Brazile Fallout: Hillary Privatized the DNC with Help from a Washington Law Firm

By Pam Martens and Russ Martens

Source: Wall Street On Parade

Secret side agreements are a common maneuver by corporate law firms. Here’s how they work. An agreement that is legal and passes the smell test is drafted and submitted to a court or a regulatory body for public consumption. Then, a separate, secret side agreement is written and signed by both sides and it contains all of the smelly, shady, ethically questionable hard details on how the original agreement will be carried out.

Donna Brazile, the former interim Chair of the Democratic National Committee (DNC) during the 2016 presidential campaign, has written a new book, “Hacks: The Inside Story of the Break-ins and Breakdowns that Put Donald Trump in the White House,” and has revealed the secret side agreement that the DNC had with Hillary Clinton’s campaign.

In 2015, Hillary Clinton’s campaign set up a joint fundraising committee called the Hillary Victory Fund (HVF) with the DNC and over 30 state democratic committees. The public portion of the agreement indicated that Hillary would raise funds for her own campaign while also allocating a portion to the DNC to help the overall Democratic Party as well as allocating funds to state democratic committees in order to support down-ballot candidates in their local elections. But the secret side agreement that effectively privatized the DNC, giving Hillary and her campaign lawyers control of the DNC and its money, had yet to see the light of day.

This is how Brazile describes the secret side agreement in her book:

“The agreement—signed by Amy Dacey, the former CEO of the DNC, and Robby Mook [Clinton’s campaign manager] with a copy to Marc Elias [lawyer at Perkins Coie]  — specified that in exchange for raising money and investing in the DNC, Hillary would control the party’s finances, strategy, and all the money raised. Her campaign had the right of refusal of who would be the party communications director, and it would make final decisions on all the other staff. The DNC also was required to consult with the campaign about all other staffing, budgeting, data, analytics, and mailings.”

The Clinton camp has now attempted to defend itself by saying these terms are standard because they were not going to kick in until the Democratic Party had chosen its official presidential nominee at its party convention in July 2016. But that’s not what the actual secret side agreement says. It indicates the following: “Beginning October 1, 2015,” the HVF would begin transferring $1.2 million to the DNC at the start of each month with that release “conditioned on” Hillary Clinton’s primary campaign personnel being consulted “and have joint authority over strategic decisions over the staffing, budget, expenditures, and general election related communications, data, technology, analytics, and research. The DNC will provide HFA advance opportunity to review on-line or mass email, communications that features a particular Democratic primary candidate.”

Additionally, the secret agreement states that “the DNC agrees that no later than September 11, 2015 it will hire one of two candidates previously identified as acceptable to HFA” (Hillary for America, the primary campaign fund for Clinton) as its Communications Director. All of this is occurring in the fall of 2015 with the official Democratic nominating convention not taking place until July 2016.

As Politico reported in May 2016, the Hillary Victory Fund was a sham in multiple other ways. First, Politico writes that less than 1 percent of the money raised stayed in the state’s coffers. The Treasurer of the Hillary Victory Fund actually had the power to move money in and out of state committee bank accounts. Politico reporters Ken Vogel and Isaac Arnsdorf cite the following example to show how things actually worked:

“…the Minnesota Democratic-Farmer-Labor Party received $43,500 from the victory fund on Nov. 2, only to transfer the same amount to the DNC that same day. The pattern repeated itself after the Minnesota party received transfers from the victory fund of $20,600 on Dec. 1 (the party sent the same amount to the DNC the next day) and $150,000 on Jan. 4 (it transferred the same amount to the DNC that day).

“That means that Minnesota’s net gain from its participation in the victory fund was precisely $0 through the end of March. Meanwhile, the DNC pocketed an extra $214,100 in cash routed through Minnesota — much of which the DNC wouldn’t have been able to accept directly, since it came from donors who had mostly had already maxed out to the national party committee.

“A similar pattern transpired with most of the participating state parties. As of March 31, only eight state parties (most of which were in battleground states such as Colorado, Florida, Nevada, New Hampshire and Virginia) had received more from the victory fund than was transferred from their accounts to the DNC.”

Brazile backs up this account in her book, writing that “the states kept less than half of 1 percent of the $82 million they had amassed from the extravagant fund-raisers Hillary’s campaign was holding….”

Brazile notes in her book that the lawyer, Marc Elias, of the politically-connected law firm, Perkins Coie, was copied on the secret side agreement. Elias has repeatedly come under scrutiny for his multi-faceted roles in the 2015-2016 presidential campaign. Most recently, he was exposed as the guy behind the hiring of Fusion GPS which compiled the scandalous Russian dossier on Donald Trump, using both Hillary campaign funds and DNC funds. The Washington Post reported that Elias was allowed to spend these funds “without oversight by campaign officials, according to a spokesperson for his law firm.”

Elias served as the General Counsel to Hillary’s primary campaign committee, Hillary for America, as well as serving as one of a team of lawyers from Perkins Coie that provided legal advice to the DNC. (Elias also provided legal advice to the Democratic Senatorial Campaign Committee, Democratic Congressional Campaign Committee, and Democratic Governors Associations, according to the Perkins Coie web site last year.)

As a legal adviser to the DNC, Elias should have known that its charter mandated fairness and impartiality to all primary candidates. But when WikiLeaks released emails last year that had been hacked at the DNC, Marc Elias was caught giving advice on how to tar Senator Bernie Sanders after his campaign suggested that the Hillary Victory Fund was skirting Federal election law. The email from Elias read:

“My suggestion is that the DNC put out a statement saying that the accusations the Sanders campaign are not true. The fact that CNN notes that you aren’t getting between the two campaigns is the problem. Here, Sanders is attacking the DNC and its current practice, its past practice with the POTUS and with Sec Kerry. Just as the RNC pushes back directly on Trump over ‘rigged system’, the DNC should push back DIRECTLY at Sanders and say that what he is saying is false and harmful the [sic] the Democratic party.”

Writing for Politico in 2014, Ken Vogel detailed how Elias and Perkins Coie have not only been the legal go-to guys for the Democratic party over the years but how they have also tinkered with Federal election law to shift more power to the 1 percent. Vogel writes:

“Perkins Coie’s political law practice, anchored by Elias and former White House Counsel Bob Bauer, has something of a stranglehold on the Democratic Party’s election law business, representing not only the party committees themselves but everyone from [Harry] Reid (whose various committees have paid $317,000 in legal fees to Perkins Coie over the years) to Obama ($7.4 million) to the major Democratic super PACs ($19 million).”

The thrust of the article, however, is that Elias played a central role in further opening the spigots for legal revenues his firm might be expected to collect in the future by tinkering with Federal legislation at the eleventh hour. Vogel writes:

“A powerful Democratic lawyer helped craft a provision that was slipped into a year-end spending bill allowing political parties to raise huge new pools of cash — including some for legal fees that are likely going to be collected by his own firm…

“The change has the potential to halt or at least slow the erosion of power of the political parties, since it would increase the maximum amount of cash that rich donors may give to the national Democratic and Republican party committees each year from $97,400 to $777,600 or more.”

The question that no one seems to be asking is who are the main beneficiaries of Perkins Coie’s heavy influence at the top of the Democratic Party. Despite Obama’s re-election for a second term, the Democratic Party shed nearly 1,000 seats from coast to coast. The Republicans now control both houses of Congress and the Executive Branch. A man with the lowest approval rating in modern history now occupies the Oval Office.

The primary beneficiaries of this hubris have been the 1 percent – Wall Street and hedge fund titans – and giant multi-national corporations that dominate the client roster at Perkins Coie.

Those within the Clinton camp and DNC who are suggesting to the American people that there is nothing to see here, time to move along, are dead wrong. Just because the Republican presidential campaign may have been corrupted by outside forces doesn’t mean that the Democratic campaign wasn’t also corrupted by its own outside forces. It’s time to follow the obscene political money trail wherever it leads.

Related Articles:

Are Hillary Clinton and the DNC Skirting Election Law?

DNC’s Direct Marketing Firm Shows Bias on Facebook Against Bernie Sanders

WikiLeaks Bombshell: Emails Show Citigroup Had Major Role in Shaping and Staffing Obama’s First Term

The conspiracy to censor the Internet

By Andre Damon and Joseph Kishore

Source: WSWS.org

The political representatives of the American ruling class are engaged in a conspiracy to suppress free speech. Under the guise of combating “trolls” and “fake news” supposedly controlled by Russia, the most basic constitutional rights enumerated in the First Amendment are under direct attack.

The leading political force in this campaign is the Democratic Party, working in collaboration with sections of the Republican Party, the mass media and the military-intelligence establishment.

The Trump administration is threatening nuclear war against North Korea, escalating the assault on health care, demanding new tax cuts for the rich, waging war on immigrant workers, and eviscerating corporate and environmental regulations. This reactionary agenda is not, however, the focus of the Democratic Party. It is concentrating instead on increasingly hysterical claims that Russia is “sowing divisions” within the United States.

In the media, one report follows another, each more ludicrous than the last. The claim that Russia shifted the US election by means of $100,000 in advertisements on Facebook and Twitter has been followed by breathless reports of the Putin government’s manipulation of other forms of communication.

An “exclusive” report from CNN last week proclaimed that one organization, “Don’t Shoot Us,” which it alleges without substantiation is connected to Russia, sought to “exploit racial tensions and sow discord” on Instagram, Twitter, YouTube, Tumblr and even Pokémon Go, a reality game played on cell phones.

Another report from CNN on Monday asserted that a Russian “troll factory” was involved in posting comments critical of Hillary Clinton as “part of President Vladimir Putin’s campaign to influence the 2016 election.” All of the negative commentary in news media and other publications directed at Clinton, it implied, were the product of Russian agents or people duped by Russian agents.

As during the period of Cold War McCarthyism, the absurdity of the charges goes unchallenged. They are picked up and repeated by other media outlets and by politicians to demonstrate just how far-reaching the actions of the nefarious “foreign enemy” really are.

While one aim has been to continue and escalate an anti-Russia foreign policy, the more basic purpose is emerging ever more clearly: to criminalize political dissent within the United States.

The most direct expression to date of this conspiracy against free speech was given by the anticommunist ideologue Anne Applebaum in a column published Monday in the Washington Post, “If Russia can create fake ‘Black Lives Matter’ accounts, who will next?”

Her answer: the American people. “I can imagine multiple groups, many of them proudly American, who might well want to manipulate a range of fake accounts during a riot or disaster to increase anxiety or fear,” she writes. She warns that “political groups—on the left, the right, you name it—will quickly figure out” how to use social media to spread “disinformation” and “demoralization.”

Applebaum rails against all those who seek to hide their identity online. “There is a better case than ever against anonymity, at least against anonymity in the public forums of social media and comment sections,” she writes. She continues: “The right to free speech is something that is granted to humans, not bits of computer code.” Her target, however, is not “bots” operating “fake accounts,” but anyone who seeks, fearing state repression or unjust punishment by his or her employer, to make an anonymous statement online. And that is only the opening shot in a drive to silence political dissent.

Applebaum is closely connected to the highest echelons of the capitalist state. She is a member of key foreign policy think tanks and sits on the board of directors of the CIA-linked National Endowment for Democracy. Married to the former foreign minister of Poland, she is a ferocious war hawk. Following the Russian annexation of Crimea, she authored a column in the Washington Post in which she called for “total war” against nuclear-armed Russia. She embodies the connection between militarism and political repression.

The implications of Applebaum’s arguments are made clear in an extraordinary article published on the front page of Tuesday’s New York Times, “As US Confronts Internet’s Disruptions, China Feels Vindicated,” which takes a favorable view of China’s aggressive censorship of the Internet and implies that the United States is moving toward just such a regime.

“For years, the United States and others saw” China’s “heavy-handed censorship as a sign of political vulnerability and a barrier to China’s economic development,” the Times writes. “But as countries in the West discuss potential Internet restrictions and wring their hands over fake news, hacking and foreign meddling, some in China see a powerful affirmation of the country’s vision for the internet.”

The article goes on to assert that while “few would argue that China’s Internet control serves as a model for democratic societies… At the same time, China anticipated many of the questions now flummoxing governments from the United States to Germany to Indonesia.”

Glaringly absent from the Times article, Applebaum’s commentary and all of the endless demands for a crackdown on social media is any reference to democratic rights, free speech or the First Amendment.

The First Amendment, which asserts that “Congress shall make no law… abridging the freedom of speech,” is the broadest amendment in the US Constitution. Contrary to Applebaum, there is no caveat exempting anonymous speech from Constitutional protection. It is a historical fact that leaders of the American Revolution and drafters of the Constitution wrote articles under pseudonyms to avoid repression by the British authorities.

The Constitution does not give the government or powerful corporations the right to proclaim what is “fake” and what is not, what is a “conspiracy theory” and what is “authoritative.” The same arguments now being employed to crack down on social media could just as well have been used to suppress books and mass circulation newspapers that emerged with the development of the printing press.

The drive toward Internet censorship in the United States is already far advanced. Since Google announced plans to bury “alternative viewpoints” in search results earlier this year, leading left-wing sites have seen their search traffic plunge by more than 50 percent. The World Socialist Web Site’s search traffic from Google has fallen by 75 percent.

Facebook, Twitter and other social media platforms have introduced similar measures. The campaign being whipped up over Russian online activity will be used to justify even more far-reaching measures.

This is taking place as universities implement policies to give police the authority to vet campus events. There are ongoing efforts to abolish “net neutrality” so as to give giant corporations the ability to regulate Internet traffic. The intelligence agencies have demanded the ability to circumvent encryption after having been exposed for illegally monitoring the phone communications and Internet activity of the entire population.

In one “democratic” country after another governments are turning to police-state forms of rule, from France, with its permanent state of emergency, to Germany, which last month shut down a subsidiary of the left-wing political site Indymedia, to Spain, with its violent crackdown on the separatist referendum in Catalonia and arrest of separatist leaders.

The destruction of democratic rights is the political response of the corporate and financial aristocracy to the growth of working class discontent bound up with record levels of social inequality. It is intimately linked to preparations for a major escalation of imperialist violence around the world. The greatest concern of the ruling elite is the emergence of an independent movement of the working class, and the state is taking actions to prevent it.

The Morgan Freeman Psy-Op Proves How Desperate The ‘Deep State’ Has Become

By Andrew Korybko

Source: Sputnik International

Morgan Freeman’s latest publicly stunt permanently stained his legacy after the famous actor decided to join the fake news industry by passing off a blockbuster script as a true story.

Morgan Freeman declared in his latest two-minute video that “We have been attacked. We are at war”, but he’s wrong in saying that Americans have been victimized by Russia, but should have rather told the truth that they’re under attack by their own government. To channel Freeman, “Imagine this movie script”, albeit modified to reflect real-life events instead of conspiratorial ones:

A globalist power cabal made up of the permanent military, intelligence, and diplomatic bureaucracies (the “deep state”), in conjunction with the Democratic Party, “Cultural Marxist” professors, the Mainstream Media, and Hollywood have attacked American democracy using non-stop infowar operations against their own fellow citizens to spread propaganda and false information aimed at convincing people that the Republican candidate and future President of the United States is really a Russian puppet.

A few years ago this might have sounded just as ridiculous as the narrative that Freeman read off in front of the cameras, but the difference is that this actually happened whereas his story still remains the realm of fiction. The conspiracy theory that Russia somehow swayed the 2016 election has no basis in reality, and it’s very condescending to the millions of average Americans in the Midwest who swayed the election for Trump to even infer that these patriotic citizens were under the influence of a foreign intelligence operation at the time.

Midwesterners didn’t tip the election for Trump because President Putin, the FSB, RT, or Sputnik told them to — which they didn’t — but because they had enough of the old order of business in the US and were desperately craving a change, any change, to improve the all-around deteriorating conditions that have come to define their lives. Trump promised law and order, jobs and strong borders, and a no-nonsense approach to American domestic politics, the complete opposite of Hillary’s platform and exactly what Midwesterners wanted to hear.

Even without the DNC leaks, many of those folks would never have countenanced voting for Hillary due to her husband’s toxic legacy and that of his party. Moreover, these voters didn’t need proof of Hillary and the Democrats’ corruption because they had suspected it all along, though the amplification of their crimes by the global media vindicated them for what The Establishment had falsely claimed for years was just another tinfoil hat “conspiracy theory”.

Now about actual conspiracy facts, many people could never have thought that their own government would turn against them and attack America’s sacred political system, its electoral democracy, through the incessant demonization of Donald Trump and the plethora of fake news that they disseminated about him. When Trump claimed that his campaign was under surveillance by the Obama Administration, he was dismissed as a crackpot, but it’s since emerged just the other day that former National Security Advisor Susan Rice did in fact authorize the spying of Trump’s former campaign manager Paul Manafort.

On top of that, the never-ending assertions that Trump is in cahoots with the Russian government or somehow under the nefarious influence of shadowy Kremlin agents are regularly debunked by listening to the President and his Administration constantly talk about “Russian aggression” and watching them use this pretext to make hostile moves against Moscow. These actions strongly refute the claims of a secret Trump-Russian connection and most Americans understand that, but the “deep state” and their cohorts in the “Cultural Marxist” corners of academia, the Mainstream Media, Hollywood, and the masked mob of “Antifa” rioters believe that the population is just too stupid to see this and could therefore be easily misled into believing their fake news narrative that Putin’s proxy is in control of the White House.

The whole point behind this massive infowar operation against the minds of the American public is to delegitimize Trump’s election in a last-ditch bid to give the Democrats a chance to win back Congress during next year’s midterm elections. It’s also designed to influence the President’s domestic and foreign policy decision making, and it actually has succeeded to a degree in that respect if one holds the view that Trump truly believed what he said on the campaign trail but was later pressured by the “deep state” to take a decidedly neo-conservative stance towards International Affairs after he entered into office. Regardless, what’s important to focus on in this context are the American people themselves, who largely dismiss the conspiratorial, never-proven, and constantly debunked accusations that Morgan Freeman shamelessly told the American public with a straight face.

There’s a popular saying that one shouldn’t “shoot the messenger”, but that doesn’t mean that the said messenger is above criticism. Morgan Freeman is a beloved household name who’s universally praised for his excellent acting skills and the unforgettable memories that he’s imbued his audiences with, but politics isn’t his element, and no matter how much the “Committee to Investigate Russia’ pleads that it’s “non-partisan”, former National Intelligence Director James Clapper’s open involvement in the project proves that it’s linked to the same anti-Trump “deep state” that’s been undermining American democracy for over the past two years. Morgan Freeman should have known better than to lend his acting talent to pretending that a movie script is a real-life story, and that’s why so many people are disappointed in him on a deep, personal level.

The irony of it all is that Morgan Freeman could have actually done a lot of good if he had the courage to say the truth. Instead of imploring Trump to sit down in front of the American people, elaborate on Hillary’s “Russia Did It!” conspiracy theory, and then “legitimize” it through a full-blown nationwide anti-Russian witch hunt stretching from the Office of the Presidency all the way down to the paupers in the inner city, he himself could have sat down in front of the American people just as he did in his two-minute psy-op video and calmly explain the actual real-life “deep state” conspiracy against Trump and the American people. He didn’t do that, so there’s no use in speculating about “coulda, shoulda, woulda”, but for the sake of cracking a smile and thinking about what might have been, it sure would have been powerful if he channeled his blockbuster script but adapted it to actual events by saying:

“My fellow Americans, during this past election, we came under attack by our own government. I’ve called on the patriotic members of Congress and our intelligence community to use every resource available to conduct a thorough investigation to determine exactly how this happened. Our citizens are demanding accountability. For 241 years our democracy has been imperfect but nevertheless something to aspire to, and we owe it to the brave people who have fought and died to protect this great nation and save democracy. And we owe it to our future generations to continue the fight.”

But then again, Hollywood by its very nature is fake and deceptive, so it might be too much to ever hope for an American movie icon to stand up and say those brave words that were imagined above, though that doesn’t mean that they wouldn’t have resonated with tens of millions of dyed-in-the-wool patriotic Americans who are sick and tired of the “deep state’s” manipulative mind games.

Related Article:

Morgan Freeman, David Frum, and the no-good non-profit (The Baffler)

US Seeks to Monopolize Cyberwarfare

By Ulson Gunnar

Source: New Eastern Outlook

The use of information to enhance martial power goes back to the beginning of human civilization itself, where propaganda and psychological warfare went hand-in-hand with slings, arrows, swords and shields.

The most recent iteration of this takes the form of social media and cyberwarfare where tools are being developed and deployed to influence populations at home and abroad, to manipulate political processes of foreign states and even tap into and exploit global economic forces.

In the beginning of the 21st century, the United States held an uncontested monopoly over the tools of cyberwarfare. Today, this is changing quickly, presenting an increasingly balanced cyberscape where nations are able to defend themselves on near parity with America’s ability to attack them.

To reassert America’s control over information and the technology used to broker it, Jared Cohen, current Google employee and former US State Department staff, has proposed a US-created and dominated “international” framework regarding cyberconflict.

His op-ed in the New York Times titled, “How to Prevent a Cyberwar,” begins by admitting the very pretext the US is using to expand its control over cyberwarfare is baseless, noting that “specifics of Russia’s interference in the 2016 America election remain unclear.”

Regardless, Cohen continues by laying out a plan for reasserting American control over cyberwarfare anyway, by claiming:

Cyberweapons won’t go away and their spread can’t be controlled. Instead, as we’ve done for other destructive technologies, the world needs to establish a set of principles to determine the proper conduct of governments regarding cyberconflict. They would dictate how to properly attribute cyberattacks, so that we know with confidence who is responsible, and they would guide how countries should respond.

Cohen, unsurprisingly, nominates the US to lead and direct these efforts:

The United States is uniquely positioned to lead this effort and point the world toward a goal of an enforceable cyberwarfare treaty. Many of the institutions that would be instrumental in informing these principles are based in the United States, including research universities and the technology industry. Part of this effort would involve leading by example, and the United States can and should establish itself as a defender of a free and open internet everywhere.

Cohen never explains how this US-dominated framework will differ from existing “international” frameworks regarding conventional warfare the US regularly abuses to justify a growing collection of devastating conflicts it is waging worldwide.

And as has been repeatedly documented, the United States’ definition of a “free and open internet everywhere” is an Internet dominated by US tech companies seeking to enhance and expand US interests globally.

Cohen ironically notes that:

Cyberweapons have already been used by governments to interfere with elections, steal billions of dollars, harm critical infrastructure, censor the press, manipulate public conversations about crucial issues and harass dissidents and journalists. The intensity of cyberconflict around the world is increasing, and the tools are becoming cheaper and more readily available.

Indeed, cyberweapons have already been used, primarily by the United States.

Jared Cohen himself was directly involved in joint operations between Google, Facebook, the US State Department and a number of other US tech and media enterprises which before and during 2011 set the stage for the so-called “Arab Spring.”

It included the training, funding and equipping of activists years ahead of the the uprisings as well as active participation in the uprisings themselves, including providing assistance to both protesters and militants everywhere from Libya to Syria in overthrowing governments targeted by Washington for regime change.

One such tool used in these efforts was described in a UK Independent article titled, “Google planned to help Syrian rebels bring down Assad regime, leaked Hillary Clinton emails claim,” which would report that:

An interactive tool created by Google was designed to encourage Syrian rebels and help bring down the Assad regime, Hillary Clinton’s leaked emails have reportedly revealed.

By tracking and mapping defections within the Syrian leadership, it was reportedly designed to encourage more people to defect and ‘give confidence’ to the rebel opposition.

The article would continue, mentioning Jared Cohen by name:

The email detailing Google’s defection tracker purportedly came from Jared Cohen, a Clinton advisor until 2010 and now-President of Jigsaw, formerly known as Google Ideas, the company’s New York-based policy think tank.

In a July 2012 email to members of Clinton’s team, which the WikiLeaks release alleges was later forwarded to the Secretary of State herself, Cohen reportedly said: “My team is planning to launch a tool on Sunday that will publicly track and map the defections in Syria and which parts of the government they are coming from.”

Would Cohen’s more recently proposed “framework” have prevented the United States’ use of these cyberweapons against sovereign states to undermine sociopolitical stability, overturn entire governments and plunge them into enduring chaos many still remain in 6 years later? Most likely not.

What Cohen and the interests he represents are truly concerned with is that nations are now not only able to recognize, prepare for and defend against US cyberwarfare, they may be capable of retaliating against the US.

Cohen’s proposal for an international framework to govern cyberwarfare simply seeks to define it in terms that leaves the US with both an uncontested monopoly over cyberwarfare as well as the means to wield it globally with absolute impunity.

It would be not unlike current “international” frameworks used to govern conflicts between nations which the US has used to justify an expansive, global campaign of extraterritorial war stretching from North Africa to Central Asia and beyond.

Such frameworks have become enablers of injustice, not a deterrence to it.

As nations from Iran to North Korea are discovering, the only true means of defending oneself from foreign military aggression is creating a plausible deterrence to dissuade foreign nations from attacking. This is done by creating a price for attacking and invading that is higher than the perceived benefits of doing so.

Nations like Russia and China have already achieved this balance with the United States in terms of conventional and nuclear warfare, and have now nearly established a similar deterrence in terms of cyber and information warfare. For the rest of the world, developing cyberdefense is not as costly as conventional military or nuclear arsenals, making cyberwarfare a corner of the battlefield unlikely to be monopolized by the US as it had done at the turn of the century.

Ensuring that no single nation ever has the opportunity to abuse such a monopoly again means exposing and confronting efforts by those like Google’s Jared Cohen and his proposal for an “international framework” for cyberwarfare that resembles the same sort of enabling the United Nations provides the US in terms of proliferating conventional conflicts across the globe.

New York Times stokes anti-Russia campaign to promote Facebook, Twitter censorship

By Bill Van Auken

Source: WSWS.org

The New York Times has mounted a concerted campaign promoting a crackdown on political expression on social media on the basis of unsubstantiated allegations of Russian government interference in the 2016 US presidential election.

In conjunction with a public statement by Facebook last Wednesday on political advertising allegedly originating in Russia, the Times published a sensationalist “investigative” report titled “The Fake Americans Russia Created to Influence the Election,” an op-ed piece indicting Facebook for failing to exercise greater censorship of political content and an editorial Saturday touching on the same themes.

Facebook briefed members of both the Senate and House intelligence committees on its findings on September 6. It said it found $50,000 in spending on 2,200 “potentially politically related” ads “that might have originated in Russia” over a two-year period beginning in June 2015. It added that this included Facebook accounts and pages “with very weak signals of a connection and not associated with any known organized effort,” including “accounts with US IP addresses but with the language set to Russian.”

The vast majority of the ads, Facebook’s chief security officer Alex Stamos added, “didn’t specifically reference the US presidential election, voting or a particular candidate,” but rather appeared to focus on amplifying “divisive social and political messages.”

The testimony was seized upon by Democratic politicians attempting to promote the theme of Russia meddling in the US elections in support of Trump. Representative Adam Schiff, the senior Democrat on the House Intelligence Committee, called the highly ambiguous Facebook findings “deeply disturbing and yet fully consistent with the unclassified assessment of the intelligence committee.”

The Times “investigation” was as weak in its substantiation of a Russian government operation to influence the 2016 presidential election as the Facebook report, but far more inflammatory.

It described an “unprecedented foreign intervention in American democracy” and a “cyberarmy of counterfeit Facebook and Twitter accounts, a legion of Russian-controlled impostors whose operations are still being unraveled.”

It repeated the unproven allegations that Russia was responsible for the hacking and leaking of Democratic emails exposing the party leadership’s attempts to sabotage the presidential campaign of self-described “socialist” Senator Bernie Sanders, while accusing Russian media outlets like RT and Sputnik of having “battered” Hillary Clinton with a “fire hose of stories, true, false and in between.”

The story focuses, however, on the alleged Russian use of Facebook and Twitter, darkly accusing the two companies of failing to prevent themselves from “being turned into engines of deception and propaganda.”

The “evidence” uncovered by the Times consisted of linking “suspect” Facebook accounts, since taken down by the company, that posted material linking to a website, DCLeaks.com, that published hacked emails from billionaire financier and Democratic Party donor George Soros, a former NATO commander, and Democratic as well as Republican functionaries. With no substantiation, the newspaper claims that “United States intelligence concluded” that the site was a creation of the Russian military intelligence agency GRU.

The article also accuses Russia of exploiting Twitter, using “hundreds of accounts” for “posting anti-Clinton messages and promoting leaked material.”

It further charges that the alleged Russian campaign employed “automated Twitter bots, which send out tweets according to built-in instruction.”

According to Twitter’s own estimate, there are some 48 million such bots on Twitter, and they accounted for fully 19 percent of all election-related tweets during the 2016 presidential campaign.

The Times report acknowledges that it investigated Twitter accounts identified as “Kremlin trolls” to discover that there were real people behind them with no ties to the Russian government. It quoted one of them, Marilyn Justice, 66, from Nova Scotia, who told the newspaper she believed that “Hillary’s a warmonger” and that she was hostile to the anti-Russian bias in the Western media. Another so-called “troll” turned out to be a web producer in Zurich, who expressed sharp disagreement with Western narratives on the Ukraine and Syria.

The existence of such views, the Times concluded was “a victory for Russia’s information war—that admirers of the Kremlin spread what American officials consider to be Russian disinformation on election hacking, Syria, Ukraine and more.”

The Times followed up its “investigation” with an op-ed piece accusing Facebook of having “contributed to, and profited from, the erosion of democratic norms in the United States” by having allowed the posting of “anti-Hillary ads precisely aimed at Facebook users whose demographic profiles implied a vulnerability to political propaganda.”

It went on to comment: “Unfortunately, the range of potential responses to this problem is limited. The First Amendment grants broad protections to publishers like Facebook.”

The Times editorial published Saturday questions whether “any federal agency is focused on” the alleged “problems” uncovered in the newspaper’s report: “foreign intervention through social media to feed partisan anger and suspicion in a polarized nation.”

There is a farcical element to the Times exposé. The idea that the spending of $50,000, vaguely linked to Russia, on Facebook ads over a two-year period undermined US elections in which total spending is estimated at roughly $7 billion is ludicrous.

Whatever actions may have been taken by the government of Vladimir Putin to promote the international interests of Russia’s ruling oligarchy, Moscow’s alleged Internet activities pale in comparison to the unrelenting campaigns mounted by US government agencies, from the CIA to the Pentagon and the National Endowment for Democracy, to rig foreign elections, engineer regime change operations and militarily destroy entire countries. As the former US assistant secretary of state Victoria Nuland proudly acknowledged, Washington sunk some $5 billion into promoting pro-Western regime change in Ukraine.

Even more preposterous is the attempt to attribute the sharp social tensions and intense political antagonisms that are ripping apart the seams of American society to Russian propaganda. Both are the product of the crisis of American capitalism, characterized above all by the uninterrupted growth of social inequality.

There is, however, a sinister and deadly serious content to the campaign by the Times editorial board, which functions as a reliable conduit for CIA propaganda. It has joined its long-running campaign around allegations of Russian interference in the US election with the demand for a crackdown on political expression on social media.

The two are inextricably linked. Underlying the Times campaign around Moscow’s supposed assault on the “integrity of American democracy” lies the political agenda of powerful factions within the US ruling establishment, which are demanding the continuation and intensification of the drive toward regime change in, and military confrontation with, Russia.

The preparations for war abroad are inevitably accompanied by the growth of censorship and political repression at home. The Times ’ criticisms of Facebook and Twitter notwithstanding, these corporations, along with Google, are collaborating closely with the US government and its intelligence agencies in the attempt to suppress freedom of speech and thought and censor anti-capitalist and anti-war reporting and opinion.

Under the phony banner of combating “fake news,” Google announced a change in its search algorithms last April that was clearly directed at slashing the readership of anti-war and left-wing websites, with the World Socialist Web Site being hit the hardest, losing more than two-thirds of its traffic from Google search results.

Facebook has followed suit, rolling out a similar announcement in June that it was updating its own News Feed algorithm aimed at “deprioritizing” posts viewed as “problematic” promoting “low quality content” “sensationalism” and “misinformation.”

The attempts by these multi-billion-dollar corporations to arrogate to the themselves the power of gatekeepers of the Internet, censoring content that conflicts with the interests of the American ruling oligarchy and its military-intelligence apparatus has aroused broad popular hostility. The WSWS has spearheaded the opposition to these attacks, with 3,500 people from more than 80 different countries signing it petition demanding that Google cease its censorship of the Internet.

New York Times Propagates Russia Hacking Conspiracy Theory

The New York Times reports as fact that Russia hacked the 2016 US presidential election despite failing to present any evidence to support this claim.

By Jeremy R. Hammond

Source: Foreign Policy Journal

In late 2002 and early 2003, those of us who were warning that the US government was lying, that there was no evidence that Iraq still possessed stockpiles of weapons of mass destruction (WMD), much less active WMD manufacturing programs, were frequently dismissed as “conspiracy theorists”.

Of course, in reality, it was the US mainstream media that was propagating the government’s unfounded conspiracy theory that Saddam Hussein had such weapons and, further, had a cooperative relationship with Al-Qaeda, the terrorist organization held responsible for the attacks of September 11, 2001.

The New York Times served the government in its campaign of deception by spearheading the media’s dissemination of the lies out to the public, thus manufacturing Americans’ consent for this illegal war of aggression.

Spreading government propaganda is a function the Times never ceases to serve well — the lesson from its own reporting during the run-up to the Iraq war, and from the mainstream media’s reporting in general, having been dutifully disregarded.

One of the latest government conspiracy theories the Times is helping to propagate, by serving effectively as the political establishment’s very own public relations firm, is the claim that the government of Russia was responsible for hacking into computers of the Democratic National Committee (DNC) and email accounts of John Podesta, who was then chairman of Hillary Clinton’s presidential campaign.

In a report published September 1, 2017, the Times elaborated on this conspiracy theory under the headline “Russian Election Hacking Efforts, Wider Than Previously Known, Draw Little Scrutiny”.

In it, the Times reports as fact that Russia was responsible not only for hacking the DNC and Podesta’s email account, but also for hacking directly into the US election system itself. All that’s old news, however, so the Times‘ new spin is that Russia’s efforts to hack state electoral systems were much more extensive than previously thought.

However, the Times presents not one shred of evidence to support the underlying claim that Russia hacked these systems, much less that this alleged hacking was much more widespread than previously reported.

To the scrutinous reader who is familiar with the propaganda techniques mainstream media use in order to manufacture consent for various government policies, the total lack of evidence is apparent. In fact, the Times actually acknowledges that there is no evidence to support the claim it is making in the headline. Yet, through obfuscation, use of deceptive language, and various other techniques, the Times leads the general reader to believe that its headline is true.

An examination of the article is useful to see just how the Times manages to lead readers to the conclusion the Russia hacking is a demonstrated fact when, in reality, it remains just another conspiracy theory originating from the government that the Times is all too happy to help propagate.

The Alleged Russian Hacking of US Electoral Systems

The first thing to note about this New York Times piece is its title. The headline makes two claims: 1) it’s a fact that Russia tried to hack the US election, and this fact has been known publicly for some time; and 2) the Times has new information showing not only that US election systems were hacked and that Russia was responsible, but also that Russia’s hacking efforts even more widespread than previously known.

The story begins with the case of Durham county, North Carolina, where, we learn, various irregularities occurred at polling stations on election day last November (bold emphasis added throughout):

Dozens were told they were ineligible to vote and were turned away at the polls, even when they displayed current registration cards. Others were sent from one polling place to another, only to be rejected. Scores of voters were incorrectly told they had cast ballots days earlier. In one precinct, voting halted for two hours.

Susan Greenhalgh, a troubleshooter at a nonpartisan election monitoring group, was alarmed. Most of the complaints came from Durham, a blue-leaning county in a swing state [North Carolina]. The problems involved electronic poll books — tablets and laptops, loaded with check-in software, that have increasingly replaced the thick binders of paper used to verify voters’ identities and registration status. She knew that the company that provided Durham’s software, VR Systems, had been penetrated by Russian hackers months before.

“It felt like tampering, or some kind of cyberattack,” Ms. Greenhalgh said about the voting troubles in Durham.

Note that the Times does not say that Ms. Greenhalgh “believed” or “had heard” that Russian hackers were responsible for earlier hacking VR Systems, but that she “knew” this was so. With this verb choice, the Times is asserting that this claim is a proven fact.

The purpose of this assertion is to establish credibility in the mind of the reader that its headline is true, that the evidence shows that Russian hacking efforts were more widespread than previously known. If it is a fact that Russia hacked US election systems, then it is not hard to believe that its hacking was more extensive than previously thought.

But what evidence does the Times present to support its assertion that this earlier Russian hacking of VR Systems occurred?

Well, to answer that question, let’s first look at how Ms. Greenhalgh “knew” that Russians had hacked VR Systems. Much further into the article, more than halfway through, the Times tells us:

As the problems mounted, The Charlotte Observer reported that Durham’s e-poll book vendor was Florida-based VR Systems, which Ms. Greenhalgh knew from a CNN report had been hacked earlier by Russians. “Chills went through my spine,” she recalled.

So there were irregularities at the Durham county polling stations, and Durham county used VR Systems for its polling system, which Ms. Greenhalgh “knew” Russians had hacked because she’d heard it on CNN.

Mid-article, however, the Times also quotes Ms. Greenhalgh acknowledging, with respect to the specific case of Durham county, “We still don’t know if Russian hackers did this.”

If we don’t know whether Russian hacking was responsible for the supposed irregularities in Durham county’s polling station, why is the Times using it as an example to support the claim made in its headline that this hacking was more extensive than previously thought? If there are cases where there is evidence, why not feature one of those, instead?

The answer is that no such evidence exists; the Times has no evidence to support that claim in its headline. In fact, it acknowledges this in several other places in the article. What the Times is trying to do is to build the case that we can safely assume that what happened in Durham county was a consequence of Russian hacking. After all, if Russia hacked VR Systems, that certainly could explain those election-day irregularities, right?

But how solid is the Times‘ premise that Russia hacked VR Systems in the first place?

The Times doesn’t attempt to support this premise solely with hearsay about something CNN reported. It exerts slightly greater effort to convince the reader. Nine paragraphs into the article, we read:

Beyond VR Systems, hackers breached at least two other providers of critical election services well ahead of the 2016 voting, said current and former intelligence officials, speaking on condition of anonymity because the information is classified. The officials would not disclose the names of the companies.

Note here that the Times is once again acknowledging that it doesn’t actually have any evidence to support the claim that Russia hacked other companies in addition to VR Systems, which it is using to support the claim made in its headline that the Russian hacking was more widespread than previously thought. The Times is simply parroting government officials who’ve made this claim.

The Times‘ case crumbles even further the deeper one reads into the article. With respect to the Durham county irregularities, the Times next notes:

There are plenty of other reasons for such breakdowns — local officials blamed human error and software malfunctions — and no clear-cut evidence of digital sabotage has emerged, much less a Russian role in it. Despite the disruptions, a record number of votes were cast in Durham, following a pattern there of overwhelming support for Democratic presidential candidates, this time Hillary Clinton.

But months later, for Ms. Greenhalgh, other election security experts and some state officials, questions still linger about what happened that day in Durham as well as other counties in North Carolina, Virginia, Georgia and Arizona.

So keep in mind as we proceed that the Times is here once again acknowledging that no evidence exists to support the suspicion that the Durham county irregularities were due to Russian hacking. Yet it attempts to lead readers to that conclusion by suggesting that Russians did hack states’ electoral systems:

After a presidential campaign scarred by Russian meddling, local, state and federal agencies have conducted little of the type of digital forensic investigation required to assess the impact, if any, on voting in at least 21 states whose election systems were targeted by Russian hackers, according to interviews with nearly two dozen national security and state officials and election technology specialists.

Note that here the Times is attributing the claim that Russia hacked into states’ electoral systems to various sources. In its next paragraph, however, the Times does away with attribution and transforms this claiminto an ostensibly verified fact:

The assaults on the vast back-end election apparatus — voter-registration operations, state and local election databases, e-poll books and other equipment — have received far less attention than other aspects of the Russian interference, such as the hacking of Democratic emails and spreading of false or damaging information about Mrs. Clinton. Yet the hacking of electoral systems was more extensive than previously disclosed, The New York Times found.

Here we see that the Times is back to asserting as fact that the Russian hacking was more extensive than previously reported, even though it has admittedly not yet provided even a single piece of supporting evidence! How can it do that? Well, transparently, what is important to the Times is that its readers believe that its headline is true, not to actually demonstrate it. Whether it is actually true does not matter; it is just the belief that the Times is aiming to instill.

This is the nature of propaganda.

Turning to the premise, note that the Times is here claiming as fact that, one, US electoral systems were extensively hacked, and, two, Russia was responsible.

It continues:

Intelligence officials in January reassured Americans that there was no indication that Russian hackers had altered the vote count on Election Day, the bottom-line outcome. But the assurances stopped there.

Government officials said that they intentionally did not address the security of the back-end election systems, whose disruption could prevent voters from even casting ballots.

That’s partly because states control elections; they have fewer resources than the federal government but have long been loath to allow even cursory federal intrusions into the voting process.

That, along with legal constraints on intelligence agencies’ involvement in domestic issues, has hobbled any broad examination of Russian efforts to compromise American election systems. Those attempts include combing through voter databases, scanning for vulnerabilities or seeking to alter data, which have been identified in multiple states. Current congressional inquiries and the special counsel’s Russia investigation have not focused on the matter.

Note here how the Times is explaining that the federal government has not really focused much on investigating US election systems irregularities even while continuing to assert as fact that there were Russian efforts to compromise those systems! Further:

“We don’t know if any of the problems were an accident, or the random problems you get with computer systems, or whether it was a local hacker, or actual malfeasance by a sovereign nation-state,” said Michael Daniel, who served as the cybersecurity coordinator in the Obama White House. “If you really want to know what happened, you’d have to do a lot of forensics, a lot of research and investigation, and you may not find out even then.”

In interviews, academic and private election security experts acknowledged the challenges of such diagnostics but argued that the effort is necessary. They warned about what could come, perhaps as soon as next year’s midterm elections, if the existing mix of outdated voting equipment, haphazard election-verification procedures and array of outside vendors is not improved to build an effective defense against Russian or other hackers.

So, again, the Times is acknowledging that the kind of forensic investigation that would be required to determine whether US election systems were hacked have not actually been conducted. How, therefore, can the Times report as fact not only that such hacking occurred, but that Russia was responsible?

It gets worse. The Times at this point in the article has already acknowledged that there could be perfectly benign explanations for what happened in Durham county. As we continue reading, we learn that the those supposedly alarming irregularities the Times opened the article with were not actually all that irregular (and hence not all that alarming). To the contrary:

Still, some of the incidents reported in North Carolina occur in every election, said Charles Stewart III, a political scientist at the Massachusetts Institute of Technology and an expert on election administration.

“Election officials and advocates and reporters who were watching most closely came away saying this was an amazingly quiet election,” he said, playing down the notion of tampering.

The Times next quotes Ms. Greenhalgh’s admission that there’s no evidence hackers got into Durham county’s system (much less that Russia was responsible).

Keep in mind that the claim the government and media have been making is that Russia interfered in the US election to throw the vote to Donald Trump. Yet, in the case of Durham county, the result was that, as the Times informs, “Hillary Clinton won 78 percent of the 156,000 votes”. This is a strange outcome if we are to assume that Russia hacked the system to tamper with the election!

But the Times is not unskilled in the art of propaganda, so it has an explanation ready for us: Russia tried to hack the system there, but was just unsuccessful! It continues:

Details of the breach did not emerge until June, in a classified National Security Agency [NSA] report leaked to The Intercept, a national security news site. That report found that hackers from Russia’s military intelligence agency, the G.R.U., had penetrated the company’s computer systems as early as August 2016, then sent “spear-phishing” emails from a fake VR Systems account to 122 state and local election jurisdictions. The emails sought to trick election officials into downloading malicious software to take over their computers.

The N.S.A. analysis did not say whether the hackers had sabotaged voter data. “It is unknown,” the agency concluded, whether Russian phishing “successfully compromised the intended victims, and what potential data could have been accessed.”

VR Systems’ chief operating officer, Ben Martin, said he did not believe Russian hackers were successful. He acknowledged that the vendor was a “juicy target,” given that its systems are used in battleground states including North Carolina, Florida and Virginia. But he said that the company blocked access from its systems to local databases, and employs security protocols to bar intruders and digital triggers that sound alerts if its software is manipulated.

Take note again of the Times choice of verb: the NSA report “found” that hackers working for Russian intelligence had penetrated VR Systems’ computer systems. Through this choice of verb, the Times is communicating that it is a verified fact that Russia hacked VR Systems. But is it? To answer that, let’s turn to the Times‘ source.

The Intercept reported on this alleged hack much earlier, on June 5, 2017. Unlike the Times, however, The Intercept provided the following important caveat:

While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based. A U.S. intelligence officer who declined to be identified cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.

To reiterate, the supposed evidence that exists proving that Russia hacked VR Systems is classified and still unknown to either the public or the media, including The Intercept and New York Times.

As The Intercept notes, the NSA report “states unequivocally in its summary statement that it was Russian military intelligence, specifically the Russian General Staff Main Intelligence Directorate, or GRU, that conducted the cyber attacks described in the document.”

But upon what actual evidence is that unequivocal statement based?

The Intercept, like the Times, proceeds to accept this unequivocal summary statement as fact despite its acknowledged lack of access to the evidence supposedly supporting this claim:

The NSA has now learned, however, that Russian government hackers, part of a team with a “cyber espionage mandate specifically directed at U.S. and foreign elections,” focused on parts of the system directly connected to the voter registration process, including a private sector manufacturer of devices that maintain and verify the voter rolls.

Here The Intercept is being as disingenuous with its readers as the Times. Note again the deceptive verb choice. The NSA had not actually “learned” that Russia tried to hack US electoral systems; it had rather assessed that this was so. As the manufactured “intelligence” about Iraq’s WMDs should have taught us, those are far from the same thing.

Conveniently, The Intercept provides a graphic image from the NSA report illustrating the point:

The key element of this chart to note is in the left column, where it identifies the “Operators” responsible sending Phishing emails — emails designed to trick the recipient into giving away login credentials for whatever system the hackers were trying to get into. Note that, according to the NSA, these “Operators” were “Probably within” the GRU.

“Probably”.

So, does the NSA know that the Russian government was responsible for these Phishing emails?

No.

The NSA is claiming this is so. But the supposed evidence it is basing this claim upon has not been shown to even exist.

Now, perhaps the NSA has solid reasoning to arrive at this conclusion. Perhaps it has solid, though not definitive, evidence to back this up.

But the New York Times ought to be properly informing its readers that the Russian hacking of VR Systems is an allegation. It ought to be including the caveat with this information that this is according to the government, but that it has not yet been proven. Moreover, the Times ought to be informing its readers that the evidence supposedly supporting this conclusion has not been made public, and, further, that nobody at the Times has been able to verify it even exists.

But continuing in its propaganda effort, the Times reminds us that, “In an assessment of Russian cyberattacks released in January, intelligence agencies said Kremlin spy services had been collecting information on election processes, technology and equipment in the United States since early 2014.”

But that was just another example of the government making a claim for which no evidence has actually been provided. Each of these claims simply builds upon those that preceded it. In the next manifestation, the New York Times claim that Russia’s supposed hacking was even more extensive than previously known will likewise be presented as fact, and the acknowledgments about the lack of supporting evidence will be omitted, just as the Times omitted that important caveat from The Intercept.

Of course, to write and publish this kind of story requires extreme cognitive dissonance on the part of journalists and editors at the Times. This psychological phenomenon of holding two fundamentally contradictory beliefs at the same time is palpable throughout the piece. Once more, even while reporting its headlined claim as fact, the Times acknowledges that it has no evidence to support it:

Beginning in 2015, the American officials said, Russian hackers focused instead on other internet-accessible targets: computers at the Democratic National Committee, state and local voter databases, election websites, e-poll book vendors and other back-end election services.

Apart from the Russian influence campaign intended to undermine Mrs. Clinton and other Democratic officials, the impact of the quieter Russian hacking efforts at the state and county level has not been widely studied. Federal officials have been so tight-lipped that not even many election officials in the 21 states the hackers assaulted know whether their systems were compromised, in part because they have not been granted security clearances to examine the classified evidence.

Of course, nobody at the New York Times has seen that evidence, either, to be able to verify that it even exists.

The Times closes by noting that, unlike Ms. Greenhalgh, Durham county officials “have rejected any notion that an intruder sought to alter the election outcome.” Nevertheless, the county has turned over computers to the North Carolina State Board of Elections and Ethics Enforcement in order for the matter to be investigated.

Of course, the Times‘ purpose with this piece, rather than being to properly inform the public, is to lead readers into the belief that, regardless of whether it happened in Durham county, there were extensive efforts by the government of Russia to hack into state electoral systems.

Never mind that the Times presents not one shred of actual evidence to support either of the two claims it makes in its headline.

Conclusion

We can again recall how the media, including the New York Times, piled lie upon lie in order to manufacture consent for the US’s war of aggression against Iraq.

Here, again, the political establishment has an agenda. Donald Trump campaigned on a platform of seeking improved relations with Russia, a deescalation of tensions, and greater cooperation with Moscow. The so-called “Deep State” was upset by Hillary Clinton’s loss. In order for the national security state to retain the authoritarian powers it has assumed supposedly in order to keep Americans safe, it needs to convince Americans that they need protecting. Russia has been selected to serve as a useful “enemy” to that end.

Framing Russia as an enemy of the United States also serves the interests of the military/security complex and the goal of maintaining and expanding US hegemony across the globe. This narrative has been used, for example, to prevent Trump from deescalating in Syria and increasing cooperation with Russia there. Trump had indicated that he would shift US policy away from the Obama administration’s goal of seeking regime change in Syria and only focus on combating the so-called “Islamic State” (a.k.a., ISIS, ISIL, or Daesh). The national security state has maneuvered rather to ensure that relations between the US and Russia remain tense and that US policy remains effectively to prolong the violence.

Whatever the motives for the propaganda campaign, we can observe that this propaganda campaign is occurring. Members of the establishment media have not only failed to learn the relevant lesson from their reporting about Iraqi WMD, but refusing to do so almost seems a job prerequisite.

News consumers should not make the same mistake.

Scrutinize. Question. Think.

If we want the mainstream media to change its behavior and actually do its job of properly informing the public, then news consumers need to change their behavior. Ever news consumers knows the old adage that you can’t believe everything you read in the newspaper. Nevertheless, all too habitually, that is precisely what they do — just as the journalists and editors they are relying on for information all too habitually accept claims from government officials as fact.

It is supposed to be the job of news media to analyze information, assess the veracity of sources, question government claims, and reveal the truth. Yet the establishment media not only fail to do so, but actively serve to propagate conspiracy theories originating from the government, and thus to manufacture consent for various government policies and the private agendas of the politically and financially powerful.

In light of how the mainstream media serve this function, it is critical for the consumers to develop the analytic skills necessary to determine the truth for themselves and be able to identify state propaganda when they see it.

Hopefully, this exercise has provided some useful insights into how to do just that.

Globalisation: Hyperstition, Surveillance, and the Empire of Reason

By S.C. Hickman

Source: Techno Occulture

Edmund Berger in his essay Underground Streams speaking of various tactics used by the Situationists, Autonomia, and the Carnivalesque:

“Like the Situationists the Autonomia would engage with the tradition of the Carnivalesque alongside a Marxist political analysis. Bakhtin had described the carnival as “political drama without footlights,” where the dividing line between “symbol and reality” was extremely vague, and the Autonomia had embodied this approach through their media-oriented tactics of detournement. But under a regime of emergency laws a great portion of the Autonomia was sent to prison or into exile, leaving its legacy through an extensive network of radical punk and anarchist squats and social centers.”

One of the things we notice is that the Autonomia movement actually struck a nerve at the heart of Power and forced their hand, which obligingly reacted and used their power over and dominion of the Security System to screen out, lock up, and exclude this threat. That’s the actual problem that will have to be faced by any emancipatory movement in the present and future: How to create a movement that can be subversive of the system, and yet chameleon like not rouse the reactionary forces to the point of invoking annihilation or exclusionary measures?

A movement toward bottom-up world building, hyperstition, and exit from this Statist system will have to do it on the sly utilizing a mirror world strategy that can counter the State and Public Security and Surveillance strategies.  Such Counter-Worlds of Exit and Hyperstitional instigation will need to work the shadow climes of the energetic unconscious, triggering a global movement from the shadows rather than in direct opposition.

In many ways as I think we need a politics of distortion, allure, and sincerity, one that invents a hyperstitional hyperobject among the various multidimensional levels of our socio-cultural systems, calling forth the energetic forces at the heart of human desire and intellect, bypassing the State and Corporate filters and Security Systems of power and control. Such a path will entail knowing more about the deep State’s secret Security apparatus and Surveillance methodologies, technologies, and tactics than most thinkers are willing to acknowledge or even apprehend. Like the Hacker movements of the 90’s up to Anonymous one will need to build shadow worlds that mimic the stealth weapons of the State and Corporate Global apparatus and assemblages; but with one caveat – these weapons are non-violent “weapons of the mind”, and go unseen and unrecognized by the State Security Systems at Local and Global levels.

A global system of mass, warrantless, government surveillance now imperils privacy and other civil liberties essential to sustaining the free world. This project to unilaterally, totally control information flow is a product of complex, ongoing interplay between technological, political, legal, corporate, economic, and social factors, including research and development of advanced, digital technologies; an unremitting “war on terror”; relaxed surveillance laws; government alliances with information technology companies; mass media manipulation; and corporate globalism. One might say it as the Googling of the World.

The United Stats internally hosts 17 intelligence agencies under the umbrella known as the Security Industrial Complex. They are also known for redundancy, complexities, mismanagement and waste. This “secret state” occupies 10,000 facilities across the U.S. Over the past five years the total funding budget exceeded half a trillion dollars. The notion of globalization which has its roots in the so called universalist discourses of the Enlightenment had as its goal one thing: to impose a transparent and manageable design over unruly and uncontrollable chaos: to bring the world of humans, hitherto vexingly opaque, bafflingly unpredictable and infuriatingly disobedient and oblivious to human wishes and objectives, into order: a complete, incontestable and unchallenged order. Order under the indomitable rule of Reason.1

This Empire of Reason spreads its tentacles across the known world through networks and statecraft, markets and tradecraft, war and secrecy, drugs and pharmakon.  The rise of the shadow state during Truman’s era began a process that had already been a part of the Corporate worldview for decades. The monopoly and regulation of a mass consumption society was and always will be the goal of capitalist market economies. In our time the slow and methodical spread of the American surveillance state and apparatus has shaped the globalist agenda. Because of it the reactionary forces of other state based control systems such as Russia and China are exerting their own power and surveillance systems as counters to Euro-American hegemony.

Surveillance is a growing feature of daily news, reflecting its rapid rise to prominence in many life spheres. But in fact surveillance has been expanding quietly for many decades and is a basic feature of the modern world. As that world has transformed itself through successive generations, so surveillance takes on an ever changing character. Today, modern societies seem so fluid that it makes sense to think of them being in what Bauman terms a ‘liquid’ phase. Always on the move, but often lacking certainty and lasting bonds, today’s citizens, workers, consumers and travelers also find that their movements are monitored, tracked and traced. Surveillance slips into a liquid state.

As Bauman relates it liquid surveillance helps us grasp what is happening in the world of monitoring, tracking, tracing, sorting, checking and systematic watching that we call surveillance. Such a state of affairs engages with both historical debates over the panopticon design for surveillance as well as contemporary developments in a globalized gaze that seems to leave nowhere to hide, and simultaneously is welcomed as such. But it also stretches outwards to touch large questions sometimes unreached by debates over surveillance. It is a conversation in which each participant contributes more or less equally to the whole. (Bauman)

Our network society has installed its own “superpanopticon” (Mark Poster). Such a system is ubiquitous and invisible to the mass of users. As Poster states it “The unwanted surveillance of one’s personal choice becomes a discursive reality through the willing participation of the surveilled individual. In this instance the play of power and discourse is uniquely configured. The one being surveilled provides the information necessary.” For Poster, this supply of self-surveillance is provided through consumer transactions stored and immediately retrievable via databases in their constitution of the subject as a “sum of the information in the fields of the record that applies to that name.” The database compiles the subject as a composite of his or her online choices and activities as tracked by IFS. This compilation is fixed on media objects (images, text, MP3s, Web pages, IPs, URLs) across the deluge of code that can be intercepted through keyword pattern recognition and private lists of “threatening” URLs.2

Our so called neoliberal society has erased the Public Sphere for the atomized world of total competition in a self-regulated market economy devoid of politics except as stage-craft. As authors in the Italian autonomist movements have argued for the past fifty and more years, this “total subsumption” of capital upon the life-sphere has been accomplished through “material” and “immaterial” means.  According to these authors, capital in late capitalism and neoliberalism has attempted to progressively colonize the entire life-sphere. Resistance, they argue, comes through the “reserves” to capital that remain as the social and intellectual foundation from which capital draws, including through “immaterial labor” using digital means. Gradually during modernity, such theorists have argued, life itself has been taken as a target for capitalist subsumption, through the cooptation of communication, sexual and familial relationships (Fortunati 1995), education, and every other sphere of human activity, with economic exchange and survival as the ultimate justification for all relationships.3

Capital’s “apparatus of capture” has become increasingly efficient and broad in its appropriation of selves as subjects of its political economy through the combination of appropriating governmental functions such as: buying off political actors and agencies, cutting public funding to modernist institutions and infrastructures, redefining the agenda of education and other cultural institutions toward capitalist values, owning and narrowing the focus of the media, forcing family structures and individuals to adapt to scarcity economies, and using government police and surveillance forces and economic pressures to crush resistance. In short, it is said that neoliberalism has advanced by the totalitarian institutionalization of national and international capitalism, one nation after another, using domestic means to force compliance in domestic markets and using international pressures (economic, military, cultural) to do the same to other countries, cultures, and peoples. (Day, pp. 126-127)

The increased accuracy (or believed accuracy) of increased surveillance and feedback targeting through the collection of social big data and its analyses and social and political uses (ranging from drone predators to state surveillance in both democratic and communist/ authoritarian governments to consumer targeting— for example, the targeting done by Target Corporation, as described in a 2012 New York Times article [Duhigg 2012])— belong to a conjoined mechanism of cybernetic and neoliberal governmentality, which crosses governmental and corporate databases and organizations. Social big data seeks to demarcate trends, which then directly or indirectly act as norms, which further consolidate individual and group action within market-determined norms (Rouvroy 2013). People are forced into competition, into a “freedom” that is monitored and checked within systems of feedback control. As Norbert Weiner suggested in the Cold War period (Wiener 1954, 1961), communicative control can be used toward a discourse of “rationality”; a rationality that is seen as proper to a given political economy. The documentary indexing of the subject provides the codes for the subject’s social positioning and expressions by others and by itself. Thanks to networked, mobile devices, the subject can attempt to continuously propose him- or herself to the world as the subject of documentary representation. (Day, pp. 132-133)

Those of us in the West who use mobile devices are becoming hooked into an elaborate datasociety in which every aspect of our lives is conditioned to enforce a self-regulatory system of choices and taboos. The surveillance is done at the level of individuals, who are monitored and whose actions are predicted throughout key moments of their consumption or production, marking changes in trends and phase states, and recalculating the trajectory of entities according to these new parameters and relationships. Our algorithmic society is splicing us all into a grid of total control systems from which it will become increasingly difficult to extricate ourselves.

As Douglas Rushkoff said recently digital technology is programmed. This makes it biased toward those with the capacity to write the code. In a digital age, we must learn how to make the software, or risk becoming the software. It is not too difficult or too late to learn the code behind the things we use—or at least to understand that there is code behind their interfaces. Otherwise, we are at the mercy of those who do the programming, the people paying them, or even the technology itself.4 More and more our mass society is being programmed through an immaterial grid of datafied compliance and surveillance that captures our desires and regulates our choices. In some ways we’ve become the mindless generation, unable to stand back from the immersive worlds of our technosphere in which we live and breath. We’ve become enamored with our Mediatainment Industrial Complex that encompasses us to the point that those being born now will not know there ever was a word without gadgets. In fact we’ve all become gadgets in a market world of science fiction, our desires captured by the very gadgets we once thought would free us from the drudgery of time. Instead we’ve been locked within a world without time, a timeless realm in which the very truth of history has been sucked out of it and instead we live in a mythic time of no time, prisoners of a cartoon world of endless entertainment and false desires. In such a world the virtual has become actual, we wander through life caught in the mesh of a fake world of commodity cartoons, citizens of a dreamland turned nightmare. Shall we ever wake up?

Modern radical thought has always seen subjectivation as an energetic process: mobilization, social desire and political activism, expression, participation have been the modes of conscious collective subjectivation in the age of the revolutions. But in our age, energy is running out and desire, which has given modern social dynamics their soul, is absorbed in the black hole of virtualization and financial games, as Jean Baudrillard argues in his 1976 book, Symbolic Exchange and Death. In this book, Baudrillard analyzes the hyperrealistic stage of capitalism, and the instauration of the logic of simulation.

The end of the spectacle brings with it the collapse of reality into hyperrealism, the meticulous reduplication of the real, preferably through another reproductive medium such as advertising or photography. Through reproduction from one medium into another the real becomes volatile, it becomes the allegory of death, but it also draws strength from its own destruction, becoming the real for its own sake, a fetishism of the lost object which is no longer the object of representation, but the ecstasy of denegation and its own ritual extermination: the hyperreal. […]

The reality principle corresponds to a certain stage of the law of value. Today the whole system is swamped by indeterminacy, and every reality is absorbed by the hyperreality of the code and simulation. The principle of simulation governs us now, rather that the outdated reality principle. We feed on those forms whose finalities have disappeared. No more ideology, only simulacra. We must therefore reconstruct the entire genealogy of the law of value and its simulacra in order to grasp the hegemony and the enchantment of the current system. A structural revolution of value. This genealogy must cover political economy, where it will appear as a second-order simulacrum, just like all those that stake everything on the real: the real of production, the real of signification, whether conscious or unconscious.

Capital no longer belongs to the order of political economy: it operates with political economy as its simulated model. The entire apparatus of the commodity law of value is absorbed and recycled in the larger apparatus of the structural law of value, this becoming part of the third order of simulacra. Political economy is thus assured a second life, an eternity, within the confines of an apparatus in which it has lost all its strict determinacy, but maintains an effective presence as a system of reference for simulation. (Baudrillard 1993a: 71-72, 2).5

We’ve all become simulations now. It’s not our bodies that matter in this digital universe of data, but rather the dividual traces we leave across the virtualized world that can be manipulated to produce profit. In the sphere of semiocapitalism, financial signs are not only signifiers pointing to particular referents. The distinction between sign and referent is over. The sign is the thing, the product, the process. The “real” economy and financial expectations are no longer distinct spheres. In the past, when riches were created in the sphere of industrial production, when finance was only a tool for the mobilization of capital investment in the field of material production, recovery could not be limited to the financial sphere. It also took employment and demand. Industrial capitalism could not grow if society did not grow. Nowadays, we must accept the idea that financial capitalism can recover and thrive without social recovery. Social life has become residual, redundant, irrelevant. (Bifo)

Those of us of an older generation still remember what existed the other side of the virtual screen, but the mass of young being born now will not have that luxury and their minds will be completely immersed in this new virtual actuality with no sense of the Outside.

While those on the Left still ponder outmoded political worlds the world of capital has abandoned both the political and the social. It’s time to wake up … I wanted to say, “before it’s too late”. My problem, my despair is that it is already too late. And, yet, I continue throwing out my little posts in hopes that someone is listening, that someone will awaken from their dogmatic slumber and act… is that you?


  1. Bauman, Zygmunt; Lyon, David. Liquid Surveillance: A Conversation (PCVS-Polity Conversations Series) (pp. 79-80). Wiley. Kindle Edition.
  2. Raiford Guins. Edited Clean Version: Technology and the Culture of Control (Kindle Locations 1304-1308). Kindle Edition.
  3. Day, Ronald E.. Indexing It All: The Subject in the Age of Documentation, Information, and Data (History and Foundations of Information Science) (p. 126). The MIT Press. Kindle Edition.
  4. Douglas Rushkoff. Program or Be Programmed (Kindle Locations 1363-1367). Kindle Edition.
  5. Berardi, Franco Bifo. After the Future (Kindle Locations 2276-2294). AK Press. Kindle Edition.

Seth Rich, Craig Murray and the Sinister Stewards of the National Security State

By Mike Whitney

Source: Information Clearing House

Why is it a “conspiracy theory” to think that a disgruntled Democratic National Committee staffer gave WikiLeaks the DNC emails, but not a conspiracy theory to think the emails were provided by Russia?

Why?

Which is the more likely scenario: That a frustrated employee leaked damaging emails to embarrass his bosses or a that foreign government hacked DNC computers for some still-unknown reason?

That’s a no-brainer, isn’t it?

Former-DNC employee, Seth Rich, not only had access to the emails, but also a motive. He was pissed about the way the Clinton crowd was “sandbagging” Bernie Sanders. In contrast, there’s neither evidence nor motive connecting Russia to the emails. On top of that,  WikiLeaks founder, Julien Assange (a man of impeccable integrity) has repeatedly denied that Russia gave him the emails which suggests the government investigation is completely misdirected. The logical course of action, would be to pursue the leads that are most likely to bear fruit, not those that originate from one’s own political bias. But, of course, logic has nothing to do with the current investigation, it’s all about politics and geopolitics.

We don’t know who killed Seth Rich and we’re not going to speculate on the matter here.  But we find it very strange that neither the media nor the FBI have pursued leads in the case that challenge the prevailing narrative on the Russia hacking issue. Why is that? Why is the media so eager to blame Russia when Rich looks like the much more probable suspect?

And why have the mainstream news organizations put so much energy into discrediting the latest Fox News report, when– for the last 10 months– they’ve showed absolutely zero interest in Rich’s death at all?

According to Fox News:

“The Democratic National Committee staffer who was gunned down on July 10 on a Washington, D.C., street just steps from his home had leaked thousands of internal emails to WikiLeaks, law enforcement sources told Fox News.

A federal investigator who reviewed an FBI forensic report detailing the contents of DNC staffer Seth Rich’s computer generated within 96 hours after his murder, said Rich made contact with WikiLeaks through Gavin MacFadyen, a now-deceased American investigative reporter, documentary filmmaker, and director of WikiLeaks who was living in London at the time….

Rod Wheeler, a retired Washington homicide detective and Fox News contributor investigating the case on behalf of the Rich family, made the WikiLeaks claim, which was corroborated by a federal investigator who spoke to Fox News….

“I have seen and read the emails between Seth Rich and Wikileaks,” the federal investigator told Fox News, confirming the MacFadyen connection. He said the emails are in possession of the FBI, while the stalled case is in the hands of the Washington Police Department.” (“Family of slain DNC staffer Seth Rich blasts detective over report of WikiLeaks link”, Fox News)

Okay, so where’s the computer? Who’s got Rich’s computer? Let’s do the forensic work and get on with it.

But the Washington Post and the other bogus news organizations aren’t interested in such matters because it doesn’t fit with their political agenda. They’d rather take pot-shots at Fox for running an article that doesn’t square with their goofy Russia hacking story. This is a statement on the abysmal condition of journalism today. Headline news has become the province of perception mandarins who use the venue to shape information to their own malign specifications, and any facts that conflict with their dubious storyline, are savagely attacked and discredited. Journalists are no longer investigators that keep the public informed, but paid assassins who liquidate views that veer from the party-line.

WikiLeaks never divulges the names of the people who provide them with information. Even so, Assange has not only shown an active interest in the Seth Rich case, but also offered a $20,000 reward for anyone providing information leading to the arrest and conviction of Rich’s murder. Why? And why did he post a link to the Fox News article on his Twitter account on Tuesday?

I don’t know, but if I worked for the FBI or the Washington Post, I’d sure as hell be beating the bushes to find out. And not just because it might help in Rich’s murder investigation, but also, because it could shed light on the Russia fiasco which is being used to lay the groundwork for impeachment proceedings. So any information that challenges the government version of events, could actually change the course of history.

Have you ever heard of Craig Murray?

Murray should be the government’s star witness in the DNC hacking scandal, instead, no one even knows who he is. But if we trust what Murray has to say, then we can see that the Russia hacking story is baloney. The emails were “leaked” by insiders not “hacked” by a foreign government. Here’s the scoop from Robert Parry at Consortium News:

“Former British Ambassador to Uzbekistan Craig Murray, has suggested that the DNC leak came from a “disgruntled” Democrat upset with the DNC’s sandbagging of the Sanders campaign and that the Podesta leak came from the U.S. intelligence community….He (Murray) appears to have undertaken a mission for WikiLeaks to contact one of the sources (or a representative) during a Sept. 25 visit to Washington where he says he met with a person in a wooded area of American University. ….

Though Murray has declined to say exactly what the meeting in the woods was about, he may have been passing along messages about ways to protect the source from possible retaliation, maybe even an extraction plan if the source was in some legal or physical danger…Murray also suggested that the DNC leak and the Podesta leak came from two different sources, neither of them the Russian government.

“The Podesta emails and the DNC emails are, of course, two separate things and we shouldn’t conclude that they both have the same source,” Murray said. “In both cases we’re talking of a leak, not a hack, in that the person who was responsible for getting that information out had legal access to that information…

Scott Horton then asked, “Is it fair to say that you’re saying that the Podesta leak came from inside the intelligence services, NSA [the electronic spying National Security Agency] or another agency?”

“I think what I said was certainly compatible with that kind of interpretation, yeah,” Murray responded. “In both cases they are leaks by Americans.”

(“A Spy Coup in America?”, Robert Parry, Consortium News)

With all the hullabaloo surrounding the Russia hacking case, you’d think that Murray’s eyewitness account would be headline news, but not in Homeland Amerika where the truth is kept as far from the front page as humanly possible.

Bottom line: The government has a reliable witness (Murray) who can positively identify the person who hacked the DNC emails and, so far, they’ve showed no interest in his testimony at all.  Doesn’t that strike you as a bit weird?

Did you know that after a 10 month-long investigation, there’s still no hard evidence that Russia hacked the 2016 elections?  In fact, when the Intelligence agencies were pressed on the matter, they promised to release a report that would provide iron-clad proof of Russian meddling.  On January 6, 2017, theDirector of National Intelligence, James Clapper, released that report. It was called The Intelligence Community Assessment (ICA).  Unfortunately, the report fell far-short of the public’s expectations. Instead of a smoking gun, Clapper produced a tedious 25-page compilation of speculation, hearsay, innuendo and gobbledygook.  Here’s how veteran journalist Robert Parry summed it up:

“The report contained no direct evidence that Russia delivered hacked emails from the Democratic National Committee and Hillary Clinton’s campaign chairman John Podesta to WikiLeaks….The DNI report…as presented, is one-sided and lacks any actual proof. Further, the continued use of the word “assesses”….suggests that the underlying classified information also may be less than conclusive because, in intelligence-world-speak, “assesses” often means “guesses.” (“US Report Still Lacks Proof on Russia ‘Hack’”, Robert Parry, Consortium News)

Repeat: “the report contained no direct evidence”, no “actual proof”, and a heckuva a lot of “guessing”. That’s some “smoking gun”, eh?

If this ‘thin gruel’ sounds like insufficient grounds for removing a sitting president and his administration, that’s because it is.  But the situation is even worse than it looks,  mainly because the information in the assessment is not reliable. The ICA was corrupted by higher-ups in the Intel food-chain who selected particular analysts who could be trusted to produce a document that served their broader political agenda. Think I’m kidding? Take a look at this excerpt from an article at Fox News:

“On January 6, 2017, the U.S. Intelligence Community issued an “Intelligence Community Assessment” (ICA) that found Russia deliberately interfered in the 2016 presidential election to benefit Trump’s candidacy…  (but) there are compelling reasons to believe this ICA was actually a politicized analysis that violated normal rules for crafting intelligence assessments…… to ensure this one reached the bottom line conclusion that the Obama administration was looking for. …

….Director of National Intelligence James Clapper explained in his testimony that two dozen or so “seasoned experts” were “handpicked” from the contributing agencies” and drafted the ICA “under the aegis of his former office” …  While Clapper claimed these analysts were given “complete independence” to reach their findings, he added that their conclusions “were thoroughly vetted and then approved by the directors of the three agencies and me.”

This process drastically differed from the Intelligence Community’s normal procedures.  Hand-picking a handful of analysts from just three intelligence agencies to write such a controversial assessment went against standing rules to vet such analyses throughout the Intelligence Community within its existing structure.  The idea of using hand-picked intelligence analysts selected through some unknown process to write an assessment on such a politically sensitive topic carries a strong stench of politicization….

A major problem with this process is that it gave John Brennan, CIA’s hyper-partisan former director, enormous influence over the drafting of the ICA.  Given Brennan’s scathing criticism of Mr. Trump before and after the election, he should have had no role whatsoever in the drafting of this assessment.  Instead, Brennan probably selected the CIA analysts who worked on the ICA and reviewed and approved their conclusions….

The unusual way that the January 6, 2017 Intelligence Community Assessment was drafted raises major questions as to whether it was rigged by the Obama administration to produce conclusions that would discredit the election outcome and Mr. Trump’s presidency.”

(“More indications Intel assessment of Russian interference in election was rigged”, Fox News)

Repeat: “A politicized analysis that violated normal rules for crafting intelligence assessments.” That says it all, doesn’t it?

Let’s take a minute and review the main points in the article:

1–Was the Intelligence Community Assessment the summary work of all 17 US Intelligence Agencies?

No, it was not. “In his May 8 testimony to a Senate Judiciary subcommittee hearing, Clapper confirmed …(that) the ICA reflected the views of only three intelligence agencies — CIA, NSA and FBI – not all 17.”

2–Did any of the analysts challenge the findings in the ICA?

No, the document failed to acknowledge any dissenting views, which suggests that the analysts were screened in order to create consensus.

3– Were particular analysts chosen to produce the ICA?

Yes, they were “handpicked from the contributing agencies” and drafted the ICA “under the aegis of his former office” (the Office of the Director of National Intelligence.)

4– Was their collaborative work released to the public in its original form?

No,  their conclusions “were thoroughly vetted and then approved by the directors of the three agencies and me.” (Clapper) This of course suggests that the document was political in nature and crafted to deliver a particular message.

5–Were Clapper’s methods “normal” by Intelligence agency standards?

Definitely not. “This process drastically differed from the Intelligence Community’s normal procedures.”

6–Are Clapper and Brennan partisans who have expressed their opposition to Trump many times in the past calling into question their ability to be objective in executing their duties as heads of their respective agencies?

Absolutely. Check out this clip from Monday’s Arkansas online:

“I think, in many ways, our institutions are under assault, both externally — and that’s the big news here, is the Russian interference in our election system,” said James Clapper, the former director of national intelligence. “I think as well our institutions are under assault internally.”

When he was asked, “Internally, from the president?” Clapper said, “Exactly.” (Clapper calls Trump democracy assailant”, arkansasonline)

Brennan has made numerous similar statements. (Note: It is particularly jarring that Clapper– who oversaw the implementation of the modern surveillance police state– feels free to talk about “the assault on our institutions.”)

7–Does the ICA prove that anyone on the Trump campaign colluded with Russia or that Russia meddled in the 2016 elections?

No, it doesn’t.  What it shows is that –even while Clapper and Brennan may have been trying to produce an assessment that would ‘kill two birds with one stone’, (incriminate Russia and smear Trump at the same time) the ICA achieved neither. So far, there’s no proof of anything.   Now take a look at this list I found in an article at The American Thinker:

“12 prominent public statements by those on both sides of the aisle who reviewed the evidence or been briefed on it confirmed there was no evidence of Russia trying to help Trump in the election or colluding with him:

The New York Times (Nov 1, 2016);
House Speaker Paul Ryan (Feb, 26, 2017);
Former DNI James Clapper , March 5, 2017);
Devin Nunes Chairman of the House Intelligence Committee, March 20, 2017);
James Comey, March 20, 2017;
Rep. Chris Stewart, House Intelligence Committee, March 20, 2017;
Rep. Adam Schiff, House Intelligence committee, April 2, 2017);
Senator Dianne Feinstein, Senate Intelligence Committee, May 3, 2017);
Sen. Joe Manchin  Senate Intelligence Committee, May 8, 2017;
James Clapper (again) (May 8, 2017);
Rep. Maxine Waters, May 9, 2017);
President Donald Trump,(May 9, 2017).
Senator Grassley, Chairman of the Senate Judiciary committee, indicated that his briefing confirmed Dianne Feinstein’s view that the President was not under investigation for colluding with the Russians.”
(“Russian Hacking and Collusion: Put the Cards on the Table”, American Thinker)

Keep in mind, this is a list of the people who actually “reviewed the evidence”, and even they are not convinced. It just goes to show that the media blitz is not based on any compelling proof, but on the determination of  behind-the-scenes elites who want to destroy their political rivals. Isn’t that what’s really going on?

How does former FBI Director James Comey fit into all this?

First of all, we need to set the record straight on Comey so readers don’t get the impression that he’s the devoted civil servant and all-around stand-up guy he’s made out to be in the media. Here’s a short clip from an article by Human Rights First that will help to put things into perspective:

“Five former FBI agents…raised concerns about his (Comey’s) support for a legal memorandum justifying torture and his defense of holding an American citizen indefinitely without charge. They note that Comey concurred with a May 10, 2005, Office of Legal Counsel opinion that authorized torture. While the agents credited Comey for opposing torture tactics in combination and on policy grounds, they note that Comey still approved the legal basis for use of specific torture tactics.

“These techniques include cramped confinement, wall-standing, water dousing, extended sleep deprivation, and waterboarding, all of which constitute torture or cruel, inhuman, or degrading treatment in contravention of domestic and international law,” the letter states.

Those signing the letter to the committee also objected to Comey’s defense of detaining Americans without charge or trial and observed, “Further, Mr. Comey vigorously defended the Bush administration’s decision to hold Jose Padilla, a United States citizen apprehended on U.S. soil, indefinitely without charge or trial for years in a military brig in Charleston, South Carolina.” (“FBI Agents Urge Senate Judiciary Committee to Question Comey on Torture, Indefinite Detention”, Human Rights First)

Get the picture?

Comey is a vicious political opportunist who doesn’t mind breaking a few legs if it’ll advance his career plans. I wouldn’t trust the man as far as I could throw him. Which isn’t far.

American Thinker’s Clarice Feldman explains why Comey launched his counter-intel investigation in July 2016 but failed to notify Congress until March 2017, a full eight months later. Here’s what she said:

“There is only one reasonable explanation for FBI Director James Comey to be launching a counter-intel investigation in July 2016, notifying the White House and Clapper, and keeping it under wraps from congress. Comey was a participant in the intelligence gathering for political purposes — wittingly, or unwittingly.” (“Russian Hacking and Collusion: Put the Cards on the Table”, American Thinker)

Are we suggesting that the heads of the so called Intelligence Community are at war with the Trump Administration and paving the way for impeachment  proceedings?

Yep, we sure are. The Russia hacking fiasco is a regime change operation no different than the CIA’s 50-or-so other oustings in the last 70 years. The only difference is that this operation is on the home field which is why everyone is so flustered. These things are only suppose to happen in those “other” countries.

Does this analysis make me a Donald Trump supporter?

Never.  The idea is ridiculous. Trump might be the worst US president of all time, in fact, he probably is. But that doesn’t mean there aren’t other nefarious forces at work behind the smokescreen of democratic government. There are. In fact, this whole flap suggests that there’s an alternate power-structure that operates completely off the public’s radar and has the elected-government in its death-grip. This largely invisible group of elites controls the likes of  Brennan, Clapper and Comey. And, apparently,  they have enough influence to challenge and maybe even remove an elected president from office. (We’ll see.)

And what’s more surprising, is that the Democrats have aligned themselves with these deep state puppetmasters.  They’ve cast their lot with the sinister stewards of the national security state and hopped on the impeachment bandwagon. But is that a wise choice for the Dems?

Author Michael J. Glennon doesn’t think so. Here’s what he says in the May edition of Harper’s Magazine:

“Those who would counter the illiberalism of Trump with the illiberalism of unfettered bureaucrats would do well to contemplate the precedent their victory would set. …

American history is not silent about the proclivities of unchecked security forces, a short list of which includes the Palmer Raids, the FBI’s blackmailing of civil rights leaders, Army surveillance of the antiwar movement, the NSA’s watch lists, and the CIA’s waterboarding. …. Who would trust the authors of past episodes of repression as a reliable safeguard against future repression?”

(“Security Breach– Trump’s tussle with the bureaucratic state”, Michael J. Glennon, Harper’s Magazine)

“Who?”

The Democrats, that’s who.

 

Mike Whitney lives in Washington state. He is a contributor to Hopeless: Barack Obama and the Politics of Illusion (AK Press). Hopeless is also available in a Kindle edition. He can be reached at fergiewhitney@msn.com.