Another Mega Group Spy Scandal? Samanage, Sabotage, and the SolarWinds Hack

By Whitney Webb

Source: The Unz Review

The devastating hack on SolarWinds was quickly pinned on Russia by US intelligence. A more likely culprit, Samanage, a company whose software was integrated into SolarWinds’ software just as the “back door” was inserted, is deeply tied to Israeli intelligence and intelligence-linked families such as the Maxwells.

In mid-December of 2020, a massive hack compromised the networks of numerous US federal agencies, major corporations, the top five accounting firms in the country, and the military, among others. Despite most US media attention now focusing on election-related chaos, the fallout from the hack continues to make headlines day after day.

The hack, which affected Texas-based software provider SolarWinds, was blamed on Russia on January 5 by the US government’s Cyber Unified Coordination Group. Their statement asserted that the attackers were “likely Russian in origin,” but they failed to provide evidence to back up that claim.

Since then, numerous developments in the official investigation have been reported, but no actual evidence pointing to Russia has yet to be released. Rather, mainstream media outlets began reporting the intelligence community’s “likely” conclusion as fact right away, with the New York Times subsequently reporting that US investigators were examining a product used by SolarWinds that was sold by a Czech Republic–based company, as the possible entry point for the “Russian hackers.” Interest in that company, however, comes from the fact that the attackers most likely had access to the systems of a contractor or subsidiary of SolarWinds. This, combined with the evidence-free report from US intelligence on “likely” Russian involvement, is said to be the reason investigators are focusing on the Czech company, though any of SolarWinds’ contractors/subsidiaries could have been the entry point.

Such narratives clearly echo those that became prominent in the wake of the 2016 election, when now-debunked claims were made that Russian hackers were responsible for leaked emails published by WikiLeaks. Parallels are obvious when one considers that SolarWinds quickly brought on the discredited firm CrowdStrike to aid them in securing their networks and investigating the hack. CrowdStrike had also been brought on by the DNC after the 2016 WikiLeaks publication, and subsequently it was central in developing the false declarations regarding the involvement of “Russian hackers” in that event.

There are also other parallels. As Russiagate played out, it became apparent that there was collusion between the Trump campaign and a foreign power, but the nation was Israel, not Russia. Indeed, many of the reports that came out of Russiagate revealed collusion with Israel, yet those instances received little coverage and generated little media outrage. This has led some to suggest that Russiagate may have been a cover for what was in fact Israelgate.

Similarly, in the case of the SolarWinds hack, there is the odd case and timing of SolarWinds’ acquisition of a company called Samanage in 2019. As this report will explore, Samanage’s deep ties to Israeli intelligence, venture-capital firms connected to both intelligence and Isabel Maxwell, as well as Samange’s integration with the Orion software at the time of the back door’s insertion warrant investigation every bit as much as SolarWinds’ Czech-based contractor.

Orion’s Fall

In the month since the hack, evidence has emerged detailing the extent of the damage, with the Justice Department quietly announcing, the same day as the Capitol riots (January 6), that their email system had been breached in the hack—a “major incident” according to the department. This terminology means that the attack “is likely to result in demonstrable harm to the national security interests, foreign relations, or the economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people,” per NextGov.

The Justice Department was the fourth US government agency to publicly acknowledge a breach in connection to the hack, with the others being the Departments of Commerce and Energy and the Treasury. Yet, while only four agencies have publicly acknowledged fallout from the hack, SolarWinds software is also used by the Department of Defense, the State Department, NASA, the NSA, and the Executive Office. Given that the Cyber Unified Coordination Group stated that “fewer than ten” US government agencies had been affected, it’s likely that some of these agencies were compromised, and some press reports have asserted that the State Department and Pentagon were affected.

In addition to government agencies, SolarWinds Orion software was in use by the top ten US telecommunications corporations, the top five US accounting firms, the New York Power Authority, and numerous US government contractors such as Booz Allen Hamilton, General Dynamics, and the Federal Reserve. Other notable SolarWinds clients include the Bill & Melinda Gates Foundation, Microsoft, Credit Suisse, and several mainstream news outlets including the Economist and the New York Times.

Based on what is officially known so far, the hackers appeared to have been highly sophisticated, with FireEye, the cybersecurity company that first discovered the implanted code used to conduct the hack, stating that the hackers “routinely removed their tools, including the backdoors, once legitimate remote access was achieved—implying a high degree of technical sophistication and attention to operational security.” In addition, top security experts have noted that the hack was “very very carefully orchestrated,” leading to a consensus that the hack was state sponsored.

FireEye stated that they first identified the compromise of SolarWinds after the version of the Orion software they were using contained a back door that was used to gain access to its “red team” suite of hacking tools. Not long after the disclosure of the SolarWinds hack, on December 31, the hackers were able to partially access Microsoft’s source code, raising concerns that the act was preparation for future and equally devastating attacks.

FireEye’s account can be taken with a grain of salt, however, as the CIA is one of FireEye’s clients, and FireEye was launched with funding from the CIA’s venture capital arm In-Q-tel. It is also worth being skeptical of the “free tool” FireEye has made available in the hack’s aftermath for “spotting and keeping suspected Russians out of systems.”

In addition, Microsoft, another key source in the SolarWinds story, is a military contractor with close ties to Israel’s intelligence apparatus, especially Unit 8200, and their reports of events also deserve scrutiny. Notably, it was Unit 8200 alumnus and executive at Israeli cybersecurity firm Cycode, Ronen Slavin, who told Reuters in a widely quoted article that he “was worried by the possibility that the SolarWinds hackers were poring over Microsoft’s source code as prelude to a much more ambitious offensive.” “To me the biggest question is, ‘Was this recon for the next big operation?’” Slavin stated.

Also odd about the actors involved in the response to the hack is the decision to bring on not only the discredited firm CrowdStrike but also the new consultancy firm of Chris Krebs and Alex Stamos, former chief information security officer of Facebook and Yahoo, to investigate the hack. Chris Krebs is the former head of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and was previously a top Microsoft executive. Krebs was fired by Donald Trump after repeatedly and publicly challenging Trump on the issue of election fraud in the 2020 election.

As head of CISA, Krebs gave access to networks of critical infrastructure throughout the US, with a focus on the health-care industry, to the CTI League, a suspicious outfit of anonymous volunteers working “for free” and led by a former Unit 8200 officer. “We have brought in the expertise of Chris Krebs and Alex Stamos to assist in this review and provide best-in-class guidance on our journey to evolve into an industry leading secure software development company,” a SolarWinds spokesperson said in an email cited by Reuters.

It is also worth noting that the SolarWinds hack did benefit a few actors aside from the attackers themselves. For instance, Israeli cybersecurity firms CheckPoint and CyberArk, which have close ties to Israeli intelligence Unit 8200, have seen their stocks soar in the weeks since the SolarWinds compromise was announced. Notably, in 2017, CyberArk was the company that “discovered” one of the main tactics used in an attack, a form of SAML token manipulation called GoldenSAML. CyberArk does not specify how they discovered this method of attack and, at the time they announced the tactic’s existence, released a free tool to identify systems vulnerable to GoldenSAML manipulation.

In addition, the other main mode of attack, a back door program nicknamed Sunburst, was found by Kaspersky researchers to be similar to a piece of malware called Kazuar that was also first discovered by another Unit 8200-linked company, Palo Alto Networks, also in 2017. The similarities only suggest that those who developed the Sunburst backdoor may have been inspired by Kazuar and “they may have common members between them or a shared software developer building their malware.” Kaspersky stressed that Sunburst and Kazuar are not likely to be one and the same. It is worth noting, as an aside, that Unit 8200 is known to have previously hacked Kaspersky and attempted to insert a back door into their products, per Kaspersky employees.

Crowdstrike claimed that this finding confirmed “the attribution at least to Russian intelligence,” only because an allegedly Russian hacking group is believed to have used Kazuar before. No technical evidence linking Russia to the SolarWinds hacking has yet been presented.

Samanage and Sabotage

The implanted code used to execute the hack was directly injected into the source code of SolarWinds Orion. Then, the modified and bugged version of the software was “compiled, signed and delivered through the existing software patch release management system,” per reports. This has led US investigators and observers to conclude that the perpetrators had direct access to SolarWinds code as they had “a high degree of familiarity with the software.” While the way the attackers gained access to Orion’s code base has yet to be determined, one possibility being pursued by investigators is that the attackers were working with employee(s) of a SolarWinds contractor or subsidiary.

US investigators have been focusing on offices of SolarWinds that are based abroad, suggesting that—in addition to the above—the attackers were likely working for SolarWinds or were given access by someone working for the company. That investigation has focused on offices in eastern Europe, allegedly because “Russian intelligence operatives are deeply rooted” in those countries.

It is worth pointing out, however, that Israeli intelligence is similarly “deeply rooted” in eastern European states both before and after the fall of the Soviet Union, ties well illustrated by Israeli superspy and media tycoon Robert Maxwell’s frequent and close associations with Eastern European and Russian intelligence agencies as well as the leaders of many of those countries. Israeli intelligence operatives like Maxwell also had cozy ties with Russian organized crime. For instance, Maxwell enabled the access of the Russian organized crime network headed by Semion Mogilevich into the US financial system and was also Mogilevich’s business partner. In addition, the cross-pollination between Israeli and Russian organized crime networks (networks which also share ties to their respective intelligence agencies) and such links should be considered if the cybercriminals due prove to be Russian in origin, as US intelligence has claimed.

Though some contractors and subsidiaries of SolarWinds are now being investigated, one that has yet to be investigated, but should be, is Samanage. Samanage, acquired by SolarWinds in 2019, not only gained automatic access to Orion just as the malicious code was first inserted, but it has deep ties to Israeli intelligence and a web of venture-capital firms associated with numerous Israeli espionage scandals that have targeted the US government. Israel is deemed by the NSA to be one of the top spy threats facing US government agencies and Israel’s list of espionage scandals in the US is arguably the longest, and includes the Jonathan Pollard and PROMIS software scandals of the 1980s to the Larry Franklin/AIPAC espionage scandal in 2009.

Though much reporting has since been done on the recent compromise of SolarWinds Orion software, little attention has been paid to Samanage. Samanage offers what it describes as “an IT Service Desk solution.” It was acquired by SolarWinds so Samanage’s products could be added to SolarWinds’ IT Operations Management portfolio. Though US reporting and SolarWinds press releases state that Samanage is based in Cary, North Carolina, implying that it is an American company, Samanage is actually an Israeli firm. It was founded in 2007 by Doron Gordon, who previously worked for several years at MAMRAM, the Israeli military’s central computing unit.

Samanage was SolarWinds’ first acquisition of an Israeli company, and, at the time, Israeli media reported that SolarWinds was expected to set up its first development center in Israel. It appears, however, that SolarWinds, rather than setting up a new center, merely began using Samanage’s research and development center located in Netanya, Israel.

Several months after the acquisition was announced, in November 2019, Samanage, renamed SolarWinds Service Desk, became listed as a standard feature of SolarWinds Orion software, whereas the integration of Samanage and Orion had previously been optional since the acquisition’s announcement in April of that year. This means that complete integration was likely made standard in either October or November. It has since been reported that the perpetrators of the recent hack gained access to the networks of US federal agencies and major corporations at around the same time. Samanage’s automatic integration into Orion was a major modification made to the now-compromised software during that period.

Samanage appears to have had access to Orion following the announcement of the acquisition in April 2019. Integration first began with Orion version 2019.4, the earliest version believed to contain the malicious code that enabled the hack. In addition, the integrated Samanage component of Orion was responsible for “ensuring the appropriate teams are quickly notified when critical events or performance issues [with Orion] are detected,” which was meant to allow “service agents to react faster and resolve issues before . . . employees are impacted.”

In other words, the Samanage component that was integrated into Orion at the same time the compromise took place was also responsible for Orion’s alert system for critical events or performance issues. The code that was inserted into Orion by hackers in late 2019 nevertheless went undetected by this Samanage-made component for over a year, giving the “hackers” access to millions of devices critical to both US government and corporate networks. Furthermore, it is this Samanage-produced component of the affected Orion software that advises end users to exempt the software from antivirus scans and group policy object (GPO) restrictions by providing a warning that Orion may not work properly unless those exemptions are granted.

Samanage, Salesforce, and the World Economic Forum

Around the time of Samange’s acquisition by SolarWinds, it was reported that one of Samanage’s top backers was the company Salesforce, with Salesforce being both a major investor in Samanage as well as a partner of the company.

Salesforce is run by Marc Benioff, a billionaire who got his start at the tech giant Oracle. Oracle was originally created as a CIA spin-off and has deep ties to Israel’s government and the outgoing Trump administration. Salesforce also has a large presence in Israel, with much of its global research and development based there. Salesforce also recently partnered with the Unit 8200-linked Israeli firm Diagnostic Robotics to “predictively” diagnose COVID-19 cases using Artificial Intelligence.

Aside from leading Salesforce, Benioff is a member of the Vatican’s Council for Inclusive Capitalism alongside Lynn Forester de Rothschild, a close associate of Jeffrey Epstein and the Clintons, and members of the Lauder family, who have deep ties to the Mega Group and Israeli politics.

Benioff is also a prominent member of the board of trustees of the World Economic Forum and the inaugural chair of the WEF’s Centre for the Fourth Industrial Revolution (C4IR), making him one of the most critical players in the unfolding of the WEF-backed Great Reset. Other WEF leaders, including the organization’s founder Klaus Schwab, have openly discussed how massive cyberattacks such as befell SolarWinds will soon result in “even more significant economic and social implications than COVID-19.”

Last year, the WEF’s Centre for Cybersecurity, of which Salesforce is part, simulated a “digital pandemic” cyberattack in an exercise entitled Cyber Polygon. Cyber Polygon’s speakers in 2020 included former UK Prime Minister Tony Blair, the Prime Minister of Russia Mikhail Mishustin, WEF founder Klaus Schwab, and IBM executive Wendi Whitmore, who previously held top posts at both Crowdstrike and a FireEye subsidiary. Notably, just months before the COVID-19 crisis, the WEF had held Event 201, which simulated a global coronavirus pandemic that crippled the world’s economy.

In addition to Samanage’s ties to WEF big shots such as Marc Benioff, the other main investors behind Samanage’s rise have ties to major Israeli espionage scandals, including the Jonathan Pollard affair and the PROMIS software scandal. There are also ties to one of the WEF’s founding “technology pioneers,” Isabel Maxwell (the daughter of Robert Maxwell and sister of Ghislaine), who has long-standing ties to Israel’s intelligence apparatus and the country’s hi-tech sector.

The Bronfmans, the Maxwells, and Viola Ventures

At the time of its acquisition by SolarWinds, Samanage’s top investor was Viola Ventures, a major Israeli venture-capital firm. Viola’s investment in Samanage, until its acquisition, was managed by Ronen Nir, who was also on Samanage’s board before it became part of SolarWinds.

Prior to working at Viola, Ronen Nir was a vice president at Verint, formerly Converse Infosys. Verint, whose other alumni have gone on to found Israeli intelligence-front companies such as Cybereason. Verint has a history of aggressively spying on US government facilities, including the White House, and created the backdoors into all US telecommunications systems and major tech companies, including Microsoft, Google and Facebook, on behalf of the US’ NSA.

In addition to his background at Verint, Ronen Nir is an Israeli spy, having served for thirteen years in an elite IDF intelligence unit, and he remains a lieutenant colonel on reserve duty. His biography also notes that he worked for two years at the Israeli embassy in Washington, DC, which is fitting given his background in espionage and the major role that Israeli embassy has played in several major espionage scandals.

As an aside, Nir has stated that “thought leader” Henry Kissinger is his “favorite historical character.” Notably, Kissinger was instrumental in allowing Robert Maxwell, Israeli superspy and father of Ghislaine and Isabel Maxwell, to sell software with a back door for Israeli intelligence to US national laboratories, where it was used to spy on the US nuclear program. Kissinger had told Maxwell to connect with Senator John Tower in order to gain access to US national laboratories, which directly enabled this action, part of the larger PROMIS software scandal.

In addition, Viola’s stake was managed through a firm known as Carmel Ventures, which is part of the Viola Group. At the time, Carmel Ventures was advised by Isabel Maxwell, whose father had previously been directly involved in the operation of the front company used to sell bugged software to US national laboratories. As noted in a previous article at Unlimited Hangout, Isabel “inherited” her father’s circle of Israeli government and intelligence contacts after his death and has been instrumental in building the “bridge” between Israel’s intelligence and military-linked hi-tech sector to Silicon Valley.

Isabel also has ties to the Viola Group itself through Jonathan Kolber, a general partner at Viola. Kolber previously cofounded and led the Bronfman family’s private-equity fund, Claridge Israel (based in Israel). Kolber then led Koor Industries, which he had acquired alongside the Bronfmans via Claridge. Kolber is closely associated with Stephen Bronfman, the son of Charles Bronfman who created Claridge and also cofounded the Mega Group with Leslie Wexner in the early 1990s.

Kolber, like Isabel Maxwell, is a founding director of the Peres Center for Peace and Innovation. Maxwell, who used to chair the center’s board, stepped down following the Epstein scandal, though it’s not exactly clear when. Other directors of the center include Tamir Pardo, former head of Mossad. Kolber’s area of expertise, like that of Isabel Maxwell, is “structuring complex, cross-border and cross industry business and financial transactions,” that is, arranging acquisitions and partnerships of Israeli firms by US companies. Incidentally, this is also a major focus of the Peres Center.

Other connections to Isabel Maxwell, aside from her espionage ties, are worth noting, given that she is a “technology pioneer” of the World Economic Forum. As previously mentioned, Salesforce—a major investor in Samanage—is deeply involved with the WEF and its Great Reset.

The links of Israeli intelligence and Salesforce to Samanage, and thus to SolarWinds, is particularly relevant given the WEF’s “prediction” of a coming “pandemic” of cyberattacks and the early hints from former Unit 8200 officers that the SolarWinds hack is just the beginning. It is also worth mentioning the Israeli government’s considerable ties to the WEF over the years, particularly last year when it joined the Benioff-chaired C4IR and participated in the October 2020 WEF panel entitled “The Great Reset: Harnessing the Fourth Industrial Revolution.”

Start Up Nation Central, an organization aimed at integrating Israeli start-ups with US firms set up by Netanyahu’s longtime economic adviser Eugene Kandel and American Zionist billionaire Paul Singer, have asserted that Israel will serve a “key role” globally in the 4th Industrial Revolution following the implementation of the Great Reset.

Gemini, the BIRD Foundation, and Jonathan Pollard

In addition to Viola, another of Samange’s leading investors is Gemini Israel Ventures. Gemini is one of Israel’s oldest venture-capital firms, dating back to the Israeli government’s 1993 Yozma program.

The first firm created by Yozma, Gemini was put under the control of Ed Mlavsky, who Israel’s government had chosen specifically for this position. As previously reported by Unlimited Hangout, Mlavsky was then serving as the executive director of the Israel-US Binational Industrial Research and Development (BIRD) Foundation, where “he was responsible for investments of $100 million in more than 300 joint projects between US and Israeli high-tech companies.”

A few years before Gemini was created, while Mlavsky still headed BIRD, the foundation became embroiled in one of the worst espionage scandals in US history, the Jonathan Pollard affair.

In the indictment of US citizen Pollard for espionage on Israel’s behalf, it was noted that Pollard delivered the documents he stole to agents of Israel at two locations, one of which was an apartment owned by Harold Katz, the then legal counsel of the BIRD Foundation and an adviser to Israel’s military, which oversaw Israel’s scientific intelligence-gathering agency, Lekem. US officials told the New York Times at the time that they believed Katz “has detailed knowledge about the [Pollard] spy ring and could implicate senior Israeli officials.”

Subsequent reporting by journalist Claudia Wright pointed the finger at the Mlavsky-run BIRD Foundation as one of the ways Israeli intelligence funneled money to Pollard before his capture by US authorities.

One of the first companies Gemini invested in was CommTouch (now Cyren), which was founded by ex-IDF officers and later led by Isabel Maxwell. Under Maxwell’s leadership, CommTouch developed close ties to Microsoft, partially due to Maxwell’s relationship with its cofounder Bill Gates.

A Coming “Hack” of Microsoft?

If the SolarWinds hack is as serious as has been reported, it’s difficult to understand why a company like Samanage would not be looked into as part of a legitimate investigation into the attack. The timing of Samanage employees gaining access to the Orion software and the company’s investors including Israeli spies and those with ties to past espionage scandals where Israel used back doors to spy on the US and beyond raises obvious red flags. Yet, any meaningful investigation of the incident is unlikely to take place, especially given the considerable involvement of discredited firms like CrowdStrike, CIA fronts like FireEye and a consultancy firm led by former Silicon Valley executives with their own government/intelligence ties.

There is also the added fact that both of the main methods used in the attack were analogous or bore similarities to hacking tools that were both discovered by Unit 8200-linked companies in 2017. Unit 8200-founded cybersecurity firms are among the few “winners” from the SolarWinds hack, as their stocks have skyrocketed and demand for their services has increased globally.

While some may argue that Unit 8200 alumni are not necessarily connected to the Israeli intelligence apparatus, numerous reports have pointed out the admitted fusion of Israeli military intelligence with Israel’s hi-tech sector and its tech-focused venture capital networks, with Israeli military and intelligence officials themselves noting that the line between the private cybersecurity sector and Israel’s intelligence apparatus is so blurred, it’s difficult to know where one begins and the other ends. There is also the Israeli government policy, formally launched in 2012, whereby Israel’s intelligence and military intelligence agencies began outsourcing “activities that were previously managed in-house, with a focus on software and cyber technologies.”

Samanage certainly appears to be such a company, not only because it was founded by a former IDF officer in the military’s central computing unit, but because its main investors include spies on “reserve duty” and venture capital firms linked to the Pollard scandal as well as the Bronfman and Maxwell families, both of whom have been tied to espionage and sexual blackmail scandals over the years.

Yet, as the Epstein scandal has recently indicated, major espionage scandals involving Israel receive little coverage and investigations into these events rarely lead anywhere. PROMIS was covered up largely thanks to Bill Barr during his first term as Attorney General and even the Pollard affair has all been swept under the rug with Donald Trump allowing Pollard to move to Israel and, more recently, pardoning the Israeli spy who recruited Pollard during his final day as President. Also under Trump, there was the discovery of “stingray” surveillance devices placed by Israel’s government throughout Washington DC, including next to the White House, which were quickly memory holed and oddly not investigated by authorities. Israel had previously wiretapped the White House’s phone lines during the Clinton years.

Another cover up is likely in the case of SolarWinds, particularly if the entry point was in fact Samanage. Though a cover up would certainly be more of the same, the SolarWinds case is different as major tech companies and cybersecurity firms with ties to US and Israeli intelligence now insist that Microsoft is soon to be targeted in what would clearly be a much more devastating event than SolarWinds due to the ubiquity of Microsoft’s products.

On Tuesday, CIA-linked firm FireEye, which apparently has a leadership role in investigating the hack, claimed that the perpetrators are still gathering data from US government agencies and that “the hackers are moving into Microsoft 365 cloud applications from physical, on-premises servers,” meaning that changes to fix Orion’s vulnerabilities will not necessarily deny hacker access to previously compromised systems as they allegedly maintain access to those systems via Microsoft cloud applications. In addition to Microsoft’s own claims that some of its source code was accessed by the hackers, this builds the narrative that Microsoft products are poised to be targeted in the next high-profile hack.

Microsoft’s cloud security infrastructure, set to be the next target of the SolarWinds hackers, was largely developed and later managed by Assaf Rappaport, a former Unit 8200 officer who was most recently the head of Microsoft’s Research and Development and Security teams at its massive Israel branch. Rappaport left Microsoft right before the COVID-19 crisis began last year to found a new cybersecurity company called Wiz.

Microsoft, like some of Samanage’s main backers, is part of the World Economic Forum and is an enthusiastic supporter of and participant in the Great Reset agenda, so much so that Microsoft CEO Satya Nadella wrote the foreword to Klaus Schwab’s book “Shaping the Fourth Industrial Revolution.” With the WEF simulating a cyber “pandemic” and both the WEF and Israel’s head of Israel’s National Cyber Directorate warning of an imminent “cyber winter”, SolarWinds does indeed appear to be just the beginning, though perhaps a scripted one to create the foundation for something much more severe. A cyberattack on Microsoft products globally would certainly upend most of the global economy and likely have economic effects more severe than the COVID-19 crisis, just as the WEF has been warning. Yet, if such a hack does occur, it will inevitably serve the aims of the Great Reset to “reset” and then rebuild electronic infrastructure.

No Escape from Our Techno-Feudal World

By Pepe Escobar

Source: Global Research

The political economy of the Digital Age remains virtually terra incognita. In Techno-Feudalism, published three months ago in France (no English translation yet), Cedric Durand, an economist at the Sorbonne, provides a crucial, global public service as he sifts through the new Matrix that controls all our lives.

Durand places the Digital Age in the larger context of the historical evolution of capitalism to show how the Washington consensus ended up metastasized into the Silicon Valley consensus. In a delightful twist, he brands the new grove as the “Californian ideology”.

We’re far away from Jefferson Airplane and the Beach Boys; it’s more like Schumpeter’s “creative destruction” on steroids, complete with IMF-style “structural reforms” emphasizing “flexibilization” of work and  outright marketization/financialization of everyday life.

The Digital Age was crucially associated with right-wing ideology from the very start. The incubation was provided by the Progress and Freedom Foundation (PFF), active from 1993 to 2010 and conveniently funded, among others, by Microsoft, At&T, Disney, Sony, Oracle, Google and Yahoo.

In 1994, PFF held a ground-breaking conference in Atlanta that eventually led to a seminal Magna Carta: literally, Cyberspace and the American Dream: a Magna Carta for the Knowledge Era, published in 1996, during the first Clinton term.

Not by accident the magazine Wired was founded, just like PFF, in 1993, instantly becoming the house organ of the “Californian ideology”.

Among the authors of the Magna Carta we find futurist Alvin “Future Shock” Toffler and Reagan’s former scientific counselor George Keyworth. Before anyone else, they were already conceptualizing how “cyberspace is a bioelectronic environment which is literally universal”. Their Magna Carta was the privileged road map to explore the new frontier.

Those Randian heroes

Also not by accident the intellectual guru of the new frontier was Ayn Rand and her quite primitive dichotomy between “pioneers” and the mob. Rand declared that egotism is good, altruism is evil, and empathy is irrational.

When it comes to the new property rights of the new Eldorado, all power should be exercised by the Silicon Valley “pioneers”, a Narcissus bunch in love with their mirror image as superior Randian heroes. In the name of innovation they should be allowed to destroy any established rules, in a Schumpeterian “creative destruction” rampage.

That has led to our current environment, where Google, Facebook, Uber and co. can overstep any legal framework, imposing their innovations like a fait accompli.

Durand goes to the heart of the matter when it comes to the true nature of “digital domination”: US leadership was never achieved because of spontaneous market forces.

On the contrary. The history of Silicon Valley is absolutely dependent on state intervention – especially via the industrial-military complex and the aero-spatial complex. The Ames Research Center, one of NASA’s top labs, is in Mountain View. Stanford was always awarded juicy military research contracts. During WWII, Hewlett Packard, for instance, was flourishing thanks to their electronics being used to manufacture radars. Throughout the 1960s, the US military bought the bulk of the still infant semiconductor production.

The Rise of Data Capitala 2016 MIT Technological Review report produced “in partnership” with Oracle, showed how digital networks open access to a new, virgin underground brimming with resources: “Those that arrive first and take control obtain the resources they’re seeking” – in the form of data.

So everything from video-surveillance images and electronic banking to DNA samples and supermarket tickets implies some form of territorial appropriation. Here we see in all its glory the extractivist logic inbuilt in the development of Big Data.

Durand gives us the example of Android to illustrate the extractivist logic in action. Google made Android free for all smartphones so it would acquire a strategic market position, beating the Apple ecosystem and thus becoming the default internet entry point for virtually the whole planet. That’s how a de facto, immensely valuable,  online real estate empire is built.

The key point is that whatever the original business – Google, Amazon, Uber – strategies of conquering cyberspace all point to the same target: take control of “spaces of observation and capture” of data.

About the Chinese credit system…

Durand offers a finely balanced analysis of the Chinese credit system – a public/private hybrid system launched in 2013 during the 3rd plenum of the 18th Congress of the CCP, under the motto “to value sincerity and punish insincerity”.

For the State Council, the supreme government authority in China, what really mattered was to encourage behavior deemed responsible in the financial, economic and socio-political spheres, and sanction what is not. It’s all about trust. Beijing defines it as “a method of perfecting the socialist market economy system that improves social governance”.

The Chinese term – shehui xinyong – is totally lost in translation in the West. Way more complex than “social credit”, it’s more about  “trustworthiness”, in the sense of integrity. Instead of the pedestrian Western accusations of being an Orwellian system, priorities include the fight against fraud and corruption at the national, regional and local levels, violations of environmental rules, disrespect of food security norms.

Cybernetic management of social life is being seriously discussed in China since the 1980s. In fact, since the 1940s, as we see in Mao’s Little Red Book. It could be seen as inspired by the Maoist principle of “mass lines”, as in “start with the masses to come back to the masses: to amass the ideas of the masses (which are dispersed, non-systematic), concentrate them (in general ideas and systematic), then come back to the masses to diffuse and explain them, make sure the masses assimilate them and translate them into action, and verify in the action of the masses the pertinence of these ideas”.

Durand’s analysis goes one step beyond Soshana Zuboff’s

The Age of Surveillance Capitalism when he finally reaches the core of his thesis, showing how digital platforms become “fiefdoms”: they live out of, and profit from, their vast “digital territory” peopled with data even as they lock in power over their services, which are deemed indispensable.

And just as in feudalism, fiefdoms dominate territory by attaching serfs. Masters made their living profiting from the social power derived from the exploitation of their domain, and that implied unlimited power over the serfs.

It all spells out total concentration. Silicon Valley stalwart Peter Thiel has always stressed the target of the digital entrepreneur is exactly to bypass competition. As quoted in Crashed: How a Decade of Financial Crises Changed the World, Thiel declared, “Capitalism and competition are antagonistic. Competition is for losers.”

So now we are facing not a mere clash between Silicon Valley capitalism and finance capital, but actually a new mode of production:

a turbo-capitalist survival as rentier capitalism, where Silicon giants take the place of estates, and also the State. That is the “techno-feudal” option, as defined by Durand.

Blake meets Burroughs

Durand’s book is extremely relevant to show how the theoretical and political critique of the Digital Age is still rarified. There is no precise cartography of all those dodgy circuits of revenue extraction. No analysis of how do they profit from the financial casino – especially mega investment funds that facilitate hyper-concentration. Or how do they profit from the hardcore exploitation of workers in the gig economy.

The total concentration of the digital glebe is leading to a scenario, as Durand recalls, already dreamed up by Stuart Mill, where every land in a country belonged to a single master. Our generalized dependency on the digital masters seems to be “the cannibal future of liberalism in the age of algorithms”.

Is there a possible way out? The temptation is to go radical – a Blake/Burroughs crossover. We have to expand our scope of comprehension – and stop confusing the map (as shown in the Magna Carta) with the territory (our perception).

William Blake, in his proto-psychedelic visions, was all about liberation and subordination – depicting an authoritarian deity imposing conformity via a sort of source code of mass influence. Looks like a proto-analysis of the Digital Age.

William Burroughs conceptualized Control – an array of manipulations including mass media (he would be horrified by social media). To break down Control, we must be able to hack into and disrupt its core programs. Burroughs showed how all forms of Control must be rejected – and defeated: “Authority figures are seen for what they are:  dead empty masks manipulated by computers”.

Here’s our future: hackers or slaves.

 

*

Note to readers: please click the share buttons above or below. Forward this article to your email lists. Crosspost on your blog site, internet forums. etc.

How Government and Media Are Prepping America for a Failed 2020 Election

FILE – In this May 6, 2019, file photo Microsoft CEO Satya Nadella delivers the keynote address at Build, the company’s annual conference for software developers in Seattle. Microsoft says it has detected more than 740 infiltration attempts by nation-state actors in the past year targeting U.S.-based political parties, campaigns and other democracy-focused organizations including think tanks and other non-profits. (AP Photo/Elaine Thompson, File)

Russia, China and Iran are already being blamed for using tech to undermine the 2020 election. Yet, the very technologies they are allegedly using were created by a web of companies with deep ties to Israeli intelligence.

By Whitney Webb

Source: Mint Press News

As World War II drew to a close in Europe, British philosopher Bertrand Russell wrote that “neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of a great fear.”

Though numerous examples in the post-World War II era have proven Russell’s point, perhaps one of the best examples was the U.S. public’s willingness to swallow lie after lie about Saddam Hussein’s Iraq due to the climate of fear that followed the September 11 attacks. Those lies, propagated by dubious intelligence, government officials and a compliant media, resulted in catastrophes – large and small, both abroad and at home.

Today, an analogous narrative is being crafted by many of the same players – both in media and government – yet it has avoided scrutiny, even from independent media.

Over the past several months and with a renewed zeal in just the last few weeks, anonymous intelligence officials, dubious “experts” and establishment media outlets have crafted a narrative about the coming “chaos” of the 2020 election, months before it takes place. Per that narrative, certain state actors will use specific technologies to target the “American mind” in order to undermine the coming presidential election. The narrative holds that those efforts will be so successful that the U.S. will never recover as a democracy.

Though these anonymous government sources and their stenographers have already named the countries who will be responsible and the technologies they will use, they also admit that no evidence yet exists to back up these claims, meaning they are — at best — pure speculation.

Headlines such as “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” “Basically Every US National Security Leader Is Warning About Foreign Interference In The 2020 Election,” and “U.S. intel agencies: Russia and China plotting to interfere in 2020 election” have become increasingly common, despite no available evidence, as have warnings that the American public is defenseless against the old scourge of “fake news” and the new scourge of “deep fakes.” Some media reports have gone so far to say that actual foreign meddling isn’t even necessary as merely the fear of foreign meddling could be enough to upend the American political system beyond repair.

Historically, the goal of such fear-inducing narratives has been the trading of civil liberties for increased security, or rather, the appearance of increased security. Yet, when the need for security is felt due to a fear that is based on government-driven speculation and not on evidence, the goal of that narrative is not about protecting the public from a real, tangible threat but instead about the consolidation of power by the very groups responsible for crafting it — in this case, the intelligence community and other key players in the national security state.

However, what is particularly odd about this narrative surrounding imminent “chaos” and meddling in the upcoming 2020 election is the fact that, not only have the instruments of said meddling been named and described in detail, but their use in the election was recently simulated by a company with deep ties to both U.S. and Israeli intelligence. That simulation, organized and run by the Israeli-American company Cybereason, ended with scores of Americans dead, the cancellation of the 2020 election, the imposition of martial law and a spike in fear among the American populace.

Many of the technologies used to create that chaotic and horrific scenario in the Cybereason simulation are the very same technologies that U.S. federal officials and corporate media outlets have promoted as the core of the very toolkit that they claim will be used to undermine the coming election, such as deep fakes and hacks of critical infrastructure, consumer devices and even vehicles.

While the narrative in place has already laid the blame at the feet of U.S. rival states China, Russia and Iran, these very technologies are instead dominated by companies that are tied to the very same intelligence agencies as Cybereason, specifically Israeli military intelligence.

With intelligence agencies in the U.S. and Israel not only crafting the narrative about 2020 foreign meddling, but also dominating these technologies and simulating their use to upend the coming election, it becomes crucial to consider the motivations behind this narrative and if these intelligence agencies have ulterior motives in promoting and simulating such outcomes that would effectively end American democracy and hand almost total power to the national security state.

 

Media, intelligence foreshadow tech-powered doom for 2020

Even though the 2020 U.S. election is still months away, a plethora of media reports over the past six months (and even before then) have been raising concern after concern about how the U.S. election is still so vulnerable to foreign meddling that such meddling is essentially an inevitability.

Part of the reason for the recent pick-up in fear mongering appears to have been the release of a joint statement issued by key members of the Trump administration last November. That statement, authored by Attorney General Bill Barr, Defense Secretary Mark Esper, acting DHS Secretary Kevin McAleenan, acting Director of National Intelligence Joseph Maguire, FBI Director Christopher Wray, NSA Director Gen. Paul Nakasone, and Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs, claimed that foreign interference in 2020 was imminent despite admitting that there is no evidence of interference having taken place:

Our adversaries want to undermine our democratic institutions, influence public sentiment and affect government policies. Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions. Adversaries may try to accomplish their goals through a variety of means, including social media campaigns, directing disinformation operations or conducting disruptive or destructive cyber-attacks on state and local infrastructure.

While at this time we have no evidence of a compromise or disruption to election infrastructure that would enable adversaries to prevent voting, change vote counts or disrupt the ability to tally votes, we continue to vigilantly monitor any threats to U.S. elections (emphasis added).”

Despite the key caveat of there being no evidence at the time the statement was issued, media reports used the statement to claim that foreign interference in 2020 was imminent, such as in these reports from BuzzFeed, ABC News, and Newsweek.

In addition to the reports that have cast the involvement of state actors — namely Russia, Iran and China — as assured despite no evidence, other reports have made the claim that this allegedly imminent interference will inevitably be successful, largely due to claims that the tactics used will rely heavily on technology that the U.S. can’t hope to successfully counter. CSO Online, an online news outlets that provides news, analysis and research on security and risk management, recently warned that “fixing America’s voting and election infrastructure problems is a long-term proposition, one that won’t be fixed in time for the election in November” while the New York Times warned of imminent chaos and that “stealthier” malevolent foreign actors had already created the foundation for “an ugly campaign season marred by hacking and disinformation.” Wired claimed last year that U.S. election security “is still hurting at every level.”

In another example, Rolling Stone published an article earlier this month with the headline “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” which claims that “the reality is that: “We’ve made progress since the last election — but we’re much less secure than we should be.” The article goes on to say that claim that the goal isn’t necessarily to hack voting machines or change results, but “to merely create the impression of an attack as a way to undermine our faith in the electoral process.”

It continues:

The target is the minds of the American people,” says Joshua Geltzer, a former counterterrorism director on the National Security Council. “In some ways, we’re less vulnerable than we were in 2016. In other ways, it’s more.” Nearly every expert agrees on this: The worst-case scenario, the one we need to prepare for, is a situation that causes Americans to question the bedrock of our democracy — free and fair elections.”

Well before this type of rhetoric made its way into the U.S. media, Israeli intelligence-linked tech firm Cybereason claiming in a release on its website that “messing with a voter’s mind” would have a bigger impact than changing vote totals, even before the 2016 election. That release, published by Cybereason prior to the last presidential election, was authored by the company’s CEO, Lior Div, who used to lead offensive hacking operations against nation-states for Israeli military intelligence.

Notably, of all of these media reports, there is a clear consensus that one of the main tactics that will soon be used to meddle in the coming U.S. election will be the use of so-called “deep fakes.” Deriving its name from a combination of “deep learning” and “fake,” deep fakes involve video and audio that has been manipulated using artificial intelligence (AI) to create media that appears to be authentic, but is not. Concern about its use in the upcoming election has spurred not only a wealth of media reports on the matter but has prompted both the U.S. military and Congress to take action to limit its potential misuse.

One thing that stands out about the media narrative regarding election meddling and deep fakes is that several news organizations have published articles that state that deep fakes will be used to undermine the 2020 election, as opposed to stating that they could be used or that they are a phenomenon worthy of attention (though some reports have taken this more measured approach).

The reason for this level of confidence may owe to statements made by prominent U.S. intelligence officials last year, including those made by Dan Coats, the former Director of National Intelligence (DNI), who claimed in the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community that deep fakes and other hi-tech forms of fake media would be used to disrupt the 2020 election. Coats specifically stated:

Adversaries and strategic competitors probably will attempt to use deep fakes or similar machine-learning technologies to create convincing—but false—image, audio, and video files to augment influence campaigns directed against the United States and our allies and partners.”

Since Coats made the warning, numerous media reports have promoted the concern with little scrutiny, representing just one of the numerous times in U.S. history where narratives first authored by U.S. intelligence are subsequently promoted heavily by U.S. media, even when the claim made by intelligence officials is speculative, as it is in this case. Indeed, the narratives being promoted with respect to the 2020 election involve many of the same intelligence agencies (American and Israeli) and media outlets who promoted claims that were later proven false about “weapons of mass destruction” in Iraq prior to the 2003 invasion, among other pertinent examples.

Notably, deep fakes figured prominently and was the tool most used by malevolent hackers in Cybereason’s 2020 election simulation, which saw both video and audio-only deep fakes used to spread misinformation on national and local TV channels in order to impersonate police officers and election officials and to create fake bomb threats by posing as the terror group Daesh (ISIS). Cybereason also happens to be a partner of the organization funding the most well-known creator and producer of deep fakes in the world, an organization that — much like Cybereason itself — is openly tied to Israeli intelligence.

Aside from deep fakes, other technologies weaponized in Cybereason’s election simulation have also been the subject of several media reports, such as the hacking of Internet of Things (IoT) devices and appliances and even the hacking of vehicles that have some form of internet connectivity.  In the Cybereason simulation, IoT hacks were used to cut power to polling stations and disseminate disinformation while vehicles were hacked to conduct terror attacks against civilians waiting in line to vote, killing several and injuring hundreds.

Most media reports have claimed that these technologies will be part of the coming “explosion” in cyber warfare in 2020 and do not specifically link them to imminent election meddling. Others, however, have made the link to the election explicit.

 

Naming the culprits in advance

In addition to the apparent consensus on how foreign meddling will occur during the 2020 election, there is also agreement regarding which countries will be responsible. Again, this is largely based on statements made by U.S. national security officials. For instance, the joint statement issued last November by the DOJ, DOD, DHS, DNI, FBI, NSA, and CISA regarding 2020 election security, states that “Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions” before adding “at this time we have no evidence.”

Similarly, the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community, written by then-Director of National Intelligence Dan Coats, names these same three countries in relation to imminent 2020 election interference and states that their interference in the 2020 election is “almost certain.” The assessment adds the following about each nation:

  • Russia: “Russia’s social media efforts will continue to focus on aggravating social and racial tensions, undermining trust in authorities, and criticizing perceived anti-Russia politicians.”
  • China: “China will continue to use legal, political, and economic levers—such as the lure of Chinese markets—to shape the information environment. It is also capable of using cyber attacks against systems in the United States to censor or suppress viewpoints it deems politically sensitive.”
  • Iran: “Iran, which has used social media campaigns to target audiences in both the United States and allied nations with messages aligned with Iranian interests, will continue to use online influence operations to try to advance its interests.”

Coats’ assessment was enough to spawn numerous stories on the imminent threat that these three nations pose to the 2020 election, with headlines such as “U.S. intel agencies: Russia and China plotting to interfere in 2020 election.”

The vast majority of warnings regarding future election interference have come from U.S. intelligence officials with a dubious record of trustworthiness and a history of using the media to spread propaganda and disinformation, most famously through Operation Mockingbird. Most — if not all — of the recent and numerous articles on imminent interference rely heavily on claims made by the two aforementioned government documents, documents crafted by U.S. intelligence agencies for public consumption, as well as claims made by anonymous U.S. officials.

A recent New York Times article, for example, titled “Chaos Is the Point’: Russian Hackers and Trolls Grow Stealthier in 2020,” is based almost entirely on “interviews with dozens of officials and experts,” though the only government official named in the article is Shelby Pierson, the intelligence community’s election threats executive. The most quoted experts named in the article are Ben Nimmo, formerly of the hawkish, NATO-funded Atlantic Council and now with Graphika, and Laura Rosenberger, director of the neoconservative-created Alliance for Securing Democracy. The article nonetheless cites “American officials” and “current and former officials” several times to make claims about imminent election interference that paint a bleak picture of the current election season.

A recent article from The Hill relies on the acting head of DHS, Chad Wolf, as its only source, citing Wolf’s claim that “we fully expect Russia to attempt to interfere in the 2020 elections to sow public discord and undermine our democratic institutions” amid other warnings that Wolf gave about Chinese and Iranian cyber threats to U.S. elections. Other articles, including one titled “Russia, China plan to adjust their tactics to hack, influence 2020 elections” cite only Shelby Pierson of the U.S. intelligence community as its source for that headline’s claim. Another titled “Russia isn’t the only threat to 2020 elections, says U.S. intel” cites only anonymous U.S. intelligence officials, as the headline suggests.

Though Russia and China have consistently been named as the most likely election meddlers, reports have also been drumming up the likelihood that Iran will emerge as 2020’s foreign meddler of choice, especially in the months prior to and weeks after the killing of Iranian General Qassem Soleimani by the Trump administration. A recent “informal poll” conducted by the Washington Post asked hawkish think tank fellows, employees at companies like Raytheon and current and former federal officials if Iran would likely retaliate against the U.S. via cyberattack. The Post ran the results of the poll under the headline “Get ready for serious cyberattacks from Iran, experts say.”

Despite the media’s numerous warnings of imminent and “serious” cyber-retaliation from Iran, the only cyberattack attributed to the country after Soleimani’s death was the vandalism of the Federal Depository Library Program website, a rather benign act that was nevertheless blasted across headlines such as “US government website hacked with pro-Iranian messages, image of bloodied Trump.” The U.S. government is quoted in that article as saying that “At this time, there is no confirmation that this was the action of Iranian state-sponsored actors.”

Also notably absent from media reports is the fact that WikiLeaks revealed in 2017 that the CIA had stockpiled a library of “stolen” cyberattack techniques produced in other nations, including Russia and Iran. Those revelations, part of the Vault 7 release, revealed that the CIA’s UMBRAGE group was capable of “misdirect[ing] attribution [for cyberattacks actually done by the CIA] by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.” In other words, the CIA was more than capable of conducting “false flag” cyber attacks and blaming them on foreign actors.

Notably, one of the viruses being blamed on Iran for cyberattacks targeting the U.S. ahead of the 2020 election — called Shamoon — was “stolen” by the CIA’s UMBRAGE and cited in the WikiLeaks release.

 

Conflict of interest-ridden Microsoft “defends democracy”

Last year saw the tech behemoth Microsoft join the effort to blame foreign state actors, specifically Iran, for cyberattacks against the U.S. This helped to bolster assertions that had largely originated with a handful of U.S. intelligence officials and hawkish, neoconservative-aligned think tanks as media reports on Microsoft’s related claims treated the company as an independent private sector observer.

Yet, as MintPress investigations have revealed, Microsoft has clear conflicts of interest with respect to election interference. Its “Defending Democracy” program has spawned tools like “NewsGuard” and “ElectionGuard” that it claims will help protect U.S. democracy, but — upon closer examination — instead have the opposite effect.

Last January, MintPress exposed NewsGuard’s neoconservative backers and how special interest groups were backing the program in an effort to censor independent journalism under the guise of the fight against “fake news.” Subsequent investigations revealed the risk that Microsoft’s ElectionGuard poses to U.S. voting machines, which it claims to make more secure and how the platform was developed by companies closely tied to the Pentagon’s infamous research branch DARPA and Israeli military intelligence Unit 8200.

ElecionGuard software has since been adopted by numerous voting machine manufacturers and is slated to be used in some Democratic Primary votes. Notably, the push for the adoption of ElectionGuard software has been spearheaded by the recently created Cybersecurity and Infrastructure Security Agency (CISA), which is the federal agency tasked with overseeing election security and is headed by Christopher Krebs, a former high level Microsoft executive.

In recent months, Microsoft has also been at the center of claims that Iran attempted to hack U.S. presidential campaigns ahead of 2020 as well as claims that Iran plans to target the U.S. power grid and other critical infrastructure with cyberattacks.

Last October, Microsoft penned a blog post discussing a “threat group” it named Phosphorus that they “believe originates from Iran and is linked to the Iranian government.” The post went on to claim that Phosphorus attempted to target a U.S. presidential campaign, which later media reports claimed was President Trump’s re-election campaign. Microsoft concluded that the attempt was “not technically sophisticated” and ultimately unsuccessful, but felt compelled to disclose it and link it to Iran’s government.

Though it provided no evidence for the hack or its reasons for “believing” that the attack originated from Iran, media reports treated Microsoft’s declaration as proof that Iran had begun actively meddling in the 2020 election. Headlines such as “Iranian Hackers Target Trump Campaign as 2020 Threats Mount,” “Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says”, “Microsoft: Iran government-linked hacker targeted 2020 presidential campaign” and “Microsoft Says Iranians Tried To Hack U.S. Presidential Campaign,” were blasted across the front pages of American media. None of the reports scrutinized Microsoft’s claims or noted the clear conflict of interest Microsoft had in making such claims due to its efforts to see its own ElectionGuard Software adopted nationwide.

Media reports also left out the fact that Microsoft is a major government contractor for the U.S. intelligence community and the Pentagon. Notably, the Trump campaign, which Microsoft said was the target of this attack, was later identified as the only major presidential campaign using Microsoft’s “AccountGuard” software, part of its dubious “Defending Democracy” program that also spawned NewsGuard and ElectionGuard. AccountGuard claims to protect campaign-linked emails and data from hackers.

Microsoft surfaced not long after, again claiming that Iran was maliciously targeting the United States’ civilian infrastructure. This subsequent claim was first published by Wired and later covered by other outlets. Those reports cite a single person, Microsoft security researcher Ned Moran, who claimed that an Iran-backed hacking group called APT33 was targeting the U.S. “physical control systems used in electric utilities, manufacturing, and oil refineries.”

“They’re trying to deliver messages to their adversaries and trying to compel and change their adversaries’ behavior,” Moran told Wired. Moran also stated that “Microsoft hasn’t seen direct evidence of APT33 carrying out a disruptive cyberattack rather than mere espionage or reconnaissance, it’s seen incidents where the group has at least laid the groundwork for those attacks (emphasis added).”

 

Cybereason helps craft the narrative

While U.S. intelligence officials and media outlets alike have been largely responsible for setting the narrative that imminent meddling will be conducted by Russia, China and Iran, key components of that narrative, particularly with respect to China and Iran, have been laid by Cybereason, a company that recently ran 2020 doomsday election simulations and that has close ties to the intelligence communities of both the U.S. and Israel.

Shortly after the killing of Iranian General Qassem Soleimani earlier this month, an operation conducted in concert with Israeli intelligence, Cybereason warned that Iran could imminently retaliate with a cyber threat and quoted its own employees who explained what and how Iran would likely target in retaliation. Cybereason’s CSO Sam Curry, who actively participated in the firm’s 2020 doomsday election simulations, stated:

 This means that Iran’s “forceful revenge” response is likely to be less about the flash and all about the bang. If you have connected systems that are responsible for kinetic world effects, like ICS systems and critical infrastructure around water, energy or vital services, it’s time to pay attention. Iran and the US are engaged in Cyber brinksmanship, which means that the gloves are off as Iran picks it’s targets (emphasis added).”

Cybereason also quoted visiting fellow for the National Security Institute and former advisor to the U.S. Secret Service (which participated in Cyberaeson’s election simulations), Anne Marie Zettlemoyer, who claimed that Iran could soon target Wall Street and critical U.S. infrastructure like the power grid:

 An attack against the financial systems can be devastating economically and weaken the confidence and viability of markets. However, we cannot ignore the physical consequences and manifestations that can come from a cyberattack, particularly against critical infrastructure like energy and industry control systems.”

Cybereason’s claims regarding Iran’s interest in “critical infrastructure” systems likely originated with Microsoft, the claims were then parroted by the media in several reports, many of which quoted Cybereason’s Sam Curry. Curry is also a contributor to major news outlets like Forbes where he writes about Iran’s cyber warfare capabilities. 

Notably, in Cybereason’s recent allegations against Iran, it states that “it’s clear that Iran has been preparing for future geopolitical conflict by gaining access to critical infrastructure and other important operations in the United States.” It backs these claims by citing an article authored by Curry for Forbes. Following Soleimani’s death, numerous media reports, including in the UK’s The Independent and ABC News, have cited Curry as an “expert” source in claiming that Iran would retaliate with cyberattacks.

Microsoft’s claims about foreign hackers and meddling — the evidence for which have never been made public but has been parroted as fact nonetheless — are frequently supported by Cybereason.

Last August, Microsoft claimed to have foiled Russian attempts at hacking two Republican-affiliated think tanks and, despite providing no evidence, Cybereason’s then-senior director of intelligence services Ross Rustici was quoted as an expert in several media reports as saying that such behavior was to be expected from Russia. In one such report, Rustici stated:

We’re very good at fighting the last war, but the Russians are very good at evolving their game. I suspect if they’re going to do a psychological operation around the elections, the way they do it will be different than what they did in 2016. How effective the defenses we’ve built for what they did in 2016 will be for those attacks is yet to be seen.”

None of the media reports quoting Rustici mentioned Cybereason’s ties to Israeli intelligence, referring to tech firms only a “Boston-based cybersecurity company” and similar variants. Cybereason’s Intelligence Group is stuffed with former and active members of U.S. and Israeli intelligence services and has released several reports about nation-state hacking with a focus on Russia and China.

Cybereason has also been at the forefront of claims that China has been engaged in aggressive cyberattacks against multinational companies that have also seen widespread coverage in U.S. media, despite the untransparent nature of the evidence for Cybereason’s claims.

In a story that received major coverage from outlets such as Fox News, Reuters, CNBC and others, Cybereason unveiled what it called “Operation Soft Cell,” an operation that stole mass troves of data from several global telecommunications companies. In each story, Cybereason is the sole source of the claim and declined to provide the name or location of any of the affected companies. The firm also claimed to have determined that the attack was likely perpetrated by someone “backed by a nation state, and is affiliated with China.” It further claimed to have debriefed and coordinated responses with U.S. intelligence.

In an article for Reuters, Cybereason stated that “this time as opposed to in the past we are sure enough to say that the attack originated in China” while Cybereason separately told CyberScoop that it had “found hacking tools such as a modified web shell and a remote access trojan that are commonly associated with, but not unique to, Chinese hackers.” Despite the incongruity, media reports laid the blame squarely on China, as seen in headlines such as “Chinese spies have been sucking up call records at multinational telecoms, researchers say.”

Prior to uncovering Operation Soft Cell, Cybereason had warned on its blogs in the months and years prior that China would imminently target U.S. companies. The revelation of Operation Soft Cell — which originated exclusively with Cybereason — has been used to build the case that China is openly engaged in cyberwarfare against its rival states, like the United States, and targeting “democracy itself.”

 

Best Known Deep Fake Creator is Funded by Israeli Intelligence

While the media, and even Cybereason itself, have helped lay the foundation to blame specific state actors for 2020 election meddling well ahead of the fact, it is worth revisiting Cybereason’s “Operation Blackout” election simulation and the tactics used by the “bad actors” in that scenario.

That simulation, discussed in detail in the first installment of this series, saw the weaponization of specific technologies, namely deep fakes, hacks of Internet of Things (IoT) devices and hacks of vehicles, in order to target the 2020 U.S. election, resulting in the cancellation of the election and the imposition of martial law.

Given the current narrative regarding what state actors are likely to meddle in the 2020 election — namely Russia, China and Iran — and the tactics they will allegedly use, it is important to explore the sources of the technologies weaponized per that narrative as well as in “Operation Blackout.”

Indeed, if there is any clear overlap between the creators of those technologies and the state actors being blamed in advance for their imminent use, it would certainly lend credibility to the claims promoted by U.S. intelligence, the media and companies like Microsoft and Cybereason.

Yet, upon closer examination, it becomes clear that the companies and state actors most involved in developing these technologies are the very ones claiming that Russia, China and Iran will use them to undermine the 2020 election.

Take for instance the use of deep fakes. Not only have numerous media reports focused on how deep fakes will be used to meddle in the 2020 elections, but Cybereason’s doomsday election simulation saw “bad actors” rely heavily on their use to spread disinformation and even make fake bomb threats. While much has been said of the coming election and deep fakes, remarkably few reports have bothered to look at the company best known for creating viral deep fakes.

Canny AI has garnered considerable media attention over the past few years for its persuasive deep fake videos that have frequently gone viral. In the last year alone, the tech firm’s viral deep fakes have included a controversial video of Mark Zuckerberg where the Facebook co-founder appears to be saying “Imagine this for a second: One man, with total control of billions of people’s stolen data, all their secrets, their lives, their futures,” as well as a video showing Richard Nixon giving a speech he never actually gave. More recently, Canny AI was behind the viral videos immediately prior to the 2019 U.K. general election that appeared to show Jeremy Corbyn and his rival Boris Johnson endorsing each other and another video that showed world leaders singing John Lennon’s “Imagine”:

Oddly, many of the media reports that discuss these viral videos fail to mention the role of Canny AI in creating these viral deep fakes and instead only mention the organization or artists with whom Canny AI partnered to create them. For instance, the Corbyn-Johnson videos were reported to have been produced by the group Future Advocacy and artist Bill Posters, but it was actually Canny AI that created those videos for that group. Similarly, the Nixon Speech deep fake was reported by several outlets as having been solely created by MIT’s Center for Advanced Virtuality. However, the Boston Globe noted that “the [MIT] team worked with Canny AI, an Israeli company that does Video Dialogue Replacement, and Respeecher, a Ukrainian startup specializing in speech-to-speech synthetic voice production” to create the video.

The Zuckerberg deep fake that Canny AI created led to lots of positive press for the company, with several media reports dubbing them as the company using “deep fakes for good” and that uses the controversial technology “responsibly.” The Zuckerberg deep fake has been cited as one of the main drivers behind Facebook’s new “deep fake” policy, which only bans some deep fake videos and has been criticized by U.S. lawmakers as insufficient. Notably, neither Facebook nor Facebook-owned Instagram ever took down Canny AI’s deep fake of Zuckerburg.

Given the concern over deep fakes in relation to the coming election and Canny AI standing out as the main producer of deep fakes that have gone viral over the past year, it is important to point out that Canny AI has ties to a state actor with a history of election meddling: the state of Israel.

Indeed, Canny AI is 100 percent funded by an Israeli start-up accelerator called Xcelerator, a joint venture between Tel Aviv University and Israeli intelligence agency Shin Bet (sometimes called Shabak). According to Start Up Nation Central, the Paul Singer-created organization that promotes Israeli technology start ups, Xcelerator-funded “start-ups participating in the program benefit from close mentoring from content and technology experts from the Shabak, experts from Tel Aviv University, and industry leaders. The connection to the Shabak also provides the entrepreneurs with ways to test the capabilities of their technologies and cooperation opportunities (emphasis added).”

In addition, Xcelerator is partnered not only with Israeli intelligence directly, but also with Cybereason, the very company that explored the use of deep fakes in the 2020 U.S. presidential election that saw the election cancelled and martial law declared as well as a company that itself has deep ties to Israeli intelligence. Other notable partners of Xcelerator include NEC Corp, which has intimate ties to top Cybereason investor Softbank; Check Point Technologies, which has ties to Israeli military intelligence Unit 8200; and the Israeli start-up accelerator Team8. In previous reports published by MintPress, Team8 was discussed in detail, particularly their recent hire of former director of the NSA and former head of U.S. Cyber Command Mike Rogers, and their close ties to Paul Singer’s Start Up Nation Central, which itself has deep ties to U.S. neoconservatives.

It is also worth noting that Xcelerator also backs an “anti-fake news” start-up called Cyabra, which has direct ties to Israel’s Mossad and offers its AI-driven “disinformation protection” to government agencies as well as politicians, particularly during election seasons. Two of Cyabra’s co-founders previously co-founded Psy-Group, which attempted to interfere in the 2016 U.S. election by weaponizing “fake news” and social media and later closed down its operations after U.S. government scrutiny into its activities began as part of the Mueller investigation.

Psy-Group also engaged in doxxing campaigns targeting Palesintian rights activists in the U.S. which were planned in conjunction with Ram Ben-Barak, the former deputy director of the Mossad who now advises Cyabra. Given that much of the concern ahead of the next election is related not only to deep fakes but also “fake news,” Cyabra’s rise and its clear ties to Mossad and the now defunct Psy-Group are important to note.

Furthermore, in examining the other technologies weaponized during Cybereason’s 2020 election simulation and cited in the aforementioned media narrative regarding 2020 meddling, a pattern similar to that of Canny AI emerges.

Indeed, the other technologies linked to these “bad actors” and foreign meddlers — namely hacking IoT devices and hacking vehicles — are also pioneered by companies with deep ties to Israeli military intelligence, specifically Unit 8200, and Israeli tech companies that have aggressively spied on U.S. government institutions in collusion with Israeli intelligence in the past, namely Comverse (now Verint) and Amdocs.

 

Hacking the Internet of Things

In Cybereason’s doomsday election simulation, another of the tactics used was the hacking of devices and appliances connected to the internet, often referred to as the Internet of Things (IoT) and which includes everything from smartphones to power grid infrastructure to city traffic lights.

While most reports on IoT hacks to date have focused on “lone wolf” or non-state-aligned actors, one company has stood out for its efforts to create a tool that would allow governments and intelligence agencies to hack these devices with ease. That company, called Toka, announced in 2018 that it planned to offer “a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain,” with “a special focus on [hacking] the so-called Internet of Things (IoT), covering tech like Amazon Echo, Nest connected home products, as well as connected fridges, thermostats and alarms.”

The Israel-based company, which raised $12.5 million within months of launching, has since been busy marketing its services to governments around the world, most recently France where it described its product portfolio as “empower[ing] governments, Intelligence, and law enforcement agencies to enhance Homeland Security with groundbreaking cyber-intelligence and operational capabilities” during an exposition in Paris last November.

Even though Toka openly markets the ability to hack private consumer devices to governments and law enforcement agencies around the world, the clear threat to privacy has gone ignored by media outlets as the company has garnered nearly no media attention since it launched nearly two years ago.

Yet, Toka is not only notable for what it offers but also for its founders and investors. Indeed, the co-founders of Toka have been described as an “all-star” team, largely because of the role of former Israeli Prime Minister and former head of Israeli military intelligence, Ehud Barak. Barak, in addition to co-founding the company, serves as its director and is also the chairman of the board of the controversial Israeli company Carbyne911, which markets software to emergency call centers in the United States. Interestingly, Cybereason’s 2020 doomsday election simulation also dealt with the hacking and weaponization of 911 call centers. Also of note is the fact that another of Carbyne911’s leadership team, former Unit 8200 commander Pinchas Buchris, is an adviser to Cybereason.

Toka’s top brass is a who’s who of former Israeli military and intelligence officials

In addition to Barak, Toka was co-founded by retired Brigadier General Yaron Rosen, former Chief of the IDF’s cyber staff, where he was “the lead architect of all [IDF] cyber activities” including those executed by Israeli military intelligence Unit 8200. Rosen, who now serves as Toka’s CEO, has stated that Toka’s technology will only be sold to countries allied with the U.S. and Israel, telling Forbes that “Russia, China and ‘other enemy countries’ would never be customers.”

Toka’s leadership and software architects are similarly tied into Israel’s national security state. Several — including the “architect” of its hacking software — previously worked for Israel’s Prime Minister’s Office and developed “offensive technologies” for Israel’s head of state and other top Toka employees and executives share numerous connections to Unit 8200, other divisions of Israeli military intelligence and Unit 8200-connected tech companies like Check Point Technologies.

Though Toka’s leadership team makes its ties to Israeli military intelligence abundantly clear, important connections also appear in examining Toka’s investors. One of the major investors in Toka is Dell technologies, one of the world’s largest technology companies that was founded by Michael Dell, a well-known pro-Israel partisan who has donated millions of dollars to the Friends of the IDF and one of the top supporters of the so-called “anti-BDS” bills that prevent publicly employed individuals or public institutions from supporting non-violent boycotts of Israel, even on humanitarian grounds. It goes without saying that a major technology company investing in a company that markets the hacking of that very technology (computers, IoT, smartphones, etc.) should be a red flag.

With a major foot in the door through its connections to Dell, whose products are used by the private and public sectors around the world, other investors in Toka again reveal its ties to Israel’s military intelligence and the same controversial Israeli tech companies that have aggressively spied on the U.S. government in the past — Amdocs and Comverse. For instance, Entrèe Capital, a venture capital fund that is one of Toka’s main investors, is managed by Aviad Eyal and Ran Achituv. The latter, who manages Entrée’s investment in Toka and sits on Toka’s board of directors, is the founder of the IDF’s satellite-based signals intelligence unit and also a former senior Vice President at both Amdocs and Comverse Infosys (Verint).

Another notable investor in Toka is the venture capital firm Andreesen Horowitz, which is advised by former Secretary of the Treasury Larry Summers, a close friend of the infamous pedophile Jeffery Epstein, whose own ties to Israeli military intelligence have been discussed in several MintPress reports. Epstein was also a close friend of Ehud Barak, co-founder and director of Toka, and invested at least $1 million in another company with close ties to Barak, Carbyne911. The remaining investors in Toka are Launch Capital, which is deeply tied to the Pritzker family — one of the wealthiest families in the U.S. with close ties to the Clintons and Obamas as well as the U.S.’ pro-Israel lobby, and Ray Rothrock, a venture capitalist who spent nearly three decades at VenRock, the Rockefeller family venture capital fund.

 

Unit 8200 – From Hacking Cars to Protecting Them?

Arguably the most disturbing aspect of Cybereason’s “Operation Blackout” election simulation was the hacking of vehicles that were then rammed into civilians waiting in line to vote at polling stations. In the simulation, this led to scores of dead Americans and hundreds of injuries.

As was the case with other technologies used to undermine the 2020 election in the simulation, this technology — the hacking of vehicles — is the bread and butter of an Israeli cybersecurity firm called Upstream Security that specializes in automobiles and boasts deep ties to the country’s military intelligence service.

Though vehicle hacking seemed out of left field when the 2020 election simulation took place last November, media reports about the imminent dangers of “car hacking” began to emerge just a month after the exercise took place, most of which cited a December 2019 report created by Upstream. Some of those reports have warned that car hacking could be used to undermine the coming U.S. election.

One report titled “Car Hacking Hits the Streets,” cites only Upstream’s report to claim that “In 2020, the connected-car market will reach a tipping point, with the majority of vehicles already connected to the Internet when sold in the United States, representing a large base of potential targets for attacks.” Another report, titled “New study shows just how bad vehicle hacking has gotten,” uses Upstream’s report (i.e. study) to claim that hacks of regular vehicles have exploded since 2016 and that most of the cars on U.S. roads today are vulnerable to hackers and that over 80 percent of those hacks occur remotely.

Neither report noted Upstream’s ties to Israeli military intelligence. Equally notable is the fact that both reports that covered the Upstream-written study say that only manufacturers can address the problem by partnering with a company like Upstream.

Lucky for Upstream, they have already partnered with a slew of auto manufacturers, including Hyundai, Volvo, Renault and even U.S. auto insurance giants like Nationwide, who now number among Upstream’s most important investors. The company’s original investors are Charles River Ventures, one of Cybereason’s first investors, and Israeli venture capital firm Glilot Capital.

Glilot Capital’s interest in Upstream is telling given the firm’s deep ties to Israel’s Unit 8200. Glilot was founded by two former Israeli military intelligence officers and has “a heavy focus on the cyber sector and the entrepreneurs who emerge from the elite Unit 8200,” according to the Jerusalem Post. Even the name of the firm is an homage to Unit 8200, as the unit’s main base is located in Glilot, near Herzliya.

“It’s as if Americans called a VC Fort Meade Capital [the US Army base in Maryland where the National Security Agency and the United States Cyber Command are headquartered], some VC names are meant to be symbolic, as in our case. Glilot is the home of several of the best intelligence and technology units in the IDF, it’s where we came from and it is where we find our best entrepreneurs,” Glilot Capital co-founder Arik Kleinstein told the Jerusalem Post in 2016.

Upstream is certainly the type of company that Glilot Capital is used to investing in. It was founded by two Israelis who both served in the IDF, with one of them serving in an elite intelligence unit. Upstream’s co-founders, Yoav Levy and Yonathan Appel, met while working at Check Point Technologies, the Unit 8200 alumni-founded company with deep ties to Israel’s military intelligence and military-industrial complex as well as the IoT hacking company Toka. Notably, Upstream recently partnered with the Japanese company Fujitsu, a longtime partner with Softbank — Cybereason’s main investor.

Softbank has also invested heavily in another Unit 8200-founded vehicle security start-up called Argus Cyber Security, a firm known for its numerous demonstrations showing how easy it is to hack vehicles. Argus is also backed by Nadav Zafrir, the former Unit 8200 commander who now runs Team8. Argus’ CEO Ofer Ben-Noon, a former captain in Unit 8200, told Forbes in 2014 that “Everything will be hacked in every single [car] brand. It will take time, it might be weeks, months, or a couple of years, but eventually it will happen.”

Since then, Unit 8200 alumni from Argus, Upstream and other Israeli automobile cybersecurity firms have shown media outlets around the world how much easier hacking vehicles has become in the years since Ben-Noon first made the claim. One such report from VICE includes a vehicle hacking demonstration, courtesy of a Unit 8200 alumni, and notes that “most cars today are susceptible to hacker attacks.”

Of course, Unit 8200 isn’t the only intelligence agency known to be experts at hacking vehicles. Indeed, in 2017, WikiLeaks revealed that the CIA was capable of hacking vehicles and exploring their use in committing “undetectable assassinations.”

 

“Bring down nations to their knees”

At the Tel Aviv Cybertech Conference in 2017, Israeli Prime Minister Benjamin Netanyahu stated the following:

Today warfare has changed dramatically…With a click of a button, you can bring down nations to their knees very rapidly if you so desire and if you’re willing to take the risks, because every system can be hacked. Our hospitals, our airplanes, our cars, our banks. The most important word here is our data banks, they can be hacked.”

Media reports and even members of the Israeli public and private sector have openly acknowledged that Israel’s intelligence apparatus — from Unit 8200 to the Mossad — remains directly linked to many of the private technology companies founded by its former members, especially in the field of cybersecurity. Though reports on the matter often praise this merging of Israel’s public and private spheres, they rarely acknowledge the documented corruption within Unit 8200, the unit’s dark past in recruiting felons and even pedophiles to join its ranks, or the danger posed by having companies directly linked to foreign intelligence being given access to the U.S. government’s most classified and sensitive systems and data.

The last omission is particularly troubling given that Israeli intelligence has not only been caught aggressively using private tech companies to spy on U.S. federal agencies and networks, but also intercepting the private communications of at least two U.S. presidents and using a notorious pedophile to sexually blackmail American politicians.

As was mentioned in the first installment of this series, Cybereason’s CEO Lior Div offers a clear example of this worrisome bridge between Israel’s public and private sector, as Div has openly stated that he views his work at Cybereason as a “continuation” of his service to Israeli military intelligence, where he led offensive cyberattacks against other nations.

Given Div’s past statements and his company’s clear ties to both Israeli and U.S. intelligence, Cybereason’s simulation of the 2020 U.S. election — which involved terrorist attacks and led to the election’s cancellation and the imposition of martial law — is highly concerning. This is particularly so considering that Cybereason’s investors have direct ties to individuals who would benefit from the election’s cancellation and also considering the clear narrative that has emerged in recent months regarding how the coming election will inevitably fall victim to tech-driven “chaos” in coming months.

The clear overlap between Cybereason’s simulation and the intelligence-driven media narrative is clear cause for concern, especially considering that the technologies that they highlight as ultimately upending the election are dominated by the very same intelligence agencies simulating and crafting that narrative.

The keyword that has been used to describe the end result of both Cybereason’s simulation and the prevailing media narrative regarding the 2020 election is “chaos,” chaos so imminent, widespread and unruly that it will shake American democracy to its core.

What has been left unsaid, however, is that a government’s solution to “chaos” is always the imposition of “order.” This means that — whatever “chaos” ultimately ensues prior to or on election day — will result in a government response that will do much more to crush freedom and undermine democracy than any act of foreign meddling has, be it real or imagined.

Ecuador Has Been Hit by 40 Million Cyber Attacks Since Assange’s Arrest

By Elias Marat

Source: The Mind Unleashed

The government of Ecuador claims that the country has come under a broad and concerted cyber attack, with approximately 40 million attempts to compromise web portals connected to public institutions ever since the controversial decision to allow UK police to forcibly remove Wikileaks founder Julian Assange from their London Embassy.

Deputy Minister of Information and Communication Technologies Patricio Real told reporters that the wave of attacks began shortly after last Thursday’s arrest of Assange by British authorities. Real said that the attacks “principally come from the United States, Brazil, Holland, Germany, Romania, France, Austria and the United Kingdom, and also from here, from our territory.”

On April 11, Ecuadorian President Lenin Moreno revoked the diplomatic asylum extended to Asange by the South American nation in 2012. In a legally dubious move, Quito also revoked the Ecuadorian nationality granted to Assange in 2017.

Ecuador’s El Comercio reported that the telecommunications ministry’s undersecretary of electronic government, Javier Jara, claimed that following “threats received by these groups related to Julian Assange”–such as the shadowy network Anonymous–the country began suffering “volumetric attacks.

Volumetric attacks are a type of distributed denial of service (DDoS) attack in which servers are flooded with requests in an attempt to overload them with traffic, thus preventing users from accessing the network.

According to AFP, the targets included the foreign ministry, central bank, tax authorities, the office of the president, and a number of other government agencies’ websites. None of the attacks succeeded in destroying or stealing data.

The attacks also come amid the Ecuadorian government’s detention of Ola Bini, a Swedish national and software developer allegedly tied to Wikileaks who was detained last Thursday as he attempted to attend a martial arts event in Japan. Bini, as well as two unidentified Russian “hackers,” are being held for their alleged role in a “hackers’ network” based in the country. Bini, who is accused of having met with Assange 12 times, has also just been accused of playing a role in blackmail attempts targeting President Moreno.

Since 2017, Assange’s relationship with his Ecuadorean hosts sharply deteriorated amid President Lenin Moreno’s attempts to curry favor with international creditors and wealthy governments in the north such as the United States, the United Kingdom and Spain. Moreno began referring to Assange on various occasions as a “miserable hacker,” an “irritant,” and a “stone in the shoe” of his government.

Last year, the London embassy cut off his access to the internet for alleged political meddling following requests by Quito that he stop commenting on affairs in other countries.

Relations took a strong turn for the worse in March following the release of a batch of documents known as the “INA Papers,” which implicated the president in alleged corruption, including money-laundering, offshore bank accounts and a shell company named INA Investment Corporation that is based in Panama and was used by President Moreno’s family to procure furniture, property, and luxury goods.

It is widely speculated that while Wikileaks has still not been directly tied to the release of the INA Papers, President Moreno was enraged after personal photographs were released showing his opulent private life, including photos of the president enjoying lavish lobster breakfast-in-bed and lobster dinners–imagery considered damning by Ecuador’s electorate especially given Moreno’s prior boasting of a poverty diet of eggs and white rice, which he claimed to regularly eat as he rammed through austerity measures that led to thousands of layoffs in the poor yet resource-rich South American country.

Within Ecuador, opinions have been evenly split about Assange, with the country’s right-wing and centrists supporting the decision to end his asylum while the left and supporters of former President Rafael Correa have considered the move a scandalous act of outright prostration before the “imperialists” of the Global North.

As such, social media reactions to the government’s complaints of “cyber attacks” have provoked both outrage and mockery from the Ecuadorian public, with some social media users thanking Assange for releasing the INA Papers and others claiming that the attacks will serve as a convenient smokescreen for the country’s authorities to further plunder the public coffers of the South American country.

Cyberwar: #RussiaGate Is US

By Rob Williams

Source: Project Censored

The following is a critical book review of Kathleen Hall Jamieson’s Cyberwar: How Russian Hackers and Trolls Helped Elect A President – What We Don’t, Can’t, And Do Know (Oxford: Oxford University Press, 2018).

“Russia hacked the 2016 US election!”

Since November 2016, the US “news” chatterati – pundits and poets, priests, prognosticators and politicians – have repeated this statement ad nauseum. The #RussiaGate story has become a commonly-accepted article of faith amongst the US neoliberal faithful – disgruntled Clintonistas, bereaved “Bernie Bros,” US news flaks, and anyone else who dislikes the current occupant of the White House. If the “Russia hacked the 2016 US election” meme warriors had a high-viz US standard bearer, it would probably be popular MSNBC performance artist Rachel “All Russia, All The Time” Maddow, who serves up the #RussiaGate sauce with reckless abandon to high TeeVee viewer ratings, earning somewhere between $30 and $40 K daily in salary. (LINK to RM mashup here).

And now, we have a scholarly book published by Oxford University Press with an epic title – Cyberwar: How Russian Hackers and Trolls Helped Elect A President – What We Don’t, Can’t, And Do Know – that purports to prove that Russia’s cyber-meddling helped sabotage the HRC campaign, swinging the 2016 US presidential election in favor of DJT.

To approach Cyberwar, first consider everything on the table re: the 2016 US presidential election.

Here‘s just a short list.

Witness the two most unpopular presidential candidates in US political history (one of whom confidently encouraged the other to run, convinced she could beat him); massive and well-documented bipartisan digital vote count manipulation (“electile dysfunction”) courtesy the 2002 “Help America Vote Act” (Orwell would be impressed); the grotesque (human) nature of Donald J Trump and Republicans’ comical attempts to first displace and then eventually come to terms with his 2016 candidacy; the complete corruption of the national Democratic Party leadership, which did everything it could to crown HRC the Dem standard bearer, from systematically undermining insurgent Vermont “progressive” Bernie Sanders’ presidential bid (read the 110 page report “Democracy Lost” for detailed descriptions of how the DNC manipulated 2016 Democratic primary outcomes in 11 swing states) to diverting DNC fundraising – millions of dollars collected from the pockets of ordinary Americans – away from so-called “down ballot” local office races and into HRC presidential campaign coffers during the heated months of 2016.

There’s so much more, but I’ll simply stop there.

Rather than looking in the 2016 mirror, however, US blames…Russians?

To be clear, I approached Cyberwar with an open mind. I am a big fan of the book’s author, distinguished US media scholar Kathleen Hall Jamieson (KHJ), longtime badass in the world of political communications scholarship, and current Elizabeth Ware Packard Professor at the Annenberg School for Communication at the University of Pennsylvania and the Director of the Annenberg Public Policy Center. Jamieson’s got street cred. However, after a close read and re-read of KHJ’s new book, including all the footnotes, Cyberwar left me unconvinced by its “more or less” central conclusion – “Russia trolled and hacked the 2016 US election, sorta!” In fact, I’d suggest that Cyberwar is a deeply problematic book, a fascinating scholarly study in “manufacturing consent” – the term Edward Herman and Noam Chomsky borrowed from Walter Lippman to title their 1988 book of the same name – describing how US elites “massage” US news channels like the New York Times, “filtering” into public view the “news” stories most beneficial to their strategic goals, while downplaying or censoring other worthy “news” stories of significance.

To fully understand my critique of Cyberwar, start with Jamieson’s credulous acceptance of “facts” provided by the US “intelligence community” (my new favorite Orwellian trope) re: the Russian government’s “interference” to advance her Cyberwar case. More on that in a moment. In the meantime, here is KHJ’s central Cyberwar claim, summarized in a single long sentence, slightly paraphrased for brevity, from her book’s conclusion: “In the run up to the 2016 US presidential election, Russian trolls and hackers carried out a strategically systematic and ultimately successful communications campaign to discredit Democratic presidential candidate Hillary Rodham Clinton and support Republican presidential candidate Donald J. Trump through sufficiently widespread messaging that focused on issues compatible with Trump’s strategic needs, addressing constituencies he had to mobilize and demobilize, by employing persuasive, visually evocative and well-targeted content that was amplified in swing states through sharing, liking, and commenting.” (p. 203).

It’s a mouthful, I know, and when you read it over a few times, removing both Clinton and Trump’s names, you quickly realize that this is what ANY strategic political campaign using digital tools –Cyberspace’s unique power and reach – would set out to do to try and win any election, anywhere. Russian president Vladimir Putin himself concedes that Russia wages “campaigns of political influence” wherever and whenever they can, just as the US and other powerful countries do and have done for decades, using as many communications tools as they can leverage.

So – how does Jamieson set out to prove Russian Cyberwar? She divides her book into four parts.

Part One of Jamieson’s book explores “who did it, why, and what research says about it might matter.” Here, KHJ flags the Internet Research Agency (IRA), a Russian troll farm, and introduces the reader to her previous ground-breaking work on communications effects research – how techniques like agenda-setting, framing, priming and “contagion creation” have worked over time to influence US voter decisions, and thus, perhaps, election outcomes. Big caveat here, that KHJ leaves unacknowledged. To wit – presumably, Russian “trolls” share the same primary goal as ALL trolls on the Internet, namely, maximizing audience engagement (and thus profit) through the creation and deployment of relevant content, with their chief “currency” being click-throughs, likes, shares, retweets, etc.

In Part Two of Cyberwar, Jamieson looks at what she calls “the prerequisites of [Russian] troll influence.” “Were the extent and virality of Russian social media content and the nature, coverage, and exposure of Russian-hacked Democratic materials,” she asks, “sufficient and sufficiently persuasive to plausibly affect the outcome of an election decided in three states by about 78,000 votes?” (p. 65). Hint – her final answer is a circumspectly strong “maybe.”

Part Three of Cyberwar finds KHJ considering “how the Russians affected the news and debate agendas in the last month of the presidential campaign.” Here, Jamieson looks at how “Russian hacked content” (her words) transformed the nature of US news coverage surrounding HRC in the month before the 2016 election, with a particular focus on the “drip drip drip” impact of “WikiLeak’d” emails illegally obtained from Democratic National Committee (DNC) servers, as well as FBI director James Comey’s role, during October 2016, in reopening the investigation into “newly-found” HRC emails, which KHJ argues helped shape public impressions around HRC for undecided US voters in the days just before the election.

Jamieson uses Cyberwar Part Four to provide a brief summary of “what we don’t, can’t, and do know about how Russian hackers and trolls helped elect Donald Trump.” “My case that the uses of Russian-hacked (emphasis added) Democratic materials influenced voters is built on scholars’ understandings of the effects of linguistic priming, media agenda setting, and framing the susceptibilities of late deciders, the dispositions of those who view both candidates unfavorably, the effects of imbalances in the amount of negative information available about alternative candidates, and scholarship on how debates affect voter attitudes,” Jamieson concludes. “It is scaffolded on evidence that the hacked content not only altered the media and debate agendas but also increased the negative press about Clinton. And it is bolstered by the possibility that Russian access and anticipated use of illegally gotten or fabricated Democratic content shaped a key decision by FBI director Comey.” (210)

To be fair, Cyberwar is an engaging read. Jamieson is a fine scholarly writer, and she has a field day digging into the aesthetics of individual Russian troll farm memes – complete with pictures. (The “Army Of Jesus” Facebook page, purportedly created by Russian trolls, features a boxing glove clad HRC sporting devil horns engaged in a fierce arm-wrestling match with Aryan Jesus himself. Hilarious.) KHJ also does a credible job tracing the evolution of the US news narrative around HRC in the weeks leading up to the 2016 election, showing how pivotal moments may have influenced voter perceptions about both HRC and DJT.

However! Individual Russian troll farm memes and evolving US “news” media coverage negatively impacting HRC do NOT a strategic Kremlin-led messaging campaign make.

Cyberwar continually flirts with a central question (which has become a story routinely told by US “news” media outlets)  – “Was Russian troll farming some sort of Kremlin-staged strategic cyber-op?” – without ever really answering it. The result is a book-length begging of this very important question, and here we come to the primary problem with Cyberwar– and it’s a whopper. Jamieson build her case for the Russian “tanking” of HRC’s candidacy on two central assumptions, both unproven.

Assumption #1: Jamieson implicitly asserts in Cyberwar that the Russians “hacked” into the Democratic National Committee (DNC) computer servers (as well as other hacks) and obtained digital copies of thousands of what became publicly damning emails from members of the DNC leadership team – Clinton campaign advisor John Podesta, HRC herself, and others – and then (by extension) tried to leverage the contents of these stolen documents for months in US social media spaces (and, by extension, influenced the shaping of US news narratives about HRC.) Interestingly, KHJ sneaks in “Russia hacked” and “Russian-stolen Democratic content” language into the last third of her book, without directly addressing this BIG rhetorical move or providing any proof that the Russians did so. Instead, she appears to implicitly draw on “evidence” for Russian hacking provided by the US “intelligence community” – former FBI director turned Trump special prosecutor Bob Mueller, former director of national intelligence James Clapper, and former National Security Agency director Michael Hayden chief among them. (Mueller, Clapper, Hayden – three US government officials who have all been less than honest with the American people, and I’m being generous.)

The counternarrative to the “Russia hacked into the DNC computers” story? Information was “leaked” from inside the DNC, not hacked from the outside. How might we know? Former NSA cryptographer Bill Binney, former CIA official Ray McGovern, and many other members of the 2003-founded Veteran Intelligence Professionals for Sanity (VIPS) argue that, based on their review of computer bit rate information, the stolen DNC content traveled at bandwidth rates too high to have been an external “hack,” but rather an internal “leak.” The reality? We’ll never know for sure, because the DNC refused to hand over their compromised computer servers to the FBI, instead contracting with Crowd Strike, a private US cybersecurity firm, to ascertain affirmative Russian hacking involvement (#Surprise!). For interested readers, NSA whistleblower Bill Binney discusses his “leak versus hack” conclusions on this recent episode of Brass Check TV between 1:27 – 1:37 here.

Assumption #2: In Cyberwar, Jamieson implies that WikiLeaks closely collaborated with the Russian government, or at the very least (it’s a bit hard to tell from her lack of analysis here), Putin used WikiLeaks as its public relations machine to destroy HRC’s reputation and elevate DJT as a presidential candidate. In other words, from his Ecuadorian embassy prison, Assange was in close cahoots with Putin, Cyberwar implies, or at the very least, Assange served as a “useful idiot” for the Kremlin. Here again, KHJ offers no proof, other than continually flagging the usual suspects, Russian troll farmers and hackers, as well as other sources such as the popular RT (formerly Russia Today) news channel for alleged disinformation shenanigans, such as broadcasting an exclusive in-depth interview between independent British journalist John Pilger and WikiLeaks’ co-founder Julian Assange on November 6, 2016, two days before the election.

Side note – this interview, entitled “Secret World of US Election,” is fascinating (see here).

RT/Russia Today now carries a variety of US news shows  hosted by US news journalists now unable to find access to the US airwaves, individuals like former MSNBC journalist Ed Schultz (now deceased), former US talk show host Larry King, and Pulitzer Prize winning former New York Times foreign correspondent Chris Hedges. Ironically, RT’s news content is often much more in-depth than any stories provided by the US corporate commercial TeeVee channels – watch any episode of Chris Hedges’ “On Contact,” for example, to hear perspectives on US politics you’ll rarely find on any other US news channel. On December 31, 2018, RT aired an episode of Larry King’s program talking with longtime Russia expert and War With Russia? author Stephen Cohen, and the show begins with King parroting the “Russia interfered in the US election” meme, a claim Cohen respectfully disputes before launching into a cogent and thoughtful analysis of the importance of a 21st century US-Russia “partnership” (not “friendship”) instead of more US/NATO aggression on Russia’s borders,  and how DJT’s overtures to Russia have been continually hamstrung by US political and media elites. Here’s a link for further listening. It bears repeating, and King and Cohen discuss this at some length, that Cohen’s point of view re: Russia is now considered “radical” in US policy-making circles, despite the Cold War between the US and Russia having been officially over for thirty years.

Back to WikiLeaks and the organization’s alleged conspiring with the Kremlin. Suffice to say, as the world’s first truly “stateless” news organization, WikiLeaks’ role as a powerful platform for publishing information provided by corporate and state insiders-turned-whistleblowers has been consistently credible and accurate, as well as proving a colossal PITA for US political and economic elites on all sides of the aisle. And yes, Assange and WikiLeaks have reserved special ire for the Clintons, and indeed, Assange admitted to actively working with the DJT campaign in the months leading up to the 2016 US presidential election. To implicitly blame the Russians for WikiLeaks’ behavior, however, as KHJ does in Cyberwar, is disingenuous at best.

Here’s a single example of this troublesome conflation based on faulty assumptions from page 149 pf KHJ’s Cyberwaranalysis: In early October 2016, Jamieson asserts, “a DHS-ODNI intelligence report confirmed that the Russians were behind the hacking of the DNC…and a first tranche of Russian-hacked Podesta emails was WikiLeak’d.” She then goes on to detail (rightly in my estimation) the damning impact of these documents on US news coverage of HRC’s campaign. But read her sentence above again to understand the broad leaps she is making, which go well beyond Russian troll farmers.

And here is the rub. At day’s end, Jamieson’s case for Russian Cyberwar squarely rests on these two assumptions, both unproven. The result? KHJ makes mountains out of molehills – amateurish Russian troll farming on Facebook and Twitter, and (maybe?) a “campaign of influence targeting HRC” is transmogrified, in her implicit final analysis AND by uncritical coverage of her Cyberwar book in the popular US news media, into Putin’s Russian government strategically penetrating to the very heart of the US electoral process, “gaming” the outcome against HRC and in favor of DJT. In this tense geopolitical moment, when corporate for-profit and “deep state” US “news” media mouthpieces supporting the Empire’s “full-spectrum dominance” of planet Earth on the Pentagon’s behalf are blindly thrashing about looking for someone (or some country) to blame, Cyberwar only adds fuel to the fires of the #RussiaGate hysteria.

Bigger picture? Even more troublesome for any American who still believes in the transformative power of free, open, and democratic discourse are the ways in which the two-year-old #RussiaGate tale is now being leveraged by US elites here in the “Homeland.” “Behavioral microtargeting,” a digital communications strategy pioneered in 2016 by UK-based Cambridge Analytica CEO Alexander Nix, Trump chief strategist Steve Bannon, and Facebook (unwittingly?) through “data breaches” of 50 million (with an M) Facebook user accounts, is now being used in state and local political races around the US as a viable political strategy. Social media censorship, meanwhile, is emerging as a strategic US synergistic state/corporate response to so-called “fake news” – witness neoliberal think tank Atlantic Council’s recent collaboration with Facebook to “purge” more than 800 “suspect” Facebook accounts, or Google’s “algorithmic censorship,” gaming its algorithm to marginalize US news outlets – TruthDig, Alternet, TruthOut, WWSA – critical of the US imperial status quo, or the complete purging of controversial independent analyst and so-called “conspiracy theorist” Alex Jones from pretty much ALL mainstream (read corporate) US digital platforms – all happened within the past year. And, as US comedienne Michelle Wolf pointed out at the annual Washington Press Club banquet last spring, MOUNDS of money are being made by US neoliberal “news” outlets – clicks, ratings, book sales – through this sort of Trump-bashing and fear-mongering, while pressing issues impacting the lives of ordinary Americans – “still no clean water in Flint, Michigan!” – are completely ignored. #RussiaGate, in sum, is now a rationale for demonizing, marginalizing, and censoring any US individual or organization that does not tow the #RussiaGate party line.

Despite the US news-induced hysteria surrounding the #RussiaGate tale, voices of reason persist. Most prominent include Rolling Stone investigative journalist Matt Taibbi, LA-based nightclub comedian Jimmy Dore (who regularly covers the excesses of the #RussiaGate story with his comedic colleagues on is popular YouTube channel “The Jimmy Dore Show”), and Nation reporter Aaron Maté, whose December 28, 2018 article calls BS on the #Russiagate nonsense. The complete title of Maté’s article? “New Studies Show Pundits Are Wrong About Russian Social-Media Involvement in US Politics – Far from being a sophisticated propaganda campaign, it was small, amateurish, and mostly unrelated to the 2016 election.” (read Maté’s piece here). Maté, who has covered the #RussiaGate story extensively since 2016, provides in-depth analysis of two new reports alleging Russian cyber meddling – one produced by the University of Oxford’s Computational Propaganda Research Project and the other by the US consulting corporation with deep ties to the national security state, New Knowledge. I encourage interested readers to take the time to read his story.

Maté’s conclusion, meanwhile, is worth quoting here at length:

Based on all of this data, we can draw this picture of Russian social-media activity: It was mostly unrelated to the 2016 election; microscopic in reach, engagement, and spending; and juvenile or absurd in its content. This leads to the inescapable conclusion, as the New Knowledge study acknowledges, that “the operation’s focus on elections was merely a small subset” of its activity. They qualify that “accurate” narrative by saying it “misses nuance and deserves more contextualization.” Alternatively, perhaps it deserves some minimal reflection that a juvenile social-media operation with such a small focus on elections is being widely portrayed as a seismic threat that may well have decided the 2016 contest.

Indeed.

Would that Kathleen Hall Jamieson was not a bit more “nuanced” in “contextualizing” her Cyberwar analysis.

What to do? The best answer is critical media literacy education – moving beyond partisan politics and moral panics to more thoughtfully engage these important political questions in open dialogue and debate.

Until we do so, we will continue to be enthralled by the #RussiaGate tale, with potentially deleterious geopolitical consequences. (Again, Cohen’s interview with Larry King is a good starting place).

To wit, in Pogo’s famous phrase – “we have met the enemy and he is US.”

Philip K. Dick and the Fake Humans

(Editor’s note: on this 36th anniversary of the passing of Philip K. Dick, it seems an appropriate time to note the relevance of his work to our current dystopia as Henry Farrell does in the following essay. Unfortunately the author is less astute regarding the ways in which the dystopias of Orwell and Huxley are equally relevant to our current milieu.)

By Henry Farrell

Source: Boston Review

This is not the dystopia we were promised. We are not learning to love Big Brother, who lives, if he lives at all, on a cluster of server farms, cooled by environmentally friendly technologies. Nor have we been lulled by Soma and subliminal brain programming into a hazy acquiescence to pervasive social hierarchies.

Dystopias tend toward fantasies of absolute control, in which the system sees all, knows all, and controls all. And our world is indeed one of ubiquitous surveillance. Phones and household devices produce trails of data, like particles in a cloud chamber, indicating our wants and behaviors to companies such as Facebook, Amazon, and Google. Yet the information thus produced is imperfect and classified by machine-learning algorithms that themselves make mistakes. The efforts of these businesses to manipulate our wants leads to further complexity. It is becoming ever harder for companies to distinguish the behavior which they want to analyze from their own and others’ manipulations.

This does not look like totalitarianism unless you squint very hard indeed. As the sociologist Kieran Healy has suggested, sweeping political critiques of new technology often bear a strong family resemblance to the arguments of Silicon Valley boosters. Both assume that the technology works as advertised, which is not necessarily true at all.

Standard utopias and standard dystopias are each perfect after their own particular fashion. We live somewhere queasier—a world in which technology is developing in ways that make it increasingly hard to distinguish human beings from artificial things. The world that the Internet and social media have created is less a system than an ecology, a proliferation of unexpected niches, and entities created and adapted to exploit them in deceptive ways. Vast commercial architectures are being colonized by quasi-autonomous parasites. Scammers have built algorithms to write fake books from scratch to sell on Amazon, compiling and modifying text from other books and online sources such as Wikipedia, to fool buyers or to take advantage of loopholes in Amazon’s compensation structure. Much of the world’s financial system is made out of bots—automated systems designed to continually probe markets for fleeting arbitrage opportunities. Less sophisticated programs plague online commerce systems such as eBay and Amazon, occasionally with extraordinary consequences, as when two warring bots bid the price of a biology book up to $23,698,655.93 (plus $3.99 shipping).

In other words, we live in Philip K. Dick’s future, not George Orwell’s or Aldous Huxley’s. Dick was no better a prophet of technology than any science fiction writer, and was arguably worse than most. His imagined worlds jam together odd bits of fifties’ and sixties’ California with rocket ships, drugs, and social speculation. Dick usually wrote in a hurry and for money, and sometimes under the influence of drugs or a recent and urgent personal religious revelation.

Still, what he captured with genius was the ontological unease of a world in which the human and the abhuman, the real and the fake, blur together. As Dick described his work (in the opening essay to his 1985 collection, I Hope I Shall Arrive Soon):

The two basic topics which fascinate me are “What is reality?” and “What constitutes the authentic human being?” Over the twenty-seven years in which I have published novels and stories I have investigated these two interrelated topics over and over again.

These obsessions had some of their roots in Dick’s complex and ever-evolving personal mythology (in which it was perfectly plausible that the “real” world was a fake, and that we were all living in Palestine sometime in the first century AD). Yet they were also based on a keen interest in the processes through which reality is socially constructed. Dick believed that we all live in a world where “spurious realities are manufactured by the media, by governments, by big corporations, by religious groups, political groups—and the electronic hardware exists by which to deliver these pseudo-worlds right into heads of the reader.” He argued:

the bombardment of pseudo-realities begins to produce inauthentic humans very quickly, spurious humans—as fake as the data pressing at them from all sides. My two topics are really one topic; they unite at this point. Fake realities will create fake humans. Or, fake humans will generate fake realities and then sell them to other humans, turning them, eventually, into forgeries of themselves. So we wind up with fake humans inventing fake realities and then peddling them to other fake humans.

In Dick’s books, the real and the unreal infect each other, so that it becomes increasingly impossible to tell the difference between them. The worlds of the dead and the living merge in Ubik (1969), the experiences of a disturbed child infect the world around him in Martian Time-Slip (1964), and consensual drug-based hallucinations become the vector for an invasive alien intelligence in The Three Stigmata of Palmer Eldritch (1965). Humans are impersonated by malign androids in Do Androids Dream of Electric Sheep? (1968) and “Second Variety” (1953); by aliens in “The Hanging Stranger” (1953) and “The Father-Thing” (1954); and by mutants in “The Golden Man” (1954).

This concern with unreal worlds and unreal people led to a consequent worry about an increasing difficulty of distinguishing between them. Factories pump out fake Americana in The Man in the High Castle (1962), mirroring the problem of living in a world that is not, in fact, the real one. Entrepreneurs build increasingly human-like androids in Do Androids Dream of Electric Sheep?, reasoning that if they do not, then their competitors will. Figuring out what is real and what is not is not easy. Scientific tools such as the famous Voight-Kampff test in Do Androids Dream of Electric Sheep? (and Blade Runner, Ridley Scott’s 1982 movie based loosely on it) do not work very well, leaving us with little more than hope in some mystical force—the I Ching, God in a spray can, a Martian water-witch—to guide us back toward the real.

We live in Dick’s world—but with little hope of divine intervention or invasion. The world where we communicate and interact at a distance is increasingly filled with algorithms that appear human, but are not—fake people generated by fake realities. When Ashley Madison, a dating site for people who want to cheat on their spouses, was hacked, it turned out that tens of thousands of the women on the site were fake “fembots” programmed to send millions of chatty messages to male customers, so as to delude them into thinking that they were surrounded by vast numbers of potential sexual partners.

These problems are only likely to get worse as the physical world and the world of information become increasingly interpenetrated in an Internet of (badly functioning) Things. Many of the aspects of Joe Chip’s future world in Ubik look horrendously dated to modern eyes: the archaic role of women, the assumption that nearly everyone smokes. Yet the door to Joe’s apartment—which argues with him and refuses to open because he has not paid it the obligatory tip—sounds ominously plausible. Someone, somewhere, is pitching this as a viable business plan to Y Combinator or the venture capitalists in Menlo Park.

This invasion of the real by the unreal has had consequences for politics. The hallucinatory realities in Dick’s worlds—the empathetic religion of Do Androids Dream of Electric Sheep?, the drug-produced worlds of The Three Stigmata of Palmer Eldritch, the quasi–Tibetan Buddhist death realm of Ubik—are usually experienced by many people, like the television shows of Dick’s America. But as network television has given way to the Internet, it has become easy for people to create their own idiosyncratic mix of sources. The imposed media consensus that Dick detested has shattered into a myriad of different realities, each with its own partially shared assumptions and facts. Sometimes this creates tragedy or near-tragedy. The deluded gunman who stormed into Washington, D.C.’s Comet Ping Pong pizzeria had been convinced by online conspiracy sites that it was the coordinating center for Hillary Clinton’s child–sex trafficking ring [likewise, the masses may have been convinced by mainstream media that a real child-sex trafficking ring never existed].

Such fractured worlds are more vulnerable to invasion by the non-human. Many Twitter accounts are bots, often with the names and stolen photographs of implausibly beautiful young women, looking to pitch this or that product (one recent academic study found that between 9 and 15 percent of all Twitter accounts are likely fake). Twitterbots vary in sophistication from automated accounts that do no more than retweet what other bots have said, to sophisticated algorithms deploying so-called “Sybil attacks,” creating fake identities in peer-to-peer networks to invade specific organizations or degrade particular kinds of conversation.

Twitter has failed to become a true mass medium, but remains extraordinarily important to politics, since it is where many politicians, journalists, and other elites turn to get their news. One research project suggests that around 20 percent of the measurable political discussion around the last presidential election came from bots. Humans appear to be no better at detecting bots than we are, in Dick’s novel, at detecting replicant androids: people are about as likely to retweet a bot’s message as the message of another human being. Most notoriously, the current U.S. president recently retweeted a flattering message that appears to have come from a bot densely connected to a network of other bots, which some believe to be controlled by the Russian government and used for propaganda purposes.

In his novels Dick was interested in seeing how people react when their reality starts to break down. A world in which the real commingles with the fake, so that no one can tell where the one ends and the other begins, is ripe for paranoia. The most toxic consequence of social media manipulation, whether by the Russian government or others, may have nothing to do with its success as propaganda. Instead, it is that it sows an existential distrust. People simply do not know what or who to believe anymore. Rumors that are spread by Twitterbots merge into other rumors about the ubiquity of Twitterbots, and whether this or that trend is being driven by malign algorithms rather than real human beings.

Such widespread falsehood is especially explosive when combined with our fragmented politics. Liberals’ favorite term for the right-wing propaganda machine, “fake news,” has been turned back on them by conservatives, who treat conventional news as propaganda, and hence ignore it. On the obverse, it may be easier for many people on the liberal left to blame Russian propaganda for the last presidential election than to accept that many voters had a very different understanding of America than they do.

Dick had other obsessions—most notably the politics of Richard Nixon and the Cold War. It is not hard to imagine him writing a novel combining an immature and predatory tycoon (half Arnie Kott, half Jory Miller) who becomes the president of the United States, secret Russian political manipulation, an invasion of empathy-free robotic intelligences masquerading as human beings, and a breakdown in our shared understanding of what is real and what is fake.

These different elements probably would not cohere particularly well, but as in Dick’s best novels, the whole might still work, somehow. Indeed, it is in the incongruities of Dick’s novels that salvation is to be found (even at his battiest, he retains a sense of humor). Obviously, it is less easy to see the joke when one is living through it. Dystopias may sometimes be grimly funny—but rarely from the inside.

Time To Make Life Hard For The Rich

By Hamilton Nolan

Source: Splinter

It is time for polite, respectable, rational people to start saying what has become painfully obvious: It is time to stop respecting the rich, and start stealing from them. In earnest.

Inequality is eating America alive. It has been growing for decades. To say that “the American dream is dead” is no longer a poetic exaggeration—it is an accurate description of 40 years of wage stagnation and declining economic mobility that has produced a generation that cannot expect to live better than their parents did. Not because of devastating war or plague, but because of a very specific set of rules governing a very specific economic system that encourages the accumulation of great wealth among a tiny portion of the population, to the detriment of the vast majority of people. Our political and business leaders have chosen to embrace a system that favors capital over labor. A system in which the more you already have, the more you make, and the less you have, the harder it is to build wealth. It is a system designed to increase inequality. It is functioning exactly as designed. And now, it is about to get worse.

How long are people supposed to tolerate being smacked in the face? By the rich? Who already have more than enough? It is not as though the fact that inequality is a crisis is a fact that snuck up on anyone. Economists have seen the trend for decades, and the general public has been well aware of it since at least the financial crisis. Obama called it “the defining challenge of our time.” Thomas Piketty became a rock star by writing a very dry book about it. It’s not an underground thing. It is well known and well understood by the people in control of the institutions with the power to change it. The response to this dire situation by the Republican Party, which a wholly owned subsidiary of the American capital-holding class, has been to pass a tax bill that will horribly exacerbate economic inequality in this country. It is a considered decision to make a bad situation worse. It is a deliberate choice—during a time when the rich already have too much—to take from the poor in order to give the rich (including members of Congress and the President) more. That is not a metaphor. That is the reality. That is what the Republican party is about to accomplish on behalf of the donor class, calling it “middle class tax relief” in the face of mathematical proof to the contrary. Even to my cynical ass, the sheer fuck you-ness of this action towards the majority of the country is breathtaking. This is not just a failure to solve a severe problem; it is the expenditure of vast amounts of political capital to make the severe problem worse so that a tiny handful of people will get wealthier than anyone needs to be.

Ideally, in a democracy, elected leaders reflecting the interests of the people would pass taxes and regulations to reverse the growing inequality here. For that to happen, we would need to end gerrymandering and reform campaign finance and probably abolish the Senate and the Electoral College, and that’s just for starters. It is not imminent, in other words. Our broken political system, which is designed to reward money with political power, is actually moving in the opposite direction of a solution. Who is suffering because of this? Most Americans. Certainly the bottom 50% are acutely suffering—money that would have been in their paychecks has been instead funneled upwards into the pockets of the rich. Every desperate family that has found themselves coming up short for rent or food or medicine, every American who has downgraded her dreams and aspirations because they became financially implausible, has been directly harmed by the political and economic class war perpetuated by the rich, even if they cannot see the perpetrators with their own eyes. I think that people have been more than patient in the face of this slow-moving crisis. In 2009, when the markets crashed and millions were laid off, nobody rioted and kidnapped the financiers and burned their homes. The outcome of that lack of direct action is the situation we find ourselves in today.

Violence against people is morally wrong and a bad way to solve problems. But capital is different. One thing that would help to create the political environment conducive to solving the inequality problem would be to make the cost of accumulating all that capital too high to be worth it. In other words, to create a downside to being too rich. I have personally stood in a room full of hedge fund titans and billionaire investors warning one another explicitly that inequality must be addressed lest the U.S. become a place like Latin America, where rich people are forced to live behind walls, surrounded by armed guards, because of the very real risks from the rage of the poor. Rich people in this country do not want to live like that. If they see that they must stop being so greedy in order to enjoy their own freedom, they will stop being so greedy. Those conditions have to be created by people who want justice.

Our situation is absurd. Not since the Gilded Age has it been more clear that a few people have too much. Furthermore, the people with too much are investing in political clout to give themselves more. It’s just wrong. If the government won’t help, we have to help ourselves. Sticking up a billionaire on the street for $100 is not going to do it. But one can imagine other ways that angry Americans might express their dissatisfaction with our current division of wealth: A large-scale online attack against the holdings of the very rich; yachts sunk in harbors; unoccupied vacation homes in the Hamptons mysteriously burned to the ground. Sotheby’s auctions swarmed by vandals, Art Basel attacked by spraypaint-wielding mobs, protests on the doorsteps of right-wing think tanks, venomous words directed at millionaires as they dine in fancy restaurants. People have a right to life and safety, but property does not. A life spent screwing the little people so that you can acquire lots of stuff loses its allure when you know that all that stuff will be smashed to pieces by angry little people. It is not hard to put together a list of those who should be targeted—Forbes publishes it every year. Likewise, public campaign finance records give us a pretty good idea of exactly who is funding the politicians who are perpetuating this economic war on behalf of the rich.

It is nice to imagine a grand, well-targeted computer hack that would neatly transfer billions of dollars out of the accounts of, say, the Walton family and into a charity account that would disburse the money to the poor in untraceable ways. That seems far-fetched. Realistically, what people can do now is to start thinking about ways to make it uncomfortable to be too rich. Socially uncomfortable and otherwise. When the accumulation of great wealth ceases to be a praiseworthy endeavor and instead becomes viewed as a sick, greedy pastime whose only reward is the hatred of your fellow citizens and the inability to live comfortably without fear of your excessive property being destroyed, rich people will rethink their goals. Until then, inequality will keep rising, and everything, for most people, will continue to slowly, slowly get worse.

Tomorrow Belongs to the Corporatocracy

By C.J. Hopkins

Source: The Unz Review

Back in October of 2016, I wrote a somewhat divisive essay in which I suggested that political dissent is being systematically pathologized. In fact, this process has been ongoing for decades, but it has been significantly accelerated since the Brexit referendum and the Rise of Trump (or, rather, the Fall of Hillary Clinton, as it was Americans’ lack of enthusiasm for eight more years of corporatocracy with a sugar coating of identity politics, and not their enthusiasm for Trump, that mostly put the clown in office.)

In the twelve months since I wrote that piece, we have been subjected to a concerted campaign of corporate media propaganda for which there is no historical precedent. Virtually every major organ of the Western media apparatus (the most powerful propaganda machine in the annals of powerful propaganda machines) has been relentlessly churning out variations on a new official ideological narrative designed to generate and enforce conformity. The gist of this propaganda campaign is that “Western democracy” is under attack by a confederacy of Russians and white supremacists, as well as “the terrorists” and other “extremists” it’s been under attack by for the last sixteen years.

I’ve been writing about this campaign for a year now, so I’m not going to rehash all the details. Suffice to say we’ve gone from Russian operatives hacking the American elections to “Russia-linked” persons “apparently” setting up “illegitimate” Facebook accounts, “likely operated out of Russia,” and publishing ads that are “indistinguishable from legitimate political speech” on the Internet. This is what the corporate media is presenting as evidence of “an unprecedented foreign invasion of American democracy,” a handful of political ads on Facebook. In addition to the Russian hacker propaganda, since August, we have also been treated to relentless white supremacist hysteria and daily reminders from the corporate media that “white nationalism is destroying the West.” The negligible American neo-Nazi subculture has been blown up into a biblical Behemoth inexorably slouching its way towards the White House to officially launch the Trumpian Reich.

At the same time, government and corporate entities have been aggressively restricting (and in many cases eliminating) fundamental civil liberties such as freedom of expression, freedom of the press, the right of assembly, the right to privacy, and the right to due process under the law. The justification for this curtailment of rights (which started in earnest in 2001, following the September 11 attacks) is protecting the public from the threat of “terrorism,” which apparently shows no signs of abating. As of now, the United States has been in a State of Emergency for over sixteen years. The UK is in a virtual State of Emergency. France is now in the process of enshrining its permanent State of Emergency into law. Draconian counter-terrorism measures have been implemented throughout the EU. Not just the notorious American police but police throughout the West have been militarized. Every other day we learn of some new emergency security measuredesigned to keep us safe from “the terrorists,” the “lone wolf shooters,” and other “extremists.”

Conveniently, since the Brexit referendum and unexpected election of Trump (which is when the capitalist ruling classes first recognized that they had a widespread nationalist backlash on their hands), the definition of “terrorism” (or, more broadly, “extremism”) has been expanded to include not just Al Qaeda, or ISIS, or whoever we’re calling “the terrorists” these days, but anyone else the ruling classes decide they need to label “extremists.” The FBI has designated Black Lives Matter “Black Identity Extremists.” The FBI and the DHS have designated Antifa “domestic terrorists.” Hosting corporations have shut down several white supremacist and neo-Nazi websites, along with their access to online fundraising. Google is algorithmically burying leftist news and opinion sources such as Alternet, Counterpunch, Global Research, Consortium News, and Truthout, among others. Twitter, Facebook, and Google have teamed up to cleanse the Internet of “extremist content,” “hate speech,” and whatever else they arbitrarily decide is inappropriate. YouTube, with assistance from the ADL (which deems pro-Palestinian activists and other critics of Israel “extremists”) is censoring “extremist” and “controversial” videos, in an effort to “fight terrorist content online.” Facebook is also collaborating with Israel to thwart “extremism,” “incitement of violence,” and whatever else Israel decides is “inflammatory.” In the UK, simply reading “terrorist content” is punishable by fifteen years in prison. Over three thousand people were arrested last year for publishing “offensive” and “menacing” material.

Whatever your opinion of these organizations and “extremist” persons is beside the point. I’m not a big fan of neo-Nazis, personally, but neither am I a fan of Antifa. I don’t have much use for conspiracy theories, or a lot of the nonsense one finds on the Internet, but I consume a fair amount of alternative media, and I publish in CounterPunch, The Unz Review, ColdType, and other non-corporate journals. I consider myself a leftist, basically, but my political essays are often reposted by right-wing and, yes, even pro-Russia blogs. I get mail from former Sanders supporters, Trump supporters, anarchists, socialists, former 1960s radicals, anti-Semites, and other human beings, some of whom I passionately agree with, others of whom I passionately disagree with. As far as I can tell from the emails, none of these readers voted for Clinton, or Macron, or supported the TPP, or the debt-enslavement and looting of Greece, or the ongoing restructuring of the Greater Middle East (and all the lovely knock-on effects that has brought us), or believe that Trump is a Russian operative, or that Obama is Martin Luther Jesus-on-a-stick. What they share, despite their opposing views, is a general awareness that the locus of power in our post-Cold War age is primarily corporate, or global capitalist, and neoliberal in nature. They also recognize that they are being subjected to a massive propaganda campaign designed to lump them all together (again, despite their opposing views) into an intentionally vague and undefinable category comprising anyone and everyone, everywhere, opposing the hegemony of global capitalism, and its non-ideological ideology (the nature of which I’ll get into in a moment).

As I wrote in that essay a year ago, “a line is being drawn in the ideological sand.” This line cuts across both Left and Right, dividing what the capitalist ruling classes designate “normal” from what they label “extremist.” The traditional ideologicalparadigm, Left versus Right, is disappearing (except as a kind of minstrel show), and is being replaced, or overwritten, by a pathological paradigm based upon the concept of “extremism.”

* * *

Although the term has been around since the Fifth Century BC, the concept of “extremism” as we know it today developed in the late Twentieth Century and has come into vogue in the last three decades. During the Cold War, the preferred exonymics were “subversive,” “radical,” or just plain old “communist,” all of which terms referred to an actual ideological adversary. In the early 1990s, as the U.S.S.R. disintegrated, and globalized Western capitalism became the unrivaled global-hegemonic ideological system that it is today, a new concept was needed to represent the official enemy and its ideology. The concept of “extremism” does that perfectly, as it connotes, not an external enemy with a definable ideological goal, but rather, a deviation from the norm. The nature of the deviation (e.g., right-wing, left-wing, faith-based, and so on) is secondary, almost incidental. The deviation itself is the point. The “terrorist,” the “extremist,” the “white supremacist,” the “religious fanatic,” the “violent anarchist” … these figures are not rational actors whose ideas we need to intellectually engage with in order to debate or debunk. They are pathological deviations, mutant cells within the body of “normality,” which we need to identify and eliminate, not for ideological reasons, but purely in order to maintain “security.”

A truly global-hegemonic system like contemporary global capitalism (the first of this kind in human history), technically, has no ideology. “Normality” is its ideology … an ideology which erases itself and substitutes the concept of what’s “normal,” or, in other words, “just the way it is.” The specific characteristics of “normality,” although not quite arbitrary, are ever-changing. In the West, for example, thirty years ago, smoking was normal. Now, it’s abnormal. Being gay was abnormal. Now, it’s normal. Being transgender is becoming normal, although we’re still in the early stages of the process. Racism has become abnormal. Body hair is currently abnormal. Walking down the street in a semi-fugue state robotically thumbing the screen of a smartphone that you just finished thumbing a minute ago is “normal.” Capitalism has no qualms with these constant revisions to what is considered normal, because none of them are threats to capitalism. On the contrary, as far as values are concerned, the more flexible and commodifiable the better.

See, despite what intersectionalists will tell you, capitalism has no interest in racism, misogyny, homophobia, xenophobia, or any other despotic values (though it has no problem working with these values when they serve its broader strategic purposes). Capitalism is an economic system, which we have elevated to a social system. It only has one fundamental value, exchange value, which isn’t much of a value, at least not in terms of organizing society or maintaining any sort of human culture or reverence for the natural world it exists in. In capitalist society, everything, everyone, every object and sentient being, every concept and human emotion, is worth exactly what the market will bear … no more, no less, than its market price. There is no other measure of value.

Yes, we all want there to be other values, and we pretend there are, but there aren’t, not really. Although we’re free to enjoy parochial subcultures based on alternative values (i.e., religious bodies, the arts, and so on), these subcultures operate within capitalist society, and ultimately conform to its rules. In the arts, for example, works are either commercial products, like any other commodity, or they are subsidized by what could be called “the simulated aristocracy,” the ivy league-educated leisure classes (and lower class artists aspiring thereto) who need to pretend that they still have “culture” in order to feel superior to the masses. In the latter case, this feeling of superiority is the upscale product being sold. In the former, it is entertainment, distraction from the depressing realities of living, not in a society at all, but in a marketplace with no real human values. (In the absence of any real cultural values, there is no qualitative difference between Gerhard Richter and Adam Sandler, for example. They’re both successful capitalist artists. They’re just selling their products in different markets.)

The fact that it has no human values is the evil genius of global capitalist society. Unlike the despotic societies it replaced, it has no allegiance to any cultural identities, or traditions, or anything other than money. It can accommodate any form of government, as long as it plays ball with global capitalism. Thus, the window dressing of “normality” is markedly different from country to country, but the essence of “normality” remains the same. Even in countries with state religions (like Iran) or state ideologies (like China), the governments play by the rules of global capitalism like everyone else. If they don’t, they can expect to receive a visit from global capitalism’s Regime Change Department (i.e., the US military and its assorted partners).

Which is why, despite the “Russiagate” hysteria the media have been barraging us with, the West is not going to war with Russia. Nor are we going to war with China. Russia and China are developed countries, whose economies are entirely dependent on global capitalism, as are Western economies. The economies of every developed nation on the planet are inextricably linked. This is the nature of the global hegemony I’ve been referring to throughout this essay. Not American hegemony, but global capitalist hegemony. Systemic, supranational hegemony (which I like to prefer “the Corporatocracy,” as it sounds more poetic and less post-structural).

We haven’t really got our minds around it yet, because we’re still in the early stages of it, but we have entered an epoch in which historical events are primarily being driven, and societies reshaped, not by sovereign nation states acting in their national interests but by supranational corporations acting in their corporate interests. Paramount among these corporate interests is the maintenance and expansion of global capitalism, and the elimination of any impediments thereto. Forget about the United States (i.e., the actual nation state) for a moment, and look at what’s been happening since the early 1990s. The US military’s “disastrous misadventures” in Iraq, Libya, Afghanistan, Syria, and the former Yugoslavia, among other exotic places (which have obviously had nothing to do with the welfare or security of any actual Americans), begin to make a lot more sense. Global capitalism, since the end of the Cold War (i.e, immediately after the end of the Cold War), has been conducting a global clean-up operation, eliminating actual and potential insurgencies, mostly in the Middle East, but also in its Western markets. Having won the last ideological war, like any other victorious force, it has been “clear-and-holding” the conquered territory, which in this case happens to be the whole planet. Just for fun, get out a map, and look at the history of invasions, bombings, and other “interventions” conducted by the West and its assorted client states since 1990. Also, once you’re done with that, consider how, over the last fifteen years, most Western societies have been militarized, their citizens placed under constant surveillance, and an overall atmosphere of “emergency” fostered, and paranoia about “the threat of extremism” propagated by the corporate media.

I’m not suggesting there’s a bunch of capitalists sitting around in a room somewhere in their shiny black top hats planning all of this. I’m talking about systemic development, which is a little more complex than that, and much more difficult to intelligently discuss because we’re used to perceiving historico-political events in the context of competing nation states, rather than competing ideological systems … or non-competing ideological systems, for capitalism has no competition. What it has, instead, is a variety of insurgencies, the faith-based Islamic fundamentalist insurgency and the neo-nationalist insurgency chief among them. There will certainly be others throughout the near future as global capitalism consolidates control and restructures societies according to its values. None of these insurgencies will be successful.

Short some sort of cataclysm, like an asteroid strike or the zombie apocalypse, or, you know, violent revolution, global capitalism will continue to restructure the planet to conform to its ruthless interests. The world will become increasingly “normal.” The scourge of “extremism” and “terrorism” will persist, as will the general atmosphere of “emergency.” There will be no more Trumps, Brexit referendums, revolts against the banks, and so on. Identity politics will continue to flourish, providing a forum for leftist activist types (and others with an unhealthy interest in politics), who otherwise might become a nuisance, but any and all forms of actual dissent from global capitalist ideology will be systematically marginalized and pathologized.

This won’t happen right away, of course. Things are liable to get ugly first (as if they weren’t ugly enough already), but probably not in the way we’re expecting, or being trained to expect by the corporate media. Look, I’ll give you a dollar if it turns out I’m wrong, and the Russians, terrorists, white supremacists, and other “extremists” do bring down “democracy” and launch their Islamic, white supremacist, Russo-Nazi Reich, or whatever, but from where I sit it looks pretty clear … tomorrow belongs to the Corporatocracy.