Let’s Give the CIA the Credit It Deserves

By Norman Solomon

Source: OpEdNews.com

For months now, our country has endured the tacit denigration of American ingenuity. Countless statements — from elected officials, activist groups, journalists and many others — have ignored our nation’s superb blend of dazzling high-tech capacities and statecraft mendacities.

Fortunately, this week the news about release of illuminating CIA documents by WikiLeaks has begun to give adequate credit where due. And not a moment too soon. For way too long, Russia has been credited with prodigious hacking and undermining of democracy in the United States.

Many Americans have overlooked the U.S. government’s fantastic hacking achievements. This is most unfair and disrespectful to the dedicated men and women of intelligence services like the CIA and NSA. Far from the limelight, they’ve been working diligently to undermine democracy not just overseas but also here at home.

Today, the massive new trove of CIA documents can help to put things in perspective. Maybe now people will grasp that our nation’s undermining of democracy is home-grown and self-actualized. It’s an insult to the ingenious capacities of the United States of America to think that we can’t do it ourselves.

Contrary to all the public relations work that U.S. intelligence agencies have generously done for them, the Russians don’t even rank as peripheral to the obstacles and prospects for American democracy. Rest assured, throughout the long history of the United States, we haven’t needed foreigners to get the job done.

In our current era, can Vladimir Putin take any credit for purging huge numbers of African Americans, Latinos and other minority citizens from the voter rolls? Of course not.

Did Putin create and maintain the barriers that prevented many low-income people from voting on November 8? Only in his dreams.

Can the Kremlin hold a candle to the corporate-owned cable TV channels that gave Donald Trump umpteen free hours of uninterrupted air time for speeches at his campaign rallies? Absolutely not.

Could any Russian operation claim more than a tiny sliver of impact compared to the handiwork of FBI Director James Comey as he boosted Donald Trump’s prospects with a pair of gratuitous announcements about a gratuitously re-opened probe of Hillary Clinton’s emails during the last days of the 2016 campaign? No way.

Is Putin anything but a miniscule lightweight in any efforts to manipulate the U.S. electorate compared to “dark money” American billionaires like the Koch brothers? Give us a break.

And how about the Fourth Amendment of the U.S. Constitution? The Kremlin can only marvel at the way that the CIA, the NSA and the bipartisan leadership in Washington have shredded the Fourth Amendment while claiming to uphold it.

To sum up: The CIA’s efforts to tout Russia add up to jaw-dropping false modesty! The humility of “deep state” leaders in Langley is truly awesome.

Let’s get a grip. Overwhelmingly, the achievements of thwarting democracy in America have been do-it-yourself operations. It’s about time that we give adequate credit to the forces perpetuating this country’s self-inflicted wounds to American democracy.

To loosely paraphrase the beloved comic-strip character Pogo, when the subject is grievous damage to democracy at home, “We have met the ingenuity and it is U.S.” But we’re having a terrible time recognizing ourselves.

Vault 7: CIA Hacking Tools Revealed

Source: WikiLeaks

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

 

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

Mainstream Media’s ‘Victimhood’

aa-corporate-media-very-good-poster

By Robert Parry

Source: Consortium News

It’s heartwarming that The New York Times and The Washington Post are troubled that President Trump is loosely throwing around accusations of “fake news.” It’s nice and that they now realize that truth does not reliably come from the mouth of every senior government official or from every official report.

The Times is even taking out full-page ads in its own pages to offer truisms about truth: “The truth is hard. The truth is hidden. The truth must be pursued. The truth is hard to hear. The truth is rarely simple. The truth isn’t so obvious. …”  On Sunday, those truth truisms ran opposite an alarmist column by Jim Rutenberg entitled, “Will the Real Democracy Lovers Please Stand Up?” Meanwhile, The Washington Post launched its own melodramatic slogan, “Democracy Dies in Darkness.”

Yet, it was only weeks ago when the Post and Times were eagerly promoting plans for silencing or blacklisting independent news sites that didn’t toe the line on what the U.S. government and its allies were claiming was true.

On Nov. 20, the Times published a lead editorial calling on Facebook and other technology giants to devise algorithms that could eliminate stories that the Times deemed to be “fake.” The Times and other mainstream news outlets – along with a few favored Internet sites – joined a special Google-sponsored task force, called the First Draft Coalition, to decide what is true and what is not. If the Times’ editorial recommendations were followed, the disfavored stories and the sites publishing them would no longer be accessible through popular search engines and platforms, essentially blocking the public’s access to them. [See Consortiumnews.com’s “What to Do About ‘Fake News.’”]

On Thanksgiving Day, the Post ran a front-page story citing an anonymous group, called PropOrNot, blacklisting 200 Web sites, including Consortiumnews.com and other important sources of independent journalism, because we supposedly promoted “Russian propaganda.”

Although PropOrNot and the Post didn’t bother to cite any actual examples or to ask the accused for comment, the point was clear: If you didn’t march in lockstep behind the Official Narrative on, say, the Ukraine crisis or the war in Syria, you were to be isolated, demonized and effectively silenced. In the article, the Post blurred the lines between “fake news” – stories that are simply made up – and what was deemed “propaganda,” in effect, information that didn’t jibe with what the U.S. State Department was saying.

Back then, in November, the big newspapers believed that the truth was easy, simple, obvious, requiring only access to some well-placed government official or a quick reading of the executive summary from some official report. Over the last quarter century or so, the Times, in particular, has made a fetish out of embracing pretty much whatever Officialdom declared to be true. After all, such well-dressed folks with those important-sounding titles couldn’t possibly be lying.

That gullibility went from the serious, such as rejecting overwhelming evidence that Ronald Reagan’s Nicaraguan Contra rebels were deeply involved in drug trafficking, to the silly, trusting the NFL’s absurd Deflategate allegations against Tom Brady. In those “old” days, which apparently ended a few weeks ago, the Times could have run full-page ads, saying “Truth is whatever those in authority say it is.”

In 2002, when the George W. Bush administration was vouching for a motley crew of Iraqi “defectors” describing Saddam Hussein’s hidden WMDs, Iraq’s purchase of some “aluminum tubes” must have been for building nuclear bombs. In 2003, when Secretary of State Colin Powell showed some artist drawings of “mobile chemical weapons labs,” they must really exist – and anyone who doubted Powell’s “slam-dunk” testimony deserved only contempt and ridicule.

When the Obama administration issued a “government assessment” blaming the Syrian military for the sarin gas attack outside Damascus on Aug. 21, 2013, there was no need to scrutinize its dubious assertions or ask for actual proof. To do so made you an “Assad apologist.”

When a bunch of U.S. allies under the effective control of Ukraine’s unsavory SBU intelligence service presented some videos with computer-generated graphics showing Russians supplying the Buk missile that shot down Malaysia Airlines Flight 17 over eastern Ukraine on July 17, 2014, there was no need to examine the holes in the evidence or note that the realistic-looking graphics were fictional and based on dubious assumptions. To do so made you a “Moscow stooge.”

In other words, when the U.S. government was gluing black hats on an “enemy” and white hats on a U.S. “ally,” the Times never seemed to object. Nor did pretty much anyone else in the mainstream media. No one seemed to note that both sides usually deserved gray hats. With very few exceptions – when the State Department or other U.S. agencies were making the charges – the Times and its cohorts simply stopped applying responsible journalistic skepticism.

Of course, there is a problem with “fake news,” i.e., stories that are consciously made up for the purpose of making money from lots of clicks. There are also fact-free conspiracy theories that operate without evidence or in defiance of it. No one hates such bogus stories more than I do — and they have long been a bane of serious journalism, dating back centuries, not just to the last election.

But what the Times, the Post and the rest of the mainstream media have typically ignored is that there are many situations in which the facts are not clear or when there are alternative explanations that could reasonably explain a set of facts. There are even times when the evidence goes firmly against what the U.S. government is claiming. At those moments, skepticism and courage are necessary to challenge false or dubious Official Narratives. You might even say, “The truth is rarely simple. The truth isn’t so obvious…”

A Tough Transition

During the transition from the Obama administration to the Trump team, the Times, the Post and other mainstream media outlets got caught in their own transition from trusting whatever the outgoing officials said to distrusting whatever the incoming officials said. In those final days, big media accepted what President Obama’s intelligence agencies asserted about Russia supposedly interfering in the U.S. election despite the lack of publicly available evidence that could be scrutinized and tested.

Even something as squirrelly as the attack on Trump’s National Security Adviser Michael Flynn – with Obama holdovers citing the never-prosecuted Logan Act from 1799 as the pretext for ginning up some kind of criminal-sounding case that scared Trump into firing Flynn – was treated as legitimate, without serious questions asked. Since Obama officials were doing the feeding, the no-skepticism rule applied to the eating. But whatever statements came from Trump, even his few lucid moments explaining why war with nuclear-armed Russia wasn’t such a great idea, were treated as dangerous nonsense.

When Trump scolded the mainstream press for engaging in “fake news” and then applied the phrase “enemy of the people,” the Times, the Post and the rest went into full victimization-mode. When a few news companies were excluded from a White House news briefing, they all rushed to the barricades to defend freedom of the press. Then, Trump went even further – he rejected his invitation to the White House Correspondents Dinner, the black-tie/evening-gown event where mainstream media stars compete to attract the hottest celebrity guests and hobnob with important government officials, a walking-talking conflict-of-interest-filled evening, an orgy of self-importance.

So, the Times, the Post and their mainstream-media friends now feel under attack. Whereas just weeks ago they were demanding that Google, Facebook and other powerful information platforms throttle those of us who showed professional skepticism toward dubious claims from the U.S. government, now the Times, the Post and the others are insisting that we all rally around them, to defend their journalistic freedom. In another full-page ad on Sunday, the Times wrote: “Truth. It’s more important now than ever.”

I would argue that truth is always important, but especially so when government officials are leading countries toward war, when lives are at stake, whether in Iraq or Syria or Ukraine or the many other global hotspots. At those moments in the recent past, the Times did not treat truth – in all its subtlety and nuance – as important at all.

I would argue, too, that the stakes are raised even higher when propagandists and ideologues are risking the prospect of nuclear war that could kill billions and effectively end human civilization. However, in that case, the American people have seen little truly professional journalism nor a real commitment to the truth. Instead, it’s been much more fun to demonize Russian President Vladimir Putin and paint black-and-white pictures of the evil Russians.

At such moments, those New York Times’ truisms about truth are forgotten: “The truth is rarely simple. The truth isn’t so obvious. …”

Investigative reporter Robert Parry broke many of the Iran-Contra stories for The Associated Press and Newsweek in the 1980s. You can buy his latest book, America’s Stolen Narrative, either in print here or as an e-book (from Amazon and barnesandnoble.com).

Russ Baker on the Media’s Deep State Conversion Moment

index

By Russ Baker

Source: Who.What.Why.

The term “Deep State” has recently become as popular with the media as the term “#resistance.” It certainly wasn’t always that way.

For years, a lonely few have set out to enlighten people on the notion that, when it comes to affairs of state, there is usually more to the story than we are told.

I started WhoWhatWhy because I realized that the publications I worked for had no interest, no understanding of, could not fathom, or were just plain scared to explore the possibility that We, the People, were not in control of our destiny.

You can read most media all day long and you’d never get a sense, except fleetingly, that eight people have as much wealth as half of the world’s population. A handful of people can put their selected candidate in the White House, and the masses remain blissfully unaware as the process unfolds.

A company with vast resources can make sure the so-called free market works a whole lot better for itself than it does for its smaller rivals — even if the other companies offer a better product or service — and corporate media remains silent.

The media typically does not make us wonder why there seem to be wars going on all the time, why Americans are able to live so well compared to most of the world, nor that even today, resource extraction is a very deadly one-way street. They rarely seem to stop and ponder why it is that no matter which of the two political parties is in office, public policy seems to always cater to the 1% and not … the public.

The media does cover politics plenty. But it does not very often cover deep politics — that is, the forces beneath the  surface, the powers behind the daily events, what’s been called the Deep State.

To those unfamiliar with it, this expression sounds creepy, even paranoid, with a hint of conspiracy theory — itself a catchall term designed to discredit any critical analysis that comes perilously close to something that may lead back to the Deep State. How could there be something other than politics or the state — deep politics and a deep state?

Well, ask yourself: Is that giant bank where you have your money actually run by the smiling masses you see in their ads? The ones who say “We’re here for you” but when you call, they all read from the same script and admit they’re powerless? One thing your bank doesn’t do, usually, is advertise the top people, the biggest shareholders, and how much power they wield, and how much money they make.

It takes something like a financial scandal for the CEO to suddenly appear in the limelight, like a mole rubbing its eyes, and you say, “Oh, so that’s the main guy.” You never knew.

The media overall hates these “deep” concepts because they are anathema to people trying to keep their jobs and move up in a hierarchical system owned and influenced by the most powerful, while still wearing the thrilling mantle of “troublemaker.”

Let’s be clear: the Deep State is not six people in hoods muttering incantations. It’s a shifting landscape of those at the top of the heap — not a monolith but a bloody battlefield, with factions breaking both bread and heads.

It includes financiers, industrialists, media titans, generals, spymasters, strategists, and experts in the black arts of mass influence. It even includes a super-verboten topic: how the “overworld” (the legit) do business, albeit usually at arm’s length, with the underworld.

Look at Trump’s track record on this; look at CIA’s well-documented cooperation with the mob and with global drug cartels. Also off-limits to the media: the role of highly profitable illegal activity in making great fortunes (prohibition, drug trade, money laundering) and the cooperation of elements of the state.

***

The deeper meaning and scope of the Deep State is now being misrepresented by those who still hope for handouts from the system — either they’re deliberately obscuring the real nature of the Deep State, or they’re really trying, without much success, to throw some light on a topic to which they’ve come late and have little incentive to dig into too deeply.

One example is the Los Angeles Times, which, despite some great journalism and bravery over the years, has retained a mysteriously close relationship with the CIA and similar entities, serving as their hatchet men against reporters who cut too near the bone of the truth. Look up Gary Webb — or read this “review” of a book on the Deep State by yours truly.  

Recently, one of its longtime Washington hands presumed to explain to the rest of us about the Deep State whose very existence he and his paper denied for so long.

The scariest new catchphrase of the Trump era — and we’re only one month in — is the “deep state,” a term borrowed from countries like Turkey and Egypt, where networks of military officers and intelligence operatives control much of the government.

Um, no. It isn’t just entrenched mid-level bureaucrats, soldiers and spies who make up the Deep State — it is also the extremely wealthy who ultimately manipulate and influence these pawns on the board of power.

The New York Times apparently got the same memo as its West Coast namesake:

A wave of leaks from government officials has hobbled the Trump administration, leading some to draw comparisons to countries like Egypt, Turkey and Pakistan, where shadowy networks within government bureaucracies, often referred to as “deep states,” undermine and coerce elected governments.

The point of all this is that if you limit a description of some poisonous Deep State to those actually employed in “bureaucracies,” you are actually playing into the hands of the most powerful Deep State players: the super-rich who benefit when government itself is discredited to the point that everything can be outsourced — to them. And that’s exactly what we have seen in case after case, with the privatization of intelligence, police work, prisons, schools, and so on. Let’s get rid of those nefarious Deep State education officials and save the day with billionaire Betsy DeVos!

No — the Deep State IS populated by people like Betsy DeVos and her husband and their coterie. They’re the ones who can buy the loyalty of modestly-paid government figures who expect to travel out the revolving door to dip into the abundant coffers of the Koch brothers et al.

To be clear, we probably don’t want to think of the Deep State as synonymous with the plutocracy — it’s not all about money. It is about an ideology of self-interest and a kind of fascist value system, and an ability to build deep links into institutions like the FBI, the Pentagon, the NSA, the CIA, local law enforcement, etc. Of course, elements within the Deep State, as is true throughout the world, can also be forces for good, resisting when things in the surface world “go too far.” That, in part, is what we are seeing in the resistance to Trump from surprising quarters.

It’s also something to keep in mind when we see the Washington Post leading the charge against Trump. The Post is, like Amazon, the property of Jeff Bezos — and the CIA is one of Amazon’s biggest customers (for its cloud computing services.) The CIA is none too happy with Trump — with very good reason, for once (well, there was also that battle with Cheney and the neocons), and so, yes, that too is all the Deep State at work.

And no, don’t look to The Post to fully explain it all. Why? Again, my personal experience — here’s the Post’s contracted-out hit piece on my Deep Politics book.

***

The Deep State has cajoled or intimidated almost the entirety of journalism, mainstream to Left to Right — to ignore its existence, and to defame those who dare investigate it, by lumping them with all manner of crazy under the all-purpose dysphemism “conspiracy theory.” Try googling related terms: conspiracy theorist, conspiracy nut, etc — you will find that the “top” news organizations have routinely beaten up on those who dared break ranks by slapping this deadly moniker on them. It’s the loud cousin of the whispering campaign, the sort that makes it hard to find work and scares off would-be allies.

I’ll note that back in the 1960s, the CIA got really nervous as interest in the assassination of President John F. Kennedy heated up, with reputable, brave people asking a lot of questions about the impossible ridiculous fantasy story the media sold us in the Warren Report. In an internal CIA memo, the agency prescribed all manner of tactics to discredit those who were sticking their noses where they oughtn’t, conferring on them the deadly “Conspiracy Theorist” label.

And, in the 1970s, Carl Bernstein, of Watergate sleuth fame, wrote a piece in Rolling Stone revealing the extent to which the security apparatus had penetrated America’s media itself. Shades of Romania and East Germany.

Even Bill Moyers, whom I greatly admire, and who has been complimentary of WhoWhatWhy’s work — brought on a conservative to explain what Deep State is all about. Given the history and the continuing resistance to the concept at the time that program aired in 2014, probably a smart move.

But the times they are a-changin’. Since Wikileaks’ revelations, since Edward Snowden, since … Trump, the shameless and spineless in journalism have spun on a dime and now the things some of us were attacked for are smack dab in the middle of the “conversation,” albeit with the system stingily withholding credit to those who were there first.

In any case, now that it’s all the vogue, I say to the establishment media: No. You do not get to define this term, you do not get to tell the rest of us if there is a Deep State, the nature of its influence, or whether we should or should not be concerned about it.

 

Related Videos:

The “White Helmets” Go To Hollywood

cseyujlwcaaq_tx-jpg_large

By Rick Sterling

Source: TruePublica

The netflix movie “The White Helmets” may win an Oscar in the “short documentary” category at the Academy Awards on Sunday February 26.  It will not be a surprise, despite the fact that the group is a fraud and the movie is a contrived infomercial.

The White Helmets are a “feel good” story like a Disney hero movie: 90% myth and fabrication. Most of what is claimed about the Syrian rescue group is untrue. They are not primarily Syrian; the group was initiated by British military contractor James LeMesurier and has been heavily funded (about $100 million) by the USA, UK and other governments. They are not volunteers; they are paid. This is confirmed in the Al Jazeera video which shows some White Helmet “volunteers’ talking about going on strike if they don’t get paid soon. Most of the heavy funding goes to the marketing which is run by “The Syria Campaign” based in New York. The manager is an Irish America woman Anna Nolan who has never been to Syria. As an example of its deception, “The Syria Campaign” website features video showing children dancing and playing soccer implying they are part of the opposition demand for a “free and peaceful” Syria . But the video images are taken from a 2010 BBC documentary about education in Syria under the Baath government.

When eastern Aleppo was finally freed from the armed militants, it was discovered that the White Helmets headquarters were alongside the headquarters of the Al Qaeda Syrian militant group. Civilians from east Aleppo reported that the White Helmets primarily responded when the militants were attacked. Soon after departing Aleppo in government supplied buses (!) the White Helmets showed up in the mountains above Damascus where they allied with terrorist groups in poisoning then shutting off the water source for five million people in Damascus.

The White Helmets’ claim to be neutral and independent is another lie. They only work in areas controlled by the rebel groups, primarily Nusra/ Al Qaeda.  Their leaders actively call for US and NATO intervention in Syria. Video shows White Helmet workers picking up the corpse of a civilian after execution and celebrating Nusra / Al Qaeda terrorist battle wins.

The movie is as fraudulent as the group it tries to heroize. The film-makers never set foot in Syria. Their video footage takes place in southern Turkey where they show White Helmet trainees in a hotel and talking on cell phones. Thrilling. There is some footage from inside Syria but it looks contrived.  The opening scene depicts a White Helmet “volunteer” going to work and beseeching his son not to give mommy a hard time. Real or scripted?

The message is simple: here are people we can support; they are under attack by the brutal “regime”…shouldn’t we “do something” to stop it??!

Khaled Khatib is said to be the person who filmed the footage from inside Syria. He has reportedly received a US visa and will attend the Oscars. This will likely garner special media attention. Ironically, some of those who have exploited the refugee issue for their own fund-raising campaigns, like Human Rights Watch, are groups which promote the war which created the refugee crisis.

Khatib has tweeted the first video he took showing the White Helmets. It looks remarkably unrealistic, with a girl who was totally buried being removed without injuries or wounds or even much dirt. Is it really possible to rescue people that quickly? In the real world, rescue workers are told to work slowly so as to not damage or exacerbate body injuries. The original video has the logo of Aleppo Media Center (AMC) which was created by the Syrian Expatriates Organization.  Their address on K Street in Washington DC suggests this is yet another Western funded media campaign driven by political objectives.

In the past few days, with perfect timing for the upcoming Oscars, there is yet another “miracle” rescue …. another girl totally buried but then removed and whisked away in record breaking time – perfect for social media.  Is it real or is it contrived?

This raises a question regarding the integrity of the Oscar Academy Awards. Are awards given for actual quality, authenticity, skill and passion?  Or are Oscar awards sometimes given under political and financial influence?  There is political motivation to promote the White Helmets as part of the effort to prevent the collapse of the Western/Israeli/regional campaign to overthrow the Syrian government.  These same governments have given boatloads of money to fuel the propaganda campaign. Last week Syria Solidarity Movement reached out to three marketing firms in the LA area to request help challenging the White Helmets nomination.  Two of the firms declined and the third said they were already being paid to promote the nomination!

The true source and purpose of the White Helmets was exposed almost two years ago. More recently Vanessa Beeley has documented the fact there is a REAL Syrian Civil Defence which was begun in the 1950’s and is a member of the International Civil Defense Organizations. This organization is opposite to the group created in Turkey in 2013. According to on-the-ground interviews in Aleppo, terrorists began by killing real Syrian rescue workers and stealing their equipment.  Since then the White Helmets have been supplied, by the West through Turkey, with brand new ambulances and related rescue equipment.

Max Blumenthal has written a two part detailed examination of the “shadowy PR firm” behind the “White Helmets”. And Jan Oberg has written an overview survey of the “pro” and “con” examinations in his work “Just How Gray are the White Helmets”.

Yet mainstream media, and some ‘alternative’ media, continue to uncritically promote the myth of the “White Helmets”. The promoters of the group absolutely deserve an award for marketing and advertising.  This is a field where truth and reality is irrelevant; it’s all about sales and manipulation. On that basis, the “White Helmets” has been an incredible success. The group was started as “Syria Civil Defense”  in Turkey in 2013.  It was re-branded as the “White Helmets” in 2014. It was heavily used in 2014 and 2015 by Nicholas Kristof, Avaaz and others to campaign for all out aggression against Syria.  In 2016 the group received the Rights Livelihood Award and was seriously considered for a Nobel Peace Prize.  These facts show how corrupt and politically and financially influenced the Rights Livelihood Award and Nobel Peace Prize can be.

The White Helmets movie is a tactic in the ongoing campaign of distortion and deception around Syria.  It’s a fraud, just like the fake kidnapping of NBC reporter Richard Engel. The Oscars will be a demonstration of the integrity of the Academy Awards.  The reporting on the story will be a test of the integrity and accuracy of media outlets. Ironically, the Israeli mainstream TV program I24 presented both sides and titled the segment “White Helmets: Heroes or Hoax?”.  In contrast, the highly popular and widely respected DemocracyNow has  only broadcast a puff piece promoting the “White Helmet” disinformation.  The coming days will reveal more about the ongoing information war against Syria.  Meanwhile on online petition continues to gather signatures to NOT give the Oscar to the White Helmets deception.

Over Half of Every Tax Dollar You Give to Uncle Sam is Spent on This

us-flag-bombs

By Phillip Schneider

Source: Waking Times

Most people probably don’t think too much about this, but are you aware of just how much of your income is being used to fuel the military industrial complex?

Conveniently omitted from the corporate/state-run media organizations is the fact that some 53 percent of your tax dollars are spent on the military. That’s right, more than half of the money you give to Uncle Sam for the privilege of being American income is spent directly on military.

In 2011 the budget for the US Government was over 3 trillion dollars, while military spending included a $717 billion request from the pentagon, $200 billion towards “overseas contingency funding” for the two major conflicts we are engaged in, and $40 billion in black budget intelligence which includes the CIA, NSA, and other agencies where the amount of money given is never fully disclosed.

In addition, $94 billion was spent on non-DOD military operations, $100 billion on health care and veterans benefits, and $400 billion was spent paying off the interest on debt raised to pay for past wars. This all adds up to over 1.6 trillion dollars spent on so-called defense. That is more than what was spent during the second world war after being adjusted for inflation.

Defense Spending Or Offense Spending?

Now it is true that defense spending is important to American interests. You might be inclined to think about how much worse off we would be without a military. Without a strong defense, if a country decided to engage us in any sort of negative way militarily we wouldn’t be able to resist or hold our ground.

However, what is typically called “defense spending” is by-and-large nothing offense spending designed to support a policy of military interventionism which exploits many nations for their natural resources and establishes Rothschild controlled central banks wherever and whenever they can.

To see this, one needs not look beyond the excuses for going to war in the first place. From the Gulf of Tonkin incident of August 1964, to the supposed WMD’s in Iraq, to Obama’s attempt in the summer of 2013 to begin bombing campaigns in Syria, nearly each and every war is initiated alongside war propaganda intended to serve the special interests who profit from the lucrative military-industrial complex that Eisenhower warned us about in his farewell address of 1961.

Why would they need to continuously lie to get us into war if there was a plausible reason for “defending ourselves” in the first place?

Drone Bombings Are America’s Slap In The Face To The World

When you take the immediate danger of American soldiers out of the equation, and in some cases any human input at all, it creates a situation where the public generally doesn’t see any problem with bombing the living daylights out of another country because it is out of sight, out of mind. For this reason, the drone program has become one of the military’s most insidious operations in history.

To put the drone program into perspective you have to understand its scale and its ability to remain covert. During the Obama presidency alone, the US has bombed a total of eight countries. Syria, Iraq, Libya, Afghanistan, Yemen, Somalia, Uganda, and Pakistan. Also, Obama became the worlds first Nobel Peace Prize winner to bomb another Nobel Peace Prize winner when he authorized a strike on a Afghan hospital run by the 1999 Peace Prize recipient Doctors Without Borders, killing at least 22 people. And somehow, bombs somehow keep on falling in places where Obama boasts that he hast ended two wars.

A recent whistle blower exposed the fact that about 90 percent of those killed in drone strikes are not the intended targets. Yes, you heard that right. For every ten people killed by American drones, nine are innocent bystanders, some of which are merely patients in a hospital suspected of harboring terrorists.

“What is war but mass murder on a scale impossible by private police forces?” – Austrian economist Murray Rothbard

This Money Could Be Spent Fixing Our Country, Or Better Yet Not Stolen From Us

In 2014 one fighter jet ended up costing the US $400 billion dollars. That amount of money could have payed for every homeless person in America to have a house worth $600,000. Imagine what that kind of money could have done if it were spent on humanitarian efforts, or better yet, if left in the hands of hardworking Americans who are supporting the economy through their free market decisions.

At the end of the day, we are all cash-cows for Uncle Sam and his globalist military industrial complex.

This short video puts it all nicely into perspective:

American Pravda: How the CIA Invented “Conspiracy Theories”

index

By Ron Unz

Source: The Unz Review

A year or two ago, I saw the much-touted science fiction film Interstellar, and although the plot wasn’t any good, one early scene was quite amusing. For various reasons, the American government of the future claimed that our Moon Landings of the late 1960s had been faked, a trick aimed at winning the Cold War by bankrupting Russia into fruitless space efforts of its own. This inversion of historical reality was accepted as true by nearly everyone, and those few people who claimed that Neil Armstrong had indeed set foot on the Moon were universally ridiculed as “crazy conspiracy theorists.” This seems a realistic portrayal of human nature to me.

Obviously, a large fraction of everything described by our government leaders or presented in the pages of our most respectable newspapers—from the 9/11 attacks to the most insignificant local case of petty urban corruption—could objectively be categorized as a “conspiracy theory” but such words are never applied. Instead, use of that highly loaded phrase is reserved for those theories, whether plausible or fanciful, that do not possess the endorsement stamp of establishmentarian approval.

Put another way, there are good “conspiracy theories” and bad “conspiracy theories,” with the former being the ones promoted by pundits on mainstream television shows and hence never described as such. I’ve sometimes joked with people that if ownership and control of our television stations and other major media outlets suddenly changed, the new information regime would require only a few weeks of concerted effort to totally invert all of our most famous “conspiracy theories” in the minds of the gullible American public. The notion that nineteen Arabs armed with box-cutters hijacked several jetliners, easily evaded our NORAD air defenses, and reduced several landmark buildings to rubble would soon be universally ridiculed as the most preposterous “conspiracy theory” ever to have gone straight from the comic books into the minds of the mentally ill, easily surpassing the absurd “lone gunman” theory of the JFK assassination.

Even without such changes in media control, huge shifts in American public beliefs have frequently occurred in the recent past, merely on the basis of implied association. In the initial weeks and months following the 2001 attacks, every American media organ was enlisted to denounce and vilify Osama Bin Laden, the purported Islamicist master-mind, as our greatest national enemy, with his bearded visage endlessly appearing on television and in print, soon becoming one of the most recognizable faces in the world. But as the Bush Administration and its key media allies prepared a war against Iraq, the images of the Burning Towers were instead regularly juxtaposed with mustachioed photos of dictator Saddam Hussein, Bin Laden’s arch-enemy. As a consequence, by the time we attacked Iraq in 2003, polls revealed that some 70% of the American public believed that Saddam was personally involved in the destruction of our World Trade Center. By that date I don’t doubt that many millions of patriotic but low-information Americans would have angrily denounced and vilified as a “crazy conspiracy theorist” anyone with the temerity to suggest that Saddam hadnot been behind 9/11, despite almost no one in authority having ever explicitly made such a fallacious claim.

These factors of media manipulation were very much in my mind a couple of years ago when I stumbled across a short but fascinating book published by the University of Texas academic press. The author of Conspiracy Theory in America was Prof. Lance deHaven-Smith, a former president of the Florida Political Science Association.

Based on an important FOIA disclosure, the book’s headline revelation was that the CIA was very likely responsible for the widespread introduction of “conspiracy theory” as a term of political abuse, having orchestrated that development as a deliberate means of influencing public opinion.

During the mid-1960s there had been increasing public skepticism about the Warren Commission findings that a lone gunman, Lee Harvey Oswald, had been solely responsible for President Kennedy’s assassination, and growing suspicions that top-ranking American leaders had also been involved. So as a means of damage control, the CIA distributed a secret memo to all its field offices requesting that they enlist their media assets in efforts to ridicule and attack such critics as irrational supporters of “conspiracy theories.” Soon afterward, there suddenly appeared statements in the media making those exact points, with some of the wording, arguments, and patterns of usage closely matching those CIA guidelines. The result was a huge spike in the pejorative use of the phrase, which spread throughout the American media, with the residual impact continueing right down to the present day. Thus, there is considerable evidence in support of this particular “conspiracy theory” explaining the widespread appearance of attacks on “conspiracy theories” in the public media.

But although the CIA appears to have effectively manipulated public opinion in order to transform the phrase “conspiracy theory” into a powerful weapon of ideological combat, the author also describes how the necessary philosophical ground had actually been prepared a couple of decades earlier. Around the time of the Second World War, an important shift in political theory caused a huge decline in the respectability of any “conspiratorial” explanation of historical events.

For decades prior to that conflict, one of our most prominent scholars and public intellectuals had been historian Charles Beard, whose influential writings had heavily focused on the harmful role of various elite conspiracies in shaping American policy for the benefit of the few at the expense of the many, with his examples ranging from the earliest history of the United States down to the nation’s entry into WWI. Obviously, researchers never claimed that all major historical events had hidden causes, but it was widely accepted that some of them did, and attempting to investigate those possibilities was deemed a perfectly acceptable academic enterprise.

However, Beard was a strong opponent of American entry into the Second World War, and he was marginalized in the years that followed, even prior to his death in 1948. Many younger public intellectuals of a similar bent also suffered the same fate, or were even purged from respectability and denied any access to the mainstream media. At the same time, the totally contrary perspectives of two European political philosophers, Karl Popper and Leo Strauss, gradually gained ascendancy in American intellectual circles, and their ideas became dominant in public life.

Popper, the more widely influential, presented broad, largely theoretical objections to the very possibility of important conspiracies ever existing, suggesting that these would be implausibly difficult to implement given the fallibility of human agents; what might appear a conspiracy actually amounted to individual actors pursuing their narrow aims. Even more importantly, he regarded “conspiratorial beliefs” as an extremely dangerous social malady, a major contributing factor to the rise of Nazism and other deadly totalitarian ideologies. His own background as an individual of Jewish ancestry who had fled Austria in 1937 surely contributed to the depth of his feelings on these philosophical matters.

Meanwhile, Strauss, a founding figure in modern neo-conservative thought, was equally harsh in his attacks upon conspiracy analysis, but for polar-opposite reasons. In his mind, elite conspiracies were absolutely necessary and beneficial, a crucial social defense against anarchy or totalitarianism, but their effectiveness obviously depended upon keeping them hidden from the prying eyes of the ignorant masses. His main problem with “conspiracy theories” was not that they were always false, but they might often be true, and therefore their spread was potentially disruptive to the smooth functioning of society. So as a matter of self-defense, elites needed to actively suppress or otherwise undercut the unauthorized investigation of suspected conspiracies.

Even for most educated Americans, theorists such as Beard, Popper, and Strauss are probably no more than vague names mentioned in textbooks, and that was certainly true in my own case. But while the influence of Beard seems to have largely disappeared in elite circles, the same is hardly true of his rivals. Popper probably ranks as one of the founders of modern liberal thought, with an individual as politically influential as left-liberal financier George Soros claiming to be his intellectual disciple. Meanwhile, the neo-conservative thinkers who have totally dominated the Republican Party and the Conservative Movement for the last couple of decades often proudly trace their ideas back to Strauss.

So, through a mixture of Popperian and Straussian thinking, the traditional American tendency to regard elite conspiracies as a real but harmful aspect of our society was gradually stigmatized as either paranoid or politically dangerous, laying the conditions for its exclusion from respectable discourse.

 

By 1964, this intellectual revolution had largely been completed, as indicated by the overwhelmingly positive reaction to the famous article by political scientist Richard Hofstadter critiquing the so-called “paranoid style” in American politics, which he denounced as the underlying cause of widespread popular belief in implausible conspiracy theories. To a considerable extent, he seemed to be attacking straw men, recounting and ridiculing the most outlandish conspiratorial beliefs, while seeming to ignore the ones that had been proven correct. For example, he described how some of the more hysterical anti-Communists claimed that tens of thousands of Red Chinese troops were hidden in Mexico, preparing an attack on San Diego, while he failed to even acknowledge that for years Communist spies had indeed served near the very top of the U.S. government. Not even the most conspiratorially minded individual suggests that all conspiracies are true, merely that some of them might be.

Most of these shifts in public sentiment occurred before I was born or when I was a very young child, and my own views were shaped by the rather conventional media narratives that I absorbed. Hence, for nearly my entire life, I always automatically dismissed all of the so-called “conspiracy theories” as ridiculous, never once even considering that any of them might possibly be true.

To the extent that I ever thought about the matter, my reasoning was simple and based on what seemed like good, solid common sense. Any conspiracy responsible for some important public event must surely have many separate “moving parts” to it, whether actors or actions taken, let us say numbering at least 100 or more. Now given the imperfect nature of all attempts at concealment, it would surely be impossible for all of these to be kept entirely hidden. So even if a conspiracy were initially 95% successful in remaining undetected, five major clues would still be left in plain sight for investigators to find. And once the buzzing cloud of journalists noticed these, such blatant evidence of conspiracy would certainly attract an additional swarm of energetic investigators, tracing those items back to their origins, with more pieces gradually being uncovered until the entire cover-up likely collapsed. Even if not all the crucial facts were ever determined, at least the simple conclusion that there had indeed been some sort of conspiracy would quickly become established.

However, there was a tacit assumption in my reasoning, one that I have since decided was entirely false. Obviously, many potential conspiracies either involve powerful governmental officials or situations in which their disclosure would represent a source of considerable embarrassment to such individuals. But I had always assumed that even if government failed in its investigatory role, the dedicated bloodhounds of the Fourth Estate would invariably come through, tirelessly seeking truth, ratings, and Pulitzers. However, once I gradually began realizing that the media was merely “Our American Pravda” and perhaps had been so for decades, I suddenly recognized the flaw in my logic. If those five—or ten or twenty or fifty—initial clues were simply ignored by the media, whether through laziness, incompetence, or much less venal sins, then there would be absolutely nothing to prevent successful conspiracies from taking place and remaining undetected, perhaps even the most blatant and careless ones.

In fact, I would extend this notion to a general principle. Substantial control of the media is almost always an absolute prerequisite for any successful conspiracy, the greater the degree of control the better. So when weighing the plausibility of any conspiracy, the first matter to investigate is who controls the local media and to what extent.

Let us consider a simple thought-experiment. For various reasons these days, the entire American media is extraordinarily hostile to Russia, certainly much more so than it ever was toward the Communist Soviet Union during the 1970s and 1980s. Hence I would argue that the likelihood of any large-scale Russian conspiracy taking place within the operative zone of those media organs is virtually nil. Indeed, we are constantly bombarded with stories of alleged Russian conspiracies that appear to be “false positives,” dire allegations seemingly having little factual basis or actually being totally ridiculous. Meanwhile, even the crudest sort of anti-Russian conspiracy might easily occur without receiving any serious mainstream media notice or investigation.

This argument may be more than purely hypothetical. A crucial turning point in America’s renewed Cold War against Russia was the passage of the 2012 Magnitsky Act by Congress, punitively targeting various supposedly corrupt Russian officials for their alleged involvement in the illegal persecution and death of an employee of Bill Browder, an American hedge-fund manager with large Russian holdings. However, there’s actually quite a bit of evidence that it was Browder himself who was actually the mastermind and beneficiary of the gigantic corruption scheme, while his employee was planning to testify against him and was therefore fearful of his life for that reason. Naturally, the American media has provided scarcely a single mention of these remarkable revelations regarding what might amount to a gigantic Magnitsky Hoaxof geopolitical significance.

To some extent the creation of the Internet and the vast proliferation of alternative media outlets, including my own small webzine, have somewhat altered this depressing picture. So it is hardly surprising that a very substantial fraction of the discussion dominating these Samizdat-like publications concerns exactly those subjects regularly condemned as “crazy conspiracy theories” by our mainstream media organs. Such unfiltered speculation must surely be a source of considerable irritation and worry to government officials who have long relied upon the complicity of their tame media organs to allow their serious misdeeds to pass unnoticed and unpunished. Indeed, several years ago a senior Obama Administration official argued that the free discussion of various “conspiracy theories” on the Internet was so potentially harmful that government agents should be recruited to “cognitively infiltrate” and disrupt them, essentially proposing a high-tech version of the highly controversial Cointelpro operations undertaken by J. Edgar Hoover’s FBI.

Until just a few years ago I’d scarcely even heard of Charles Beard, once ranked among the towering figures of 20th century American intellectual life. But the more I’ve discovered the number of serious crimes and disasters that have completely escaped substantial media scrutiny, the more I wonder what other matters may still remain hidden. So perhaps Beard was correct all along in recognizing the respectability of “conspiracy theories,” and we should return to his traditional American way of thinking, notwithstanding endless conspiratorial propaganda campaigns by the CIA and others to persuade us that we should dismiss such notions without any serious consideration.

10 Signs Of Our Global Awakening

trueworldorder-1024x531

By Paul A. Philips

Source: Activist Post

Since time immemorial, under the ruling thumb of the world’s dark overlords, humanity has been hacked, stymied, suppressed and coerced into submission through mind-controlling, soul-destroying atrocities. Those unable to see that just about every subject under the sun is a deception and how their family and friends are affected don’t yet realize the extent to which the dark overlords have us snugly stitched up.

However, alternative media sources tell us that people are awakening exponentially to the realization that they’re being stitched up and in the swathe of these awakened souls, more and more are playing their dutiful part in enlightening others.

So, here are 10 signs of our global mass awakening.

1. The fall and further fall of the mainstream media

Trust in the mainstream media has fallen to an all-time low and continues to plummet. Much of this has to do with an increasingly aware and disgruntled public: More and more people are able to discern a mainstream media totally lacking in integrity, thanks to the rising popularity of the independent/alternative media exposing the dishonesty.

Unlike the alternative/independent sources, the servile corporate-controlled mainstream media has been a highly effective tool used to manipulate the consensus reality of the masses for a number of powerful individuals having political and financial self-interests. A number of us know we have seen attempts by these elitist individuals controlling the mainstream media to thwart the rising popularity of the independent/alternative media through false, baseless accusations of ‘fake news.’  Indeed, it’s an attempt to discredit because it exposes the truth about the elite and reveals their hidden agendas….

Essentially, the unjust ‘fake news’ labelling of the independent/alternative media has backfired on the manipulators: Instead of achieving censorship it has given rise to further increasing support for the alternative/independent media, while the mainstream media has taken an even bigger fall. As many of us know, the real fake news exists in the mainstream media with its propaganda and mind control…

Given that these 2 paradigms cannot live side by side each other, which one will win the information war?

Besides the mainstream media, worldwide, an increasingly aware public show a growing distrust for Big Government and Big Business institutions from multiple polls.

The distrust and unpopularity implicitly expressed by the public on these crooked institutions with their resident crooks mainly come from the truth revelations put out by the alternative/independent media.

Further, this is what happens when Big Government and Big Business not only ignores the people’s voice in decision making, but also demonizes their dissension and public opinion, which only serves to fuel the public’s uprising.

3. Marches against Monsanto have intensified

There couldn’t be a better example of the public’s growing distrust in Big Business than Monsanto. As the years roll by marches against Monsanto from people of many different backgrounds all over the world have risen significantly and don’t look to be cooling down….

Although there are signs of Monsanto clawing back, in recent years earnings have plummeted. The earnings drop for the biotech company suggests a growing public disdain for their GM seeds as more and more people realize the dangers of GMO and its glyphosate herbicide.

More and more realize that Monsanto are out to patent, own and control every seed in the world. This threatens the destruction and diversity of every natural God-given seed….

4. Increasing health awareness

Although still very popular, people’s awareness of the dangers of fast food has increased, as indicated by recent erratic share prices in some of the major fast food corporations who’ve had to pull out all marketing stops to claw back on fallen share prices.

Reports indicate that last year people have shown more interest than ever in organic non-GMO healthier food options. Besides how these choices affect health, people’s increased interest and awareness has extended into concerns over the environment, animals and the workers involved in food production.

5. Increasing recognition of disinformation

People are increasingly seeing right through those various media sources with their dogmatic unhealthy skeptics, shills, trolls, pseudo-debunkers, controlled opposition agents, biasing, filtering and in-your-face lies intended to sell you the spin of disinformation to keep you ignorant, deceived and helplessly anesthetized in the matrix control system…

6. Increasing support for social media

The social media outlet has greatly contributed to our awakening. It has indeed provided a unique and effective platform for the people’s voice. No wonder the mainstream media and elitists are unpopular:  It has allowed us to spread the word on subjects such as PizzaGate and the Clinton conspiracies….

Along with the alternative/independent media, the explosive interest in the social media outlet has not only changed our views but also continues to redefine journalism and how information is shared. How this is redefining media is a subject for another piece.

Simple to say we’re in a golden age of alternative/independent and social media which has contributed greatly to our global awakening.

7. Changing viewpoint towards the ‘Conspiracy Theorist’

Another blatant indicator confirming our awakening is a change in how the term ‘Conspiracy Theorist’ is now generally viewed.

Used frequently over the years in mainstream media the term ‘Conspiracy Theorist’ was invented in the ’60s by the CIA (Crooks IAction). It has been used as a cover up to discredit those aware of the facts on how the dark overlords and their associates have been involved in criminal activity….

No longer generally viewed as a label to slap on crazy kooks believing Richard Nixon was a werewolf… etc… Conspiracy Theory has become more generally viewed as either conspiracy fact or at least something worth investigating rather than flatly dismissing.

For more on this see: 9 Indisputable Truths about “Conspiracy Theorists”

8. Increasing attempts to shut us up

Our global mass awakening has got the dark overlords greatly concerned as they question the effectiveness of their control systems over us. How can they deal with our awakening in growing overwhelming numbers?

Desperately, in cahoots with their associates, they’re throwing everything at us ranging from the grossly suppressive, the extremely petty, the violent and the ridiculous to try to shut us up and deny our self-expression, keep us mentally, spiritually and physically enslaved in the matrix controlling system.

9. Awakening through unknown/unforeseen processes

Our awakening goes beyond the specific and measurable: We cannot simply quantify our awakening: There are circumstances occurring on a spiritual level that go beyond our limited understanding. Such as, for example, claims have been made recently of energetic emissions from our galactic centre that could affect our spirituality and transform us….

10. Rise in local meet-up groups

As already mentioned, the Internet and social media has indeed been great for exchanging information to wake people up but what if these set ups become censored? Further, large groups, virtual or real, run the risk of infiltration for dumbing down and deliberate disinformation.

So the solution lies (in part) in the forming of local community-based in-person groups to cultivate the resistance and humanity; and local meet-up group numbers are already growing.

In conclusion

Will our mass awakening to the deception produce a turnaround — a world that makes a difference for everyone? A world where there are no predators, no controlling hierarchy, no blood-sucking vampiric slave-drivers at the top ruling the numerous enslaved at the bottom… no more fight for self-sufficiency because it’s already been achieved in the communities… etc.

It is up to us all to play our part.

 

You can read more from Paul A. Philips at his site NewParadigm.ws, where this article first appeared.