Thread: What is the ShadowNet? The Snowden connection.
1. https://twitter.com/CowgirlCas22/status/1297226457505300481?s=20
2. There has been a buzz on social media lately about the documentary "Shadow Gate." This is nothing new folks. I dug in to it long ago, but opted not to post it for obvious reasons. Now that it hit the mainstream I am going to post it.
3. Multiple conspiracy theories have emerged. Many of which I believe are a disinformation campaign propagated by [THEM]. You know me, I don't pull any punches or post any BS that isn't backed by sauce.
5. Was he an employee or her handler? How much intel was provided to China? Other questions arise like; why did China give Hunter Biden all of that cash? How many U.S. secrets did sleepy Joe sell to China?
6. Why did our politicians sell us out to China? Sign horrific trade deals etc? What if it was blackmail? Did the Chinese use the ShadowNet to hack our leaders. Did they use their other assets?
7. The government of China is engaged in espionage overseas, directed through diverse methods via the Ministry of State Security, the United Front Work Department, and People's Liberation Army as well as their numerous front organizations
8. It employs a variety of tactics including cyber spying to gain access to sensitive information remotely, signals intelligence, and human intelligence.
9. China is also engaged in industrial espionage aimed at gathering information to bolster its economy, This article is from 2007 when CNN actually reported the news. https://web.archive.org/web/20080120120103/http://www.cnn.com/2007/TECH/11/15/us.china.tech.ap/
10. as well as monitoring dissidents abroad such as supporters of the Tibetan independence movement and Uyghurs as well as the Taiwan independence movement, the Hong Kong independence movement, Falun Gong, pro-democracy activists, and other critics of the Chinese Communist Party
11. It is generally believed that Chinese intelligence agencies operate differently from other espionage organizations by employing primarily academics or students who will be in their host country only a short time,
12. rather than spending years cultivating a few high-level sources or double agents. There are over 100,000 Chinese spies in in the US at any given time.
14. In fact, there are a number spies that have infiltrated all levels of our government and military.
15. The use of non-traditional intelligence assets is codified in Chinese law. Article 14 of China's 2017 National Intelligence Law mandates that Chinese intelligence agencies "may ask relevant institutions
16. organizations and citizens to provide necessary support, assistance and cooperation." Spalding, Robert (2019). Stealth war: how China took over while America's elite slept. Kaufman, Seth. Penguin Random House. p. 148. ISBN 978-0-593-08434-2. OCLC 1102323878.
17. Honey trapping and kompromat are also common tools of Chinese intelligence services. https://en.wikipedia.org/wiki/Honey_trapping
https://en.wikipedia.org/wiki/Kompromat 
19. This is the second cyber espionage operation of this sort discovered by researchers at the Information Warfare Monitor, following the discovery of GhostNet in March 2009.The Shadow Network report "Shadows in the Cloud: Investigating Cyber Espionage 2.0"
21. The cyber spying network made use of Internet services, such as social networking and cloud computing platforms. The services included Twitter, Google Groups, Baidu, Yahoo Mail, Blogspot, and http://blog.com  etc,
23. What no one wants you to know is: In 2009, Snowden began work as a contractor for Dell,which manages computer systems for multiple government agencies. https://edwardsnowden.com/2014/01/27/video-ard-interview-with-edward-snowden/
24. Assigned to an NSA facility at Yokota Air Base near Tokyo, Snowden instructed top officials and military officers on how to defend their networks from Chinese hackers.
25. Snowden looked into mass surveillance in China which prompted him to investigate and then expose Washington's mass surveillance program after he was asked in 2009 to brief a conference in Tokyo.
27. In 2011, he returned to Maryland, where he spent a year as lead technologist on Dell's CIA account. In that capacity, he was consulted by the chiefs of the CIA's technical branches, including the agency's chief information officer and its chief technology officer.
28. In March 2012, Dell reassigned Snowden to Hawaii as lead technologist for the NSA's information-sharing office. https://www.cryptomuseum.com/people/snowden/index.htm
37. first for Dell and then for two months with Booz Allen Hamilton. While intelligence officials have described his position there as a system administrator, Snowden has said he was an infrastructure analyst,
38. which meant that his job was to look for new ways to break into Internet and telephone traffic around the world.
39. The NSA sent a memo to Congress saying that Snowden had tricked a fellow employee into sharing his personal public key infrastructure certificate to gain greater access to the NSA's computer system.
44. In March 2014, during testimony to the European Parliament, Snowden wrote that before revealing classified information he had reported "clearly problematic programs" to ten officials, who he said/did nothing in response. https://www.edwardsnowden.com/2014/06/25/edward-snowden-speaks-to-the-council-of-europe-on-improving-the-protection-of-whistleblowers/
45. In a May 2014 interview, Snowden told NBC News that after bringing his concerns about the legality of the NSA spying programs to officials, he was told to stay silent on the matter. He asserted that the NSA had copies of emails he sent to their Office of General Counsel,
46. oversight and compliance personnel broaching "concerns about the NSA's interpretations of its legal authorities. I had raised these complaints not just officially in writing through email,
48. In May 2014, U.S. officials released a single email that Snowden had written in April 2013 inquiring about legal authorities but said that they had found no other evidence that Snowden had expressed his concerns to someone in an oversight position. https://cup.columbia.edu/book/whistleblowing-nation/9780231194174
49. In June 2014, the NSA said it had not been able to find any records of Snowden raising internal complaints about the agency's operations. That same month, Snowden explained that he himself has not produced the communiqués in question because of the ongoing nature of the
52. It's hard to ascertain exactly when the NSA started spying on US citizens with Chinese tactics. What we do know is, Snowden uncovered the Chinese ops and set out to determine if the NSA was doing the same thin
53. We know a lot of policies were put in place under the Bush admin in the Patriot act. To date, there is no evidence that citizens were being spyed on before #ObamaGate.
54. I'm seeing a lot of people making allegations that Snowden caused the spying to increase which is BS. Obama weaponiozed the intelligence agencies for political AND monetary reasons. https://www.bitchute.com/video/SY11mNzkgAiN/
55. In 2013, Trump made a series of tweets in which he referred to Snowden as a "traitor", saying he gave "serious information to China and Russia" and "should be executed".
56. Later that year he added a caveat, tweeting "if it and he could reveal Obama's [birth] records, I might become a major fan"
57. However, in Aug of 2020, after learning the facts about the large scale espionage, AND experiencing it first hand, he had a much different opinion. He suggested during a press conference that he would "take a look" at pardoning Snowden and remarked that he was
59. Snowden responded to the announcement saying, "the last time we heard a White House considering a pardon was 2016, when the very same Attorney General who once charged me conceded that, on balance,
60. my work in exposing the NSA's unconstitutional system of mass surveillance had been 'a public service'." https://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/ProtectionOfSources.aspx
61. Top members of the House Armed Services Committee voiced strong opposition to a pardon, saying Snowden's actions resulted in "tremendous harm" to national security, and that he needed to stand trial.
63. You're entitled to your opinion, but in my mind, Snowden was a freakin hero and if he hadn't fled, he would have ended up like Seth Rich and every other person that has tried to expose [THEM].
64. All involved in the illegal spying and attempted coup of a duly elected president, need to be prosecuted to the full extent of the law!
66. When you install a Facebook, Twitter, Messenger etc app, you are putting Malware in your device. I strongly advise you to use the browser version rather than an app.
67. In closing, here is a list of additional sauce and helpful tips.
You can follow @CowgirlCas22.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: