Have you ever had the pleasure of dealing with an agent of the Federal government? For example, have you been audited by the IRS? Did you notice what the “Agent” does to gain access to his (or her) computer—by inserting a “Smart ID” into a slot? Did you ask how your personal information is protected from disclosure or theft? What is to prevent the Agent from copying files to a thumb drive and taking them home?
Regarding the Smart ID, the “HSPD-12” is discussed in this publicly available article; please note the following:
HSPD-12, FIPS 201 and the PIV Card
Homeland Security Presidential Directive 12 (HSPD-12), issued by President George W. Bush on August 27, 2004, mandated the establishment of a standard for identification of Federal government employees and contractors. HSPD-12 requires the use of a common identification credential for both logical and physical access to federally controlled facilities and information systems. The Department of Commerce and National Institute of Standards and Technology (NIST) were tasked with producing a standard for secure and reliable forms of identification. In response, NIST published Federal Information Processing Standard Publication 201 (FIPS 201), Personal Identity Verification (PIV) of Federal Employees and Contractors, issued on February 25, 2005, and a number of special publications that provide more detail on the implementation of the standard.
Both Federal agencies and enterprises have implemented FIPS 201-compliant ID programs and have issued PIV cards. The FIPS 201 PIV card is a smart card with both contact and contactless interfaces that is now being issued to all Federal employees and contractors…
Additional information about FIPS 201 can be found on the Government Identity/Credentialing Resources page, from NIST, and from the Secure Technology Alliance Access Control Council.
If you engage the IRS employee in conversation, remembering the adage you catch more flies with honey than with vinegar, you’ll learn the computer cannot be compromised—all data on the device are encrypted; the only access to it is via the Smart ID. Data can be copied to an external “thumb drive” but everything copied will be encrypted; any file on that thumb drive is only readable by that specific device. Wouldn’t this be true of NSA devices as well? Why does Snowden never discuss dealing with such encryption: how would it be possible?
In the Oliver Stone movie Snowden, as well as in any of Snowden’s descriptions of how he accessed the NSA computers, did you note either the depiction or reference to this universal Smart ID? How could Snowden be exempt from its requirement? Why wasn’t its use, which is public knowledge, shown or discussed? Per the above, the Smart ID is deployed in all government agencies: there are no exceptions. And while the financial portion (think of all those Goldman Sachs alumni at the U.S. Department of the Treasury) is likely the most powerful part of the financial-military-industrial-media-congressional complex that is the central power of the federal government, do you think that IRS systems are different and superior in security to what was employed by a contractor working for Booze-Allen Hamilton at the NSA? How many reading my words work at a large entity, not necessarily government, let us say a Fortune 1000 or higher? Do you have the ability to copy data unimpeded onto any external device? Can you surf the Internet at will? Or is everything you do on the computer network under constant, real-time scrutiny?
Did Edward Snowden, who has publicly criticized Google, mention Google is deployed as a search engine throughout the federal “intranet”? And can he catch a link to the Washington Post on the NSA homepage too? Or would he testify and can it be verified that NSA does not use Google (for example to obtain the PowerPoint he revealed) for searching for internal documents and procedures? Can anyone reading my words answer the questions I’ve posed so far and answer accurately and honestly with confirmatory evidence?
Edward Snowden would have us believe that the Eye of Sauron didn’t notice he was looking at gigabytes of data unrelated to his job function and using his computer to copy the data to external devices over a lengthy period of time. Are his supporters alleging he is so clever he could disappear from the “Eye of Sauron’s” view and be unnoticed? If you believe that, I have a bridge to sell you in Crimea. ZeroHedge reported “IRS Agent Charged In Leak Of Michael Cohen Transactions To Michael Avenatti.” From the article:
John C. Fry, an analyst in the San Francisco IRS office who had worked for the agency since 2008, was charged with disclosing Cohen’s Suspicious Activity Reports (SARs) – nine months after we reported that it wouldn’t be difficult to track down the leaker due to a digital trail left behind from accessing the system.
However, don’t believe it takes nine months to identify such an unauthorized intrusion. Don’t think every keystroke isn’t monitored in real-time. So my question is: would the NSA, which has much more sensitive data (especially compromising information on the governing class) than tax returns and financial transactions have inferior capabilities than the IRS as to maintaing data security? Are we to believe the NSA lacks a “digital trail” when it comes to classified documents?
On another issue, why did Snowden provide his files to known house organs of Intelligence Agencies, specifically the Washington Post and The Guardian, and not give them to Wikileaks to allow a publicly available searchable database? As Roger Stone has noted, the odious Nixon was taken down principally by the CIA media front The Washington Post because he sought detente with Russia and another presidential assassination would have been too obvious. Notice the situation regarding the Snowden treasure trove as investigative journalist Whitney Webb writes about it here: “Silencing the Whistle: The Intercept Shutters Snowden Archive, Citing Cost.”
According to a timeline of events written by Poitras that was shared and published by journalist and former Intercept columnist Barrett Brown, both Scahill and Greenwald were intimately involved in the decision to close the Snowden archive.
While other outlets — such as the Jeff Bezos-owned Washington Post and the New York Times — also possess much (though not all) of the archive, the Intercept was the only outlet with the (full) archive that had continued to publish documents, albeit at a remarkably slow pace, in recent years. In total, fewer than 10 percent of the Snowden documents have been published since 2013. Thus, the closing of the publication’s Snowden archive will likely mean the end of any future publications, unless Greenwald’s promise of finding “the right partner … that has the funds to robustly publish” is fulfilled…
Yet, as Poitras pointed out, the research department accounted for a minuscule 1.5 percent of First Look Media’s budget. Greenwald’s claim that the archive was shuttered owing to its high cost to the company is also greatly undermined by the fact that he, along with several other Intercept employees — Reed and Scahill among them — receive massive salaries that dwarf those of journalists working for similar nonprofit publications.
Greenwald, for instance, received \$1.6 million from First Look Media, of which Omidyar is the sole shareholder, from 2014 to 2017. His yearly salary peaked in 2015, when he made over \$518,000. Reed and Scahill both earn well over \$300,000 annually from First Look. According to journalist Mark Ames, Scahill made over \$43,000 per article at the Intercept in 2014. Other writers at the site, by comparison, have a base salary of \$50,000, which itself is higher than the national average for journalists.
And what about Snowden himself, the pontificator, the man who can speak on television or to the media with evidence of training? Practice yourself—see how well you can answer questions and speak publicly to a TV camera. How did he get his training? Who trained him? Why? How is it that the legacy media, which applauds the slow, painful execution of Julian Assange, be in rapture over Snowden’s new book tour and provide ample coverage? Is Assange being murdered in part to prevent his providing exculpatory evidence that Russia never hacked the DNC and it was a leak?
I have provided two videos below for the reader to consider and compare.
Look at how Bill Binney, a true techno-nerd speaks and compare the difference between him with the polished interviews given by Snowden who borders on pomposity. Also, to his favor Binney is doing his best to debunk the Russia hacking narrative of the DNC; Snowden makes his thoughts about Russia and Russians clear in his latest interview with Der Spiegel promoting his new book about himself:
DER SPIEGEL: Do you have Russian friends?
Snowden: I try to keep a distance between myself and Russian society, and this is completely intentional. I live my life with basically the English-speaking community. I’m the president of the Freedom of the Press Foundation. And, you know, I’m an indoor cat. It doesn’t matter where I am—Moscow, Berlin, New York — as long as I have a screen to look into.
DER SPIEGEL: Western authorities accuse the Russian government on a regular basis of being one of the biggest disrupters in the digital world. Are they right?
Snowden: Russia is responsible for a lot of negative activity in the world, you can say that right and fairly. Did Russia interfere with elections? Almost certainly. But do the United States interfere in elections? Of course. They’ve been doing it for the last 50 years. Any country bigger than Iceland is going to interfere in every crucial election, and they’re going to deny it every time, because this is what intelligence services do. This is explicitly why covert operations and influence divisions are created, and their purpose as an instrument of national power is to ask: How can we influence the world in a direction that improves our standing relative to all the other countries?
I am pleased to have played a small role in getting Stephen F. Cohen’s work published on Unz.com. He and others have effectively debunked Russian involvement in the manipulation of America elections and the conclusions of the Mueller report. To paraphrase a point Professor Cohen made in his most recent article posted here, which is simply common sense: We are to believe Trump is Putin’s puppet yet Putin simultaneously encouraged the preparation of a dossier to destroy him. Does that make sense to any one with half a brain? Do you believe Putin’s intelligence agencies don’t communicate to him how Washington as “organized crime” really operates, as Whitney Webb has disclosed, now on the pages of Unz.com? What difference does any compromised President make to the policies and goals of the occupational government of the United States (obvious to any reader of this and similar websites)?
Do you notice how Snowden never challenges any government narrative, whether it’s on Russia as a villain, and not as a victim of war initiated by Washington? Why is an alleged humanitarian such a Russophobe? Is this how he repays the nation that granted him asylum? Has he only compassion in the abstract, and is a genius but too stupid to consider the consequences of America going to war with Russia and in fact exacerbating the tension by his false and inflammatory statements about Russian conduct in the 2016 elections, for which there are no facts and evidence?
And then there’s the destruction of the World Trade Center buildings. Of course Snowden at NSA had no access to information on how and why it was done, but as Dmitri Orlov has written:
I suppose I am a “conspiracy theorist” too. Whenever I write something that questions the veracity of some official narrative, someone (probably a troll) pops up and asks me what I think of 9/11. Here is what I typically reply:
I totally believe that it was possible to knock down three steel-framed buildings using two flying aluminum cans loaded with kerosene, luggage and meat. I have proven that this is possible by throwing two beer cans at three chain-link fences. All three fences were instantly swallowed up by holes in the ground that mysteriously opened up right under them and in which they were instantaneously incinerated into fine oxide powder that coated the entire neighborhood. Anybody who does not believe my experimental results is obviously a tin-foil-hat crackpot conspiracy theorist.
Lots of people read this and ran away bleating; a few people bust a gut laughing because this is (trust me on this!) actually quite funny. Some people took offense at someone ridiculing an event in which thousands of people died. (To protect their tender sensibilities they should consider emigrating to a country that isn’t run by a bunch of war criminals.)
But if you do see the humor in this, then you may be up to the challenge, which is to pull out a useful signal (a typical experimentalist’s task) out of a mess of unreliable and contradictory data. Only then would you be in a position to persuasively argue—not prove, mind you!—that the official story is complete and utter bullshit.
Note that everything beyond that point, such as arguing what “the real story” is, is strictly off-limits. If you move beyond that point you open yourself up to well-organized, well-funded debunking. But if all you produce is a very large and imposing question mark, then the only way to attack it is by producing certainty—a very tall order! In conspiracy theory, as in guerrilla warfare, you don’t have to win. You just have to not lose long enough for the enemy to give up.
Has Snowden ever challenged the September 11 narrative, ludicrous as it is, and him being an “engineer?” And this last point is the reason I’m writing these words: I don’t have to come up with the “real story” on who Edward Snowden is and what his true motives are. I am asking questions that point out the discrepancies in Snowden’s statements and conduct and his alleged sanctity. In this article, “EXCLUSIVE REPORT: NSA Whistleblower: Snowden Never Had Access to the JUICIEST Documents … Far More Damning”
WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent. [Background here, here and here.]
Does Snowden even have documents which contain the information which you’ve seen?
RUSSELL TICE: The answer is no.
WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
RUSSELL TICE: Think of it this way. Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden?
Now do you think they’re going to put that information into PowerPoint slides that are easy to explain to everybody what they’re doing?
They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA. They made the reports look like they were Humint (human intelligence) reports. They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago. [The NSA and other agencies are still doing “parallel construction”, “laundering” information to hide the fact that the information is actually from mass NSA surveillance.]
Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level. It’s called “ECI” – Exceptionally Controlled Information – and it’s called the black program … which I was a specialist in, by the way.
I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations It’s highly unlikely Mr. Snowden had any access to these.
Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it. It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System. The JWICS system is what everybody at NSA has access to. Mr Snowden had Sys Admin [systems administrator] authority for the JWICS.
And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information – also known as “code word” – clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance].
ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks.
These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them. [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency.
When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times – that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up.
There was no such thing beforehand. It was made up … to try to placate the American people.
The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of.
So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
Snowden’s Failure To Understand the Most Important Documents
RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG.
The stuff that I saw looked like a bunch of alphanumeric gobbledygook. Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst. So he would see something like that, and he wouldn’t know what he’s looking at.
But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there.
I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
Did we really need Snowden to have told us that the Internet, federally controlled, does not allow anyone a modicum of privacy and the government after implementing the Patriot Act considers ordinary Americans the enemy?
In “Inconsistencies and Unanswered Questions: The Risks of Trusting the Snowden Story” Kevin Ryan wrote:
Journalist Margie Burns asked some good questions back in June that have not yet been answered. She wondered about the 29-year old Snowden who had been a U.S. Army Special Forces recruit, a covert CIA operative, and an NSA employee in various capacities, all in just a few, short years. Burns asked “How, exactly, did Snowden get his series of NSA jobs? Did he apply through regular channels? Was it through someone he knew? Who recommended him? Who were his references for a string of six-figure, high-level security jobs? Are there any safeguards in place so that red flags go up when a subcontractor jumps from job to job, especially in high-level clearance positions?”
Five months later, journalists Mark Ames and Yasha Levine investigated some of the businesses in which Greenwald’s benefactor Omidyar had invested. They found that the actual practices of those businesses were considerably less humanitarian than the outward appearance of Omidyar’s ventures often portray. The result was that Omidyar took down references to at least one of those businesses from his website.
In December, whistleblower Sibel Edmonds broke the news that Omidyar‘s Paypal Corporation was implicated in the as-yet-unreleased NSA documents from Snowden. Moreover, Edmonds had allegedly been contacted by an NSA official who alleged that “a deal was made in early June, 2013 between the journalists involved in this recent NSA scandal and U.S. government officials, which was then sealed by secrecy and nondisclosure agreements by all parties involved.”
It would appear that Snowden’s whistleblowing has been co-opted by private corporate interests. Are those involved with privatization of the stolen documents also colluding with government agencies to frame and direct national discussions on domestic spying and other serious matters?
The possibilities are endless, it seems. Presenting documents at a measured rate could be a way to acclimate citizens to painful realities without stirring the public into a panic or a unified response that might actually threaten the status quo. And considering that the number of documents has somehow grown from only thousands to nearly two million, it seems possible that those in control could release practically anything, thereby controlling national dialogue on many topics.
Please read the final paragraph above twice and think about the points raised about acclimating citizens and controlling national dialog. Is Snowden as much of a “Pied Piper” as QAnon? How did Snowden describe the nature of the CIA and NSA in this earlier interview with Der Spiegel?
DER SPIEGEL: But those people see you as their biggest enemy today.
Snowden: My personal battle was not to burn down the NSA or the CIA. I even think they actually do have a useful role in society when they limit themselves to the truly important threats that we face and when they use their least intrusive means.
Snowden: It wasn’t that difficult. Everybody is currently pointing at the Russians.
DER SPIEGEL: Rightfully?
Snowden: I don’t know. They probably did hack the systems of Hillary Clinton’s Democratic Party, but we should have proof of that. In the case of the hacking attack on Sony, the FBI presented evidence that North Korea was behind it. In this case they didn’t, although I am convinced that they do have evidence. The question is why?
DER SPIEGEL: Mike Pompeo, the new head of the CIA, has accused WikiLeaks, whose lawyers helped you, of being a mouthpiece for the Russians. Is that not harmful to your image as well?
Snowden: First, we should be fair about what the accusations are. I don’t believe the U.S. government or anybody in the intelligence community is directly accusing Julian Assange or WikiLeaks of working directly for the Russian government. The allegations I understand are that they were used as a tool basically to wash documents that had been stolen by the Russian government. And, of course, that’s a concern. I don’t see that as directly affecting me because I’m not WikiLeaks and there is no question about the provenance of the documents that I dealt with.
DER SPIEGEL: Currently, there’s another American guy out there who is accused of being too close to Putin.
Snowden: Oh (laughs).
DER SPIEGEL: Your president. Is he your president?
Snowden: The idea that half of American voters thought that Donald Trump was the best among us, is something that I struggle with. And I think we will all be struggling with it for decades to come.
DER SPIEGEL: But isn’t there reason to fear terrorism?
Snowden: Sure there is. Terrorism is a real problem. But when we look at how many lives it has claimed in basically any country that is outside of war zones like Iraq or Afghanistan, it is so much less than, say, car accidents or heart attacks. Even if Sept. 11 were to happen every single year in the U.S., terrorism would be a much lower threat than so many other things.
No, no one is accusing Wikileaks of conspiring with Russia, just Robert Mueller. I really appreciate Snowden calling Julian Assange a liar, for he has consistently denied there was a “state actor.”
“Terrorism is a real problem” Snowden said. Is it credible that Snowden, who presented himself as donating funds to Ron Paul, has never read any alternative news sites? Is it credible that Snowden believes that terrorists and this would include the good “moderate terrorists” in Syria are armed and act on their own initiative, and is ignorant of the role of the governments of America, Israel, and Saudi Arabia in using them to achieve their ends as proxy armies? Does Snowden then think this report, “America Created Al-Qaeda and the ISIS Terror Group” is false? Does that mindset make Snowden a champion for liberty or a tool for more control of the American population? For example, is it credible that this alleged genius supports the narrative of the September 11 attacks World Trade Center attacks? Whom do you trust, the contributors to these very pages or Edward Snowden?
Snowden has promoted the use of the Tor Browser. ZeroHedge posted this article, “Tor Project ‘Almost 100% Funded By The US Government’: FOIA” which noted:
The Tor Project – a private nonprofit known as the “NSA-proof” gateway to the “dark web,” turns out to be almost “100% funded by the US government” according to documents obtained by investigative journalist and author Yasha Levine.
In a recent blog post, Levine details how he was able to obtain roughly 2,500 pages of correspondence via FOIA requests while performing research for a book. The documents include strategy, contract, budgets and status updates between the Tor project and its primary source of funding; a CIA spinoff known as the Broadcasting Board of Governors (BBG), which “oversees America’s foreign broadcasting operations like Radio Free Asia and Radio Free Europe.”
By following the money, I discovered that Tor was not a grassroots. I was able to show that despite its indie radical cred and claims to help its users protect themselves from government surveillance online, Tor was almost 100% funded by three U.S. National Security agencies: the Navy, the State Department and the BBG. Following the money revealed that Tor was not a grassroots outfit, but a military contractor with its own government contractor number. In other words: it was a privatized extension of the very same government that it claimed to be fighting.
The documents conclusively showed that Tor is not independent at all. The organization did not have free reign to do whatever it wanted, but was kept on a very short leash and bound by contracts with strict contractual obligations. It was also required to file detailed monthly status reports that gave the U.S. government a clear picture of what Tor employees were developing, where they went and who they saw. -Yasha Levine
The FOIA documents also suggest that Tor’s ability to shield users from government spying may be nothing more than hot air. While no evidence of a “backdoor” exists, the documents obtained by Levine reveal that Tor has “no qualms with privately tipping off the federal government to security vulnerabilities before alerting the public, a move that would give the feds an opportunity to exploit the security weakness long before informing Tor users.”
Interestingly, Edward Snowden is a big fan of Tor – even throwing a “cryptoparty” while he was still an NSA contractor where he set up a Tor exit node to show off how cool they are.
In a 2015 interview with The Intercept’s (Wikileaks hating) Micah Lee, Snowden said:
LEE: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing?
SNOWDEN: I think Tor is the most important privacy-enhancing technology project being used today.
“Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.”
Tor lists on its own website sponsors that include Google, the U.S. Department of State Bureau of Democracy, Human Rights, and Labor, ONR via Naval Research Laboratory (past sponsor) and DARPA.
When Julian Assange was taken from the Ecuadoran embassy, he was carrying a copy of Gore Vidal: History of the National Security State & Vidal on America. As an older article on Vidal in The Guardian noted, “Gore Vidal claims ‘Bush junta’ complicit in 9/11.”
Isn’t it odd by doing what he did with Vidal’s book Assange makes the point the legitimacy of Washington must be challenged, but Snowden never does, other than offering suggestions for tinkering at the margins, perhaps advising we use DuckDuckGo instead of Google to give us the illusion of privacy? Did Snowden, for someone who is in front of a computer screen for most of the day, make public the facts obtained by Whitney Webb in her piece “How the CIA, Mossad and ‘the Epstein Network’ Are Exploiting Mass Shootings to Create an Orwellian Nightmare” posted on Unz.com which goes in depth into the Orwellian hell we are facing, for as Webb concludes:
With companies like Carbyne — with its ties to both the Trump administration and to Israeli intelligence — and the Mossad-linked Gabriel also marketing themselves as “technological” solutions to mass shootings while also doubling as covert tools for mass data collection and extraction, the end result is a massive surveillance system so complete and so dystopian that even George Orwell himself could not have predicted it.
Following another catastrophic mass shooting or crisis event, aggressive efforts will likely follow to foist these “solutions” on a frightened American public by the very network connected, not only to Jeffrey Epstein, but to a litany of crimes and a frightening history of plans to crush internal dissent and would-be dissenters in the United States.
There is the concept of willful blindness that I think applies to much of what Snowden has done, if not something altogether more nefarious—distorations, misrepresenations, and outright lies, in addition to hubris. What is the point I’m making? Perhaps Snowden is only a Soros and Hillary Clinton supporting liberal—but then why would he have done what he did? His character is of any government employee of the “surface state” who swallows false narratives whole.
I only wish the reader fairly and intelligently consider the questions I have raised. For I am encouraging you to think very carefully before you trust the statements, purpose, motives, and truthfulness of the secular saint, Edward Snowden.
Yvonne Lorenzo makes her home in New England in a house full to bursting with books, including works on classical Greece. Her interests include gardening, mythology, ancient history, The Electric Universe, and classical music, especially the compositions of Handel, Mozart, Bach, Haydn, Tchaikovsky, Mahler, and the Bel Canto repertoire. She is the author of the novels the Son of Thunder and The Cloak of Freya and has contributed to LewRockwell.com and TheSaker.IS.