2. There has been a buzz on social media lately about the documentary "Shadow Gate." This is nothing new folks. I dug in to it long ago, but opted not to post it for obvious reasons. Now that it hit the mainstream I am going to post it.
3. Multiple conspiracy theories have emerged. Many of which I believe are a disinformation campaign propagated by [THEM]. You know me, I don't pull any punches or post any BS that isn't backed by sauce.
4. What no one will tell you, and wasn't included in the documentary, is that this technology originated in China. Not only was Diane Feinstein on the intelligence committee, she had a Chinese spy in her employ for years. https://www.washingtonpost.com/opinions/explain-the-chinese-spy-sen-feinstein/2018/08/09/0560ca60-9bfd-11e8-b60b-1c897f17e185_story.html
5. Was he an employee or her handler? How much intel was provided to China? Other questions arise like; why did China give Hunter Biden all of that cash? How many U.S. secrets did sleepy Joe sell to China?
6. Why did our politicians sell us out to China? Sign horrific trade deals etc? What if it was blackmail? Did the Chinese use the ShadowNet to hack our leaders. Did they use their other assets?
7. The government of China is engaged in espionage overseas, directed through diverse methods via the Ministry of State Security, the United Front Work Department, and People's Liberation Army as well as their numerous front organizations
8. It employs a variety of tactics including cyber spying to gain access to sensitive information remotely, signals intelligence, and human intelligence.
9. China is also engaged in industrial espionage aimed at gathering information to bolster its economy, This article is from 2007 when CNN actually reported the news. https://web.archive.org/web/20080120120103/http://www.cnn.com/2007/TECH/11/15/us.china.tech.ap/
10. as well as monitoring dissidents abroad such as supporters of the Tibetan independence movement and Uyghurs as well as the Taiwan independence movement, the Hong Kong independence movement, Falun Gong, pro-democracy activists, and other critics of the Chinese Communist Party
11. It is generally believed that Chinese intelligence agencies operate differently from other espionage organizations by employing primarily academics or students who will be in their host country only a short time,
12. rather than spending years cultivating a few high-level sources or double agents. There are over 100,000 Chinese spies in in the US at any given time.
14. In fact, there are a number spies that have infiltrated all levels of our government and military.
15. The use of non-traditional intelligence assets is codified in Chinese law. Article 14 of China's 2017 National Intelligence Law mandates that Chinese intelligence agencies "may ask relevant institutions
16. organizations and citizens to provide necessary support, assistance and cooperation." Spalding, Robert (2019). Stealth war: how China took over while America's elite slept. Kaufman, Seth. Penguin Random House. p. 148. ISBN 978-0-593-08434-2. OCLC 1102323878.
17. Honey trapping and kompromat are also common tools of Chinese intelligence services. https://en.wikipedia.org/wiki/Honey_trapping https://en.wikipedia.org/wiki/Kompromat
18. The Shadow Network is a China-based computer espionage operation that stole classified documents and emails from the Indian government, the office of the Dalai Lama, and other high-level government networks. https://www.nytimes.com/2010/04/06/science/06cyber.html?pagewanted=all&_r=1&
19. This is the second cyber espionage operation of this sort discovered by researchers at the Information Warfare Monitor, following the discovery of GhostNet in March 2009.The Shadow Network report "Shadows in the Cloud: Investigating Cyber Espionage 2.0"
20. was released 6 April 2010, approximately one year after the publication of "Tracking GhostNet" https://www.scribd.com/doc/29435784/SHADOWS-IN-THE-CLOUD-Investigating-Cyber-Espionage-2-0
21. The cyber spying network made use of Internet services, such as social networking and cloud computing platforms. The services included Twitter, Google Groups, Baidu, Yahoo Mail, Blogspot, and http://blog.com
22. which were used to host malware and infect computers with malicious software. https://www.nytimes.com/2010/04/06/science/06cyber.html?pagewanted=all&_r=1&
23. What no one wants you to know is: In 2009, Snowden began work as a contractor for Dell,which manages computer systems for multiple government agencies. https://edwardsnowden.com/2014/01/27/video-ard-interview-with-edward-snowden/
24. Assigned to an NSA facility at Yokota Air Base near Tokyo, Snowden instructed top officials and military officers on how to defend their networks from Chinese hackers.
25. Snowden looked into mass surveillance in China which prompted him to investigate and then expose Washington's mass surveillance program after he was asked in 2009 to brief a conference in Tokyo.
26. During his four years with Dell, he rose from supervising NSA computer system upgrades to working as what his résumé termed a "cyberstrategist" and an "expert in cyber counterintelligence" at several U.S. locations. https://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-whistleblower
27. In 2011, he returned to Maryland, where he spent a year as lead technologist on Dell's CIA account. In that capacity, he was consulted by the chiefs of the CIA's technical branches, including the agency's chief information officer and its chief technology officer.
28. In March 2012, Dell reassigned Snowden to Hawaii as lead technologist for the NSA's information-sharing office. https://www.cryptomuseum.com/people/snowden/index.htm
29. On March 15, 2013 – three days after what he later called his "breaking point" of "seeing the Director of National Intelligence, James Clapper, directly lie under oath to Congress" https://www.scmp.com/news/hong-kong/article/1268209/snowden-sought-booz-allen-job-gather-evidence-nsa-surveillance
31. Although he has said his career high annual salary was $200,000, Snowden said he took a pay cut to work at consulting firm Booz Allen Hamilton, https://www.nytimes.com/2013/07/01/us/job-title-key-to-inner-access-held-by-snowden.html
32. where he sought employment in order to gather data and then release details of the NSA's worldwide surveillance activity. It didn't take long for [THEM] to activate their assets in the MSM to push fake news. https://www.reuters.com/article/net-us-usa-security-snowden/exclusive-snowden-persuaded-other-nsa-workers-to-give-up-passwords-sources-idUSBRE9A703020131108
36. At the time of his departure from the U.S. in May 2013, he had been employed for 15 months inside the NSA's Hawaii regional operations center, which focuses on the electronic monitoring of China and North Korea. https://www.vanityfair.com/news/politics/2014/05/edward-snowden-politics-interview
37. first for Dell and then for two months with Booz Allen Hamilton. While intelligence officials have described his position there as a system administrator, Snowden has said he was an infrastructure analyst,
38. which meant that his job was to look for new ways to break into Internet and telephone traffic around the world.
39. The NSA sent a memo to Congress saying that Snowden had tricked a fellow employee into sharing his personal public key infrastructure certificate to gain greater access to the NSA's computer system.
40. Booz Allen terminated Snowden's employment on June 10, 2013, the day after he went public with his story, and 3 weeks after he had left Hawaii on a leave of absence. https://www.theguardian.com/world/2014/jul/18/-sp-edward-snowden-interview-rusbridger-macaskill
42. Snowden elaborated in January 2014, saying "[I] made tremendous efforts to report these programs to co-workers, supervisors, and anyone with the proper clearance who would listen. https://thehill.com/policy/technology/210570-nsa-no-documents-of-snowden-complaints
43. The reactions of those I told about the scale of the constitutional violations ranged from deeply concerned to appalled, but no one was willing to risk their jobs, families, and possibly even freedom to go through what [Thomas Andrews] Drake did. https://www.theguardian.com/world/2014/jul/18/-sp-edward-snowden-nsa-whistleblower-interview-transcript
44. In March 2014, during testimony to the European Parliament, Snowden wrote that before revealing classified information he had reported "clearly problematic programs" to ten officials, who he said/did nothing in response. https://www.edwardsnowden.com/2014/06/25/edward-snowden-speaks-to-the-council-of-europe-on-improving-the-protection-of-whistleblowers/
45. In a May 2014 interview, Snowden told NBC News that after bringing his concerns about the legality of the NSA spying programs to officials, he was told to stay silent on the matter. He asserted that the NSA had copies of emails he sent to their Office of General Counsel,
46. oversight and compliance personnel broaching "concerns about the NSA's interpretations of its legal authorities. I had raised these complaints not just officially in writing through email,
48. In May 2014, U.S. officials released a single email that Snowden had written in April 2013 inquiring about legal authorities but said that they had found no other evidence that Snowden had expressed his concerns to someone in an oversight position. https://cup.columbia.edu/book/whistleblowing-nation/9780231194174
49. In June 2014, the NSA said it had not been able to find any records of Snowden raising internal complaints about the agency's operations. That same month, Snowden explained that he himself has not produced the communiqués in question because of the ongoing nature of the
50. dispute, disclosing for the first time that "I am working with the NSA in regard to these records and we're going back and forth, so I don't want to reveal everything that will come out." https://www.lawfareblog.com/edward-snowden-national-security-whistleblowing-and-civil-disobedience
52. It's hard to ascertain exactly when the NSA started spying on US citizens with Chinese tactics. What we do know is, Snowden uncovered the Chinese ops and set out to determine if the NSA was doing the same thin
53. We know a lot of policies were put in place under the Bush admin in the Patriot act. To date, there is no evidence that citizens were being spyed on before #ObamaGate
54. I'm seeing a lot of people making allegations that Snowden caused the spying to increase which is BS. Obama weaponiozed the intelligence agencies for political AND monetary reasons. https://www.bitchute.com/video/SY11mNzkgAiN/
55. In 2013, Trump made a series of tweets in which he referred to Snowden as a "traitor", saying he gave "serious information to China and Russia" and "should be executed".
56. Later that year he added a caveat, tweeting "if it and he could reveal Obama's [birth] records, I might become a major fan"
57. However, in Aug of 2020, after learning the facts about the large scale espionage, AND experiencing it first hand, he had a much different opinion. He suggested during a press conference that he would "take a look" at pardoning Snowden and remarked that he was
59. Snowden responded to the announcement saying, "the last time we heard a White House considering a pardon was 2016, when the very same Attorney General who once charged me conceded that, on balance,
60. my work in exposing the NSA's unconstitutional system of mass surveillance had been 'a public service'." https://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/ProtectionOfSources.aspx
61. Top members of the House Armed Services Committee voiced strong opposition to a pardon, saying Snowden's actions resulted in "tremendous harm" to national security, and that he needed to stand trial.
62. Liz Cheney called the idea of a pardon "unconscionable". A week prior to the announcement, Trump also said he had been thinking of letting Snowden return to the U.S. without facing any time in jail. https://theintercept.com/2015/10/23/u-n-report-calls-on-governments-to-protect-whistleblowers-like-snowden-not-prosecute-them/
63. You're entitled to your opinion, but in my mind, Snowden was a freakin hero and if he hadn't fled, he would have ended up like Seth Rich and every other person that has tried to expose [THEM].
64. All involved in the illegal spying and attempted coup of a duly elected president, need to be prosecuted to the full extent of the law!
65. Another thing you should know is: one of the founding Facebook engineers was a Rothschild. The platform was designed for the soul purpose of not only spying on you, but selling your data. https://softwareengineeringdaily.com/2019/10/28/facebook-entrepreneurship-with-jeff-rothschild/
66. When you install a Facebook, Twitter, Messenger etc app, you are putting Malware in your device. I strongly advise you to use the browser version rather than an app.
67. In closing, here is a list of additional sauce and helpful tips.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.