Taking Back Our Stolen History
StoneGhost
StoneGhost

StoneGhost

According to CBC reporter Rob Gordon who reported on the case of Canadian Forces Navy Sub-Lt. Jeffrey Paul Delisle who was sentenced in 2012 for selling NSA secrets to Russia: “It’s a computer system that links the five eyes. The five eyes are the United States, Britain, Australia, New Zealand and Canada. All their information is shared on the Stone Ghost computer.”

The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistle-blower Edward Snowden reveals. Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.

According to Jack Posobiec, intelligence is not open for all Five Eyes members indiscriminantly, rather it is coded based on a need to know basis from the informations initial procurer.

Some foreign (and domestic —Ed.) observers regard any U.S. surveillance efforts with suspicion, fearing that intelligence products will be used against their national interests, the privacy rights of their citizens, or to advance the interests of U.S. firms in competition for international business. This view is held even though it is well-known that many countries have long undertaken similar efforts. Nonetheless, some argue that electronic surveillance, except in a narrow, court-approved, law enforcement context, should not be undertaken by democratic governments.2

Alleged examples of espionage conducted by the members of the “Five Eyes” include:

  • On behalf of the British Prime Minister Margaret Thatcher, the Canadian Security Intelligence Service of Canada spied on two British cabinet ministers in 1983. (source)
  • The U.S. National Security Agency spied on and intercepted the phone calls of Princess Diana right until she died in a Paris car crash with Dodi Fayed in 1997. The NSA currently holds 1,056 pages of classified information about Princess Diana, which has been classified as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security … the damage would be caused not by the information about Diana, but because the documents would disclose ‘sources and methods’ of U.S. intelligence gathering”. An official insisted that “the references to Diana in intercepted conversations were ‘incidental’,” and she was never a ‘target’ of the NSA eavesdropping.(source)
  • U.K. agents monitored the conversations of the 7th Secretary-General of the United Nations Kofi Annan.(source)
  • U.S. agents gathered “detailed biometric information” on the 8th Secretary-General of the United Nations, Ban Ki-Moon.(source)
  • In the early 1990s, the U.S. National Security Agency intercepted the communications between the European aerospace company Airbus and the Saudi Arabian national airline. In 1994, Airbus lost a $6 billion contract with Saudi Arabia after the NSA, acting as a whistleblower, reported that Airbus officials had been bribing Saudi officials to secure the contract. As a result, the American aerospace company McDonnell Douglas (now part of Boeing) won the multibillion-dollar contract instead of Airbus.(source)
  • The American defense contractor Raytheon won a US$1.3 billion contract with the Government of Brazil to monitor the Amazon rainforest after the U.S. Central Intelligence Agency (CIA), acting as a whistleblower, reported that Raytheon’s French competitor Thomson-Alcatel had been paying bribes to get the contract.(source)
  • In order to boost America’s position in trade negotiations with the then Japanese Trade Minister Ryutaro Hashimoto, in 1995 the CIA eavesdropped on the conversations between Japanese bureaucrats and executives of car manufacturers Toyota and Nissan.(source)

StoneGhost vs. Wikileaks (Journalists)

U.S. defense contractors hired to use cyber warfare and social media sock-puppets to sway public opinion against Wikileaks, discredit journalists/activists

HBGary Federal, a US defense department cyber security firm, was hacked (allegedly by a 16 year old girl) and its emails were uploaded to torrents and websites. In those emails, the public learned that prominent law firms hired Berico Technologies, Palantir Technologies, and HBGary to create fake Facebook, Twitter, and YouTube accounts to post online as if they were real people and influence your opinion.  One person can run more than 50 different accounts, all with complete “online” life histories to add authenticity. Their purpose? Discredit all associated with Wikileaks through coercion and convince the public that Wikileaks, Glenn Greenwald, and Julian Assange are terrorists.

StoneGhost & Monsanto vs. anti-GMO activists in Paris

The U.S. government uses StoneGhost, the United States SIGINT System (USSS), [14] and Fourteen Eyes mass surveillance to attack, harass, and intimidate citizens on behalf of U.S. based corporate interests. Moratoriums on Monsanto’s famous “MON 810” genetically modified (GMO) corn are being passed all across Europe due to people’s belief that these products are unsafe. Instead of respecting the people’s will, our state department considers making a “target retaliation list that causes some pain across the EU” to help out their struggling buddies at Monsanto.

4. (C) France’s new “High Authority” on agricultural biotech is designed to roll back established science-based decision making. The recently formed authority is divided into two colleges, a scientific college and a second group including civil society and social scientists to assess the “common interest” of France. The authority’s first task is to review MON 810. In the meantime, however, the draft biotech law submitted to the National Assembly and the Senate for urgent consideration, could make any biotech planting impossible in practical terms. The law would make farmers and seed companies legally liable for pollen drift and sets the stage for inordinately large cropping distances. The publication of a registry identifying cultivation of GMOs at the parcel level may be the most significant measure given the propensity for activists to destroy GMO crops in the field.

5. (C) Both the GOF and the Commission have suggested that their respective actions should not alarm us since they are only cultivation rather than import bans. We see the cultivation ban as a first step, at least by anti-GMO advocates, who will move next to ban or further restrict imports. (The environment minister’s top aide told us that people have a right not to buy meat raised on biotech feed, even though she acknowledged there was no possible scientific basis for a feed based distinction.) Further, we should not be prepared to cede on cultivation because of our considerable planting seed business in Europe and because farmers, once they have had experience with biotech, become its staunchest supporters.

6. Country team Paris recommends that we calibrate a target retaliation list that causes some pain across the EU since this is a collective responsibility, but that also focuses in part on the worst culprits. The list should be measured rather than vicious and must be sustainable over the long term, since we should not expect an early victory. (source)

Let it be known: if you are an anti-GMO activist living in the United States of America or abroad, the full might of the Fourteen Eyes, the NSA, and the StoneGhost surveillance machine will bear down on you in defense of Monsanto.  How many more companies are on the “cool kids” list?

Fourteen Eyes of the NWO

5 Eyes

Australia
Canada
New Zealand
United Kingdom
United States

9 Eyes

Denmark
France
the Netherlands
Norway

14 Eyes

Germany
Belgium
Italy
Spain
Sweden

 

Sources:

  1. http://www.scribd.com/doc/161382957/US-Defense-Contractors-vs-WikiLeaks-Response-v6 – US Defense Contractors vs WikiLeaks Response v6
  2. http://www.beastwithin.org/users/wwwwolf/blog/2011/02/official-hbgary-federal-sock-sorter.html – Official HBGary Federal Sock Sorter
  3. http://www.theregister.co.uk/2011/03/17/hbgary_anon_hacker_interview/ – HBGary’s nemesis is a ’16-year-old schoolgirl’ Tales of mystery and imagination
  4. http://media.washingtonpost.com/wp-srv/politics/documents/personalsoftware0302.pdf – Persona Management Software. Solicitation Number: RTB220610 Agency: USAF Air Mobility Command, 6th Contracting Squadron

 

Source: https://www.thelibertybeacon.com/five-eyes-of-the-deep-state-stoneghost-exposed/