America’s Real Red Scare

The Slow-Motion Collapse of the American Empire

By William J. Astore

Source: TomDispatch.com

Jump into your time machine and let me transport you back to another age.

It’s May 2001 and the Atlantic Monthly has just arrived in the mail.  I’m tantalized by the cover article.  “Russia is finished,” the magazine announces.  The subtitle minces no words: “The unstoppable descent into social catastrophe and strategic irrelevance.”  Could it be that the country I had worried most about as a military officer during all those grim years of the Cold War, the famed “Evil Empire” that had threatened us with annihilation, was truly kaput, even in its Russian rather than Soviet guise?

Sixteen years later, the article’s message seems just a tad premature.  Today’s Russia surely has its problems — from poverty to pollution to prostitution to a rickety petro-economy — but on the geopolitical world stage it is “finished” no longer.  Vladimir Putin’s Russia has recently been enjoying heightened influence, largely at the expense of a divided and disputatious superpower that now itself seems to be on an “unstoppable descent.”

Sixteen years after Russia was declared irrelevant, a catastrophe, finito, it is once again a colossus — at least on the American political scene, if nowhere else.  And that should disturb you far less than this: more than a generation after defeating the Soviet Union in the Cold War, the United States of 2017 seems to be doing its level best to emulate some of the worst aspects of its former foe and once rival superpower.

Yes, the U.S. has a Soviet problem, and I’m not referring to the allegations of the moment in Washington: that the Trump campaign and Russian officials colluded, that money may have flowed into that campaign via Russian oligarchs tied to Putin, that the Russians hacked the U.S. election to aid Donald Trump, that those close to the president-elect dreamed of setting up a secret back channel to Moscow and suggested to the Russian ambassador that it be done through the Russian embassy, or even that Putin has a genuine hold of some sort on Donald Trump.  All of this is, of course, generating attention galore, as well as outrage, in the mainstream media and among the chattering classes, leading some to talk of a new “red scare” in America.  All of it is also being investigated, whether by congressional intelligence committees or by former FBI director — now special counsel — Robert Mueller.

When it comes to what I’m talking about, though, you don’t need a committee or a counsel or a back channel or a leaker from some intelligence agency to ferret it out.  Whatever Trump campaign officials, Russian oligarchs, or Vladimir Putin himself did or didn’t do, America’s Soviet problem is all around us: a creeping (and creepy) version of authoritarianism that anyone who lived through the Cold War years should recognize.  It involves an erosion of democratic values; the ever-expanding powers exercised by a national security state operating as a shadow government and defined by militarism, surveillance, secrecy, prisons, and other structures of dominance and control; ever-widening gaps between the richest few and the impoverished many; and, of course, ever more weapons, along with ever more wars.

That’s a real red scare, America, and it’s right here in the homeland.

In February, if you remember — and given the deluge of news, half news, rumor, and innuendo, who can remember anything these days? — Donald Trump memorably compared the U.S. to Russia.  When Bill O’Reilly called Vladimir Putin “a killer” in an interview with the new president, he responded that there was little difference between us and them, for — as he put it — we had our killers, too, and weren’t exactly innocents abroad when it came to world affairs.  (“There are a lot of killers. You think our country’s so innocent?”)  The president has said a lot of outlandish things in his first months in office, but here he was on to something.

My Secret Briefing on the Soviet Union

When I was a young lieutenant in the Air Force, in 1986 if memory serves, I attended a secret briefing on the Soviet Union. Ronald Reagan was president, and we had no clue that we were living through the waning years of the Cold War.  Back then, believing that I should know my enemy, I was reading a lot about the Soviets in “open sources”; you know, books, magazines, and newspapers.  The “secret” briefing I attended revealed little that was new to me. (Classified information is often overhyped.)  I certainly heard no audacious predictions of a Soviet collapse in five years (though the Soviet Union would indeed implode in 1991).  Like nearly everyone at the time, the briefers assumed the USSR would be our archenemy for decades to come and it went without saying that the Berlin Wall was a permanent fixture in a divided Europe, a forever symbol of ruthless Communist oppression.

Little did we know that, three years later, the Soviet military would stand aside as East Germans tore down that wall.  And who then would have believed that a man might be elected president of the United States a generation later on the promise of building a “big, fat, beautiful wall” on our shared border with Mexico?

I wasn’t allowed to take notes during that briefing, but I remember the impression I was left with: that the USSR was deeply authoritarian, a grim surveillance state with an economy dependent on global weapons sales; that it was intent on nuclear domination; that it was imperialist and expansionist; that it persecuted its critics and dissidents; and that it had serious internal problems carefully suppressed in the cause of world mastery, including rampant alcohol and drug abuse, bad health care and declining longevity (notably for men), a poisoned environment, and an extensive prison system featuring gulags.  All of this was exacerbated by festering sores overseas, especially a costly and stalemated war in Afghanistan and client-states that absorbed its resources (think: Cuba) while offering little in return.

This list of Soviet problems, vintage 1986, should have a familiar ring to it, since it sounds uncannily like a description of what’s wrong with the United States today.

In case you think that’s an over-the-top statement, let’s take that list from the briefing — eight points in all — one item at a time.

1. An authoritarian, surveillance state: The last time the U.S. Congress formally declared war was in 1941.  Since then, American presidents have embarked on foreign wars and interventions ever more often with ever less oversight from Congress.  Power continues to grow and coalesce in the executive branch, strengthening an imperial presidency enhanced by staggering technologies of surveillance, greatly expanded in the aftermath of the 9/11 terrorist attacks.  Indeed, America now has 17 intelligence agencies with a combined yearly budget of $80 billion.  Unsurprisingly, Americans are surveilled more than ever, allegedly for our safety even if such a system breeds meekness and stifles dissent.

2. An economy dependent on global weapons sales: The U.S. continues to dominate the global arms trade in a striking fashion.  It was no mistake that a centerpiece of President Trump’s recent trip was a $110 billion arms deal with Saudi Arabia.  On the same trip, he told the Emir of Qatar that he was in the Middle East to facilitate “the purchase of lots of beautiful military equipment.”  Now more than ever, beautiful weaponry made in the U.S.A. is a significant driver of domestic economic growth as well as of the country’s foreign policy.

3. Bent on nuclear domination: Continuing the policies of President Obama, the Trump administration envisions a massive modernization of America’s nuclear arsenal, to the tune of at least a trillion dollars over the next generation.  Much like an old-guard Soviet premier, Trump has boasted that America will always remain at “the top of the pack” when it comes to nuclear weapons.

4. Imperialist and expansionist: Historians speak of America’s “informal” empire, by which they mean the U.S. is less hands-on than past imperial powers like the Romans and the British.  But there’s nothing informal or hands-off about America’s 800 overseas military bases or the fact that its Special Operations forces are being deployed in 130 or more countries yearly.  When the U.S. military speaks of global reach, global power, and full-spectrum dominance, this is traditional imperialism cloaked in banal catchphrases.  Put differently, Soviet imperialism, which American leaders always professed to fear, never had a reach of this sort.

5. Persecutes critics and dissidents: Whether it’s been the use of the Patriot Act under George W. Bush’s presidency, the persecution of whistleblowers using the World War I-era Espionage Act under the Obama administration, or the vilification of the media by the new Trump administration, the U.S. is far less tolerant of dissent today than it was prior to the Soviet collapse.  As Homeland Security Secretary and retired four-star Marine General John Kelly recently put it, speaking of news stories about the Trump administration based on anonymous intelligence sources, such leaks are “darn close to treason.”  Add to such an atmosphere Trump’s attacks on the media as the “enemy” of the people and on critical news stories as “fake” and you have an environment ripe for the future suppression of dissent.

In the Soviet Union, political opponents were often threatened with jail or worse, and those threats were regularly enforced by men wearing military or secret police uniforms.  In that context, let’s not forget the “Lock her up!” chants led by retired Lt. General Michael Flynn at the Republican National Convention and aimed at Donald Trump’s political opponent of that moment, Hillary Clinton.

6. Internal problems like drug abuse, inadequate health care, and a poisoned environment: Alcoholism is still rife in Russia and environmental damage widespread, but consider the U.S. today.  An opioid crisis is killing more than 30,000 people a year.  Lead poisoning in places like Flint, Michigan, and New Orleans is causing irreparable harm to the young.  The disposal of wastewater from fracking operations is generating earthquakes in Ohio and Oklahoma.  Even as environmental hazards proliferate, the Trump administration is gutting the Environmental Protection Agency.  As health crises grow more serious, the Trump administration, abetted by a Republican-led Congress, is attempting to cut health-care coverage and benefits, as well as the funding that might protect Americans from deadly pathogens.  Disturbingly, as with the Soviet Union in the era of its collapse, life expectancy among white men is declining, mainly due to drug abuse, suicide, and other despair-driven problems.

7. Extensive prison systems: As a percentage of its population, no country imprisons more of its own people than the United States.  While more than two million of their fellow citizens languish in prisons, Americans continue to see their nation as a beacon of freedom, ignoring Guantánamo Bay, Cuba.  In addition, the country now has a president who believes in torture, who has called for the murder of terrorists’ families, and who wants to refill Guantánamo with prisoners.  It also has an attorney general who wants to make prison terms for low-level drug offenders ever more draconian.

8. Stalemated wars: You have to hand it to the Soviets.  They did at least exhibit a learning curve in their disastrous war in Afghanistan and so the Red Army finally left that country in 1989 after a decade of high casualties and frustration (even if its troops returned to a land on the verge of implosion).  U.S. forces, on the other hand, have been in Afghanistan for 16 years, with the Taliban growing ever stronger, yet its military’s response has once again been to call for investing more money and sending in more troops to reverse the “stalemate” there.  Meanwhile, after 14 years, Iraq War 3.0 festers, bringing devastation to places like Mosul, even as its destabilizing results continue to manifest themselves in Syria and indeed throughout the greater Middle East.  Despite or rather because of these disastrous results, U.S. leaders continue to over-deploy U.S. Special Operations forces, contributing to exhaustion and higher suicide rates in the ranks.

In light of these eight points, that lighthearted Beatles tune and relic of the Cold War, “Back in the USSR,” takes on a new, and far harsher, meaning.

What Is to Be Done?

Slowly, seemingly inexorably, the U.S. is becoming more like the former Soviet Union.  Just to begin the list of similarities: too many resources are being devoted to the military and the national security state; too many over-decorated generals are being given too much authority in government; bleeding-ulcer wars continue unstanched in Afghanistan, Iraq, and elsewhere; infrastructure (roads, bridges, pipelines, dams, and so on) continues to crumble; restless “republics” grumble about separating from the union (Calexit!); rampant drug abuse and declining life expectancy are now American facts of life. Meanwhile, the latest U.S. president is, in temperament, authoritarian, even as government “services” take on an increasingly nepotistic flavor at the top.

I’m worried, comrade!  Echoing the cry of the great Lenin, what is to be done?  Given the list of symptoms, here’s one obvious 10-step approach to the de-sovietization of America:

1. Decrease “defense” spending by 10% annually for the next five years.  In the Soviet spirit, think of it as a five-year plan to restore our revolution (as in the American Revolution), which was, after all, directed against imperial policies exercised by a “bigly” king.

2. Cut the number of generals and admirals in the military by half, and get rid of all the meaningless ribbons, badges, and medals they wear.  In other words, don’t just cut down on the high command but on their tendency to look (and increasingly to act) like Soviet generals of old.  And don’t allow them to serve in high governmental positions until they’ve been retired for at least 10 years.

3. Get our military out of Afghanistan, Iraq, and other war-torn countries in the Greater Middle East and Africa.  Reduce that imperial footprint overseas by closing costly military bases.

4. Work to eliminate nuclear weapons globally by, as a first step, cutting the vast U.S. arsenal in half and forgetting about that trillion-dollar “modernization” program.  Eliminate land-based ICBMs first; they are no longer needed for any meaningful deterrent purposes.

5. Take the money saved on “modernizing” nukes and invest it in updating America’s infrastructure.

6. Curtail state surveillance.  Freedom needs privacy to flourish.  As a nation, we need to remember that security is not the bedrock of democracy — the U.S. Constitution is.

7. Work to curb drug abuse by cutting back on criminalization.  Leave the war mentality behind, including the “war on drugs,” and focus instead on providing better treatment programs for addicts.  Set a goal of cutting America’s prison population in half over the next decade.

8. Life expectancy will increase with better health care.  Provide health care coverage for all using a single-payer system.  Every American should have the same coverage as a member of Congress.  People shouldn’t be suffering and dying because they can’t afford to see a doctor or pay for their prescriptions.

9. Nothing is more fundamental to “national security” than clean air and water.  It’s folly to risk poisoning the environment in the name of either economic productivity or building up the military.  If you doubt this, ask citizens of Russia and the former Soviet Republics, who still struggle with the fallout from the poisonous environmental policies of Soviet days.

10. Congress needs to assert its constitutional authority over war and the budget, and begin to act like the “check and balance” it’s supposed to be when it comes to executive power.

There you have it.  These 10 steps should go some way toward solving America’s real Russian problem — the Soviet one.  Won’t you join me, comrade?

 

William J. Astore, a retired lieutenant colonel (USAF) and history professor, is a TomDispatch regular.  His personal blog is Bracing Views.

The West’s War on Free Speech

By Tony Cartalucci

Source: Land Destroyer

With a name like the “National Democratic Institute” (NDI) one might expect the US State Department-funded, corporate-financier chaired front to be the premier proponent of freedom and democracy worldwide. And although it poses as such, it does precisely the opposite. It uses principles like free speech, democracy, press freedom, and human rights as a facade behind which it carries out a politically motivated agenda on behalf of the special interests that fund and direct its activities.

In a recent Tweet, NDI linked to a New York Times article titled, “In Europe’s Election Season, Tech Vies to Fight Fake News.” It claimed in the Tweet that the article featured:

A look at some of the projects aiming to use automated algorithms to identify and combat fake news. 

The article itself though, reveals nothing short of a global effort by US tech-giants Google and Facebook, in collaboration with the Western media, to censor any and all media that fails to align with Western-dominated narratives.

The article itself claims:

The French electorate heads to the polls in the second round of presidential elections on May 7, followed by votes in Britain and Germany in the coming months. Computer scientists, tech giants and start-ups are using sophisticated algorithms and reams of online data to quickly — and automatically — spot fake news faster than traditional fact-checking groups can. 

The goal, experts say, is to expand these digital tools across Europe, so the region can counter the fake news that caused so much confusion and anger during the United States presidential election in November, when outright false reports routinely spread like wildfire on Facebook and Twitter.

The article then explains that once “fake news” is spotted, it is expunged from the Internet. It reports that:

After criticism of its role in spreading false reports during the United States elections, Facebook introduced a fact-checking tool ahead of the Dutch elections in March and the first round of the French presidential election on April 23. It also removed 30,000 accounts in France that had shared fake news, a small fraction of the approximately 33 million Facebook users in the country.

Were foreign government-linked tech companies purging tens of thousands of accounts ahead of elections in say, Thailand or Russia, it is very likely organizations like NDI and media platforms like the New York Times would cry foul, depicting it as censorship.

In determining what is and isn’t “fake news,” the New York Times offers some clues (emphasis added):

Using a database of verified articles and their artificial intelligence expertise, rival groups — a combination of college teams, independent programmers and groups from existing tech companies — already have been able to accurately predict the veracity of certain claims almost 90 percent of the time, Mr. Pomerleau said. He hopes that figure will rise to the mid-90s before his challenge ends in June.

In other words, “fake news” is determined by comparing it directly to narratives presented by establishment media platforms like the New York Times, the BBC, CNN, MSNBC, Fox News, and others who have notorious track records of serial deception, false reporting, and even war propagandizing.

Nowhere does the New York Times explain how these “verified articles” have been determined to be factually accurate, and instead, it appears that all these algorithms are doing is ensuring all media falls in line with Western narratives.

If media in question coincides with Western-dominated media platforms, it is given a pass – if not, it is slated for expunging as described elsewhere in the New York Times’ piece.

Thus, the National Democratic Institute, who claims on its website to “support and strengthen democratic institutions worldwide through citizen participation, openness and accountability in government,” finds itself promoting what is essentially a worldwide agenda of malicious censorship, manipulating the perception of the globe’s citizenry, not supporting or strengthening it’s participation in any sort of honest political process.

To answer the question as to what the NDI is referring to when it claims other nations are “censoring” free speech and press freedoms, it involves defending local fronts funded by the NDI and its parent organization, the National Endowment for Democracy (NED) who merely repeat Western propaganda in local languages and with local spins. When foreign nations attempt to deal with these instances of “fake news,” US fronts like NDI and NED depict it as censorship.

While the West poses as the premier champion of free speech, citizen participation, openness, and accountability, the New York Times article reveals an unfolding plan to utterly crush any narrative that deviates from Western media talking points, thus controlling citizen perception, not encouraging “participation,” and ensuring that the West alone determines what is “opened” and held “accountable.”

No worse scenario can be referenced in human history or even among human fiction than plans to determine for the world through automatic algorithms and artificial intelligence almost in real time what is heard and read and what isn’t. It is even beyond the scope and scale of George Orwell’s cautionary dystopian “1984” novel.

In a truly free society, an educated citizenry is capable of deciding for itself what is “fake news” and what isn’t. Because of the rise of alternatives to the West’s monopoly over global information, many people are doing just that – determining that Western narratives are in fact deceptions. At no other point in modern history has the Western media faced as many alternatives, and as much skepticism on this scale, as well as an ebbing of trust domestically and abroad. It is no surprise then, to find the West resorting to outright censorship, even if it cushions mention of it with terms like “fake news.”

The Government Is Still the Enemy of Freedom

By John W. Whitehead

Source: The Rutherford Institute

“Rights aren’t rights if someone can take them away. They’re privileges. That’s all we’ve ever had in this country, is a bill of temporary privileges. And if you read the news even badly, you know that every year the list gets shorter and shorter. Sooner or later, the people in this country are gonna realize the government … doesn’t care about you, or your children, or your rights, or your welfare or your safety… It’s interested in its own power. That’s the only thing. Keeping it and expanding it wherever possible.”— George Carlin

My friends, we’re being played for fools.

On paper, we may be technically free.

In reality, however, we are only as free as a government official may allow.

We only think we live in a constitutional republic, governed by just laws created for our benefit.

Truth be told, we live in a dictatorship disguised as a democracy where all that we own, all that we earn, all that we say and do—our very lives—depends on the benevolence of government agents and corporate shareholders for whom profit and power will always trump principle. And now the government is litigating and legislating its way into a new framework where the dictates of petty bureaucrats carry greater weight than the inalienable rights of the citizenry.

We’re in trouble, folks.

Freedom no longer means what it once did.

This holds true whether you’re talking about the right to criticize the government in word or deed, the right to be free from government surveillance, the right to not have your person or your property subjected to warrantless searches by government agents, the right to due process, the right to be safe from soldiers invading your home, the right to be innocent until proven guilty and every other right that once reinforced the founders’ belief that this would be “a government of the people, by the people and for the people.”

Not only do we no longer have dominion over our bodies, our families, our property and our lives, but the government continues to chip away at what few rights we still have to speak freely and think for ourselves.

If the government can control speech, it can control thought and, in turn, it can control the minds of the citizenry.

The unspoken freedom enshrined in the First Amendment is the right to think freely and openly debate issues without being muzzled or treated like a criminal.

In other words, if we no longer have the right to tell a Census Worker to get off our property, if we no longer have the right to tell a police officer to get a search warrant before they dare to walk through our door, if we no longer have the right to stand in front of the Supreme Court wearing a protest sign or approach an elected representative to share our views, if we no longer have the right to protest unjust laws by voicing our opinions in public or on our clothing or before a legislative body—no matter how misogynistic, hateful, prejudiced, intolerant, misguided or politically incorrect they might be—then we do not have free speech.

What we have instead is regulated, controlled speech, and that’s a whole other ballgame.

Protest laws, free speech zones, bubble zones, trespass zones, anti-bullying legislation, zero tolerance policies, hate crime laws and a host of other legalistic maladies dreamed up by politicians and prosecutors are conspiring to corrode our core freedoms purportedly for our own good.

For instance, the protest laws being introduced across the country—in 18 states so far—are supposedly in the name of “public safety and limiting economic damage.”

Don’t fall for it.

No matter how you package these laws, no matter how well-meaning they may sound, no matter how much you may disagree with the protesters or sympathize with the objects of the protest, these proposed laws are aimed at one thing only: discouraging dissent.

In Arizona, police would be permitted to seize the assets of anyone involved in a protest that at some point becomes violent.

In Minnesota, protesters would be forced to pay for the cost of having police on hand to “police” demonstrations.

Oregon lawmakers want to “require public community colleges and universities to expel any student convicted of participating in a violent riot.”

A proposed North Dakota law would give drivers the green light to “accidentally” run over protesters who are blocking a public roadway. Florida and Tennessee are entertaining similar laws.

Pushing back against what it refers to as “economic terrorism,” Washington wants to increase penalties for protesters who block access to highways and railways.

Anticipating protests over the Keystone Pipeline, South Dakota wants to apply the governor’s emergency response authority to potentially destructive protests, create new trespassing penalties and make it a crime to obstruct highways.

In Iowa, protesters who block highways with speeds posted above 55 mph could spend five years in prison, plus a fine of up to $7,500. Obstruct traffic in Mississippi and you could be facing a $10,000 fine and a five-year prison sentence.

A North Carolina law would make it a crime to heckle state officials. Under this law, shouting at a former governor would constitute a crime.

Indiana lawmakers wanted to authorize police to use “any means necessary” to breakup mass gatherings that block traffic. That legislation has since been amended to merely empower police to issue fines for such behavior.

Georgia is proposing harsh penalties and mandatory sentencing laws for those who obstruct public passages or throw bodily fluids on “public safety officers.”

Virginia wants to subject protesters who engage in an “unlawful assembly” after “having been lawfully warned to disperse” with up to a year of jail time and a fine of up to $2,500.

Missouri wants to make it illegal for anyone participating in an “unlawful assembly” to intentionally conceal “his or her identity by the means of a robe, mask, or other disguise.”

Colorado wants to lock up protesters for up to 18 months who obstruct or tamper with oil and gas equipment and charge them with up to $100,000 in fines.

Oklahoma wants to create a sliding scale for protesters whose actions impact or impede critical infrastructure. The penalties would range from $1,000 and six months in a county jail to $100,000 and up to 10 years in prison. And if you’re part of an organization, that fine goes as high as $1,000,000.

Michigan hopes to make it easier for courts to shut down “mass picketing” demonstrations and fine protesters who block entrances to businesses, private residences or roadways up to $1,000 a day. That fine jumps to $10,000 a day for unions or other organizing groups.

Ask yourself: if there are already laws on the books in all of the states that address criminal or illegal behavior such as blocking public roadways or trespassing on private property—because such laws are already on the books—then why does the government need to pass laws criminalizing activities that are already outlawed?

What’s really going on here?

No matter what the politicians might say, the government doesn’t care about our rights, our welfare or our safety.

How many times will we keep falling for the same tricks?

Every despotic measure used to control us and make us cower and fear and comply with the government’s dictates has been packaged as being for our benefit, while in truth benefiting only those who stand to profit, financially or otherwise, from the government’s transformation of the citizenry into a criminal class.

Remember, the Patriot Act didn’t make us safer. It simply turned American citizens into suspects and, in the process, gave rise to an entire industry—private and governmental—whose profit depends on its ability to undermine our Fourth Amendment rights.

Placing TSA agents in our nation’s airports didn’t make us safer. It simply subjected Americans to invasive groping, ogling and bodily searches by government agents. Now the TSA plans to subject travelers to even more “comprehensive” patdowns.

So, too, these protest laws are not about protecting the economy or private property or public roads. Rather, they are intended to muzzle discontent and discourage anyone from challenging government authority.

These laws are the shot across the bow.

They’re intended to send a strong message that in the American police state, you’re either a patriot who marches in lockstep with the government’s dictates or you’re a pariah, a suspect, a criminal, a troublemaker, a terrorist, a radical, a revolutionary.

Yet by muzzling the citizenry, by removing the constitutional steam valves that allow people to speak their minds, air their grievances and contribute to a larger dialogue that hopefully results in a more just world, the government is deliberately stirring the pot, creating a climate in which violence becomes inevitable.

When there is no steam valve—when there is no one to hear what the people have to say, because government representatives have removed themselves so far from their constituents—then frustration builds, anger grows and people become more volatile and desperate to force a conversation.

Then again, perhaps that was the government’s plan all along.

As John F. Kennedy warned in March 1962, “Those who make peaceful revolution impossible will make violent revolution inevitable.”

The government is making violent revolution inevitable.

How do you lock down a nation?

You sow discontent and fear among the populace. You terrorize the people into believing that radicalized foreigners are preparing to invade. You teach them to be non-thinkers who passively accept whatever is told them, whether it’s delivered by way of the corporate media or a government handler. You brainwash them into believing that everything the government does is for their good and anyone who opposes the government is an enemy. You acclimate them to a state of martial law, carried out by soldiers disguised as police officers but bearing the weapons of war. You polarize them so that they can never unite and stand united against the government. You create a climate in which silence is golden and those who speak up are shouted down. You spread propaganda and lies. You package the police state in the rhetoric of politicians.

And then, when and if the people finally wake up to the fact that the government is not and has never been their friend, when it’s too late for peaceful protests and violence is all that remains to them as a recourse against tyranny, you use all of the tools you’ve been so carefully amassing—the criminal databases and surveillance and identification systems and private prisons and protest laws—and you shut them down for good.

As I make clear in my book Battlefield America: The War on the American People, once a government assumes power—unconstitutional or not—it does not relinquish it. The militarized police are not going to stand down. The NSA will continue to collect electronic files on everything we do. More and more Americans are going to face jail time for offenses that prior generations did not concern themselves with.

The government—at all levels—could crack down on virtually anyone at any time.

Martin Luther King saw it coming: both the “spontaneous explosion of anger by various citizen groups” and the ensuing crackdown by the government.

“Police, national guard and other armed bodies are feverously preparing for repression,” King wrote shortly before he was assassinated. “They can be curbed not by unorganized resort to force…but only by a massive wave of militant nonviolence….It also may be the instrument of our national salvation.”

Militant nonviolent resistance.

“A nationwide nonviolent movement is very important,” King wrote. “We know from past experience that Congress and the President won’t do anything until you develop a movement around which people of goodwill can find a way to put pressure on them… This means making the movement powerful enough, dramatic enough, morally appealing enough, so that people of goodwill, the churches, laborers, liberals, intellectuals, students, poor people themselves begin to put pressure on congressmen to the point that they can no longer elude our demands.

“It must be militant, massive nonviolence,” King emphasized.

In other words, besides marches and protests, there would have to be civil disobedience. Civil disobedience forces the government to expend energy in many directions, especially if it is nonviolent, organized and is conducted on a massive scale. This is, as King knew, the only way to move the beast. It is the way to effect change without resorting to violence. And it is exactly what these protest laws are attempting to discourage

We are coming to a crossroads. Either we gather together now and attempt to restore freedom or all will be lost. As King cautioned, “everywhere, ‘time is winding up,’ in the words of one of our spirituals, corruption in the land, people take your stand; time is winding up.”

 

ABOUT JOHN W. WHITEHEAD

Constitutional attorney and author John W. Whitehead is founder and president of The Rutherford Institute. His new book Battlefield America: The War on the American People (SelectBooks, 2015) is available online at http://www.amazon.com. Whitehead can be contacted at johnw@rutherford.org.

 

Our Hopelessly Dysfunctional Democracy

By Charles Hugh Smith

Source: Of Two Minds

When the system is rigged, “democracy” is just another public-relations screen to mask the unsavory reality of Oligarchy.

Democracy in America has become a hollow shell. The conventional markers of democracy–elections and elected representatives–exist, but they are mere facades; the mechanisms of setting the course of the nation are corrupt, and the power lies outside the public’s reach.

History has shown that democratic elections don’t guarantee an uncorrupt, functional government. Rather, democracy has become the public-relations stamp of approval for corrupt governance that runs roughshod over individual liberty while centralizing the power to enforce consent, silence critics and maintain the status quo.

Consider Smith’s Neofeudalism Principle #1: If the citizenry cannot replace a dysfunctional government and/or limit the power of the financial Aristocracy at the ballot box, the nation is a democracy in name only.

In other words, if the citizenry changes the elected representation but the financial Aristocracy and the Deep State remain in charge, then the democracy is nothing but a PR facade for an oppressive oligarchy.

If the erosion of civil liberties and rising inequality characterize the state of the nation, democracy is both dysfunctional and illiberal. A state that strips away the civil liberties of its citizens via civil forfeiture, a war-on-drugs Gulag and unlimited surveillance may be a democracy in name, but it is at heart an oppressive oligarchy.

If the super-wealthy continue to become ever wealthier while the bottom 95% of the citizenry struggle in various stages of debt-serfdom, the state may be a democracy in name, but it is at heart an oppressive oligarchy.

Author/commentator Fareed Zakaria recently addressed the illiberal aspects of America’s faded democracy in an article America’s democracy has become illiberal.

Zakar’s prettified critique avoided the real worm at the heart of our democracy:the state exists to enforce cartels. Some might be private, some might be state-run, and others might be hybrids, such as our failed Sickcare system and our military industrial complex.

The ultimate role of democracy isn’t to “give the people a voice;” the only meaningful role of democracy is to protect the liberties of individuals from state encroachment, break up cartels and monopolies and limit the corruption of private/public money.

America’s democracy has failed on all counts. Civil liberties in a nation of ubiquitous central-state surveillance, a quasi-political Gulag (that nickel bag will earn you a tenner in America’s drug-war Gulag) and civil forfeiture (we suspect you’re up to no good, so we have the right to steal your car and cash) are eroding fast.

In America, the central government’s primary job is enforcing and funding cartels. As many of us have pointed out for years, a mere $10 million in lobbying, revolving-door graft (getting paid $250,000 for a speech or for a couple of board meetings) and bribes (cough-cough, I mean campaign contributions) can secure $100 million in profits–either by erecting regulatory/legal barriers or by direct federal funding of the cartel’s racket (healthcare, defense, “National Security,” etc.).

I explain why this is so in my books Resistance, Revolution, Liberation, Inequality and the Collapse of Privilege and Why Our Status Quo Failed and Is Beyond Reform.

The fact that the corruption is veiled does not mean it isn’t corruption. In the sort of nations Americans mock as fake democracies, the wealthy protect their wealth and incomes with bags of cash delivered at night to politicians.

Nothing so crass or obvious here, of course. Here, the government of Algiers gives $25 million to the Clinton Foundation for “favors,” the Russian government gives hundreds of thousands to John Podesta’s firm for “advice” (heh), the Koch Brothers fund an array of front-organizations that work on behalf of their agenda, K Street lobbying firms rake in tens of millions of dollars every year, and the first thing tech companies do when they realize some interest group might crimp their profits courtesy of lobbying the central state’s politicos is set up their own lavish lobbying and “contribution” schemes.

In theory, democracy enables advocacy by a variety of groups in order to reach a consensual solution to problems shared by everyone. In practice, the advocacy is limited to a select group of insiders, donors and the various fronts of the wealthy: foundations, think-tanks, lobbyists, etc.

Does anyone think America’s democracy is still capable of solving the truly major long-term problems threatening the nation? Based on what evidence? What we see is a corrupt machine of governance that kicks every can down the road rather than suffer the blowback of honestly facing problems that will require deep sacrifices and changes in the status quo.

We see a dysfunctional machine of governance that changes the name of legislation and proposes policy tweaks, while leaving the rapacious cartels untouched. (See the current sickcare “debate” for examples.)

We see an Imperial Project setting the state’s agenda to suit its own desires, and a corporate media that is quivering with rage now that the public no longer believes its tainted swill of “news” and “reporting.”

The divide between the haves and the have-nots is not limited to money–it’s also widening between the few with political power and the teeming serfs with effectively zero political power. When the system is rigged, “democracy” is just another public-relations screen to mask the unsavory reality of oligarchy.

 

Lessons from George Orwell’s ‘1984’

1984

By Ethan Indigo Smith

Source: Waking Times

“Political language is designed to make lies sound truthful and murder respectable, and to give an appearance of solidity to pure wind.” — George Orwell

Some fictional literature is so profound as to be relevant for decades. George Orwell’s timeless 1984 is one such literary work. One of the most influential books of our time, its message resonates today as much as it did when it was first published over 65 years ago — as shown by its recent surge to the #1 spot on Amazon’s bestseller list.

So what can 1984 teach us about the modern day?

At its core, 1984 is a post-WWII interpretation of the relationship between individuals and institutions. It changed the course of social history by spawning new language relating to the structure and mechanisms of our society, expanding the scope of human language and thought, and therefore, humanity’s understanding of itself. And that legacy seems perfectly fitting, for in the story of 1984, the world is controlled by so many restrictions that even the expressiveness of the official language, “Newspeak”, is deliberately narrowed by the ruling institutions in a way that limits the ability of individuals to express “thoughtcrime” — that which is deemed illegal by the “Inner Party”, the State.

As a work of fiction, 1984 provides a stark view of a burgeoning culture of totalitarianism. As a work of symbolism, however, it stands as a reflection of modern fact in The U.S.A. and the world today. Within its narrative, the five freedoms of the First Amendment of the United States Constitution were infringed and removed; in particular, the freedom of speech was so restricted that there was only one source of news operated by the official governing body and an entire branch of government was dedicated to steadily eliminating language deemed detrimental to the State.

Orwell created new phrases like “Newspeak” (the official, limited language) and its antonym “Oldspeak”, “Goodthink” (thoughts that are approved by the Party) and its antonym “Crimethink”, and “Doublethink” (the normalized act of simultaneously accepting two contradictory beliefs). The new language allowed his narrative to portray and expose age-old structures of thought and language manipulation – structures that have exponentially escalated in the modern day.

In 1984 all opposition is controlled and absorbed into the background. ‘Big Brother’ is the human image that represents The Inner Party (and the Party line) via the Telescreen providing an ‘official’ narrative while appropriating and misrepresenting the notion of brotherhood and unity into a ‘brand name’ — one that actually instills a psychology of collectivism, not brotherhood, just as the controllers in our own world instill nationalism and war-mindedness in the name of “freedom” and “liberty”. Indeed, the Telescreen is the primary means through which norms were forced on the society and false imagery and narratives embedded in its collective consciousness. Totally transfixed on the Party line, as told by the Telescreen, the fictional society of 1984 has lost the ability to think such that it will believe two plus two is five, as the saying goes, as long as it is presented as such on the Telescreen. They have been captive to this set up their entire lives, and, with language and thought restricted and outlawed, they are blind to their own captivity, unable to discern for themselves. Thus, lies are made to be “truths” using logic so distorted that it not only convinces the masses that two plus two equal five, but that war is peace, freedom is slavery, and ignorance is strength.

In reality, individual ignorance is strength to institutions. Such distortions of language and thought (and, incidentally, history) are the perfect means by which to disempower and co-opt an entire society — means that are not limited to the works of fiction. Orwell knew that ideas do not exist separately from language. Language, in both spoken and written forms, is essential to our ability to form and communicate thoughts and ideas. That is why today the United States government, the shadow powerbrokers that control it, and the mainstream media that support it (the entirety of which is owned by only 6 corporations) continue their war on “fake news” — i.e. ideas that are skeptical of government pronouncements, and information that proves them to be false — taking aim not just at independent journalism but independent thought itself. While government surveillance of its own people continues to increase, government secrecy is at an all-time high, the sharing of ideas that challenge the status quo is becoming more heavily censored, releasing information on institutional and State activity is now punishable by law, and whistleblowers from inside the State are systematically destroyed. If that wasn’t Orwellian enough, Donald Trump’s advisors have begun coining phrases like “alternative facts”, and we have even seen the creation of an Orwellian “Ministry of Truth”, an “international fact-checking network” charged with deciding what is “truth” and what is “fake news”.

If the events of 1984 continue to hold true, and the ruling Party of today gets its way, words and ideas will soon become not only censored, but illegal and eliminated altogether, controlled by increasingly totalitarian governments steering our society down a dystopian path of censorship, blind belief, and misinformation — all in the name of the State. However, as our minds are freed, one at a time, we are ultimately finding that our society is heavily embedded with such norms and structures that perpetuate false imagery, preserving the status quo of the State from the ‘threat’ of individual thinking — hence the modern war on “fake news”. We are beginning, as a society, to question such falsehood, and exercise our inherent freedom to expose it.

“Freedom is the freedom to say that two plus two make four. If that is granted, all else follows”. ~ George Orwell

The Last Man in Europe

The original working title to 1984 was ‘The Last Man in Europe.’ This descriptive and evocative title idea provides a clear glimpse into George Orwell’s intent, and encapsulates a main point of 1984, a title perhaps too revealing to be anything but a working title. Certainly, that is the way many of us feel when we first become aware of lies and partial-truths that are presented as reality by those in control of our society today, and accepted in totality by seemingly everyone else – it is as if we are the last lone person. Indeed, the road of the freethinker can be a lonely one, and the story’s protagonist, patriot Winston Smith, is made to believe he is the last person who questions, who looks, listens and speaks.

In a totalitarian society — be it Orwell’s fictional world or the increasingly authoritarian political regimes of today — the official narratives portrayed by the “official” media portray that a society is in consensus with the State, and that those engaged in Thoughtcrime (whether or not it is legally a crime) are isolated social outcasts and lunatics, and demeaned as “rebels” and “conspiracy theorists” (despite the existence of actual conspiracy, against which the truly conscious mind must inevitably rebel.) Yet in reality, Crimethink is what differentiates we freethinkers from those who are lost in the spell of societal illusion and, therefore, pose a threat to the status quo of the State. But this is part of the trap of Goodthink — it creates the illusion of consensus, and therefore, engenders isolation in those who do not concede.

As a master of his craft, nothing Orwell wrote was off the cuff. Now it is not overtly spoken in the book, but there are four types of people in the fictional realm of 1984. There are three described classes and a suggested fourth, only later is it implied that the Brotherhood, anti-establishment rebels — has been eliminated from the narrative jut as those in power sought to eliminate them from the society.

The Secret to 1984 is ‘4’

1984 is in part an expose on the four basic types of people in a society, the four types of institutions and the four types of institutional lies that enable them.

Characterized by how they respond to information, modern societies are made up of four archetypes of people — idiots, zealots, elitists and patriots. Idiots refuse information, zealots blindly refute information, elitists misuse information, and patriots seek and distribute information. Despite dramatic alterations in the world’s geopolitical landscape, and some fluctuation of individuals from one group/role to another over time, the dynamic between these groups has historically remained the same, and are inevitably intertwined: Idiots avoid all new pertinent information in order to maintain their perspective, never questioning the status quo. Zealots ask certain questions of certain information, ignoring unaligned information in order to maintain their perspective, supporting the status quo at all costs. Elitists question information in order to manipulate and reap gains off those who don’t know, benefiting from the status quo. Patriots question information to educate themselves and share it with others, in order that we might enhance our lives and progress beyond the status quo.

It is no wonder, then, that the patriot has been all but deleted from today’s socio-political landscape, with those acting as true patriots being demonized by the State, and the meaning of the word “patriot” distorted and confused (by the likes of George W. Bush Jr.) to mean an unquestioning, flag-waving, with-us-or-against-us brand of nationalistic idiocy. (Check out my article, The First Amendment – The REAL Patriot Act for a deeper discussion of this.) Using a practice so well-defined by Orwell that it is known today as Orwellian speak, institutions transfer and confuse words and ideas by mixing up themselves, their policies and their products with patriotic ideas and words. They take the meaning of words and archetypes, and flip them on their heads: War is peace, freedom is slavery, ignorance is strength, and true patriotism (such as that shown by government whistleblowers) is traitorous.

In reality, the true patriots, the rebels who see through the lies of institutions and act accordingly, are removed from public consciousness in exactly the same way. In “Orwellian” fashion, the fourth deleted class of people in 1984, the Brotherhood, who are working to bring down the fascist Inner Party, are deleted through the admission of language. The other three types, which are specifically mentioned in the-book-within-the-book, the fictional The Theory and Practice of Oligarchical Collectivism, are the High, the Middle and the Low castes. Similarly, the other three types of people depicted in the society of Oceania are the Inner Party, the Outer Party and the Proles. The social classes interact very little.

The Inner Party and Outer Party make up 2% of the population, and are the institutionalized controllers of Oceania. They are akin to modern politicians and the financial elite, working with and against one another, and clamoring to gain and maintain power. They have privileges the other castes do not, including being able to (temporarily) turn off the propaganda-spewing Telescreens.

However, there is a pecking order within the Party. The Outer Party are given state administrative jobs and are composed of the more educated members of society. They are responsible for the direct implementation of the Party’s policies but have no say in decision making. They are the “artificial middle class” and as such, have strict rules applied to them. They are allowed “no vices other than cigarettes and Victory Gin”, are spied on via their Telescreens, and are encouraged to spy on each other, and to report suspicious activities to Big Brother.

The lower class of workers that perform the majority of menial tasks and labors are known as the Proles. They live in the poorest of conditions, are not educated, and instead are kept entertained with alcohol, gambling, sports, fiction and pornography (called “prolefeed”) — the 1984 equivalent of “bread and circus”.

According to the Inner Party and the Telescreen it controls, those who might challenge the system – the important fourth type of person – simply do not exist. The Brotherhood, the organization of patriots, are portrayed by the controlling ‘Inner Party’ as only a rumor, and the notion of their existence is belittled by the Inner Party, via the Telescreen. In Oceania, if the Telescreen is t be believed, there are no patriots, nor is such action allowed — and any who think that way are isolated by the divide-and-conquer tactic used by empires past and present. Thus, like so many in our failing society, Smith believes himself to be ‘The Last Man in Europe’…

“During times of universal deceit, telling the truth becomes a revolutionary act.” – George Orwell

And yet, as the character of Winston Smith accurately observes in his diary, “If there is any hope, it lies with the Proles” — just as our hope for today lies with the so-called “99%”. The “proles” in our society must begin to look beyond the bread and circus, beyond the prolefeed, and become a true brotherhood, and sisterhood, by questioning information, educating themselves, and sharing what they learn with others in order that we might overcome institutional oppression and finally create the ‘golden age’ that is our combined potential.

God and Gold is Within

“We shall meet in the place where there is no darkness.” — George Orwell, 1984

Nothing Orwell wrote was by accident. The name of the character who leads the Brotherhood rebellion is named Emmanuel Goldstein, a name that translates roughly to mean God (Emmanuel) and gold are within (Goldstein). The use of this character name by Orwell asserts a developed, even transmuted human being, who has transcended the imposed limitations of the system he is opposed to, and grown from dull to refined, disempowered to empowered. It also reveals Orwell’s knowledge of how such patriotism and rebellion can become revolution.

The word “prole” is short for prolétariat, a French word derived from the Latin proletarius, meaning “a man whose only wealth is his offspring, or whose sole service to the state is as father”. A word evoking pure institutionalized collectivism, it suggests that the individual has no value other than the labor and progeny he provides to the State. (If you’re only value to the state is as a breeder and consumer, well what kind of world does, sorry, would that result in??) Now compare that definition to the name Emmanuel Goldstein, Golden Godliness is Within. In complete contrast, it is a statement of inner development, of individual enlightenment and empowerment — which, as Orwell knew, are the only forces that can successfully lead a rebellion against the institutional oppression of both fiction and reality.

So, you see, the secret to 1984 is ‘4’. Its most powerful message is in its omissions: in the omission of information, which is the only way the Party/State can maintain authoritarian control, and in the deliberately-omitted fourth human archetype, the righteous rebel, the marginalized voice of descent who is led to believe he is the “last man in Europe”. But in fact, the last man in Europe is you and I. We are everywhere. And, as we open our minds and our mouths, and embrace the gold within, we re-tell the lost narrative of the Brotherhood, and turn our Proles into our Brothers.

Cycle of Insurgency: How the US military is expected to put down an insurrection

Suspect Death

By Justin King

Source: The Fifth Column

One of the overriding questions when discussing an insurgency within the United States has always been the debate over how the military would respond. Those who hope for the military to break ranks and join the resistance will be disappointed. Those who would believe the military will employ surgical strikes to remove dissidents through technology will be surprised. The American people don’t have to guess how the US military would respond any longer. Two respected academics chose to war game a scenario using the United States Operating Concept (2010) as a guide.

The first thing to understand about an insurrection is that it isn’t terrorism. The terms are often used interchangeably by the media, but there is a significant difference.

As pointed out throughout this series, insurgencies that matured through the cycle of insurgency win. Always. There is a reason for this. Insurgencies, though typically weaker militarily, have great advantages over their adversaries. One of the greatest small unit commanders and unconventional warfare experts in modern times, Richard Marcinko, described three things needed to win in combat: speed, surprise, and violence of action. When transferred to the strategic and operational levels, the insurgency possesses these attributes. The greatest advantages of the insurgency are:

Mobility: The refusal to stay in a static location negates technologically advanced weapons systems.
Initiative: The insurgency is able to choose the time and place of most of the battles they fight.
Surprise: Because the insurgents have the ability to choose the time and place of the fight, they can select moments when the opposition is weakest.
Camouflage: The insurgent does not wear a uniform. As the father of modern insurgency, Michael Collins, said: “Our uniform will be that of the man on the street and the peasant in the field.” This makes distinguishing between friend and foe difficult for the opposition.
Unpredictability: A force that is unpredictable on a battlefield is dangerous. Field commanders train to fight conventional wars, in which both sides attempt to take and hold territory, the insurgent seeks destabilization of the opposition’s government, not land. Tactics designed to defeat a conventional army are useless against an enemy that doesn’t seek to hold territory. The value of remaining unpredictable has created an adage in military circles: “Professional soldiers are predictable, but the world is full of amateurs.” The implied meaning is that the amateur is more dangerous.
Factional divides: In a conventional military setting, a force should function like a well-oiled machine and have clear command and control. Insurgencies typically operate with loose alliances between factions who follow a particular commander. Sometimes they work together, sometimes they don’t. Just when the opposition gains a feel for the tactics and strategy of an insurgent commander, a new one arises. This leads to unpredictable actions being taken by the various factions, which increases their overall effectiveness.
Civilian sympathies: Insurgencies typically maintain a great deal of support from the local populace, which means the opposition can’t move without information detailing those moves reaching the insurgents. In a conventional conflict, the lines of battle hinder civilians from collecting intelligence and passing it to the opposing force. It can be done, but it is difficult. Insurgencies have no front lines.

Insurgencies maintain several other key advantages, but they are more nuanced and are beyond the scope of this article.

The US Army has adopted a doctrine of “Full Spectrum Operations”. Loosely it means the combination of offensive, defensive, and either stability operations overseas or civil support operations on U.S. soil. It’s a concept developed for conventional wars, with little application in unconventional conflicts. To produce a desired outcome (a US military win), the scenario has to be carefully crafted. The academics who published Full Spectrum Operations in the Homeland: A “Vision” of the Future were able to accomplish that. The scenario they present is:

The Great Recession of the early twenty-first century lasts far longer than anyone anticipated.  After a change in control of the White House and Congress in 2012, the governing party cuts off all funding that had been dedicated to boosting the economy or toward relief.  The United States economy has flatlined, much like Japan’s in the 1990s, for the better part of a decade.  By 2016, the economy shows signs of reawakening, but the middle and lower-middle classes have yet to experience much in the way of job growth or pay raises.  Unemployment continues to hover perilously close to double digits, small businesses cannot meet bankers’ terms to borrow money, and taxes on the middle class remain relatively high.  A high-profile and vocal minority has directed the public’s fear and frustration at nonwhites and immigrants.  After almost ten years of race-baiting and immigrant-bashing by right-wing demagogues, nearly one in five Americans reports being vehemently opposed to immigration, legal or illegal, and even U.S.-born nonwhites have become occasional targets for mobs of angry whites.

In May 2016 an extremist militia motivated by the goals of the “tea party” movement takes over the government of Darlington, South Carolina, occupying City Hall, disbanding the city council, and placing the mayor under house arrest.  Activists remove the chief of police and either disarm local police and county sheriff departments or discourage them from interfering.  In truth, this is hardly necessary.  Many law enforcement officials already are sympathetic to the tea party’s agenda, know many of the people involved, and have made clear they will not challenge the takeover.  The militia members are organized and have a relatively well thought-out plan of action.

With Darlington under their control, militia members quickly move beyond the city limits to establish “check points” – in reality, something more like choke points — on major transportation lines.  Traffic on I-95, the East Coast’s main north-south artery; I-20; and commercial and passenger rail lines are stopped and searched, allegedly for “illegal aliens.”  Citizens who complain are immediately detained.  Activists also collect “tolls” from drivers, ostensibly to maintain public schools and various city and county programs, but evidence suggests the money is actually going toward quickly increasing stores of heavy weapons and ammunition.  They also take over the town web site and use social media sites to get their message out unrestricted.

The scenario continues with descriptions of the activities of politicians prior to the military being involved, but the actions of the “insurgent” already guarantee a US military victory. In the presented scenario, the insurgents surrender every single advantage they have. They attempt to hold territory, losing the advantages of mobility, surprise, initiative, and unpredictability. Because they are operating openly and in a defined area, they have lost the advantage of camouflage. The battle lines established by the insurgents themselves at the checkpoints negate the benefits of civilian sympathy. They have a unified command structure that reduces unpredictability.

In the scenario, DOD responds to this threat by establishing a “show of force” to demoralize the insurgents. They then mount offensive operations by surprise to take down the checkpoints. Towards the end of the campaign, the military seizes power and radio stations and so on. It then begins mopping up operations once the civilians of Darlington have fled.

When faced with the realities of a modern insurgency, this response is completely fictional. There can be no “show of force” to insurgents who don’t take and hold territory. Because the insurgency would operate in a loosely defined area, it would be the US military setting up checkpoints (as in Iraq) that would be ambushed, not the insurgents. Wise insurgents would use mobile communications to spread their message, not a static radio station. The power stations would have been destroyed to foster a belief in the civilian populace that the government can’t even keep the lights on, much less defeat the insurgency. The civilians that conveniently remove themselves from the battlefield in the scenario will be in the line of fire during an insurgency because there is no front line. There is nowhere to evacuate to.

The academics responsible for this scenario specifically created a simple set of conditions that allowed them to explore the logistical aspects of the doctrine on US soil, without considering the real world applications. The US counterinsurgency doctrine is fundamentally flawed. Even when practiced in a foreign country, away from the intense criticism of the US media and populace, it failed to pacify Iraq or Afghanistan. In the US, the doctrine is worthless.

In the joint publication on counterinsurgency doctrine used by all branches, even before the table of contents, it spells out the expected failure. On page iii it states:

“US counterinsurgency efforts should provide incentives to the host-nation government to undertake reforms that address the root causes of the insurgency.”

In a US-based insurgency, the United States is the “host-nation government”. While the above scenario makes for a fun read, current US doctrine is to meet the demands of domestic insurgents, while protecting as much of its credibility as possible.

The Illusion of Freedom: The Police State Is Alive and Well

By John W. Whitehead

Source: Battlefield America

“What happened here was the gradual habituation of the people, little by little, to being governed by surprise; to receiving decisions deliberated in secret; to believing that the situation was so complicated that the government had to act on information which the people could not understand, or so dangerous that, even if the people could understand it, it could not be released because of national security… This separation of government from people, this widening of the gap, took place so gradually and so insensibly, each step disguised (perhaps not even intentionally) as a temporary emergency measure or associated with true patriotic allegiance or with real social purposes. And all the crises and reforms (real reforms, too) so occupied the people that they did not see the slow motion underneath, of the whole process of government growing remoter and remoter.”—Historian Milton Mayer, They Thought They Were Free: The Germans, 1933-45

Brace yourself.

There is something being concocted in the dens of power, far beyond the public eye, and it doesn’t bode well for the future of this country.

Anytime you have an entire nation so mesmerized by the antics of the political ruling class that they are oblivious to all else, you’d better beware. Anytime you have a government that operates in the shadows, speaks in a language of force, and rules by fiat, you’d better beware. And anytime you have a government so far removed from its people as to ensure that they are never seen, heard or heeded by those elected to represent them, you’d better beware.

The world has been down this road before.

As historian Milton Mayer recounts in his seminal book on Hitler’s rise to power, They Thought They Were Free, “Most of us did not want to think about fundamental things and never had. There was no need to. Nazism gave us some dreadful, fundamental things to think about—we were decent people‑—and kept us so busy with continuous changes and ‘crises’ and so fascinated, yes, fascinated, by the machinations of the ‘national enemies’, without and within, that we had no time to think about these dreadful things that were growing, little by little, all around us.”

We are at our most vulnerable right now.

The gravest threat facing us as a nation is not extremism—delivered by way of sovereign citizens or radicalized Muslims—but despotism, exercised by a ruling class whose only allegiance is to power and money.

Nero fiddled while Rome burned.

America is burning, and all most Americans can do is switch the channel, tune out what they don’t want to hear, and tune into their own personal echo chambers.

We’re in a national state of denial.

Yet no amount of escapism can shield us from the harsh reality that the danger in our midst is posed by an entrenched government bureaucracy that has no regard for the Constitution, Congress, the courts or the citizenry.

If the team colors have changed from blue to red, that’s just cosmetic.

The playbook remains the same. The leopard has not changed its spots.

Scrape off the surface layers and you will find that the American police state is alive and well and continuing to wreak havoc on the rights of the American people.

“We the people” are no longer living the American Dream.

We’re living the American Lie.

Indeed, Americans have been lied to so sincerely, so incessantly, and for so long by politicians of all stripes—who lie compulsively and without any seeming remorse—that they’ve almost come to prefer the lies trotted out by those in government over less-palatable truths.

The American people have become compulsive believers.

As Nick Cohen writes for The Guardian, “Compulsive liars shouldn’t frighten you. They can harm no one, if no one listens to them. Compulsive believers, on the other hand: they should terrify you. Believers are the liars’ enablers. Their votes give the demagogue his power. Their trust turns the charlatan into the president. Their credulity ensures that the propaganda of half-calculating and half-mad fanatics has the power to change the world.”

While telling the truth “in a time of universal deceit is,” as George Orwell concluded, “a revolutionary act,” believing the truth—and being able to distinguish the truth from a lie—is also a revolutionary act.

Here’s a truth few Americans want to acknowledge: nothing has changed (at least, not for the better) since Barack Obama passed the reins of the police state to Donald Trump.

The police state is still winning. We the people are still losing.

In fact, the American police state has continued to advance at the same costly, intrusive, privacy-sapping, Constitution-defying, relentless pace under President Trump as it did under President Obama.

Police haven’t stopped disregarding the rights of citizens. Having been given the green light to probe, poke, pinch, taser, search, seize, strip, shoot and generally manhandle anyone they see fit in almost any circumstance, all with the general blessing of the courts, America’s law enforcement officials are no longer mere servants of the people entrusted with keeping the peace. Indeed, they continue to keep the masses corralled, under control, and treated like suspects and enemies rather than citizens.

SWAT teams haven’t stopped crashing through doors and terrorizing families. Nationwide, SWAT teams continue to be employed to address an astonishingly trivial array of criminal activities or mere community nuisances including angry dogs, domestic disputes, improper paperwork filed by an orchid farmer, and misdemeanor marijuana possession. With more than 80,000 SWAT team raids carried out every year on unsuspecting Americans for relatively routine police matters and federal agencies laying claim to their own law enforcement divisions, the incidence of botched raids and related casualties continue to rise.

The Pentagon and the Department of Homeland Security haven’t stopped militarizing and federalizing local police. Police forces continue to be transformed into heavily armed extensions of the military, complete with jackboots, helmets, shields, batons, pepper-spray, stun guns, assault rifles, body armor, miniature tanks and weaponized drones. In training police to look and act like the military and use the weapons and tactics of war against American citizens, the government continues to turn the United States into a battlefield.

Schools haven’t stopped treating young people like hard-core prisoners. School districts continue to team up with law enforcement to create a “schoolhouse to jailhouse track” by imposing a “double dose” of punishment for childish infractions: suspension or expulsion from school, accompanied by an arrest by the police and a trip to juvenile court. In this way, the paradigm of abject compliance to the state continues to be taught by example in the schools, through school lockdowns where police and drug-sniffing dogs enter the classroom, and zero tolerance policies that punish all offenses equally and result in young people being expelled for childish behavior.

For-profit private prisons haven’t stopped locking up Americans and immigrants alike at taxpayer expense. States continue to outsource prison management to private corporations out to make a profit at taxpayer expense. And how do you make a profit in the prison industry? Have the legislatures pass laws that impose harsh penalties for the slightest noncompliance in order keep the prison cells full and corporate investors happy.

Censorship hasn’t stopped. First Amendment activities continue to be pummeled, punched, kicked, choked, chained and generally gagged all across the country. The reasons for such censorship vary widely from political correctness, safety concerns and bullying to national security and hate crimes but the end result remained the same: the complete eradication of what Benjamin Franklin referred to as the “principal pillar of a free government.”

The courts haven’t stopped marching in lockstep with the police state. The courts continue to be dominated by technicians and statists who are deferential to authority, whether government or business. Indeed, the Supreme Court’s decisions in recent years have most often been characterized by an abject deference to government authority, military and corporate interests. They have run the gamut from suppressing free speech activities and justifying suspicionless strip searches to warrantless home invasions and conferring constitutional rights on corporations, while denying them to citizens.

Government bureaucrats haven’t stopped turning American citizens into criminals. The average American now unknowingly commits three felonies a day, thanks to an overabundance of vague laws that render otherwise innocent activity illegal, while reinforcing the power of the police state and its corporate allies.

The surveillance state hasn’t stopped spying on Americans’ communications, transactions or movements. On any given day, whether you’re walking through a store, driving your car, checking email, or talking to friends and family on the phone, you can be sure that some government agency, whether it’s your local police, a fusion center, the National Security Agency or one of the government’s many corporate partners, is still monitoring and tracking you.

The TSA hasn’t stopped groping or ogling travelers. Under the pretext of protecting the nation’s infrastructure (roads, mass transit systems, water and power supplies, telecommunications systems and so on) against criminal or terrorist attacks, TSA task forces (comprised of federal air marshals, surface transportation security inspectors, transportation security officers, behavior detection officers and explosive detection canine teams) continue to do random security sweeps of nexuses of transportation, including ports, railway and bus stations, airports, ferries and subways, as well as political conventions, baseball games and music concerts. Sweep tactics include the use of x-ray technology, pat-downs and drug-sniffing dogs, among other things.

Congress hasn’t stopped enacting draconian laws such as the USA Patriot Act and the NDAA. These laws—which completely circumvent the rule of law and the constitutional rights of American citizens, continue to re-orient our legal landscape in such a way as to ensure that martial law, rather than the rule of law, our U.S. Constitution, becomes the map by which we navigate life in the United States.

The Department of Homeland Security hasn’t stopped being a “wasteful, growing, fear-mongering beast.” Is the DHS capable of plotting and planning to turn the national guard into a federalized, immigration police force? No doubt about it. Remember, this is the agency that is notorious for militarizing the police and SWAT teams; spying on activists, dissidents and veterans; stockpiling ammunition; distributing license plate readers; contracting to build detention camps; tracking cell-phones with Stingray devices; carrying out military drills and lockdowns in American cities; using the TSA as an advance guard; conducting virtual strip searches with full-body scanners; carrying out soft target checkpoints; directing government workers to spy on Americans; conducting widespread spying networks using fusion centers; carrying out Constitution-free border control searches; funding city-wide surveillance cameras; and utilizing drones and other spybots.

The military industrial complex hasn’t stopped profiting from endless wars abroad. America’s expanding military empire continues to bleed the country dry at a rate of more than $15 billion a month (or $20 million an hour). The Pentagon spends more on war than all 50 states combined spend on health, education, welfare, and safety. Yet what most Americans fail to recognize is that these ongoing wars have little to do with keeping the country safe and everything to do with enriching the military industrial complex at taxpayer expense.

The Deep State’s shadow government hasn’t stopped calling the shots behind the scenes. Comprised of unelected government bureaucrats, corporations, contractors, paper-pushers, and button-pushers who are actually calling the shots behind the scenes, this government within a government continues to be the real reason “we the people” have no real control over our so-called representatives. It’s every facet of a government that is no longer friendly to freedom and is working overtime to trample the Constitution underfoot and render the citizenry powerless in the face of the government’s power grabs, corruption and abusive tactics.

And the American people haven’t stopped acting like gullible sheep. In fact, many Americans have been so carried away by their blind rank-and-file partisan devotion to their respective political gods that they have lost sight of the one thing that has remained constant in recent years: our freedoms are steadily declining.

Here’s the problem as I see it: “we the people” have become so trusting, so gullible, so easily distracted, so out-of-touch and so sure that our government will always do the right thing by us that we have ignored the warning signs all around us.

In so doing, we have failed to recognize such warning signs as potential red flags to use as opportunities to ask questions, demand answers, and hold our government officials accountable to respecting our rights and abiding by the rule of law.

Unfortunately, once a free people allows the government to make inroads into their freedoms, or uses those same freedoms as bargaining chips for security, it quickly becomes a slippery slope to outright tyranny. And it doesn’t really matter whether it’s a Democrat or a Republican at the helm, because the bureaucratic mindset on both sides of the aisle now seems to embody the same philosophy of authoritarian government.

As I make clear in my book Battlefield America: The War on the American People, this is what happens when you ignore the warning signs.

This is what happens when you fail to take alarm at the first experiment on your liberties.

This is what happens when you fail to challenge injustice and government overreach until the prison doors clang shut behind you.

In the American police state that now surrounds us, there are no longer such things as innocence, due process, or justice—at least, not in the way we once knew them. We are all potentially guilty, all potential criminals, all suspects waiting to be accused of a crime.

So you can try to persuade yourself that you are free, that you still live in a country that values freedom, and that it is not too late to make America great again, but to anyone who has been paying attention to America’s decline over the past 50 years, it will be just another lie.

The German people chose to ignore the truth and believe the lie.

They were not oblivious to the horrors taking place around them. As historian Robert Gellately points out, “[A]nyone in Nazi Germany who wanted to find out about the Gestapo, the concentration camps, and the campaigns of discrimination and persecutions need only read the newspapers.”

The warning signs were definitely there, blinking incessantly like large neon signs.

“Still,” Gellately writes, “the vast majority voted in favor of Nazism, and in spite of what they could read in the press and hear by word of mouth about the secret police, the concentration camps, official anti-Semitism, and so on. . . . [T]here is no getting away from the fact that at that moment, ‘the vast majority of the German people backed him.’”

Half a century later, the wife of a prominent German historian, neither of whom were members of the Nazi party, opined: “[O]n the whole, everyone felt well. . . . And there were certainly eighty percent who lived productively and positively throughout the time. . . . We also had good years. We had wonderful years.”

In other words, as long as their creature comforts remained undiminished, as long as their bank accounts remained flush, as long as they weren’t being discriminated against, persecuted, starved, beaten, shot, stripped, jailed and turned into slave labor, life was good.

This is how tyranny rises and freedom falls.

As Primo Levi, a Holocaust survivor observed, “Monsters exist, but they are too few in number to be truly dangerous. More dangerous are the common men, the functionaries ready to believe and to act without asking questions.”

Freedom demands responsibility.

Freedom demands that people stop sleep-walking through life, stop cocooning themselves in political fantasies, and stop distracting themselves with escapist entertainment.

Freedom demands that we stop thinking as Democrats and Republicans and start thinking like human beings, or at the very least, Americans.

Freedom demands that we not remain silent in the face of evil or wrongdoing but actively stand against injustice.

Freedom demands that we treat others as we would have them treat us. That is the law of reciprocity, also referred to as the Golden Rule, and it is found in nearly every world religion, including Judaism and Christianity.

In other words, if you don’t want to be locked up in a prison cell or a detention camp—if you don’t want to be discriminated against because of the color of your race, religion, politics or anything else that sets you apart from the rest—if you don’t want your loved ones shot at, strip searched, tasered, beaten and treated like slaves—if you don’t want to have to be constantly on guard against government eyes watching what you do, where you go and what you say—if you don’t want to be tortured, waterboarded or forced to perform degrading acts—if you don’t want your children to grow up in a world without freedom—then don’t allow these evils to be inflicted on anyone else, no matter how tempting the reason or how fervently you believe in your cause.

As German theologian and anti-Nazi dissident Dietrich Bonhoeffer observed, “We are not to simply bandage the wounds of victims beneath the wheels of injustice, we are to drive a spoke into the wheel itself.”

Vault 7: CIA Hacking Tools Revealed

Source: WikiLeaks

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

 

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.