The United States, Russia, China and all other members of the G7 have been spying on themselves and on everyone else for years, even before Edward Snowden leaked it to the public.
Although it may be tricky to find the exact birth date of the Surveillance State we know it was a gradual process. It was brought upon us all by means of convenience and even more gradually through fear.
As philosophers had warned, the third world war would not be necessarily a battle of firepower, but a fight between those who intend to provide information and those who purposely counteract information with propaganda and disinformation.
That is where we are today.
The world is fighting an information guerrilla warfare between those who inform – mostly citizen journalists and some alternative media – and the military industrial complex, that controls the firepower, the media and the cyber world. The world in immersed in a hot information war that slowly but surely seems to be driving humanity towards the specter of nuclear war.

Today because of a secret program launched and managed by the infamous and controversial National Security Agency (NSA) of the United States, GHCQ from the United Kingdom and the collaboration of western European countries along with Israel, Australia and New Zealand, the military and political establishments have a way to conceal an effective cyber army of spies, an exclusive group of guerrillas that are part of the operation named Tailored Access Operations or CAT.

The troop members of these guerrillas are solely dedicated to conducting missions in cyber space to manipulate and destroy enemy computers and their hard drives and to discover ultimately how we all think and how we make use of technology on the world wide web. Cyber security is not what the establishment would have us believe it is. It is a war between them and us.

The program leaked by Edward Snowden was launched eight years ago and it made it possible for governments to manage and devise strategies for fighting on the Internet, to spy on everyone who uses cyber space and to cripple communications from and to civilians as well as competing cyber forces from foreign nations.

Their control is so immense, that they are able to interrupt and destroy complete computer networks that are in charge of controlling potable water, electricity , factories, airports and payment transactions. In sum, they can cripple a whole nation with a few key strokes.

The existence of this program was discovered by former NSA consultant, Edward Snowden, who made public thousands of documents summarizing the work of the NSA. Many of those documents have been dumped by major media outlets, as well as independent reporters including Der Spiegel, The Guardian and journalists like Glenn Greenwald.

The secret services are no longer only occupied with espionage. Edward Snowden documents show that they dominate Internet and are preparing for a major digital war. The weekly magazine reveals that digital spies are working in secret services that form the “Alliance of Five Eyes, composed by the United Kingdom, Canada, New Zealand, the United States and Australia.

The documents held by Snowden reveal the NSA is aware that the next great global conflict will begin on the Internet, a certainty that convinced the agency to request a substantial increase in its budget to reinforce itseld and to carry out offensive operations on covers designed to invade enemy computer networks.

The documents state that one of the most successful attacks by the NSA was using the Stuxnet virus to cripple Iran‘s atomic program. Another tool developed by cyber warriors at the NSA was the Regin virus, with which it tried to infiltrate the computer network of the German Foreign Ministry. The virus was also used to spy on the European Commission.

The NSA and its allies have also used cyber attacks that they have allegedly suffered to demand more power and more resources to benefit their spying programs worldwide which continue to Steal it All, as its motto says.

The team of experts from the NSA failed to detect the IP address in Asia, a trail that eventually led them to find the start of the attack on China. The counterattack was swift and successful. The spies managed to discover the outcome of the Chinese attack, but also discovered that China was responsible for an attack suffered by the United Nations.

The core of the NSA spies work under a Senate Law 321 that deals with the Remote Operation Center located at Fort Meade in Maryland, which occupies the third floor of one of the main buildings of the complex. This spying body sweeps the internet and gathers all information possible 24 hours a day.

The priority of the NSA are attacks and no defense” admitted Snowden in a recent interview, referring to the new strategy of the watchdog and when it can, ‘it attacks along with its allies from the group of the Five Eyes, all other countries that do not belong to that exclusive group of espionage, including Germany and Spain.

Luis Miranda is an award-winning journalist and the founder and editor-in-chief at The Real Agenda News. His career spans over 18 years and almost every form of news media. His articles include subjects such as environmentalism, Agenda 21, climate change, geopolitics, globalisation, health, vaccines, food safety, corporate control of governments, immigration and banking cartels, among others. Luis has worked as a news reporter, on-air personality for Live and Live-to-tape news programs. He has also worked as a script writer, producer and co-producer on broadcast news.
Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

The middle class that vanished

  One of the giants of the South experiences the highest rates…

The TB pandemic that nobody sees, but that kills millions a year

  31.8 million people will have died by 2030 if tuberculosis is…