Americans Are Being Divided As The War On Domestic Terror Expands

Americans appear too divided and distracted to recognize that the architects of the Patriot Act and the failed War on Terror now have their sights set on the American homeland.

By Derrick Broze

Source: The Last American Vagabond

The first week of 2021 kicked off with chaos at the Capitol in Washington D.C. Was it a protest, a riot or an insurrection? Were there provocateurs, and if so, were they Antifa, the cops, and/or the Feds? As usual, everyone on the internet thinks they know the answer within ten minutes. Unfortunately, this genuinely leads to the spreading of unfounded theories – many based on nothing but speculation and emotion. But while the public is debating over theories and arguing amongst themselves, the newly emboldened Military Industrial Complex is eagerly anticipating the incoming Biden Administration as an opportunity to expand the War on Domestic Terror.

In the immediate aftermath of the “storming of the Capitol”, the media pundits, intelligence community, and politicians began foaming at the mouth in excitement over the chance to push through Domestic Terror legislation. Michigan representative Elissa Slotkin, also former Acting Assistant Secretary of Defense and CIA analyst, said, “the post 9/11 era is over. The single greatest national security threat right now is our internal division. The threat of domestic terrorism.” Slotkin went on to say that she urges the Biden administration to “understand that the greatest threat now is internal.”

TLAV writer Whitney Webb responded to Slotkin’s comment by reminding the audience that, “before Congress, Elissa worked for the CIA and the Pentagon and helped destabilize the Middle East during the Bush and Obama admins. What she says here is essentially an open announcement that the US has moved from the “War on [foreign] terror” to the “War on domestic terror”.”

The Federal Bureau of Investigations (FBI) also reportedly released a bulletin warning that “domestic extremists” are planning a nationwide protest to stop Joe Biden from being sworn in as President. According to ABC News“The FBI has also received information in recent days on a group calling for “storming” state, local and federal government courthouses and administrative buildings in the event President Donald Trump is removed from office prior to Inauguration Day. The group is also planning to “storm” government offices in every state the day President-elect Joe Biden will be inaugurated, regardless of whether the states certified electoral votes for Biden or Trump.”

Since the bulletin has not been publicly released the report should be viewed skeptically. However, it’s only one of many emerging reports and articles stoking the flames of civil war and internal chaos. The fact of the matter is that this is not a new attempt to demonize the American people. This current effort is simply a continuation of the effort to label Americans as terrorists that has been taking place since at least the mid-1990’s following the Oklahoma City bombing false flag. These efforts were expanded further after the attacks of 9/11. In fact, as most readers know by now, it was Joe Biden who wrote the anti-terror legislation in the 90’s which became the basis for the Patriot ACT after 9/11.

While the “War on Terror” launched by the George W. Bush administration was focused on imaginary enemies in Iraq, Afghanistan, Libya, Iran, Syria, and elsewhere, there has also been a steady push to focus on the American public. In the first years of the Obama administration we saw the rise of the “Tea Party” movement, the American Libertarian movement, and Liberal Progressives who opposed the war machine, the surveillance state, and the militarization of the police. Organizations like the Southern Poverty Law Center (SPLC) did their best to label activists “extremists” for constitutionally protected activism and organizing. In 2010, the SPLC even came up with a “Patriot Hit List” of so-called extremists.

The post-9/11 era saw the creation of Fusion Centers; centralized systems that pool and analyze intelligence from federal, state, local, and private sector entities. The National Network of Fusion Centers was created after the 9/11 attacks to provide for more streamlined communication between federal and local agencies. The Fusion Centers have been criticized as violations of civil liberties and a danger to separation of federal and local governments. They have been exposed for targeting of protesters of the Dakota Access Pipeline and most infamously, in 2009 it was revealed that the Missouri Information Analysis Center (MIAC) was targeting supporters of third party candidates, Ron Paul supporters, anti-abortion activists, and “conspiracy theorists” as potential domestic extremists.

The 2010’s also saw the passing of the 2012 National Defense Authorization Act which included provisions allowing for indefinitely detaining Americans who have been labeled potential terrorists. Under these provisions, Americans lose the ability to have access to a lawyer and the right to a speedy trial. The measures were approved every year during the Obama and Trump administrations.

The truth is that the United States has long been pushing for a focus on Domestic Terror and Extremism, and regardless of what really happened at the Capitol on January 6, the event is being used as a way to justify the push for strengthening domestic terror legislation.

Another organization that is helping propel the “rise of domestic terror” narrative is the Center for Strategic & International Studies (CSIS), an organization with deep ties to the intelligence community and Western Military Industrial Complex. In October, the CSIS released a study claiming that two-thirds of the terrorist plots and attacks in the United States in the first eight months of 2020 were carried out by white supremacists and like-minded extremists. Coincidentally, journalist John Vibes recently reported that, “the Center for Strategic and International Studies (CSIS) is listed as the “most recent employment” for three selections on Biden’s Department of Defense agency review team: Kathleen Hicks, who is a former defense official under President Barack Obama, as well as Melissa Dalton, and Andrew Hunter.”

The most likely candidate for new domestic terror legislation is the “The Domestic Terrorism Prevention Act”, originally passed by the House in 2020, would create “dedicated domestic terrorism offices within the Department of Homeland Security, the Department of Justice, and the Federal Bureau of Investigation to analyze and monitor domestic terrorist activity and require the Federal Government to take steps to prevent domestic terrorism.”

Illinois Senator Dick Durbin has already promised to reintroduce the bill in the coming days. “Senate Democrats, along with the Biden administration, will work together to investigate, expose, and hold accountable domestic terrorism threats in our country,” Durbin and Sen. Minority Leader Chuck Schumer said in a joint statement. The bill also has support from the Anti-Defamation League and the Leadership Conference on Civil and Human Rights.

Another domestic terror bill that has previously been considered is the “Confronting the Threat of Domestic Terror Act”. The bill was introduced by Rep. Adam Schiff, who claimed that “the legislation is narrowly crafted and includes protections to ensure it is not misused.” However, the American Civil Liberties Union warned“people of color and other marginalized communities have long been targeted under domestic terrorism authorities for unfair and discriminatory surveillance, investigations, and prosecutions. Law enforcement agencies’ use of these authorities undermines and has violated equal protection, due process, and First Amendment rights.”

This is a crucial time for the American experiment. Will the American people allow themselves to be divided to the point of calling for domestic terror legislation to be used on their neighbors, co-workers, friends and family? With the public inundated with fears of civil war, stolen elections, rampant disinformation, and general exhaustion with COVID-19 measures, it appears to be a very critical moment which may decide whether America is destined for a renewed desire for liberty, truth, and free speech, or an accelerated push towards tyranny.

Yes, Election Fraud is Real. And its a Longstanding Tradition on Both Sides of the Aisle

As allegations of election fraud continue to swirl almost two weeks since the 2020 election, the contours of a galvanized bipartisan ruling class in America are beginning to emerge in the wake of democracy’s demise

By Raul Diego

Source: Mint Press News

American democracy is in limbo after the long-anticipated, contested election has finally come to pass. More than a week removed from November 3, Democrats and Republicans peddle their own version of events as a corporate media blitzkrieg tries to manufacture consent for Joe Biden as president-elect in true Guaidó style. Trump plays the villain, ensconced in the Oval Office while his cabinet officials pitch weak legal challenges that fail to address substantive issues of electoral fraud and serve to simply prolong the stalemate and build up the tension for the grand finale.

Despite evidence of fatal vulnerabilities underlying the electronic voting infrastructure of the United States that leave the systems at the very heart of the democratic process open to election rigging on a massive scale, much of the American public is unaware of the extent of the problem and how easily election results can be manipulated without leaving a trace.

The bumbling incompetence of the Trump administration provides cover for the machinations of the U.S. establishment, which more nuanced independent coverage has revealed in great detail. Taking the deliberate preparations made for this particular eventuality into consideration, complete with table-top exercises and the creation of new federal agencies and programs since the start of the 2016 presidential race, it is clear that the 2020 Election was targeted as an opportunity to fundamentally transform the American political juggernaut, in tandem with the ongoing worldwide economic reset.

statement released last Thursday by the director of one of the newest agencies, in charge of overseeing cybersecurity infrastructure in the United States, claimed that there was “no evidence […] any voting system deleted or lost votes, changed votes, or was in any way compromised.” Chris Krebs, the head of the Cybersecurity & Infrastructure Security Agency (CISA), directly contradicted the Trump-appointed chairman of the Federal Election Commission (FEC), who last week told the conservative outlet Newsmax that voter fraud was definitely taking place.

Cyberbullies

Part of the Cybersecurity & Infrastructure Security Agency’s mission centers on assuring compliance with DHS dictates surrounding election security protocols. The standalone federal agency with oversight from the Department of Homeland Security was formed two years after an embarrassing incident involving DHS occurred during the 2016 general election, when Georgia’s then secretary of state,­ – now governor – Brian Kemp, announced that cyberattacks on its voting systems had been traced to the federal law enforcement agency.

In 2020 with CISA firmly in place, DHS’ cybersecurity division implemented a “24/7 war room” to ostensibly guard against election hacking. CISA’s Krebs, a former cybersecurity policy director at Microsoft, led the effort to “monitor a network of every state’s election system simultaneously until every vote is counted,” according to News Nation, which was allowed to bring a camera crew into the operation in Fort Meade, Maryland.

In the lead up to the 2020 election, warnings about Russian and Iranian cyberwarriors running roughshod over the electoral contest were everywhere in U.S. media. Dire warnings of an existential threat to democracy by foreign actors that never materialized were leveraged to implement new security measures in partnership with the private sector. Krebs floated the excuse for a conspicuously absent horde of Eurasian hackers, that America’s enemies chose to “sit out this election” in a recent New York Times article.

The fact is that neither Russia nor Iran have anywhere near the level of access to America’s election system as the handful of private companies who are part of an electronic voting machine cartel, which currently controls over 92% of the elections market in the United States.

You Don’t Really HAVA Choice

In a prolific time for draconian government overreach, one of the lesser-known pieces of legislation proposed by the Bush administration was the Help America Vote Act (HAVA), passed by a Republican-controlled House and a unanimous vote by a Democrat-led Senate in December 2001. The bill was signed into law 11 months later and “greatly accelerated the full computerization of U.S. elections,” according to Jonathan Simon, an election integrity advocate and author of “Code Red, Computerized Election Theft and The New American Century,” in an interview with MintPress.

Simon describes the legislation’s carrot-and-stick approach to goad states into adopting technologies like touchscreen voting systems known as DREs, which were later replaced with barcode systems or BMDs, which were “entirely lacking in cyber-security provisions to protect the increasingly concealed process it promoted.” Among the bill’s authors is none other than the current Senate leader and Republican kingmaker, Mitch McConnell, who has defended Trump’s right to challenge the election results without committing to a particular outcome.

“If, as was claimed,” Simon continues, “HAVA would make voting easier and thus increase turnout, as we can see clearly today, that was decidedly not a GOP goal, certainly not of a tactician like McConnell.” The partisan motivations Simon ascribes to HAVA are clear enough, and, as he points out, should have been clear to Democrats as well. But, the argument that the American liberal establishment had no inkling of the ramifications fails to account for the Democrats’ own forays into the closely held universe of electronic voting systems.

A week ago, FOX Anchor Maria Bartiromo casually let slip on air that House Speaker Nancy Pelosi’s chief of staff, Sidney Powell, had become a lobbyist for Dominion Voting Systems – one of a handful of companies that maintain a close-knit cartel of electronic voting systems, which together control 92% of the election marketplace. Nevertheless, Dominion’s market share is dwarfed by ES&S; the largest election voting machine company in the United States and whose “subcontractors that [do] the actual programming, maintenance, and distribution” are controlled by GOP political allies, according to Simon.

The wrangling these firms engage in to steal electoral markets from each other, and the inseparable political problems such dynamics can cause, was on full display in Louisiana just before the 2018 midterm elections when its Democrat governor, John Bel Edwards, canceled a $95 million dollar contract that had been awarded to Dominion after competitor ES&S filed a complaint about the contracting process. Edwards was accused by his Republican secretary of state of siding “with his political buddies over election security,” which contradicts the prevailing notions of a pure partisan split along this issue.

Fatal Vulnerabilities

Experts on both sides of the political divide concede that both voter fraud and election fraud occur with considerable frequency since the advent of electronic voting machines. In addition to Dominion and ES&S, only five other companies dominate this space: Tenex, SGO/Smartmatic, Hart InterCivic, Demtech, and Premier (formerly Diebold).

Virtually all have been accused of vote count manipulation or other irregularities associated with their systems. Hart, for instance, was accused of vote flipping (the practice of switching the votes from one candidate to their opponent) in Texas. Dominion also ran into issues in the Lone Star state when its systems failed certification over accessibility problems.

“Much of the equipment being used to record and count votes,” explains Jonathan Simon, “is either modem-equipped, which leaves it highly vulnerable to remote interference, or programmed with the use of other computers than are internet-connected, allowing the alteration of memory cards and code running in either precinct-level machines (like BMDs, DREs, or Optical Scanners) or central tabulators.”

Examples of these dangerous weaknesses were explored in a recent video published by a self-styled national security professional, L. Todd Wood, where conservative elections security expert, Russ Ramsland, breaks down his findings from a forensic analysis of a 1000+ page voter log taken out of Dallas County’s central tabulation center in the aftermath of the 2018 midterm elections.

Ramsland identified instances of votes being replaced in 96 precincts, an inordinate number of database “updates” and other serious irregularities that point to vote-count manipulation and amount to election fraud. His most explosive allegation centered around claims of real-time vote-swapping in the 2019 gubernatorial election in Kentucky, where Ramsland asserts that thousands of votes originally given for the Republican candidate were swapped live on a CNN broadcast and added to the tally of the Democratic candidate, Andy Beshear, who would end up winning the election.

Ramsland also alleged that the election data of that race was being stored in a server in Frankfurt, Germany before being cycled through the central tabulation database, which syncs automatically with the numbers shown to television viewers. This server has been pounced on by Trump supporters in recent days and repeated by Rudy Giuliani in his podcast on Friday when he also purported to have direct evidence of election fraud.

While it is practically impossible for the layman to unravel the complexities underlying the encryption and cloud technologies underlying the present-day election system in the United States, few can doubt that moving towards a digital voting system removes whatever last vestiges of control the regular American citizen had in a once participatory exercise of democracy.

Asked if democracy can even exist under such conditions, Simon refers to a prediction he made in “CODE RED,” in which he augurs “an inexorable progression to where we are now: public trust eroded, the losers making wild allegations, no one able to prove anything, [and] everyone kind of waking up to the realization that our concealed computerized vote-counting process does not yield evidence-based results.”

Spook Charade

Giuliani’s promises of whistleblowers coming forward to save the day for the MAGA crowd and call the election off aren’t likely to produce anything of consequence as this charade only serves to further pave the way for the ruling classes, who are consolidating their grip on power and wealth at mind-boggling speeds thanks to the peculiar advantages bestowed upon them by the pandemic protocols. Real evidence of election fakery is too widespread to confront as part of a national discussion, as that would threaten the position of the politicians who depend on a rigged system and the powerful interests that control them.

With the extremes of the American political spectrum lighting up in deep reds and blues, whatever emerges out of the ashes won’t resemble much that came before it, and regardless of the election results, America’s inexorable march towards techno-fascism is moving right along.

Actual voter and election fraud takes place in every national American election and is just as prevalent in state and municipal elections, as well. From vote splitting to voter suppression tactics to direct manipulation of election results, both political parties have usurped the electoral processes to lie and cheat their way into power more than once.

But with the advent of digital voting systems, even the scandals we always seem to hear about far too late will vanish from sight, as well. The most straightforward aspect of democracy – voting – is disappearing behind a curtain of ones and zeros that only technocratic lackeys will be able to pull back. Trump, who was plucked from the reality TV screen like Jeff Daniels in “The Purple Rose of Cairo” and inserted into the national contest for the highest office in the land, will do nothing to change that.

Publically available FBI documents show the sitting president has been an FBI informant since the early eighties and his rise to the highest office in the land was not the case of a brash, independent billionaire who decided to run for president to “Make America Great Again.” After all, Donald Trump’s long-standing ties with the very “deep state” many of his staunchest supporters are convinced he is dismantling, actually reveals a factional war among the ruling class behind the scenes.

With a president who is as deep state as it gets, if there’s something we can take away from the last four years and these last few days since the election, it’s that the American establishment’s over-the-top partisanship has been a ruse undertaken to hide the fact that they are united in waging a class war like never before.

Alleged Salas Family Assailant Previously Worked for US/Israeli Intelligence-Linked Firm

The alleged gunmen who killed the son of Esther Salas, the judge recently assigned to the Epstein-Deutsche Bank case, worked for a company of corporate spies and mercenaries with ties to intelligence and also to Deutsche Bank.

By Whitney Webb

Source: Unlimited Hangout

The news of the shooting of the husband and son of Esther Salas, the judge recently assigned to oversee the Jeffrey Epstein – Deutsche Bank case, caused shock and confusion while also bringing renewed scrutiny to the Epstein scandal just a week after Epstein’s main co-conspirator, Ghislaine Maxwell, was denied bail in a separate case.

The case Salas is set to oversee is a class action lawsuit brought by Deutsche Bank investors who allege that Deutsche Bank “failed to properly monitor customers that the Bank itself deemed to be high risk, including, among others, the convicted sex offender Jeffrey Epstein.” The case came after the New York state Department of Financial Services had settled with Deutsche Bank over the bank’s failure to cut ties with Epstein-linked accounts, resulting in Deutsche Bank paying a $150 million fine. Deutsche Bank, unlike other financial institutions, failed to close all of its accounts linked to Epstein until less than a month prior to his arrest last year, even though the bank had identified him as “high risk” years before.

Beyond the tragedy of Sunday’s shooting, which claimed the life of Salas’ only child, the quick discovery of the death of the main suspect, Roy Den Hollander, of a “self-inflicted” gunshot to the head before he could be arrested or questioned by authorities has led to speculation that there is more to the official narrative of the crime than meets the eye.

With law enforcement sources now claiming that Esther Salas was not the intended target of the attack and some media reports now suggesting that Den Hollander’s motive was related to his dislike of feminism, it appears there are efforts underway to distance Sunday’s tragic shooting from Salas’ recent assignment to the Epstein case, which occurred just four days before the tragic shooting.

The most likely reason for any such “damage control” effort lies in the fact that both U.S. law enforcement investigations and mainstream media reports have consistently downplayed the connections of Jeffrey Epstein’s sexual trafficking and financial crimes to intelligence agencies in the U.S. and Israel. Similarly, Roy Den Hollander previously worked for a New York firm has been described as a “private CIA” with ties to those countries’ intelligence agencies and, also, ties to Deutsche Bank.

A Private CIA

According to his website, Den Hollander once worked for Kroll Associates Moscow Office, where he “managed and upgraded Kroll’s delivery of intelligence and security in the former Soviet Union” from 1999 to 2000. A few years prior, Kroll had won a considerable bid from the Russian government to locate money allegedly “spirited out of the country by the directors of state enterprises when they realized that privatization was inevitable.” The Kroll executives in charge of the Russian portfolio prior to Den Hollander were E. Norbett Garrett, a former CIA station chief in Cairo and Kuwait, and Joseph Rosetti, former chief of security for IBM. During that period and prior to his hiring at Kroll, Den Hollender worked as a lawyer in Russia regarding “legal and business issues, including international financing and marketing” and married a Russian woman he met during his time there that he subsequently claimed was part of the “Russian mafia.”

Founded by Jules Kroll in 1972, Kroll Associates would later become known as the “CIA of Wall Street” and “Wall Street’s Private Eye” and was alleged to be an actual front for the CIA by French intelligence agencies, according to theWashington Post. Part of the reason for this nickname, which was once a boasting point for top Kroll executives, owes to the fact that the firm frequently hired former CIA and FBI officers, as well as former members of MI6 and Mossad. K2 Intelligence, the successor to Kroll Associates founded by Jules Kroll and his son Jeremy in 2009, has similar hiring practices, counting former FBI and NSA officials among its ranks alongside former high-ranking members of the Israel Defense Forces (IDF) and Shin Bet, Israel’s domestic intelligence agency. Kroll also boasted ties to the Bush family, with Jonathan Bush (George Bush Sr.’s brother) serving on its corporate advisory board, and Kroll was also employed by Bill Clinton’s first presidential campaign.

Though it is mainly involved in corporate security and investigations, Kroll has also frequently investigated targets of Washington foreign policy, including Saddam Hussein, and was also the company tapped to “reorganize” Enron in 2002. Kroll Associates also has long been a subject of scrutiny for those that question the official narrative on the attacks of September 11, 2001, given that the company was put in charge of security for the World Trade Center complex from 1993 bombing up through the 2001 attacks and has no shortage of ties to companies and individuals that profited from the attacks. Kroll itself experienced a “surge in business” following the events of 9/11, a day when its top executives all avoided going to work despite ostensibly providing security for the complex.

A similar “surge in business” for Kroll followed the 2003 U.S. invasion of Iraq after the company’s investigations into Saddam Hussein’s and the Bath Party’s finances had been used as partial justification for the military incursion. Kroll became a major provider of mercenaries along with companies like Blackwater and DynCorp to the U.S. invasion and subsequent occupation through its subsidiary Kroll Security International. Its clients included the United States Agency for International Development (USAID), which has long fronted for the CIA, and also provided mercenaries for the war in Afghanistan.

Kroll executives over the years have commented to the press on their reputation as a “private CIA” and have also noted the advantages of being a “private” as opposed to “public” intelligence agency. For instance, E. Norbett Garrett, the former CIA official turned Kroll executive, told The New Yorker in 2009 the following:

“Garrett explained the disparity between what Kroll could do and what the C.I.A. could in a place like Sudan. “They have to rely on public and covert sources,” he said. “But we can go straight to Salah Idris. He’s our client, after all. We can go straight to his friends. We can be manipulated, of course, shown incomplete information, and sometimes we have to walk away from a case if we don’t trust somebody. But we definitely have some advantages.”

Kroll Associates and the Epstein Network

Aside from Kroll Associates’ own role as a private intelligence firm, it is also worth pointing out that Jules Kroll had an odd meeting with Robert Maxwell, Ghislaine Maxwell’s father, shortly before his death, alleged by most Maxwell biographers and his family to have been a homicide. Roughly two weeks before his death, Kroll met with Maxwell at New York’s Helmsley Palace Hotel. According to a 1992 article in Vanity Fair, “Maxwell had ushered Kroll and two other men out onto the patio so that their conversation could not be overheard or bugged,” with Maxwell allegedly seeking to hire Kroll to uncover “people out to get him, to destroy his empire, to cripple him financially, and to destroy his life and business in any way they could.”

The article further notes that “the meeting broke up with Maxwell’s promising that he would send Kroll what he called “a memorandum of suspicions and unexplained events.” “Maxwell was working on this compendium,” said the  [anonymous] participant [in the meeting], “when he met his death.” Kroll Associates was never formally hired.”

Much more recently Kroll came under scrutiny after being hired by disgraced media mogul Harvey Weinstein alongside the “private Mossad for hire” firm Black Cube. Weinstein had been instructed to hire Black Cube by Ehud Barak, the former Israeli military intelligence head and Israeli Prime Minister with close ties to Jeffrey Epstein and a frequent visitor of Epstein’s residences. Weinstein hired Kroll to harass and cyberstalk women who had accused him of sexual assault. Weinstein was a one-time business partner of Jeffrey Epstein’s and the testimony of Epstein victim Maria Farmer strongly implies that Ghislaine Maxwell and Epstein “shared” women, and potentially underage girls, with the film producer. The Daily Beast later reported that Epstein had used his ties to Weinstein to impress and recruit potential victims and at least one of those victims landed a role in a film produced by a Weinstein-owned company due to Epstein’s ties to Weinstein.

In addition, Kroll’s long-time executive Vice President for Operations, James Bucknam, was previously chief adviser to former FBI director Louis Freeh and is now CEO of the Freeh Group. Freeh has since become notorious for having been hired by Epstein associate, lawyer Alan Dershowitz, to “investigate” the Epstein scandal, and was also involved in the cover-up of the Penn State child molestation and abuse scandal. Freeh was also director of the FBI when the Bureau declined to investigate accusations regarding Leslie Wexner, Ghislaine Maxwell and Jeffrey Epstein and their involvement in the sex trafficking of minors, first reported to the FBI in 1996 by Maria Farmer.

The Kroll – Deutsche Bank “Revolving Door”

After “retiring” from Kroll associates, Jules Kroll created a credit-rating agency, a field he had called just years earlier “a heck of a racket.” Named the Kroll Bond Rating Agency (KBRA), the firm was envisioned by Kroll as a “credit-rating agency on steroids,” but has failed to make a dent in the market shares of the so-called “Big Three” credit-rating agencies: Standard & Poor’s, Moody’s Investors Service, and Fitch Ratings.

Though it hasn’t managed to become a dominant force in credit ratings, KBRA has managed to be profitable and to have produced something of a “revolving door” between its senior management and Deutsche Bank executives. For instance, KBRA’s top executive in Europe, Mauricio Noé, had previously been a Managing Director of Deutsche Bank’s London branch. In another example, Vice President for Credit Structuring at Deutsche Bank in New York, Ian Ross, was previously employed by KBRA and Yee Cent Wong, managing director of KBRA for CMBS, was previously Vice President of the Credit Solutions Group at Deutsche Bank Securities. Another managing director of KBRA, Bill Baneky, had previously served as Deutsche Bank’s Vice President and National Relationship Manager. One of KBRA’s senior managing directors, Rosemary Kelley, is also a former Deutsche Bank Vice President, while another, Ken Kockenmeister, was Deutsche Bank’s Director for Large Loan Securitization and Underwriting.

While they may not be the “biggest” credit-rating agency, KBRA analysts and executives frequently speak to media outlets where they comment on the state of various businesses, Deutsche Bank among them. Given the amount of overlap between Deutsche Bank and KBRA, it is unsurprising that KBRA has lobbied in the press on Deutsche’s behalf. For instance, KBRA analyst Christopher Whalen told Business Insider in 2016 that “The problem with Deutsche Bank may be the end of Merkel’s career,” adding that “The question is does she want to be remembered for doing the right thing — which is to provide support for the bank and diffuse the situation — or does she want to be remembered for standing by when one of the largest banks in Europe failed?”

Jeffrey Epstein’s ties to Deutsche Bank go back decades, and potentially earlier. After working for Bear Stearns earlier in his career and then as a so-called “financial bounty hunter” with ties to intelligence-linked arms dealers and Wall Street, Epstein set up a Ponzi scheme with Steve Hoffenberg called Tower Financial, which collapsed in 1993 and subsequently landed Hoffenberg 20 years in prison. Epstein’s name, despite being a clear co-conspiractor, was suspiciously dropped from the case during the trial. Hoffenberg subsequently alleged that Epstein used his ill-gotten gains from Tower Financial alongside a series of suspect loans from Deutsche Bank to create his investment company.

Hoffenberg subsequently told The Observer the following:

“His lead bank is Deutsche Bank, Germany, that runs the lead on his financial trust company. They run the platform in the trading of the currencies for Epstein and with Epstein. He’s never disclosed to the investors that provide the money to Deutsche Bank his true legacy, that’s securities fraud.”

Following that point, Epstein’s financial activities, aside from his Deutsche Bank-enabled investment vehicle, were publicly conducted through Bear Stearns (until its 2008 collapse) and J.P. Morgan. When J.P. Morgan dropped Epstein as a client, he again turned to Deutsche Bank in 2013, becoming a client of the bank’s private wealth division in New York. Anti-money laundering compliance officers at the bank’s branches in New York and Florida subsequently flaggedEpstein’s accounts in 2015, in 2016 and again in 2019, creating suspicious activity reports regarding the movements of large amounts of funds tied to Epstein-linked accounts outside of the U.S.

However, the bank did not fully terminate their relationship with Epstein until June 2019, just a few weeks prior to his arrest last year. Epstein was believed to have dozens of accounts with the bank at one point and those accounts were shut down slowly over a period of several months beginning in late 2018.

Ties that Bind

The narrative emerging that Den Hollander was motivated to kill Esther Salas’ husband and sons due to his hatred of feminism is a rapid attempt to explain away a story that clearly warrants further investigation, albeit into avenues that mainstream media and powerful individuals in the public and private sectors prefer remain untouched.

As the heinous act targeting the Salas family has shown, individuals with a lot to lose are willing to go to the farthest extremes to keep the ties of Epstein to the financial sector and to intelligence out of sight and out of mind. Indeed, just last December, Epstein’s personal banker at Deutsche Bank, Thomas Bowers, the chief of Deutsche Bank’s Private Wealth Management division in New York from 2012 to 2015, was found dead in his home. His death was quickly ruled a suicide by hanging. Bowers had also signed off on “unorthodox” loans, not just for Epstein, but Donald Trump, who has his own ties to the Epstein scandal.

While some have been quick to point out that Trump (as well as his son-in-law Jared Kushner) could stand to lose from potential revelations in the Epstein-Deutsche Bank trial, there are other key power-brokers tied to both Epstein and Deutsche Bank who could also be feeling the heat. For instance, Lynn Forester de Rothschild, who became close to Epstein in the early 1990s and subsequently connected him to the Clinton White House and later to Alan Dershowitz, is intimately involved in the Deutsche Bank Microfinance Consortium.

Aside from Epstein’s use of the money, Deutsche Bank has been notorious for years as a cesspool of money launderingfor organized crime networks, paying $14.5 billion in fines in just seven years for official action taken against the bank by several governments. It is highly likely that the brutality of what happened outside the Salas family home on Sunday is more related to Deutsche Bank than Epstein, as numerous powerful individuals have ties to the embattled bank.

Even the recent move by Attorney General William Barr to remove SDNY District Attorney Geoffrey Berman from his post appears to be more related to Berman’s efforts to investigate Deutsche Bank than the Epstein scandal, as some have alleged. This is because Barr’s new pick for Berman’s old job counts Deutsche Bank among his former clients and notably defended the bank in a recent anti-money laundering probe, whereas Berman was investigating the bank (albeit for political reasons that took aim at the bank’s dealings with Trump).

While Epstein’s egregious and criminal actions targeting minors have now become public knowledge, in role in facilitating white collar crime, money laundering and financial frauds on behalf of corporations, governments and oligarchs remains sorely under-covered, despite his role in such activities preceding and continuing after his involvement in an intelligence-linked sexual blackmail operation.

It arguably remains one of the key components of the Epstein scandal, yet the most poorly understood and most under-investigated. If anything, the tragic events at the Salas family home on Sunday, and what appears to be a rapid yet shoddy cover-up of the shooter’s ties to Kroll Associates and actual motives, reveal that Epstein’s financial ties are more frightening to certain powerful individuals and institutions than his trove of sexual blackmail.

How Government and Media Are Prepping America for a Failed 2020 Election

FILE – In this May 6, 2019, file photo Microsoft CEO Satya Nadella delivers the keynote address at Build, the company’s annual conference for software developers in Seattle. Microsoft says it has detected more than 740 infiltration attempts by nation-state actors in the past year targeting U.S.-based political parties, campaigns and other democracy-focused organizations including think tanks and other non-profits. (AP Photo/Elaine Thompson, File)

Russia, China and Iran are already being blamed for using tech to undermine the 2020 election. Yet, the very technologies they are allegedly using were created by a web of companies with deep ties to Israeli intelligence.

By Whitney Webb

Source: Mint Press News

As World War II drew to a close in Europe, British philosopher Bertrand Russell wrote that “neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of a great fear.”

Though numerous examples in the post-World War II era have proven Russell’s point, perhaps one of the best examples was the U.S. public’s willingness to swallow lie after lie about Saddam Hussein’s Iraq due to the climate of fear that followed the September 11 attacks. Those lies, propagated by dubious intelligence, government officials and a compliant media, resulted in catastrophes – large and small, both abroad and at home.

Today, an analogous narrative is being crafted by many of the same players – both in media and government – yet it has avoided scrutiny, even from independent media.

Over the past several months and with a renewed zeal in just the last few weeks, anonymous intelligence officials, dubious “experts” and establishment media outlets have crafted a narrative about the coming “chaos” of the 2020 election, months before it takes place. Per that narrative, certain state actors will use specific technologies to target the “American mind” in order to undermine the coming presidential election. The narrative holds that those efforts will be so successful that the U.S. will never recover as a democracy.

Though these anonymous government sources and their stenographers have already named the countries who will be responsible and the technologies they will use, they also admit that no evidence yet exists to back up these claims, meaning they are — at best — pure speculation.

Headlines such as “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” “Basically Every US National Security Leader Is Warning About Foreign Interference In The 2020 Election,” and “U.S. intel agencies: Russia and China plotting to interfere in 2020 election” have become increasingly common, despite no available evidence, as have warnings that the American public is defenseless against the old scourge of “fake news” and the new scourge of “deep fakes.” Some media reports have gone so far to say that actual foreign meddling isn’t even necessary as merely the fear of foreign meddling could be enough to upend the American political system beyond repair.

Historically, the goal of such fear-inducing narratives has been the trading of civil liberties for increased security, or rather, the appearance of increased security. Yet, when the need for security is felt due to a fear that is based on government-driven speculation and not on evidence, the goal of that narrative is not about protecting the public from a real, tangible threat but instead about the consolidation of power by the very groups responsible for crafting it — in this case, the intelligence community and other key players in the national security state.

However, what is particularly odd about this narrative surrounding imminent “chaos” and meddling in the upcoming 2020 election is the fact that, not only have the instruments of said meddling been named and described in detail, but their use in the election was recently simulated by a company with deep ties to both U.S. and Israeli intelligence. That simulation, organized and run by the Israeli-American company Cybereason, ended with scores of Americans dead, the cancellation of the 2020 election, the imposition of martial law and a spike in fear among the American populace.

Many of the technologies used to create that chaotic and horrific scenario in the Cybereason simulation are the very same technologies that U.S. federal officials and corporate media outlets have promoted as the core of the very toolkit that they claim will be used to undermine the coming election, such as deep fakes and hacks of critical infrastructure, consumer devices and even vehicles.

While the narrative in place has already laid the blame at the feet of U.S. rival states China, Russia and Iran, these very technologies are instead dominated by companies that are tied to the very same intelligence agencies as Cybereason, specifically Israeli military intelligence.

With intelligence agencies in the U.S. and Israel not only crafting the narrative about 2020 foreign meddling, but also dominating these technologies and simulating their use to upend the coming election, it becomes crucial to consider the motivations behind this narrative and if these intelligence agencies have ulterior motives in promoting and simulating such outcomes that would effectively end American democracy and hand almost total power to the national security state.

 

Media, intelligence foreshadow tech-powered doom for 2020

Even though the 2020 U.S. election is still months away, a plethora of media reports over the past six months (and even before then) have been raising concern after concern about how the U.S. election is still so vulnerable to foreign meddling that such meddling is essentially an inevitability.

Part of the reason for the recent pick-up in fear mongering appears to have been the release of a joint statement issued by key members of the Trump administration last November. That statement, authored by Attorney General Bill Barr, Defense Secretary Mark Esper, acting DHS Secretary Kevin McAleenan, acting Director of National Intelligence Joseph Maguire, FBI Director Christopher Wray, NSA Director Gen. Paul Nakasone, and Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs, claimed that foreign interference in 2020 was imminent despite admitting that there is no evidence of interference having taken place:

Our adversaries want to undermine our democratic institutions, influence public sentiment and affect government policies. Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions. Adversaries may try to accomplish their goals through a variety of means, including social media campaigns, directing disinformation operations or conducting disruptive or destructive cyber-attacks on state and local infrastructure.

While at this time we have no evidence of a compromise or disruption to election infrastructure that would enable adversaries to prevent voting, change vote counts or disrupt the ability to tally votes, we continue to vigilantly monitor any threats to U.S. elections (emphasis added).”

Despite the key caveat of there being no evidence at the time the statement was issued, media reports used the statement to claim that foreign interference in 2020 was imminent, such as in these reports from BuzzFeed, ABC News, and Newsweek.

In addition to the reports that have cast the involvement of state actors — namely Russia, Iran and China — as assured despite no evidence, other reports have made the claim that this allegedly imminent interference will inevitably be successful, largely due to claims that the tactics used will rely heavily on technology that the U.S. can’t hope to successfully counter. CSO Online, an online news outlets that provides news, analysis and research on security and risk management, recently warned that “fixing America’s voting and election infrastructure problems is a long-term proposition, one that won’t be fixed in time for the election in November” while the New York Times warned of imminent chaos and that “stealthier” malevolent foreign actors had already created the foundation for “an ugly campaign season marred by hacking and disinformation.” Wired claimed last year that U.S. election security “is still hurting at every level.”

In another example, Rolling Stone published an article earlier this month with the headline “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” which claims that “the reality is that: “We’ve made progress since the last election — but we’re much less secure than we should be.” The article goes on to say that claim that the goal isn’t necessarily to hack voting machines or change results, but “to merely create the impression of an attack as a way to undermine our faith in the electoral process.”

It continues:

The target is the minds of the American people,” says Joshua Geltzer, a former counterterrorism director on the National Security Council. “In some ways, we’re less vulnerable than we were in 2016. In other ways, it’s more.” Nearly every expert agrees on this: The worst-case scenario, the one we need to prepare for, is a situation that causes Americans to question the bedrock of our democracy — free and fair elections.”

Well before this type of rhetoric made its way into the U.S. media, Israeli intelligence-linked tech firm Cybereason claiming in a release on its website that “messing with a voter’s mind” would have a bigger impact than changing vote totals, even before the 2016 election. That release, published by Cybereason prior to the last presidential election, was authored by the company’s CEO, Lior Div, who used to lead offensive hacking operations against nation-states for Israeli military intelligence.

Notably, of all of these media reports, there is a clear consensus that one of the main tactics that will soon be used to meddle in the coming U.S. election will be the use of so-called “deep fakes.” Deriving its name from a combination of “deep learning” and “fake,” deep fakes involve video and audio that has been manipulated using artificial intelligence (AI) to create media that appears to be authentic, but is not. Concern about its use in the upcoming election has spurred not only a wealth of media reports on the matter but has prompted both the U.S. military and Congress to take action to limit its potential misuse.

One thing that stands out about the media narrative regarding election meddling and deep fakes is that several news organizations have published articles that state that deep fakes will be used to undermine the 2020 election, as opposed to stating that they could be used or that they are a phenomenon worthy of attention (though some reports have taken this more measured approach).

The reason for this level of confidence may owe to statements made by prominent U.S. intelligence officials last year, including those made by Dan Coats, the former Director of National Intelligence (DNI), who claimed in the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community that deep fakes and other hi-tech forms of fake media would be used to disrupt the 2020 election. Coats specifically stated:

Adversaries and strategic competitors probably will attempt to use deep fakes or similar machine-learning technologies to create convincing—but false—image, audio, and video files to augment influence campaigns directed against the United States and our allies and partners.”

Since Coats made the warning, numerous media reports have promoted the concern with little scrutiny, representing just one of the numerous times in U.S. history where narratives first authored by U.S. intelligence are subsequently promoted heavily by U.S. media, even when the claim made by intelligence officials is speculative, as it is in this case. Indeed, the narratives being promoted with respect to the 2020 election involve many of the same intelligence agencies (American and Israeli) and media outlets who promoted claims that were later proven false about “weapons of mass destruction” in Iraq prior to the 2003 invasion, among other pertinent examples.

Notably, deep fakes figured prominently and was the tool most used by malevolent hackers in Cybereason’s 2020 election simulation, which saw both video and audio-only deep fakes used to spread misinformation on national and local TV channels in order to impersonate police officers and election officials and to create fake bomb threats by posing as the terror group Daesh (ISIS). Cybereason also happens to be a partner of the organization funding the most well-known creator and producer of deep fakes in the world, an organization that — much like Cybereason itself — is openly tied to Israeli intelligence.

Aside from deep fakes, other technologies weaponized in Cybereason’s election simulation have also been the subject of several media reports, such as the hacking of Internet of Things (IoT) devices and appliances and even the hacking of vehicles that have some form of internet connectivity.  In the Cybereason simulation, IoT hacks were used to cut power to polling stations and disseminate disinformation while vehicles were hacked to conduct terror attacks against civilians waiting in line to vote, killing several and injuring hundreds.

Most media reports have claimed that these technologies will be part of the coming “explosion” in cyber warfare in 2020 and do not specifically link them to imminent election meddling. Others, however, have made the link to the election explicit.

 

Naming the culprits in advance

In addition to the apparent consensus on how foreign meddling will occur during the 2020 election, there is also agreement regarding which countries will be responsible. Again, this is largely based on statements made by U.S. national security officials. For instance, the joint statement issued last November by the DOJ, DOD, DHS, DNI, FBI, NSA, and CISA regarding 2020 election security, states that “Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions” before adding “at this time we have no evidence.”

Similarly, the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community, written by then-Director of National Intelligence Dan Coats, names these same three countries in relation to imminent 2020 election interference and states that their interference in the 2020 election is “almost certain.” The assessment adds the following about each nation:

  • Russia: “Russia’s social media efforts will continue to focus on aggravating social and racial tensions, undermining trust in authorities, and criticizing perceived anti-Russia politicians.”
  • China: “China will continue to use legal, political, and economic levers—such as the lure of Chinese markets—to shape the information environment. It is also capable of using cyber attacks against systems in the United States to censor or suppress viewpoints it deems politically sensitive.”
  • Iran: “Iran, which has used social media campaigns to target audiences in both the United States and allied nations with messages aligned with Iranian interests, will continue to use online influence operations to try to advance its interests.”

Coats’ assessment was enough to spawn numerous stories on the imminent threat that these three nations pose to the 2020 election, with headlines such as “U.S. intel agencies: Russia and China plotting to interfere in 2020 election.”

The vast majority of warnings regarding future election interference have come from U.S. intelligence officials with a dubious record of trustworthiness and a history of using the media to spread propaganda and disinformation, most famously through Operation Mockingbird. Most — if not all — of the recent and numerous articles on imminent interference rely heavily on claims made by the two aforementioned government documents, documents crafted by U.S. intelligence agencies for public consumption, as well as claims made by anonymous U.S. officials.

A recent New York Times article, for example, titled “Chaos Is the Point’: Russian Hackers and Trolls Grow Stealthier in 2020,” is based almost entirely on “interviews with dozens of officials and experts,” though the only government official named in the article is Shelby Pierson, the intelligence community’s election threats executive. The most quoted experts named in the article are Ben Nimmo, formerly of the hawkish, NATO-funded Atlantic Council and now with Graphika, and Laura Rosenberger, director of the neoconservative-created Alliance for Securing Democracy. The article nonetheless cites “American officials” and “current and former officials” several times to make claims about imminent election interference that paint a bleak picture of the current election season.

A recent article from The Hill relies on the acting head of DHS, Chad Wolf, as its only source, citing Wolf’s claim that “we fully expect Russia to attempt to interfere in the 2020 elections to sow public discord and undermine our democratic institutions” amid other warnings that Wolf gave about Chinese and Iranian cyber threats to U.S. elections. Other articles, including one titled “Russia, China plan to adjust their tactics to hack, influence 2020 elections” cite only Shelby Pierson of the U.S. intelligence community as its source for that headline’s claim. Another titled “Russia isn’t the only threat to 2020 elections, says U.S. intel” cites only anonymous U.S. intelligence officials, as the headline suggests.

Though Russia and China have consistently been named as the most likely election meddlers, reports have also been drumming up the likelihood that Iran will emerge as 2020’s foreign meddler of choice, especially in the months prior to and weeks after the killing of Iranian General Qassem Soleimani by the Trump administration. A recent “informal poll” conducted by the Washington Post asked hawkish think tank fellows, employees at companies like Raytheon and current and former federal officials if Iran would likely retaliate against the U.S. via cyberattack. The Post ran the results of the poll under the headline “Get ready for serious cyberattacks from Iran, experts say.”

Despite the media’s numerous warnings of imminent and “serious” cyber-retaliation from Iran, the only cyberattack attributed to the country after Soleimani’s death was the vandalism of the Federal Depository Library Program website, a rather benign act that was nevertheless blasted across headlines such as “US government website hacked with pro-Iranian messages, image of bloodied Trump.” The U.S. government is quoted in that article as saying that “At this time, there is no confirmation that this was the action of Iranian state-sponsored actors.”

Also notably absent from media reports is the fact that WikiLeaks revealed in 2017 that the CIA had stockpiled a library of “stolen” cyberattack techniques produced in other nations, including Russia and Iran. Those revelations, part of the Vault 7 release, revealed that the CIA’s UMBRAGE group was capable of “misdirect[ing] attribution [for cyberattacks actually done by the CIA] by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.” In other words, the CIA was more than capable of conducting “false flag” cyber attacks and blaming them on foreign actors.

Notably, one of the viruses being blamed on Iran for cyberattacks targeting the U.S. ahead of the 2020 election — called Shamoon — was “stolen” by the CIA’s UMBRAGE and cited in the WikiLeaks release.

 

Conflict of interest-ridden Microsoft “defends democracy”

Last year saw the tech behemoth Microsoft join the effort to blame foreign state actors, specifically Iran, for cyberattacks against the U.S. This helped to bolster assertions that had largely originated with a handful of U.S. intelligence officials and hawkish, neoconservative-aligned think tanks as media reports on Microsoft’s related claims treated the company as an independent private sector observer.

Yet, as MintPress investigations have revealed, Microsoft has clear conflicts of interest with respect to election interference. Its “Defending Democracy” program has spawned tools like “NewsGuard” and “ElectionGuard” that it claims will help protect U.S. democracy, but — upon closer examination — instead have the opposite effect.

Last January, MintPress exposed NewsGuard’s neoconservative backers and how special interest groups were backing the program in an effort to censor independent journalism under the guise of the fight against “fake news.” Subsequent investigations revealed the risk that Microsoft’s ElectionGuard poses to U.S. voting machines, which it claims to make more secure and how the platform was developed by companies closely tied to the Pentagon’s infamous research branch DARPA and Israeli military intelligence Unit 8200.

ElecionGuard software has since been adopted by numerous voting machine manufacturers and is slated to be used in some Democratic Primary votes. Notably, the push for the adoption of ElectionGuard software has been spearheaded by the recently created Cybersecurity and Infrastructure Security Agency (CISA), which is the federal agency tasked with overseeing election security and is headed by Christopher Krebs, a former high level Microsoft executive.

In recent months, Microsoft has also been at the center of claims that Iran attempted to hack U.S. presidential campaigns ahead of 2020 as well as claims that Iran plans to target the U.S. power grid and other critical infrastructure with cyberattacks.

Last October, Microsoft penned a blog post discussing a “threat group” it named Phosphorus that they “believe originates from Iran and is linked to the Iranian government.” The post went on to claim that Phosphorus attempted to target a U.S. presidential campaign, which later media reports claimed was President Trump’s re-election campaign. Microsoft concluded that the attempt was “not technically sophisticated” and ultimately unsuccessful, but felt compelled to disclose it and link it to Iran’s government.

Though it provided no evidence for the hack or its reasons for “believing” that the attack originated from Iran, media reports treated Microsoft’s declaration as proof that Iran had begun actively meddling in the 2020 election. Headlines such as “Iranian Hackers Target Trump Campaign as 2020 Threats Mount,” “Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says”, “Microsoft: Iran government-linked hacker targeted 2020 presidential campaign” and “Microsoft Says Iranians Tried To Hack U.S. Presidential Campaign,” were blasted across the front pages of American media. None of the reports scrutinized Microsoft’s claims or noted the clear conflict of interest Microsoft had in making such claims due to its efforts to see its own ElectionGuard Software adopted nationwide.

Media reports also left out the fact that Microsoft is a major government contractor for the U.S. intelligence community and the Pentagon. Notably, the Trump campaign, which Microsoft said was the target of this attack, was later identified as the only major presidential campaign using Microsoft’s “AccountGuard” software, part of its dubious “Defending Democracy” program that also spawned NewsGuard and ElectionGuard. AccountGuard claims to protect campaign-linked emails and data from hackers.

Microsoft surfaced not long after, again claiming that Iran was maliciously targeting the United States’ civilian infrastructure. This subsequent claim was first published by Wired and later covered by other outlets. Those reports cite a single person, Microsoft security researcher Ned Moran, who claimed that an Iran-backed hacking group called APT33 was targeting the U.S. “physical control systems used in electric utilities, manufacturing, and oil refineries.”

“They’re trying to deliver messages to their adversaries and trying to compel and change their adversaries’ behavior,” Moran told Wired. Moran also stated that “Microsoft hasn’t seen direct evidence of APT33 carrying out a disruptive cyberattack rather than mere espionage or reconnaissance, it’s seen incidents where the group has at least laid the groundwork for those attacks (emphasis added).”

 

Cybereason helps craft the narrative

While U.S. intelligence officials and media outlets alike have been largely responsible for setting the narrative that imminent meddling will be conducted by Russia, China and Iran, key components of that narrative, particularly with respect to China and Iran, have been laid by Cybereason, a company that recently ran 2020 doomsday election simulations and that has close ties to the intelligence communities of both the U.S. and Israel.

Shortly after the killing of Iranian General Qassem Soleimani earlier this month, an operation conducted in concert with Israeli intelligence, Cybereason warned that Iran could imminently retaliate with a cyber threat and quoted its own employees who explained what and how Iran would likely target in retaliation. Cybereason’s CSO Sam Curry, who actively participated in the firm’s 2020 doomsday election simulations, stated:

 This means that Iran’s “forceful revenge” response is likely to be less about the flash and all about the bang. If you have connected systems that are responsible for kinetic world effects, like ICS systems and critical infrastructure around water, energy or vital services, it’s time to pay attention. Iran and the US are engaged in Cyber brinksmanship, which means that the gloves are off as Iran picks it’s targets (emphasis added).”

Cybereason also quoted visiting fellow for the National Security Institute and former advisor to the U.S. Secret Service (which participated in Cyberaeson’s election simulations), Anne Marie Zettlemoyer, who claimed that Iran could soon target Wall Street and critical U.S. infrastructure like the power grid:

 An attack against the financial systems can be devastating economically and weaken the confidence and viability of markets. However, we cannot ignore the physical consequences and manifestations that can come from a cyberattack, particularly against critical infrastructure like energy and industry control systems.”

Cybereason’s claims regarding Iran’s interest in “critical infrastructure” systems likely originated with Microsoft, the claims were then parroted by the media in several reports, many of which quoted Cybereason’s Sam Curry. Curry is also a contributor to major news outlets like Forbes where he writes about Iran’s cyber warfare capabilities. 

Notably, in Cybereason’s recent allegations against Iran, it states that “it’s clear that Iran has been preparing for future geopolitical conflict by gaining access to critical infrastructure and other important operations in the United States.” It backs these claims by citing an article authored by Curry for Forbes. Following Soleimani’s death, numerous media reports, including in the UK’s The Independent and ABC News, have cited Curry as an “expert” source in claiming that Iran would retaliate with cyberattacks.

Microsoft’s claims about foreign hackers and meddling — the evidence for which have never been made public but has been parroted as fact nonetheless — are frequently supported by Cybereason.

Last August, Microsoft claimed to have foiled Russian attempts at hacking two Republican-affiliated think tanks and, despite providing no evidence, Cybereason’s then-senior director of intelligence services Ross Rustici was quoted as an expert in several media reports as saying that such behavior was to be expected from Russia. In one such report, Rustici stated:

We’re very good at fighting the last war, but the Russians are very good at evolving their game. I suspect if they’re going to do a psychological operation around the elections, the way they do it will be different than what they did in 2016. How effective the defenses we’ve built for what they did in 2016 will be for those attacks is yet to be seen.”

None of the media reports quoting Rustici mentioned Cybereason’s ties to Israeli intelligence, referring to tech firms only a “Boston-based cybersecurity company” and similar variants. Cybereason’s Intelligence Group is stuffed with former and active members of U.S. and Israeli intelligence services and has released several reports about nation-state hacking with a focus on Russia and China.

Cybereason has also been at the forefront of claims that China has been engaged in aggressive cyberattacks against multinational companies that have also seen widespread coverage in U.S. media, despite the untransparent nature of the evidence for Cybereason’s claims.

In a story that received major coverage from outlets such as Fox News, Reuters, CNBC and others, Cybereason unveiled what it called “Operation Soft Cell,” an operation that stole mass troves of data from several global telecommunications companies. In each story, Cybereason is the sole source of the claim and declined to provide the name or location of any of the affected companies. The firm also claimed to have determined that the attack was likely perpetrated by someone “backed by a nation state, and is affiliated with China.” It further claimed to have debriefed and coordinated responses with U.S. intelligence.

In an article for Reuters, Cybereason stated that “this time as opposed to in the past we are sure enough to say that the attack originated in China” while Cybereason separately told CyberScoop that it had “found hacking tools such as a modified web shell and a remote access trojan that are commonly associated with, but not unique to, Chinese hackers.” Despite the incongruity, media reports laid the blame squarely on China, as seen in headlines such as “Chinese spies have been sucking up call records at multinational telecoms, researchers say.”

Prior to uncovering Operation Soft Cell, Cybereason had warned on its blogs in the months and years prior that China would imminently target U.S. companies. The revelation of Operation Soft Cell — which originated exclusively with Cybereason — has been used to build the case that China is openly engaged in cyberwarfare against its rival states, like the United States, and targeting “democracy itself.”

 

Best Known Deep Fake Creator is Funded by Israeli Intelligence

While the media, and even Cybereason itself, have helped lay the foundation to blame specific state actors for 2020 election meddling well ahead of the fact, it is worth revisiting Cybereason’s “Operation Blackout” election simulation and the tactics used by the “bad actors” in that scenario.

That simulation, discussed in detail in the first installment of this series, saw the weaponization of specific technologies, namely deep fakes, hacks of Internet of Things (IoT) devices and hacks of vehicles, in order to target the 2020 U.S. election, resulting in the cancellation of the election and the imposition of martial law.

Given the current narrative regarding what state actors are likely to meddle in the 2020 election — namely Russia, China and Iran — and the tactics they will allegedly use, it is important to explore the sources of the technologies weaponized per that narrative as well as in “Operation Blackout.”

Indeed, if there is any clear overlap between the creators of those technologies and the state actors being blamed in advance for their imminent use, it would certainly lend credibility to the claims promoted by U.S. intelligence, the media and companies like Microsoft and Cybereason.

Yet, upon closer examination, it becomes clear that the companies and state actors most involved in developing these technologies are the very ones claiming that Russia, China and Iran will use them to undermine the 2020 election.

Take for instance the use of deep fakes. Not only have numerous media reports focused on how deep fakes will be used to meddle in the 2020 elections, but Cybereason’s doomsday election simulation saw “bad actors” rely heavily on their use to spread disinformation and even make fake bomb threats. While much has been said of the coming election and deep fakes, remarkably few reports have bothered to look at the company best known for creating viral deep fakes.

Canny AI has garnered considerable media attention over the past few years for its persuasive deep fake videos that have frequently gone viral. In the last year alone, the tech firm’s viral deep fakes have included a controversial video of Mark Zuckerberg where the Facebook co-founder appears to be saying “Imagine this for a second: One man, with total control of billions of people’s stolen data, all their secrets, their lives, their futures,” as well as a video showing Richard Nixon giving a speech he never actually gave. More recently, Canny AI was behind the viral videos immediately prior to the 2019 U.K. general election that appeared to show Jeremy Corbyn and his rival Boris Johnson endorsing each other and another video that showed world leaders singing John Lennon’s “Imagine”:

Oddly, many of the media reports that discuss these viral videos fail to mention the role of Canny AI in creating these viral deep fakes and instead only mention the organization or artists with whom Canny AI partnered to create them. For instance, the Corbyn-Johnson videos were reported to have been produced by the group Future Advocacy and artist Bill Posters, but it was actually Canny AI that created those videos for that group. Similarly, the Nixon Speech deep fake was reported by several outlets as having been solely created by MIT’s Center for Advanced Virtuality. However, the Boston Globe noted that “the [MIT] team worked with Canny AI, an Israeli company that does Video Dialogue Replacement, and Respeecher, a Ukrainian startup specializing in speech-to-speech synthetic voice production” to create the video.

The Zuckerberg deep fake that Canny AI created led to lots of positive press for the company, with several media reports dubbing them as the company using “deep fakes for good” and that uses the controversial technology “responsibly.” The Zuckerberg deep fake has been cited as one of the main drivers behind Facebook’s new “deep fake” policy, which only bans some deep fake videos and has been criticized by U.S. lawmakers as insufficient. Notably, neither Facebook nor Facebook-owned Instagram ever took down Canny AI’s deep fake of Zuckerburg.

Given the concern over deep fakes in relation to the coming election and Canny AI standing out as the main producer of deep fakes that have gone viral over the past year, it is important to point out that Canny AI has ties to a state actor with a history of election meddling: the state of Israel.

Indeed, Canny AI is 100 percent funded by an Israeli start-up accelerator called Xcelerator, a joint venture between Tel Aviv University and Israeli intelligence agency Shin Bet (sometimes called Shabak). According to Start Up Nation Central, the Paul Singer-created organization that promotes Israeli technology start ups, Xcelerator-funded “start-ups participating in the program benefit from close mentoring from content and technology experts from the Shabak, experts from Tel Aviv University, and industry leaders. The connection to the Shabak also provides the entrepreneurs with ways to test the capabilities of their technologies and cooperation opportunities (emphasis added).”

In addition, Xcelerator is partnered not only with Israeli intelligence directly, but also with Cybereason, the very company that explored the use of deep fakes in the 2020 U.S. presidential election that saw the election cancelled and martial law declared as well as a company that itself has deep ties to Israeli intelligence. Other notable partners of Xcelerator include NEC Corp, which has intimate ties to top Cybereason investor Softbank; Check Point Technologies, which has ties to Israeli military intelligence Unit 8200; and the Israeli start-up accelerator Team8. In previous reports published by MintPress, Team8 was discussed in detail, particularly their recent hire of former director of the NSA and former head of U.S. Cyber Command Mike Rogers, and their close ties to Paul Singer’s Start Up Nation Central, which itself has deep ties to U.S. neoconservatives.

It is also worth noting that Xcelerator also backs an “anti-fake news” start-up called Cyabra, which has direct ties to Israel’s Mossad and offers its AI-driven “disinformation protection” to government agencies as well as politicians, particularly during election seasons. Two of Cyabra’s co-founders previously co-founded Psy-Group, which attempted to interfere in the 2016 U.S. election by weaponizing “fake news” and social media and later closed down its operations after U.S. government scrutiny into its activities began as part of the Mueller investigation.

Psy-Group also engaged in doxxing campaigns targeting Palesintian rights activists in the U.S. which were planned in conjunction with Ram Ben-Barak, the former deputy director of the Mossad who now advises Cyabra. Given that much of the concern ahead of the next election is related not only to deep fakes but also “fake news,” Cyabra’s rise and its clear ties to Mossad and the now defunct Psy-Group are important to note.

Furthermore, in examining the other technologies weaponized during Cybereason’s 2020 election simulation and cited in the aforementioned media narrative regarding 2020 meddling, a pattern similar to that of Canny AI emerges.

Indeed, the other technologies linked to these “bad actors” and foreign meddlers — namely hacking IoT devices and hacking vehicles — are also pioneered by companies with deep ties to Israeli military intelligence, specifically Unit 8200, and Israeli tech companies that have aggressively spied on U.S. government institutions in collusion with Israeli intelligence in the past, namely Comverse (now Verint) and Amdocs.

 

Hacking the Internet of Things

In Cybereason’s doomsday election simulation, another of the tactics used was the hacking of devices and appliances connected to the internet, often referred to as the Internet of Things (IoT) and which includes everything from smartphones to power grid infrastructure to city traffic lights.

While most reports on IoT hacks to date have focused on “lone wolf” or non-state-aligned actors, one company has stood out for its efforts to create a tool that would allow governments and intelligence agencies to hack these devices with ease. That company, called Toka, announced in 2018 that it planned to offer “a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain,” with “a special focus on [hacking] the so-called Internet of Things (IoT), covering tech like Amazon Echo, Nest connected home products, as well as connected fridges, thermostats and alarms.”

The Israel-based company, which raised $12.5 million within months of launching, has since been busy marketing its services to governments around the world, most recently France where it described its product portfolio as “empower[ing] governments, Intelligence, and law enforcement agencies to enhance Homeland Security with groundbreaking cyber-intelligence and operational capabilities” during an exposition in Paris last November.

Even though Toka openly markets the ability to hack private consumer devices to governments and law enforcement agencies around the world, the clear threat to privacy has gone ignored by media outlets as the company has garnered nearly no media attention since it launched nearly two years ago.

Yet, Toka is not only notable for what it offers but also for its founders and investors. Indeed, the co-founders of Toka have been described as an “all-star” team, largely because of the role of former Israeli Prime Minister and former head of Israeli military intelligence, Ehud Barak. Barak, in addition to co-founding the company, serves as its director and is also the chairman of the board of the controversial Israeli company Carbyne911, which markets software to emergency call centers in the United States. Interestingly, Cybereason’s 2020 doomsday election simulation also dealt with the hacking and weaponization of 911 call centers. Also of note is the fact that another of Carbyne911’s leadership team, former Unit 8200 commander Pinchas Buchris, is an adviser to Cybereason.

Toka’s top brass is a who’s who of former Israeli military and intelligence officials

In addition to Barak, Toka was co-founded by retired Brigadier General Yaron Rosen, former Chief of the IDF’s cyber staff, where he was “the lead architect of all [IDF] cyber activities” including those executed by Israeli military intelligence Unit 8200. Rosen, who now serves as Toka’s CEO, has stated that Toka’s technology will only be sold to countries allied with the U.S. and Israel, telling Forbes that “Russia, China and ‘other enemy countries’ would never be customers.”

Toka’s leadership and software architects are similarly tied into Israel’s national security state. Several — including the “architect” of its hacking software — previously worked for Israel’s Prime Minister’s Office and developed “offensive technologies” for Israel’s head of state and other top Toka employees and executives share numerous connections to Unit 8200, other divisions of Israeli military intelligence and Unit 8200-connected tech companies like Check Point Technologies.

Though Toka’s leadership team makes its ties to Israeli military intelligence abundantly clear, important connections also appear in examining Toka’s investors. One of the major investors in Toka is Dell technologies, one of the world’s largest technology companies that was founded by Michael Dell, a well-known pro-Israel partisan who has donated millions of dollars to the Friends of the IDF and one of the top supporters of the so-called “anti-BDS” bills that prevent publicly employed individuals or public institutions from supporting non-violent boycotts of Israel, even on humanitarian grounds. It goes without saying that a major technology company investing in a company that markets the hacking of that very technology (computers, IoT, smartphones, etc.) should be a red flag.

With a major foot in the door through its connections to Dell, whose products are used by the private and public sectors around the world, other investors in Toka again reveal its ties to Israel’s military intelligence and the same controversial Israeli tech companies that have aggressively spied on the U.S. government in the past — Amdocs and Comverse. For instance, Entrèe Capital, a venture capital fund that is one of Toka’s main investors, is managed by Aviad Eyal and Ran Achituv. The latter, who manages Entrée’s investment in Toka and sits on Toka’s board of directors, is the founder of the IDF’s satellite-based signals intelligence unit and also a former senior Vice President at both Amdocs and Comverse Infosys (Verint).

Another notable investor in Toka is the venture capital firm Andreesen Horowitz, which is advised by former Secretary of the Treasury Larry Summers, a close friend of the infamous pedophile Jeffery Epstein, whose own ties to Israeli military intelligence have been discussed in several MintPress reports. Epstein was also a close friend of Ehud Barak, co-founder and director of Toka, and invested at least $1 million in another company with close ties to Barak, Carbyne911. The remaining investors in Toka are Launch Capital, which is deeply tied to the Pritzker family — one of the wealthiest families in the U.S. with close ties to the Clintons and Obamas as well as the U.S.’ pro-Israel lobby, and Ray Rothrock, a venture capitalist who spent nearly three decades at VenRock, the Rockefeller family venture capital fund.

 

Unit 8200 – From Hacking Cars to Protecting Them?

Arguably the most disturbing aspect of Cybereason’s “Operation Blackout” election simulation was the hacking of vehicles that were then rammed into civilians waiting in line to vote at polling stations. In the simulation, this led to scores of dead Americans and hundreds of injuries.

As was the case with other technologies used to undermine the 2020 election in the simulation, this technology — the hacking of vehicles — is the bread and butter of an Israeli cybersecurity firm called Upstream Security that specializes in automobiles and boasts deep ties to the country’s military intelligence service.

Though vehicle hacking seemed out of left field when the 2020 election simulation took place last November, media reports about the imminent dangers of “car hacking” began to emerge just a month after the exercise took place, most of which cited a December 2019 report created by Upstream. Some of those reports have warned that car hacking could be used to undermine the coming U.S. election.

One report titled “Car Hacking Hits the Streets,” cites only Upstream’s report to claim that “In 2020, the connected-car market will reach a tipping point, with the majority of vehicles already connected to the Internet when sold in the United States, representing a large base of potential targets for attacks.” Another report, titled “New study shows just how bad vehicle hacking has gotten,” uses Upstream’s report (i.e. study) to claim that hacks of regular vehicles have exploded since 2016 and that most of the cars on U.S. roads today are vulnerable to hackers and that over 80 percent of those hacks occur remotely.

Neither report noted Upstream’s ties to Israeli military intelligence. Equally notable is the fact that both reports that covered the Upstream-written study say that only manufacturers can address the problem by partnering with a company like Upstream.

Lucky for Upstream, they have already partnered with a slew of auto manufacturers, including Hyundai, Volvo, Renault and even U.S. auto insurance giants like Nationwide, who now number among Upstream’s most important investors. The company’s original investors are Charles River Ventures, one of Cybereason’s first investors, and Israeli venture capital firm Glilot Capital.

Glilot Capital’s interest in Upstream is telling given the firm’s deep ties to Israel’s Unit 8200. Glilot was founded by two former Israeli military intelligence officers and has “a heavy focus on the cyber sector and the entrepreneurs who emerge from the elite Unit 8200,” according to the Jerusalem Post. Even the name of the firm is an homage to Unit 8200, as the unit’s main base is located in Glilot, near Herzliya.

“It’s as if Americans called a VC Fort Meade Capital [the US Army base in Maryland where the National Security Agency and the United States Cyber Command are headquartered], some VC names are meant to be symbolic, as in our case. Glilot is the home of several of the best intelligence and technology units in the IDF, it’s where we came from and it is where we find our best entrepreneurs,” Glilot Capital co-founder Arik Kleinstein told the Jerusalem Post in 2016.

Upstream is certainly the type of company that Glilot Capital is used to investing in. It was founded by two Israelis who both served in the IDF, with one of them serving in an elite intelligence unit. Upstream’s co-founders, Yoav Levy and Yonathan Appel, met while working at Check Point Technologies, the Unit 8200 alumni-founded company with deep ties to Israel’s military intelligence and military-industrial complex as well as the IoT hacking company Toka. Notably, Upstream recently partnered with the Japanese company Fujitsu, a longtime partner with Softbank — Cybereason’s main investor.

Softbank has also invested heavily in another Unit 8200-founded vehicle security start-up called Argus Cyber Security, a firm known for its numerous demonstrations showing how easy it is to hack vehicles. Argus is also backed by Nadav Zafrir, the former Unit 8200 commander who now runs Team8. Argus’ CEO Ofer Ben-Noon, a former captain in Unit 8200, told Forbes in 2014 that “Everything will be hacked in every single [car] brand. It will take time, it might be weeks, months, or a couple of years, but eventually it will happen.”

Since then, Unit 8200 alumni from Argus, Upstream and other Israeli automobile cybersecurity firms have shown media outlets around the world how much easier hacking vehicles has become in the years since Ben-Noon first made the claim. One such report from VICE includes a vehicle hacking demonstration, courtesy of a Unit 8200 alumni, and notes that “most cars today are susceptible to hacker attacks.”

Of course, Unit 8200 isn’t the only intelligence agency known to be experts at hacking vehicles. Indeed, in 2017, WikiLeaks revealed that the CIA was capable of hacking vehicles and exploring their use in committing “undetectable assassinations.”

 

“Bring down nations to their knees”

At the Tel Aviv Cybertech Conference in 2017, Israeli Prime Minister Benjamin Netanyahu stated the following:

Today warfare has changed dramatically…With a click of a button, you can bring down nations to their knees very rapidly if you so desire and if you’re willing to take the risks, because every system can be hacked. Our hospitals, our airplanes, our cars, our banks. The most important word here is our data banks, they can be hacked.”

Media reports and even members of the Israeli public and private sector have openly acknowledged that Israel’s intelligence apparatus — from Unit 8200 to the Mossad — remains directly linked to many of the private technology companies founded by its former members, especially in the field of cybersecurity. Though reports on the matter often praise this merging of Israel’s public and private spheres, they rarely acknowledge the documented corruption within Unit 8200, the unit’s dark past in recruiting felons and even pedophiles to join its ranks, or the danger posed by having companies directly linked to foreign intelligence being given access to the U.S. government’s most classified and sensitive systems and data.

The last omission is particularly troubling given that Israeli intelligence has not only been caught aggressively using private tech companies to spy on U.S. federal agencies and networks, but also intercepting the private communications of at least two U.S. presidents and using a notorious pedophile to sexually blackmail American politicians.

As was mentioned in the first installment of this series, Cybereason’s CEO Lior Div offers a clear example of this worrisome bridge between Israel’s public and private sector, as Div has openly stated that he views his work at Cybereason as a “continuation” of his service to Israeli military intelligence, where he led offensive cyberattacks against other nations.

Given Div’s past statements and his company’s clear ties to both Israeli and U.S. intelligence, Cybereason’s simulation of the 2020 U.S. election — which involved terrorist attacks and led to the election’s cancellation and the imposition of martial law — is highly concerning. This is particularly so considering that Cybereason’s investors have direct ties to individuals who would benefit from the election’s cancellation and also considering the clear narrative that has emerged in recent months regarding how the coming election will inevitably fall victim to tech-driven “chaos” in coming months.

The clear overlap between Cybereason’s simulation and the intelligence-driven media narrative is clear cause for concern, especially considering that the technologies that they highlight as ultimately upending the election are dominated by the very same intelligence agencies simulating and crafting that narrative.

The keyword that has been used to describe the end result of both Cybereason’s simulation and the prevailing media narrative regarding the 2020 election is “chaos,” chaos so imminent, widespread and unruly that it will shake American democracy to its core.

What has been left unsaid, however, is that a government’s solution to “chaos” is always the imposition of “order.” This means that — whatever “chaos” ultimately ensues prior to or on election day — will result in a government response that will do much more to crush freedom and undermine democracy than any act of foreign meddling has, be it real or imagined.

The Twilight of Liberty: the State Destroys Alternative Media

By Kurt Nimmo

Source: Another Day in the Empire

It should be obvious by now what the plan is for Julian Assange—psychological torture resulting in either a total breakdown or an untimely death, the latter supported by the psychopaths who claim they are our leaders. This psychological torture was noted, with standard corporate media disinterest, by Nils Melzer, an internationally recognized expert on torture treatment.

“Unless the UK urgently changes course and alleviates his inhumane situation, Mr. Assange’s continued exposure to arbitrariness and abuse may soon end up costing his life,” Melzer, UN special rapporteur on torture and other cruel, inhuman or degrading treatment, said in a statement last week.

Melzer demanded “that London immediately take measures to protect Assange’s health and dignity… However, what we have seen from the UK Government is outright contempt for Mr. Assange’s rights and integrity… Despite the medical urgency of my appeal, and the seriousness of the alleged violations, the UK has not undertaken any measures of investigation, prevention and redress required under international law.”

In America, the UK, and much of Europe, the financial elite and its political class consider truth-telling a cardinal sin, a crime punishable by death—not by lethal injection, but slowly and sadistically under a torture system tweaked by the CIA and put into action in rendition dungeons scattered around the world.

An article at Strategic Culture Foundation summarizes:

Assange has provided vital information to the international public which demonstrates systematic corruption by Washington and its allies. For telling the truth, he is now being persecuted, just as his whistleblowing colleagues, Chelsea Manning and Edward Snowden are. Manning has been repeatedly imprisoned in the US, while Snowden has had to seek asylum in Russia for fear of being summarily incarcerated as a “traitor” if he returns to the US.

In fact, all of us, those who look beyond the headlines and ferret out the truth, are half a dozen steps away from suffering Julian Assange’s fate.

The national security state and its political class plan to kill Assange, keep Chelsea Manning in prison and find a way to return Snowden to the US for a show trial and life behind bars (or execution).

It must, however, first salt the earth where truth is harvested. Thousands of blogs, similar to this one, and websites contradicting and disassembling approved narratives, will be targeted for extinction.

The Mueller investigation did not result in dethroning Donald Trump. The Clinton-DNC attack on a duly elected president, however, resulted in millions of easily duped Americans believing Russia somehow meddled in the 2016 election and will do it again in 2020.

According to corporate entities in “partnership” with the state (the true nature of fascism), Russia is not alone in its supposed hatred of democracy and the self-proclaimed exceptional nation-state.

“There is an undeclared war that Russia and China are waging against the United States and the West,” Jim Sciutto,  CNN’s chief national security correspondent and co-anchor of CNN Newsroom, told the Poynter Fellowship in Journalism Speaker Series in October. “China and Russia, over the last 10 years, have done a remarkably good job at this.”

This alleged manipulation of American voters, according to the state and its corporate propaganda media, is assisted by Russian agents and a countless number of mindless dupes unaware of Vladimir Putin’s desire to destroy America.

In 2016, Max Blumenthal wrote:

A shady website that claims “Russia is Manipulating US Opinion Through Online Propaganda” has compiled a blacklist of websites its anonymous authors accuse of pushing fake news and Russian propaganda. The blacklist includes over 200 outlets, from the right-wing Drudge Report and Russian government-funded Russia Today, to Wikileaks and an array of marginal conspiracy and far-right sites. The blacklist also includes some of the flagship publications of the progressive left, including Truthdig, Counterpunch, Truthout, Naked Capitalism, and the Black Agenda Report, a leftist African-American opinion hub that is critical of the liberal black political establishment.

“You can see in the current atmosphere, where anti-Russia hysteria has spread like typhoid, how readily-accepted such a notion would be by many. The reds are under our beds and the Russkies have taken over our airwaves,” wrote Daniel McAdams of The Ron Paul Institute for Peace & Prosperity wrote in 2017.

The Washington Post, owned by billionaire Jeff Bezos, rolled out the red carpet for the shadowy group, PropOrNot, and its baseless fact-devoid accusations of alternative media treason and complicity with Russia.

Bezos is working closely with the CIA on a $600 million internet-cloud deal to get the NSA, DoD, the National Reconnaissance Office, the National Geospatial-Intelligence Agency, and other government snoop-and-subvert operations interconnected.

The Alliance for Securing Democracy’s Hamilton 68 effort to destroy alternative media also has roots in the 2016 election loss of Hillary Clinton. Hamilton 68 is a project supported by the US State Department, the German Marshall Fund, and NATO. Neocon William Kristol and DNC operative John Podesta sit on its advisory board. The organization leans heavily on the Russian collusion fairy tale, thus lending to the conclusion alternative media is a Trojan horse that will help the “New Hitler” Putin destroy democracy.

I certainly don’t have a crystal ball to gaze into and read the future. However, it seems rather obvious what the outcome of all this feverish work to demonize truth-tellers and install gatekeepers on the internet will be.

First, high visibility “fake news” websites will feel the heat. This is already well underway with the persecution of Alex Jones for the crime of questioning Sandy Hook and promoting the Pizzagate conspiracy theory. Lawsuits aimed at Jones are intended to drive his operation into bankruptcy and hold him criminally responsible for questioning official narratives.

The takeaway here—questioning official narratives and positing counter-narratives is a risky business and you are advised not to engage in treasonous behavior with Russian agents if you value your freedom, ability to earn a living, and want to stay off a government terror list.

Second, the concerted effort to sanitize social media of heretical political expression is moving along at a fairly robust clip. Numerous activists and alternative websites and individuals—including the above mentioned McAdams—have been scrubbed since Hillary Clinton declared war on freedom of political expression, which she fallaciously and absurdly chalked up to malfeasance by Russia and the misbehavior of Deplorables.

Third, there will be “meddling by Russia” in the 2020 election regardless of the winner of the presidential teleprompter reader sweepstakes. This will be considered a national emergency and the floodgates will fly open to suffuse the population with scary stories of democracy lost to the autocrat Putin. Radical measures to stem the tide of subversion will be put forward and turned into law by the political class.

I have no idea what the outcome of this will be except to say many of us will be prevented from posting counter-narratives and unearthing hidden truths—historical, political, and economic. Earlier this year the FBI designated alternative media commentary as domestic terrorism.

“The FBI assesses these conspiracy theories very likely will emerge, spread, and evolve in the modern information marketplace, occasionally driving both groups and individual extremists to carry out criminal or violent acts,” the document states. It also goes on to say the FBI believes conspiracy theory-driven extremists are likely to increase during the 2020 presidential election cycle.

The FBI’s not talking about flat-earthers and UFOologists. It is targeting alternative media. The historical record—ignored by the propaganda media—of the FBI’s COINTELPRO operation to destroy political movements in the 1960s and 70s should be revisited. It is paradigmatic of the state and its subversion of opposition. For the FBI, terror is truth unshackled.

Again, I have no idea what will happen, but considering the emphasis placed on the destruction of the First Amendment—along with the Second and Fifth—and the manufactured hysteria of insidious Russian (and Chinese) subversion, and the credulity (or indifference) of the American people, it now appears the alternative media is in danger of extinction, at least on the internet.

It’s the DNC, Stupid: Democratic Party, Not Russia, Has Delegitimized the Democratic Process

By Elizabeth Vos

Source: Consortium News

Establishment Democrats and those who amplify them continue to project blame for the public’s doubt in the U.S. election process onto outside influence, despite the clear history of the party’s subversion of election integrity. The total inability of the Democratic Party establishment’s willingness to address even one of these critical failures does not give reason to hope that the nomination process in 2020 will be any less pre-ordained.

The Democratic Party’s bias against Sen. Bernie Sanders during the 2016 presidential nomination, followed by the DNC defense counsel doubling down on its right to rig the race during the fraud lawsuit brought against the DNC, as well as the irregularities in the races between former DNC Chairwoman Debbie Wasserman Schultz and Tim Canova, indicate a fatal breakdown of the U.S. democratic process spearheaded by the Democratic Party establishment. Influences transcending the DNC add to concerns regarding the integrity of the democratic process that have nothing to do with Russia, but which will also likely impact outcomes in 2020.

The content of the DNC and Podesta emails published by WikiLeaks demonstrated that the DNC acted in favor of Hillary Clinton in the lead up to the 2016 Democratic primary. The emails also revealed corporate media reporters acting as surrogates of the DNC and its pro-Clinton agenda, going so far as to promote Donald Trump during the GOP primary process as a preferred “pied-piper candidate.” One cannot assume that similar evidence will be presented to the public in 2020, making it more important than ever to take stock of the unique lessons handed down to us by the 2016 race.

Social Media Meddling

Election meddling via social media did take place in 2016, though in a different guise and for a different cause from that which are best remembered. Twitter would eventually admit to actively suppressing hashtags referencing the DNC and Podesta emails in the run-up to the 2016 presidential election. Additional reports indicated that tech giant Google also showed measurable “pro-Hillary Clinton bias” in search results during 2016, resulting in the alleged swaying of between 2 and 10 millions voters in favor of Clinton.

On the Republican side, a recent episode of CNLive! featured discussion of the Cambridge Analytica scandal, in which undecided voters were micro-targeted with tailored advertising narrowed with the combined use of big data and artificial intelligence known collectively as “dark strategy.” CNLive! Executive Producer Cathy Vogan noted that SCL, Cambridge Analytica’s parent company, provides data, analytics and strategy to governments and military organizations “worldwide,” specializing in behavior modification. Though Cambridge Analytica shut down in 2018, related companies remain.

The Clinton camp was hardly absent from social media during the 2016 race. The barely-legal activities of Clintonite David Brock were previously reported by this author to have included $2 million in funding for the creation of an online “troll army” under the name Shareblue. The LA Times described the project as meant to “to appear to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid and highly tactical.” In other words, the effort attempted to create a false sense of consensus in support for the Clinton campaign.

In terms of interference in the actual election process, the New York City Board of Elections was shown to have purged over one hundred thousand Democratic voters in Brooklyn from the rolls before the 2016 primary, a move that the Department of Justice found broke federal law. Despite this, no prosecution for the breach was ever attempted.

Though the purge was not explicitly found to have benefitted Clinton, the admission falls in line with allegations across the country that the Democratic primary was interfered with to the benefit of the former secretary of state. These claims were further bolstered by reports indicating that voting results from the 2016 Democratic primary showed evidence of fraud.

DNC Fraud Lawsuit

The proceedings of the DNC fraud lawsuit provide the most damning evidence of the failure of the U.S. election process, especially within the Democratic Party. DNC defense lawyers argued in open court for the party’s right to appoint candidates at its own discretion, while simultaneously denying any “fiduciary duty” to represent the voters who donated to the Democratic Party under the impression that the DNC would act impartially towards the candidates involved.

In 2017, the Observer reported that the DNC’s defense counsel argued against claims that the party defrauded Sanders’ supporters by favoring Clinton, reasoning that Sanders’ supporters knew the process was rigged. Again: instead of arguing that the primary was neutral and unbiased in accordance with its charter, the DNC’s lawyers argued that it was the party’s right to select candidates.

The Observer noted the sentiments of Jared Beck, the attorney representing the plaintiffs of the lawsuit:

…“People paid money in reliance on the understanding that the primary elections for the Democratic nominee —nominating process in 2016 were fair and impartial, and that’s not just a bedrock assumption that we would assume just by virtue of the fact that we live in a democracy, and we assume that our elections are run in a fair and impartial manner. But that’s what the Democratic National Committee’s own charter says. It says it in black and white.”

The DNC defense counsel’s argument throughout the course of the DNC fraud lawsuit doubled down repeatedly in defense of the party’s right to favor one candidate over another, at one point actually claiming that such favoritism was protected by the First Amendment. The DNC’s lawyers wrote:

“To recognize any of the causes of action that Plaintiffs allege would run directly contrary to long-standing Supreme Court precedent recognizing the central and critical First Amendment rights enjoyed by political parties, especially when it comes to selecting the party’s nominee for public office.” [Emphasis added]

The DNC’s shameless defense of its own rigging disemboweled the most fundamental organs of the U.S. body politic.  This no indication that the DNC will not resort to the same tactics in the 2020 primary race,

Tim Canova’s Allegations

If Debbie Wasserman Schultz’s role as disgraced chairwoman of the DNC and her forced 2016 resignation wasn’t enough, serious interference was also alleged in the wake of two contests between Wasserman Schultz and professor Tim Canova in Florida’s 23rd congressional district. Canova and Wasserman Schultz first faced off in a 2016 Democratic primary race, followed by a 2018 general congressional election in which Canova ran as an independent.

Debacles followed both contests, including improper vote counts, illegal ballot destruction, improper transportation of ballots, and generally shameless displays of cronyism. After the controversial results of the initial primary race against Wasserman Schultz, Canova sought to have ballots checked for irregularities, as the Sun-Sentinel reported at the time:

“[Canova] sought to look at the paper ballots in March 2017 and took Elections Supervisor Brenda Snipes to court three months later when her office hadn’t fulfilled his request. Snipes approved the destruction of the ballots in September, signing a certification that said no court cases involving the ballots were pending.”

Ultimately, Canova was granted a summary judgment against Snipes, finding that she had committed what amounted to multiple felonies. Nonetheless, Snipes was not prosecuted and remained elections supervisor through to the 2018 midterms.

Republicans appear no more motivated to protect voting integrity than the Democrats, with The Nation reporting that the GOP-controlled Senate blocked a bill this week that would have “mandated paper-ballot backups in case of election machine malfunctions.”

Study of Corporate Power

A 2014 study published by Princeton University found that corporate power had usurped the voting rights of the public: “Economic elites and organized groups representing business interests have substantial independent impacts on U.S. government policy, while average citizens and mass-based interest groups have little or no independent influence.”

In reviewing this sordid history, we see that the Democratic Party establishment has done everything in its power to disrespect voters and outright overrule them in the democratic primary process, defending their right to do so in the DNC fraud lawsuit. We’ve noted that interests transcending the DNC also represent escalating threats to election integrity as demonstrated in 2016.

Despite this, establishment Democrats and those who echo their views in the legacy press continue to deflect from their own wrongdoing and real threats to the election process by suggesting that mere discussion of it represents a campaign by Russia to attempt to malign the perceptionof the legitimacy of the U.S. democratic process.

Hillary Clinton’s recent comments to the effect that Congresswoman Tulsi Gabbard is being “groomed” by Russia, and that the former Green Party Presidential candidate Dr. Jill Stein is a “Russian asset”, were soon echoed by DNC-friendly pundits. These sentiments externalize what Gabbard called the “rot” in the Democratic party outward onto domestic critics and a nation across the planet.

Newsweek provided a particularly glaring example of this phenomenon in a recent op-ed penned by columnist Naveed Jamali, a former FBI double agent whose book capitalizes on Russiagate. In an op-ed titled: Hillary Clinton Is Right. Tulsi Gabbard Is A Perfect Russian Asset – And Would Be A Perfect Republican Agent,” Jamali argued:

“Moscow will use its skillful propaganda machine to prop up Gabbard and use her as a tool to delegitimize the democratic process.” [Emphasis added]

Jamali surmises that Russia intends to “attack” our democracy by undermining the domestic perception of its legitimacy. This thesis is repeated later in the piece when Jamali opines: “They want to see a retreat of American influence. What better way to accomplish that than to attack our democracy by casting doubt on the legitimacy of our elections.” [Emphasis added]

The only thing worth protecting, according to Jamali and those who amplify his work (including former Clinton aide and establishment Democrat Neera Tanden), is the perception of the democratic process, not the actual functioning vitality of it. Such deflective tactics ensure that Russia will continue to be used as a convenient international pretext for silencing domestic dissent as we move into 2020.

Given all this, how can one expect the outcome of a 2020 Democratic Primary — or even the general election – to be any fairer or transparent than 2016?

 

Elizabeth Vos is a freelance reporter, co-host of CN Live! and regular contributor to Consortium News. 

Where’s Ghislaine?

By Kurt Nimmo

Source: Another Day in the Empire

It now looks like that photo of Ghislaine Maxwell at a burger bar in California is a fake. It was allegedly taken by her close friend and lawyer, Leah Saffian. Metadata on the image file is tagged with “Meadowgate,” the media investment corporation where Saffian is president. At least one photo shows Ghislaine with Dexter, Saffian’s dog.

What is the point of this photo, which was at first assumed to be legitimate? The answer is quite simple: Maxwell, Jeffrey Epstein’s collaborator in serial rape of 14-year-old girls, is laughing at the so-called justice system.

Here’s Maxwell’s subtext—she is protected, she will never see the inside of a prison cell for the unpardonable crime of making an unknown number of children sex slaves. The civil cases against her and the Epstein estate will fizzle out and go nowhere. She is thumbing her nose at the victims. She once referred to them as “nothing” and trailer park “trash.”   

From USA Today.

Legal experts say it will likely be difficult for prosecutors and Epstein victims to win criminal cases and civil lawsuits against the financier’s former associates… If prosecutors have strong cases against the peripheral players, they would have charged them already.

Ghislaine, the daughter of the late Mossad operative Robert Maxwell, is not a peripheral player. She recruited pervert Epstein’s girls, taught them how to perform oral sex, and loaned them out to his rich and elite friends,. None will go to prison, or even face serious investigation. London police refuse to investigate Prince Andrew. A system of law designed for commoners doesn’t apply to royalty.

After the news cycle leaves Epstein behind, Ghislaine Maxwell will resume her life as a British socialite. She’s a protected intelligence asset like her father—or he was until he stepped on the toes of the wrong people and ended up mysteriously dead. He swindled his employees out of their pension funds. After his death, Maxwell was celebrated in Israel as a national hero.

According to Gordon Thomas, author of Gideon’s Spies: The Secret History of the Mossad, Robert Maxwell was owned by Israeli intelligence.

“We never had any accountability for 9/11. We never had any accountability for the Kennedy assassination,” Kevin Barrett told Press TV. “We never had any accountability for Operation Gladio, which the Pentagon used to murder thousands of innocent people in Europe in false flag operations during the Cold War. We never had accountability in MKUltra when Americans were tortured to death by the CIA in mind control experiments.”

Ditto the Epstein case. It will fade into the sunset and those of us who know the truth—the elite corporate and financial class are responsible for murder, mayhem, and the rape of children and will never be held to account. Those who insist otherwise will be denounced as dangerous conspiracy theorists.

Can the Progressive-“Conspiracy” Divide be Bridged?

By John Kirby

Source: Off Guardian

People from a variety of advocacy communities who tackle issues ranging from the assassinations of the 1960’s to vaccine safety are rightly upset by a recent NBC News.com op-ed authored by Lynn Parramore, a progressive journalist known for her insightful pieces for Alternet and other outlets.

In the article, Parramore argues that those who espouse “conspiracy theories” might be displaying “narcissistic personality traits,” suffer from “low self-esteem,” and share a “negative view of humanity.” Various studies are cited in support of this claim.

As a filmmaker acquainted both with the author of the op-ed as well as a number of people from the communities under fire, I hope it’s possible to dispel some of the misconceptions on all sides and even find some common ground.

At the outset, it should be acknowledged that Parramore’s piece is an uncharacteristically harsh ad hominem smear, taking its place in a long line of similar attacks on people who have dared question—sometimes at great personal cost—a whole range of suspect official narratives over many years.

But Parramore and many journalists like her are neither assets of an intelligence service nor unthinking tools of big media; she is fully conscious of the ways in which power and wealth can be used collusively (one might even say conspiratorially) to deceive and abuse the public.

So what accounts for a piece like this one?  Why does it rankle a progressive like Parramore so intensely when she hears someone mention that the U.S. military-industrial complex had the most to gain from the September 11th attacks, or that Big Pharma may be applying the same racketeering techniques to the ever-expanding vaccination schedule she discovered at play in the opioid crisis?

Those of us who have labored long to publicize state crimes against democracy have our own list of the psychological, political, and economic factors that may be preventing smart people from seeing evidence that we regard as overwhelming.

The primary difficulty may lie in just how smart and thoroughly educated many of these writers are: no one who has spent a lifetime looking into the way the world works wants to think they might have missed something big.

And as Noam Chomsky has pointed out, the more educated we are, the more we are a target for state-corporate propaganda. Even journalists outside the mainstream may internalize establishment values and prejudices.

Which brings us to Parramore’s embrace of the term “conspiracy theory.”   Once a neutral and little-used phrase, “conspiracy theory” was infamously weaponized in 1967 by a memo from the CIA to its station chiefs worldwide.

Troubled by growing mass disbelief in the “lone nut” theory of President Kennedy’s assassination, and concerned that “[c]onspiracy theories have frequently thrown suspicion on our organization,” the agency directed its officers to “discuss the publicity problem with friendly and elite contacts (especially politicians and editors)” and to “employ propaganda assets to answer and refute the attacks of the critics. Book reviews and feature articles are particularly appropriate for this purpose.”

As Kevin Ryan writes, and various analyses have shown:

In the 45 years before the CIA memo came out, the phrase ‘conspiracy theory’ appeared in the Washington Post and New York Times only 50 times, or about once per year. In the 45 years after the CIA memo, the phrase appeared 2,630 times, or about once per week.”

While it turns out that Parramore knows something about this hugely successful propaganda drive, she chose in her NBC piece to deploy the phrase as the government has come to define it, i.e., as “something that requires no consideration because it is obviously not true.”  This embeds a fallacy in her argument which only spreads as she goes on.

Likewise, the authors of the studies she cites, who attempt to connect belief in “conspiracy theories” to “narcissistic personality traits,” are not immune to efforts to manipulate the wider culture. Studies are only as good as the assumptions from which they proceed; in this case, the assumption was provided by an interested Federal agency.

And what of their suggested diagnosis?

The DSM-5’s criteria for narcissism include “a pervasive pattern of grandiosity…a need for admiration and lack of empathy.”  My experience in talking to writers and advocates who—to mention a few of the subjects Parramore cites—seek justice in the cases of the political murders of the Sixties, have profound concerns about vaccine safetyor reject the official conspiracy theory of 9/11, does not align with that characterization.

On the contrary, most of the people I know who hold these varied (and not always shared) views are deeply empathic, courageously humble, and resigned to a life on the margins of official discourse, even as they doggedly seek to publicize what they have learned.

A number of them have arrived at their views through painful, direct experience, like the loss of a friend or the illness of a child, but far from having a “negative view of humanity,” as Parramore writes, most hold a deep and abiding faith in the power of regular people to see injustice and peacefully oppose it.

In that regard, they share a great deal in common with writers like Parramore: ultimately, we all want what’s best for our children, and none of us want a world ruled by unaccountable political-economic interests.

If we want to achieve that world, then we should work together to promote speech that is free from personal attacks on all sides. Even more importantly, we should all be troubled by efforts to shut down content and discussions labeled “false and misleading” on major social media platforms.

Who will decide what is false and what is true?

In the case of vaccines, there is actually no scientific consensus that they are safe—only a state-media consensus, emanating from groups like the CDC, which act as sales agents for Big Pharma.

A terrible precedent is being set, and both unfettered scientific inquiry and free speech are suffering greatly. Today it is vaccines and “conspiracy theories” that are being banned and labeled “dangerous” by the FBI. What will we be prevented, scared, or shamed away from discussing tomorrow?

President Kennedy said:

a nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”

Perhaps we should take a closer look at ideas that so frighten the powers-that-be. Far from inviting our ridicule, the people who insist that we look in these forbidden places may one day deserve our thanks.

 

John Kirby is a documentary filmmaker. His latest project, Four Died Trying, examines what John Kennedy, Malcolm X, Martin Luther King and Robert Kennedy were doing in the last years of their lives which may have led to their deaths.