On Monday, 26 September 2022 someone blew up the Nord Stream pipeline system, built at Germany’s request, to deliver Natural Gas from Russia to Germany. For a number of reasons, some of which I articulated in the article, “Britain’s Secret Diplomacy and the European Wars,” I thought that Great Britain was probably the mastermind and one of the perpetrators behind the attacks. Again, not any legitimate British government organization, but some deep state networks within the British military and structures. I expressed this view in the podcast with Tom Luongo, published five days after the attacks.
This week, Russia’s Foreign Ministry and the Ministry of Defence revealed that Britain’s (then) PM Liz Truss sent a message to the US State Secretary Antony Blinken, saying “It’s done.”
The message was sent only one minute after the pipelines were destroyed. Foreign Ministry spokeswoman Maria Zakharova demanded an explanation from the British government. Not surprisingly, the allegations were rejected on both sides of the Atlantic, with the UK Ministry of Defence claiming that the Russians were “peddling false claims on an epic scale.” Of course they are: we all know that we in the west are the good guys and that the Russians are evil, so that should settle the issue. Or maybe not. If you’re not so sure about the western narrative anymore, please continue reading.
From the perspective of an average newsflow consumer, it may seem weird that the Russians could hack into Liz Truss’ text messages, but the German-Finnish tech entrepreneur Kim Dotcom weighed in to demystify the world of cyber intelligence. In a tweet on 30 Oct, he wrote, “How do the Russians know that the UK blew up the North Stream pipelines in partnership with the US? Because @trussliz used her iPhone to send a message to @SecBlinken saying ‘It’s done’ a minute after the pipeline blew up and before anybody else knew? iCloud admin access rocks!”
In yesterday’s thread, Dotcom elaborated further, adding some credibility to his viewpoint:
“Govt secrets are only secret to ordinary people, not to nations engaged in the global cyberwar. The leaders of the top 20 spy nations know who blew up the Nord Stream pipeline. Let me explain the reality of the hyper transparent spy world we’re living in today.
“Top secret” means nothing to the top spy agencies in the world. Secrecy exists to keep citizens in the dark. Russia and China know exactly who blew up the Nord Stream pipelines because in todays world it’s impossible for an operation like that to leave no trace. Let me explain:
All big tech databases are backdoored by every major spy agency. Every smartphone is an open mic to them. Every computer that is connected to the net is wide open. All major chips and most hardware is trojanized. All the data that one spy agency collects is stolen by the others.
All leaders of nations are targeted by spy tech and not one of them, not even the US President, isn’t spied on successfully 24/7 by multiple foreign and domestic agencies. Even the encrypted devices that spy agencies give to their leaders are backdoored. That’s the reality.
Occasional private conversations in zero tech environments are possible but the rare exception. Something like Nord Stream attack involves hundreds of people from military, agencies and the leadership of multiple countries. Impossible not to have a weak link in such a scenario.
The perpetrators of major events understand that their adversaries know exactly who did it and it’s a game they play against each other at the expense of ordinary people who become victims of stupid dick swinging contests. It’s a secret war that has been going on for decades.
I used to be a hacker, turned data security consultant, hired the top hackers in the world, was paid by Fortune 500 companies to hack them. We never had any client we didn’t hack successfully. That’s the truth. There’s no effective data security at all. Everything is wide open.
Spy agencies with billion dollar budgets have coders in all leading tech companies implementing backdoors. It’s impossible to keep them secret. Competing agencies, cyber criminals and security analysts find them. That’s why you constantly have to install new security patches.
I understand exactly how all of this works and when the NSA cooperated with their New Zealand partner agency GCSB to spy on my devices (in a copyright case) I caught them, exposed them, took them to court, forced a change of the law and the Prime Minister had to apologize to me.
When I’m sharing spy stuff with you I’m not wasting your time like the 50 American spy chiefs who got their presstitutes to tell you lies about the Hunter Biden laptop being Russian disinformation or that Russia hacked the DNC and gave the @HillaryClinton data to Wikileaks.”
Another element corroborating the idea that the Russians successfully hacked top British officials was last month’s abrupt departure of the UK Defence Minister Ben Wallace to Washington. Wallace’s flight to Washington was an unplanned trip, arranged hastily at the last moment. Apparently, the British had discovered that their communications were compromised by Russian intelligence at the time when they went public with warnings about a planned dirty-bomb false flag attack in Ukraine. Discussing things over “secure” telephone lines was out of the question.
So, supposing that the UK’s deep state and special forces were involved in the Nord Stream attacks, this raises further questions. In particular, why did the Russians choose to go public with those allegations now – they must have had Truss’ texts for weeks? Also, given that Putin’s spokesman Dmitry Peskov suggested that the attacks cannot go unanswered, what measures will Russia take in retaliation against the UK? For the war-pigs in the west, the greatest gift Russia could give them at this time would be some kind of a pretext to launch into a full-scale, united war of NATO against Russia. So I doubt that we’ll see that scenario play out, but then again I was also wrong when I thought that Russia wouldn’t invade Ukraine back in February. Time will tell and we’ll find out soon enough.
The futility of protecting our own secrecy
I wanted to point out two more takeaways from Kim Dotcom’s thread above. First, it puts into perspective our individual efforts to keep our communications private and confidential. Many years ago I entirely gave up on trying to keep my communications secret. Use Proton mail, they said. Use double encryption, they said. Don’t use gmail, they said. Don’t use WhatsApp, don’t talk over Zoom, etc… But even while not knowing what Kim Dotcom and other hackers know, I’m sufficiently tech-literate to know that if someone really wanted to hack into my stuff, they probably could, and all attempts to keep stuff secret would likely be futile.
Perhaps our best collective defense is to communicate openly and speak our thought crimes freely, swamp the powers that be with the sheer volume of them right in the open, and simply claim our freedom of expression by our everyday conduct.
Megaupload: a story worth remembering…
Second: some years ago I looked into Kim Dotcom’s business model with his Megaupload venture. The details of it have meanwhile receded into the memory fog, but Megaupload was such a phenomenally compelling and revolutionary (and legal) concept that if it was left to the free markets, it would have completely upended the whole publishing, arts and entertainment industry, probably to the greatest benefit of both content producers and consumers. As it happened, the industry and western intelligence apparatus co-opted New Zealand’s law enforcement agencies and illegally and forcefully destroyed Megaupload.
However, the idea was hatched and no force can uninvent it. It’s a story worth remembering and researching. Ultimately, its time will come.
Alex Krainer – @NakedHedgie is the creator of I-System Trend Following and publisher of daily TrendCompass reports, covering over 200 key financial and commodity markets for investors and traders – probably the best CTA daily newsletter on the market today. One month’s test drive is always free of charge – no strings attached!
8 thoughts on “It’s done: realities of the hyper-transparent spy world”
Congrats to your last conversation with Tom Luongo, Alex.
Kim gives an accurate overview how unsafe the Internet is. I worked on Network design for large ISP’s. All products have legal interception built into them, it is a legal requirement and corporate security would not sign off the product without it meeting all of the rquirements.
I came under surveillance myself about 20 years back. I had lived with a German journalist for some years in Munich but our relationship had ended in 2000. In 2003 I got a email from the US consulate in Munich regarding my passport renewal. As I am not a US citizen I knew something was afoot. When I asked where they had got my email address from, they claimed that someone had visited the offices in Munich and left my email address.
I still have a copy of those emails complete with their spyware embedded in PDF files. I resolved from then on to ‘have nothing to hide’. That is the best protection.
I knew that it was related to Andrea’s work. She was blacklisted back then after her critical articles on the Israeli policies towards the Palestinians and she had interviewed the Mayor of Gaza, Jonathan Cooke, Refusniks etc. and published these in the Jungewelt magazine. She had to leave journalism and now works in academia.
What Kim does not cover is the many secure communications networks that exist in the world. Some have been compromised I am sure but constant innovation of Hedy Lamarr’s invention continues apace. Here is a nerdy video that gives some idea of what is out there. Liz Truss may have not followed the protocols for secure communication but I would expect that using an Iphone for confidential communications is not part of how she has been instructed to act. https://www.youtube.com/watch?v=kvkSXuOfpSQ
I watched your recent appearance on Gonzalo Lira’s Round Table and was impressed with your clarity and obvious knowledge of the financial entities who rule and have ruled for centuries. Many years ago, I read Jim Marrs book, “Rule by Secrecy” so understand that international banks finance wars on both sides in their quest for global domination.
Your present day analyses of the current players and their methods shines a light that I haven’t found in other commentators on the current crisis.
In my experience, some events are relatively easy to predict based on a common sense, logical interpretation of superficial acts such as Biden “poking the Bear” and Ukraine massing troops on the Donetsk border (confirmed by Jacques Baud) leaving Putin no choice but to launch the SMO. However, the unseen “who, what, where and why” are not as obvious.
After hearing your Round Table analyses and reading a couple of your articles, it’s evident that you possess a superior grasp of the historic and current intricacies of the play and the players. I appreciate your excellent work and especially your ability to coherently connect the dots to reveal the players and the play.
In a world that appears insane, understanding the backstory alleviates the stress of confusion and helplessness intentionally created by the plethora of lies foisted upon us. Thank you.
Hi Barbara, thank you for your kind words, they are much appreciated. Warm regards from Monaco.
I hope you will become a regular visitor to Gonzalo’s Round Table and Open House live streams. Your demeanor is refreshing. So many guests have truly appalling communication skills (or lack thereof) that their comments become a muddle and a chore to watch. You appear to intend to educate your audience and your calm, confident manner makes your information comprehensible as well as credible. In my opinion, it’s critically important for us to understand events so your contributions should be widely disseminated. Gonzalo has a large following. Assuming you are able to contact him directly, please forward this recommendation to him.
LikeLiked by 1 person
I always suspected that the frenzy to get us all to buy anti-virus software was really a way for the overlords to bug us more effectively. Looks like I was right. Even Firefox browser updates itself every day now – surely to keep open the spy portals.
LikeLiked by 1 person
YES, very enlightening “Roundtable” with the boys. I’ve listened three times.
What if there is an epochal world-changing effort happening so far off the radar, few even imagine it exists?
I can confirm much of what is on this site, but I cannot connect dots, because they are off my radar.
Perhaps You, Tom and others can – and help Anna and her group unseat the banksters.
Carry-on til you are carrion.
LikeLiked by 1 person
Thank you Paul!