptops and phones etc, for any backdoor or trapdoors loopholes.
@@ Educating the customers to ethical practises and ways of running the internet.
@@ A formation of a ethics committee, which will classify material on the internet according to age groups and devise verification methods a person can access each age group Internet content.
@@ All malware programs, hacking programs and stealing programs should be completely criminalised and heavy fines and punishments prescribed for their use.
These fines can be country specific, so even if a culprit from a country is not caught, the country will pay the fines and damages.
If we are to do above, than all effort Edward Snowden has done to enlighten us about Internet cheating, looting and blackmail can be a just reward for a person who has staked his life to enlighten the Internet!
Copyright © Tanvir Nebuchadnezar