Vault 7: CIA Hacking Tools Revealed

Source: WikiLeaks

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

 

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

Media, Mind-Control, & Meditation: Plato’s E-Cave Panopticon and Beyond

panopticon-image

By Mankh (Walter E. Harris III)

Source: Axis of Logic

“Relax,” said the night man,
”We are programmed to receive.
You can check-out any time you like, 
But you can never leave!”

 – The Eagles, from “Hotel California”

In Plato’s Allegory of the Cave, people saw a shadow play on the wall and perceived it as reality. Today that Cave has morphed to provide umpteen TV channels and mini-screen gadgets; and the once sanctified living room cave has expanded into a free-range bubble of consciousness – heads bowed before an electronic altar, seemingly oblivious to the outside world.

“The “panopticon” refers to an experimental laboratory of power in which behaviour could be modified, and Foucault viewed the panopticon as a symbol of the disciplinary society of surveillance.”[1]

In Plato’s E-Cave, not only are the people watching a shadow play, they, and the shadows they watch, are being watched.

HyperNormalization
With a veneer of calm aplomb, the masses communicate 24-7, often in a frenetic urgency of the mundane, hence one interpretation of HyperNormalization. In all the years of overhearing cell-phone conversations in public, I can’t recall one snippet of philosophy or practical advice, rather stuff like, ‘yeah OMG I’ll get the chips!’ and ‘I’ll be there in like 30 seconds!’; if you’re old enough, you’d remember the days when, you got there when you got there! That said, a cell-phone can be a helpful even life-saving device.

The USEmpire election appears to have both proven and disproven the main theory of Adam Curtis’ fascinating new documentary “HyperNormalization.”

“Curtis argues that since the 1970s, governments, financiers, and technological utopians have given up on the complex “real world” and built a simple “fake world” that is run by corporations and kept stable by politicians.”[2]

The California cyber-tech-boom was a love-child of LSD-consciousness that found refuge in E-wizardy all the while looking to escape repressive politics. In his book “2030” Pepe Escobar describes it as: “Digital network capitalism would then shape post-modern globalization, from the New Economy before the end of the millennium to every digital wall to be broken beyond. California cosmology forged our world.”

According to Wikipedia:

“The term “hypernormalisation” is taken from Alexei Yurchak’s 2006 book Everything was Forever, Until it was No More: The Last Soviet Generation, about the paradoxes of life in the Soviet Union during the 20 years before it collapsed. A professor of anthropology at the University of California, Berkeley, he argues that everyone knew the system was failing, but as no one could imagine any alternative to the status quo, politicians and citizens were resigned to maintaining a pretence of a functioning society. Over time, this delusion became a self-fulfilling prophecy and the “fakeness” was accepted by everyone as real, an effect which Yurchak termed “hypernormalisation”.”[3]

First off, I see HyperNormalization as a half-truth because while the self-referential, gossipy world is fake, it is a veneer for a very real world of resource extraction and the violence perpetrated to maintain the status quo – and that is what the fakers ignore. As far as the election, many expected the Clinton dynasty to prevail as the corrupt, business as usual lesser of two evils. Breaking snooze: Where’s  the headline news that Melania Trump plans to focus on helping women and children?; I saw that mentioned on CNN’s Anderson Cooper 360, such a perfect antidote for Hillary’s loss and The Donald’s anti-feminist track record.

Even though WikiLeaks revealed the DNC (Democratic National Convention) was rigged against Sanders and leaks of Podesta/Clinton e-mails may have been proverbial straws for Hillary’s campaign camel, the prevailing media sentiment was that she would win – despite the fact that the day before the election some polls indicated a shrinking 3-4 point lead, thus with the typical margin of error, it was, in effect, tied. Yet the mass hyper-surprise!; and all that after the corporate media and comedy shows had simultaneously bashed Trump and given him more air-time than a kite on a windy day – both disdaining and elevating him, a media-mindfuck if ever there was one.

And there was little uproar when Gary Johnson and Jill Stein were excluded from debates and virtually banned from all corporate news, thus proving (if you didn’t know already) that it’s not a truly democratic election. Yet carry on we must and do the best we can with what we got, was the general sentiment, in other words, “the “fakeness” was accepted by everyone as real” aka HyperNormalization.

Yet the non-coastal, poor and middle America White working class (with sides of KKK and minorities!), which reportedly was the key demographic for The Don’s victory, was voting out of bare-bones needs; in effect they were not HyperNormalized. Then again, if Trump, who promises to challenge the status quo, caves-in to Deep State pressure, we will have an answer to an interesting article’s titular question: “President Trump: big liar going to Washington or Tribune of the People?”[4] And if that answer is the former, then the mostly White working poor will also have been duped/HyperNormalized.

You see, it’s hard to know what’s what; which all seems to prove HyperNormalization as the dominant societal charade; which screen is real, if any?

What you perceive is what you get
Another key phrase in Curtis’ documentary is “managed perception” – akin to Chomsky and Herman’s  “Manufacturing Consent: The Political Economy of the Mass Media” (1988) which showed how opinions and desensitized agreement to the status quo became a product to be mined and marketed. Witness CBS Chairman Les Moonves’ comment from February 2016:

“Man, who would have expected the ride we’re all having right now? … The money’s rolling in and this is fun. I’ve never seen anything like this, and this [is] going to be a very good year for us. Sorry. It’s a terrible thing to say. But, bring it on, Donald. Keep going.” [5] And, if i might satirically add, like an orangey topped Duracell battery, The Don does seem to have a lot of energy.

HyperNormalization is also akin to Sheldon Wolin’s theory  of “inverted totalitarianism,” where the faceless corporate machine wields so much entertainment and bureaucratic power that the people barely notice they are being played hook, line, and sinking feelings.

Some of Curtis’ info, however, is inaccurate or questionable. For examples, he blames the demise of the Occupy Movement on lack of vision and planning yet neglects to mention the FBI coordinated systemic crackdown on the ‘camps’ across the country. [6]

About Syria he says that President Bashar al-Assad retaliated with a “vengeful fury,” whereas Assad has defended his actions as self-defense for his people; numerous journalists back the Syrian President’s claim.

Post-election, I wonder: Why were so many liberals, lefties, and women more surprised that Trump won than that the DNC/HRC rigged it against Sanders? Were they simply feeling impotent due to HyperNormalized shadow play? Whatever the case, his victory revealed a crack in the smooth screen of HyperNormalization.

According to Patrick Caddell’s survey before the election, the populace seems to be hip to what’s happening:

“Powerful interests from Wall Street banks to corporations, unions and political interest groups have used campaign and lobbying money to rig the system for them. They are looting the national treasury of billions of dollars at the expense of every man, woman and child. AGREE = 81%; DISAGREE = 13%…

“The country is run by an alliance of incumbent politicians, media pundits, lobbyists and other powerful money interests for their own gain at the expense of the American people. AGREE = 87%; DISAGREE = 10%

The real struggle for America is not between Democrats and Republicans but between mainstream American and the ruling political elites. AGREE = 67%; DISAGREE = 24%.” [7]

This makes it seem it is the ‘how-to bring about change’ that is the deeper conundrum of the HyperNormalized world. Then again, people too often seem to have only their own best interests at heart. Approximately 90% of Americans want their food labeled so as to know if they contain GMOs etc. or not, yet hardly a peep out of anyone that climate change or the “environment” aka Mother Earth & Nature-beings were deliberately excluded as a main topic of the presidential debates. This makes it seem that, in general, Americans want clean food for themselves, they want a clean environment so they can go ‘play in the park’ by themselves. And that brings us to the Great Disconnect and Standing Rock.

Flow like water, be steady as a rock
Part of HyperNormalization is a disconnect from Nature and from being self- and community-guided, and therefore disconnected from the Original Peoples of Turtle Island. While many people are certainly aware of what’s happening with Standing Rock, the corporate media’s lack of attention, let alone empathy, fosters lack of concern for the outcome, lack of being outraged by the violent and racist treatment of those in prayer and peacefully protecting the main source of water for the Standing Rock Sioux and other Natives as well as approximately 17-million people downstream. The real-fake outrage is over the outcome of a fake election.

For many Native reservations where poverty and PTSD are prevalent, the people are anything but HyperNormalized; they are struggling to survive – as with Standing Rock, they are not asking for much: clean water and the space to live their lives with ancient traditions timelessly connected with the land, the water, the stones…

Plato, imagining a prisoner getting outside of the Cave, wrote: “Slowly, his eyes adjust to the light of the sun. First he can only see shadows. Gradually he can see the reflections of people and things in water and then later see the people and things themselves. Eventually, he is able to look at the stars and moon at night until finally he can look upon the sun itself .” [8]

Standing Rock is bringing people together, raising consciousness at many levels. As one example from a little over a week ago:

“In a “historic” show of interfaith solidarity, 500 clergy members prayed along the banks of North Dakota’s Cannonball River on Thursday where they “bore witness with the Standing Rock Sioux Nation,” which has faced intimidation, violence, and arrests for protecting their sacred land and water supply from the threats of a massive oil pipeline. According to the Episcopal News Service, “The interfaith group spent more than five hours on site, marching, singing hymns, sharing testimony, and calling others to join them in standing with the more than [300] tribes who have committed their support to the Sioux Nation as they protest the route of the Dakota Access Pipeline (DAPL).” [9]

This solidarity is in stark contrast with the election where a typically 51/49 system determines an outcome for a society literally programmed for exciting close-call winners – think sporting events,
reality shows, awards ceremonies.

Outside in and inside out
There are many ways to get outside the Cave. One of those is by going within. When I first started to meditate, as is common, I became aware of the constant chatter in my head and soon realized that the mind left unattended will rattle on endlessly. Meditation then showed me that once the chatter quiets, one then has access to other frequencies, other ‘channels’ – what happens then is a very personal matter yet also impersonal because one becomes connected with another source of thinking-seeing-feeling. Chatter, like cell-phones, has it’s usefulness, say, if you forgot to turn the stove off. My point to the personal anecdote is that the corporate media is too much chatter, endlessly looping itself. The gadgets, too, though useful, seem hard-wired for HyperNormalization.

Some of the chatter we must live with, yet by learning to follow our intuitions, listening to and connecting with Nature, talking with elders and little children we can better tune-out from the shadow-play, we can find new and ancient ways for more people – and that includes trees, rivers, etc. –  “to look at the stars and moon at night” and “look upon the sun itself.”

“Sin filo ya y derrotada se quejó: Soy más fuerte que ella, pero no le puedo hacer daño y ella a mi, sin pelear. me ha vencido.’”

“Without sharpness and defeated, it [the sword] complained: ‘I am stronger than the water, but I cannot harm her. And the water, without fighting, has conquered me.’” [10]

NOTES:
1.    Panopticism here and here.
2.    Ibid.
3.    HyperNormalization
4.    See here.
5.    “Les Moonves: Trump’s run is ‘damn good for CBS’”. See here.
6.    “Revealed: how the FBI coordinated the crackdown on Occupy
7.    “Patrick Caddell; The Pollster Who ‘Got it Right’
8.    “Allegory of the Cave
9.    “A Prayer for People and Planet: 500 Clergy Hold ‘Historic’ Mass Gathering for Standing Rock
10.    “Questions & Swords: Folktales of the Zapatista Revolution” as told by Subcomandante Marcos, Cino Puntos Press, El Paso, Texas, 2001, p.82.

To watch “HyperNormalization”, click here.

Mankh (Walter E. Harris III) is an essayist and resident poet on Axis of Logic. In addition to his work as a writer, he is a small press publisher and Turtle Islander. His new book of genre-bending poetic-nonfiction is “Musings With The Golden Sparrow.” You can contact him via his literary website.

  

Phantom Democracy in the Age of the Internet

trumpandflag

By Nozomi Hayase

Source: Dissident Voice

After the Electoral College vote, the Trump presidency is now official. As denial and blame games continue, it becomes clear this was not a foreign government coup d’état. The truth is that democracy in America has been rotten to the core for decades. It is meddled with by corporate lobbyists, Big Pharma, Big Oil and Wall Street –those who are addicted to money and power.

American democracy is hollowed out, veiled with a loud media echo chamber, bringing feigned solidity to its emptiness. Out of this vacuum emerges a madness for power. U.S. politics is a contest of those who are driven by insatiable hunger – the most callous, cunning and manipulative people in society.

In this system, only people who lack empathy and advance self-serving agendas without concerns for others can rise to the top. The results of this year’s presidential election may mean that this person who many saw as ‘unfit to be president’ was better suited to play this dirty game than his opponent, Hillary Clinton.

Ascent of Trump

Donald Trump, a perceived outsider, seemed to appear out of nowhere. The former producer of the American game show The Apprentice sniffed the vulnerability of disfranchised Americans who are continually betrayed by the establishment. He then quickly moved in for the kill, turning the electoral arena into a new Reality TV show.

With social media as a hunting ground, this new Republican contender made direct connection with his audience, pouring out charm and grooming them with fake promises. By deploying words as weapons of control, he managed to garner favorable reactions from his followers. His language cast a magic spell where contradictory remarks and lies bypassed critical examination. Emotions triumphed over reason and under the grip of irrational logic, facts no longer seemed to matter. With a chameleon-like ability to shape-shift and say whatever voters wanted to hear, he was able to create a mirage and ensnare the populace into a grandiose fantasy.

What was the press, as a supposed watchdog of power doing during this Trump’s uncanny rise in popularity? Mainstream media did nothing to prevent it and instead facilitated this process. His bombastic comments hit jackpot high ratings in the corporate media and rhetoric not bound by facts was not only tolerated, but actively promoted with their shortsighted mentality of profit at any cost.

WikiLeaks and the Democratizing Power of the Internet

This same corporate media also buried a few important facts regarding the 2016 U.S. presidential election. This year’s election was an unprecedented phenomenon. This is not only because the lesser evil game was fought between two of the historically most disliked candidates, but also because of the role played by a new actor from outside of the U.S. electoral arena. Days before the election, a Forbes article acknowledged the significance of WikiLeaksDNC emails, calling them a “Holy Grail of understanding of U.S. electoral politics.” It noted how “few understand the importance of WikiLeaks in the eventual writing of the history of presidential politics.”

WikiLeaks has shown how elections in the existence of a truly free press will never be the same as before. U.S. politics sponsored by corporate masters creates a milieu of deception, lies and fraud that is fraught with corruption. These power driven politicians can only thrive in secrecy. When their actions are exposed, like Hillary’s highly paid Goldman Sachs speeches, crafted public images that suck the masses into their illusions of grandeur tend to shatter. Contrary to hysterical rants of ‘Russia hacked the election!’, the defeat of the Clinton dynasty was a testimony to the power of transparency.

WikiLeaks, the world’s first global 4th estate, which operates outside of any government was birthed on the Internet. It showed a potential for emancipation unleashed by this Net. Much of the force of democratization on the Internet is being subverted to create mass surveillance and censorship. Yet at the same time, its effect of empowering ordinary people cannot be denied.

In fact, Bernie Sander’s campaign was built on social media’s grassroots organizing. With independent campaign funding, this virtually unknown senator from Vermont successfully sparked the idea of socialism and raised issues of Wall Street corruption, economic injustice and poverty at a national level. Sander’s largest support came from millennials. It was these natives of the Internet that galvanized his political revolution.

Fake News and Fake Authority

Democrats appear to be disconnected with this new reality of the Internet’s bottom up spontaneous crowd gathering or even worse were adversaries to it. This was shown in their reaction to the corruption revealed in the DNC email database and Trump’s winning of the election.

On the second day of the Democratic National Convention, hundreds of Sanders delegates who learned about DNC’s rigging of the primary walked out in protest. Chanting “This is what Democracy looks like!”, they vowed not to go with Hillary. This crisis of the American political system opened up an opportunity for real democracy. But then, Bernie turned away, urging his supporters to nominate Hillary and sided with the corrupted Democratic Party. His failure to seize this historical moment helped throw the election to Trump, who the Clinton campaign had portrayed as a ‘pied piper candidate’.

After all this came the Fake News explosion. Some established liberal media, freaked out by the country quickly turning red in this Republican takeover, created a new red scare. On November 24, an article in The Washington Postmade wild accusations that Russia was engaging in propaganda during the election to spread ‘fake news’ in favor of Trump. The anonymous site that claimed to have identified these fake news sites that the author cited in the article, was shown to be nothing but a black list that labels anyone who challenges the official narrative as untrustworthy or even insinuating them to be Russian agents, spies or traitors.

Despite U.S. Intelligence Chief James Clapper’s claim that intelligence agencies lacked strong evidence for WikiLeaks’ connection with an alleged Russian cyberattack, it was way easier for progressives to ignore facts and spread paranoia, blaming the loss of Clinton on anyone but themselves.

In the age of the Internet, fake news can easily be manufactured and spread. Yet, at the same time it can also be shut down with countering views that surround them. Also, in this new environment, traditional media is losing its monopolizing power to disseminate information. They no longer can claim to be the sole purveyor of truth. In the case of the Washington Post‘s fake news scandal, The Intercept and Matt Taibbi of Rolling Stone quickly denounced and challenged its claim, halting this report on ‘fake news’. Social media networks also countered the gatekeepers who tried to dictate what is real through filtering views that challenge the official narrative. In the end, this fake news article was debunked, with Wapo issuing a correction on that story shortly after its publication. What this has shown is the publisher’s false authority and the establishment’s desperate attempt to reassert their shrinking legitimacy to keep people under their sphere of influence.

From Regime Change to Game Changer

The election is over and liberals’ hope to stop the rise of demagoguery is fading. The president elect began recruiting his rich buddies into his cabinet. Recently, he convened a group of Silicon Valley tech leaders to invite them into his new ‘construction project to rebuild America’. As this void of American democracy is being filled with more blatant patronage networks, new insurgencies of civic power are also arising. The potent and creative power of the Internet is already here. Those who have experienced it will not easily succumb to the reality being handed down to them from the teetering Trump Tower.

Just as the power of the Internet can be used by the oligarchic class to corral the masses, it can also be used to empower the people, through its open network. When the liberating force of a free net is claimed by citizens to create movements across borders, linking diverse struggles, it can give all a chance to not only change a regime, but to change the game altogether.

One game changer is WikiLeaks. With the creative use of technology, this Internet of the media built a robust network that is resistant to censorship, making it possible for the organization to be free from state and corporate influence, allowing it to truly serve the interests of the people. It has gained its own credibility through a perfect record of authentication of documents and rigorous scientific journalism that publishes full and verifiable archives. Despite corporate media’s smearing of the organization, public opinion polls indicate that Americans strongly approve WikiLeaks’ Podesta leaks.

Another democratic tool that is available to people everywhere is cryptocurrency like Bitcoin. With this new invention, ordinary people now have power to create their own money and peer-to-peer networks that are not intermediated by any governments, banks or corporations. Just as WikiLeaks distributes free speech beyond borders and lets truth be discovered through each individual’s participation, with Bitcoin, free speech becomes an app that can be downloaded from anywhere by anyone and values are created through people transacting freely, verified by a consensus of equal peers.

In Their Nothingness, We Find Our Power

On January, 20 2017, Trump will be sworn in with the Oath of Office. The White House will become his new executive boardroom. With this United States Incorporated, the Constitution may be slowly shredded off from his business contract. With the president elect’s proposal on Twitter to give penalties, including jail time or loss of citizenship for burning the American flag, coupled with his recent call for the expansion of nuclear weapons, many are rightfully fearful of the future.

Yet, wars and destruction of civil society are already happening around the world. Crackdowns on cash and schemes of demonetization are taking place in countries like Venezuela and India. When faced with the reality of their national currencies quickly disappearing or losing value, people are waking up to the fact that these claimed values are fake and that they are not backed by real economic activity or anything of true value. More and more people are seeing bubbles pumped up by toxic assets and fraud of financial engineering that rent-seeks earnings of hard working people and creates money out of thin air.

In his speech “Currency Wars and Bitcoin’s Neutrality”, technologist and author Andreas Antonopoulos spoke of how “cash is being eradicated around the world as a scourge.” He then pointed out how governments are waging currency wars against other countries and their own people in order to benefit from a crisis they artificially created. He emphasized how governments and central banks can’t win this game, because “cash is something that we can create, electronic cash, self sovereign cash, digital cash – Bitcoin.” He then noted how this math-based ‘Internet of money’ offers an exit from this old world of currency wars. He alerted the Bitcoin community that as the battle intensifies, those who create a new infrastructure as an exit from nation-state gated economies, and those who point to this exit will be called traitors, criminals, thug and terrorists.

This war on cash and censorship with Fake News memes are attacks on our fundamental freedoms. It is a battle for truth, involving the question of who will define our human reality. This war is now full on, yet mostly brewing beneath the radar. Just before Christmas, President Obama quietly signed into law the 2017 National Defense Authorization Act. This included the ‘Countering Disinformation and Propaganda Act’, which was presented to help counter foreign enemy propaganda, yet is actually a McCarthy era-style censorship law.

We live in a time when traditional authority and leaders have failed us and there is vacuousness in this space where a center used to hold. In the story of Faust, Goethe wrote about a universal man following his thirst for knowledge. In this journey, Dr. Faust meets Mephisto (the devil) who tried to trick and tempt him to come under his control. In the scene A Dark Gallery, Faust told Mephisto, “In your Nothingness I hope to find my All”. He then took the key and entered into this mysterious unknown.

Our quest for real democracy invokes this thirst for knowledge. It invites us all to enter into the realm of Nothingness. We no longer want to believe; we want to know. We no longer blindly accept a world conceived by a few elites. Now, in this chaos and abyss we are descending into, we may be able to find the real source of our own legitimacy. With knowledge that springs from deep within, we are able to penetrate the deception of those who seek to control us and recognize their actual emptiness. In their nothingness, we can find the creative power that has always been there, power that can bring life back to this phantom of democracy.

 

Nozomi Hayase, Ph.D., is a writer who has been covering issues of freedom of speech, transparency, and decentralized movements. Her work is featured in many publications. Find her on twitter @nozomimagine. Read other articles by Nozomi.

Indict Clinton For the Russian DNC and RNC Hack

Intelligence Report On Russian Election Influence Is A Flop

index

Source: Moon of Alabama

Yesterday the U.S. Director of National Intelligence, the CIA, the NSA and the FBI released a report about alleged Russian hacking of the Democratic National Council and on Russian influence operation on the U.S. presidential election. The report failed to convince anyone. It is indeed a public relation disaster for the Intelligence Community.

John Harwood covers “the economy and national politics for CNBC and the New York Times.” More then 100,000 people follow him on Twitter. He is known as Hillary Clinton supporter and chummy with John Podesta who ran Clinton’s election campaign.

Harwood set up a simple poll. It is not statistically representative but gives a picture of a general sentiment.

harwood

This result surely shows the limits of power of the so-called Intelligence Community. But it is worse: yesterday’s “Russian hacking” claims failed to convince even its most ardent and anti-Russian supporters.

Daily Beast: U.S. Spy Report Blames Putin for Hacks, But Doesn’t Back It Up

Kevin Rothrock (Moscow Times):

I cannot believe my eyes. Is this really part of the US government’s intelligence case?I’ll say it: the declassified USG report “Assessing Russian Activities and Intentions in Recent US Elections” is an embarrassment.

Susan Hennessey (Lawfare, Brookings):

The unclassified report is underwhelming at best. There is essentially no new information for those who have been paying attention.

Bill Neely (NBCNews):

Lots of key judgements but not many key facts & no open proof in US Intell. report into alleged Russian hacking.

Stephen Hayes (Weekly Standard):

The intel report on Russia is little more than a collection of assertions. Understand protecting sources/methods, but it’s weak.

Julia Ioffe (The Atlantic):

It’s hard to tell if the thinness of the #hacking report is because the proof is qualified, or because the proof doesn’t exist.@JeffreyGoldberg Have to say, though, I’m hearing from a lot of Russia watchers who are very skeptical of the report. None like Putin/Trump.

When you lost even Julia Ioffe on your anti-Russian issue …

Clapper as DNI and Brennan as CIA chief should have been fired years ago. They will both be gone by January 20. The Intelligence Community will remember them as the chief-authors of this devastating failure.

 

Related Articles:

The Russians Did Not “Hack” the US Election – a Few Facts from a Former CIA Spy

US Report Still Lacks Proof on Russia ‘Hack’

Russian Scum!!!

Related Podcast:

 

Foxes Guard Facebook Henhouse

hqdefault

By F. William Engdahl

Source: New Eastern Outlook

The latest mantra of CIA-linked media since the “Pizzagate” leaks of data alleging that Hillary Clinton Campaign Manager John Podesta and other highly influential political persons in Washington were connected to an unusual pizza place near the White House run by a 41-year old James Achilles Alefantis called Comet Ping Pong, is the need to crack down (i.e. censorship) on what is being called “Fake News.” The latest step in this internet censorship drive is a decision by the murky social media organization called Facebook to hire special organizations to determine if Facebook messages are pushing Fake News or not. Now it comes out that the “fact check” private organizations used by Facebook are tied to the CIA and CIA-related NGO’s including George Soros’ Open Society Foundations.

In the last weeks of the US Presidential campaign, Wikileaks released a huge number of emails linked to Clinton Campaign Manager, John Podesta. The contents of thousands of emails revealed detailed exchanges between Podesta and the oddly-influential Comet Ping Pong pizza place owner, Alefantis, as well as the Clinton campaign, which held fundraisers at Comet Ping Pong.

The Pizzagate scandal exploded in the final weeks of the US campaign as teams of private researchers documented and posted Facebook, Instagram and other data suggesting that Alefantis and Comet Ping Pong were at the heart of a pedophilia ring that implicated some of the most prominent politicians in Washington and beyond.

The New York Times and Washington Post moved swiftly to assert that the Pizzagate revelations were Fake News, quoting “anonymous sources” who supposedly said the CIA “believed” Russia was behind hackers who exposed emails and documents from the Democratic National Committee (DNC) and Hillary Clinton’s campaign chair John Podesta. Former NSA senior intelligence expert William Binney claimed the Podesta and Clinton campaign data were leaked, not hacked. The NSA, he pointed out, would immediately identify a hack, especially a foreign hack, and they have remained silent.

The uncovering and release to Wikileaks of the Podesta emails were immediately blamed on Russian intelligence by the CIA, and now by the US President, with not a shred of proof, and despite the fact that NSA. Wikipedia, whose content is often manipulated by US intelligence agencies, rapidly posted a page with the curious title, “Pizzagate (Conspiracy Theory).”

To make certain the neutral interested reader gets the message, the first line reads, “Pizzagate is a debunked conspiracy theory which emerged during the 2016 United States presidential election cycle, alleging that John Podesta’s emails, which were leaked by WikiLeaks, contain coded messages referring to human trafficking, and connecting a number of pizzerias in Washington, D.C. and members of the Democratic Party to a child-sex ring.”

‘Fake News’ Mantra Begins

My purpose in mentioning Pizzagate details is not to demonstrate the authenticity of the Pizzagate allegations. That others are doing with far more resources. Rather, it is to point out the time synchronicity of the explosive Pizzagate email releases by Julian Assange’s Wikileaks web blog, with the launch of a massive mainstream media and political campaign against what is now being called “Fake News.”

The cited New York Times article that Wikipedia cites as “debunking” the Pizzagate allegations states, “None of it was true. While Mr. Alefantis has some prominent Democratic friends in Washington and was a supporter of Mrs. Clinton, he has never met her, does not sell or abuse children, and is not being investigated by law enforcement for any of these claims. He and his 40 employees had unwittingly become real people caught in the middle of a storm of fake news.” The article contains not one concrete proof that the allegations are false, merely quoting Alefantis as the poor victim of malicious Fake News.

That New York Times story was accompanied by a series of articles such as “How Fake News Goes Viral: A Case Study.” Another headline reads, “Obama, With Angela Merkel in Berlin, Assails Spread of Fake News.” Then on November 19, strong Clinton supporter, Facebook billionaire Mark Zuckerberg is quoted in a prominent article titled, “Facebook Considering Ways to Combat Fake News, Mark Zuckerberg Says.”

Facebook uses CIA Censors

Zuckerberg, CEO and founder of the world-leading social media site, Facebook.com, the world’s 5th wealthiest man at an estimated $50 billion, has now established a network of “Third Party Fact Checkers” whose job is to red flag any Facebook message of the estimated one billion people using the site, with a prominent warning that reads, “Disputed by Third-Party Fact Checkers.”

Facebook has announced that it is taking its censorship ques from something called The International Fact-Checking Network (IFCN). This IFCN, a new creation, has drafted a code of five principles for news websites to accept, and Facebook will work with “third-party fact checking organizations” that are signatories to that code of principles.

If we search under the name International Fact-Checking Network, we find ourselves at the homepage of something called the Poynter Institute for Media Studies in St. Petersburg, Florida.

OK. If we look a bit deeper we find that the Poynter Institute’s International Fact-Checking Network in turn, as its website states, gets money from the Bill & Melinda Gates Foundation, Google, the National Endowment for Democracy, the Omidyar Network, the Open Society Foundations of George Soros.

Oh my, oh my! Bill & Melinda Gates Foundation who partners with Soros in numerous nasty projects such as convincing African countries to accept Genetically Modified or GMO seeds? Google, whose origins date back to funding by the CIA and NSA as what intelligence researcher Nafeez Ahmed describes as a “plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority‘ “?

The Omidyar Foundation is the foundation of eBay founder and multi billionaire, Pierre Omidyar, which finances among other projects the online digital publication, The Intercept, launched in 2014 by Glenn Greenwald, Laura Poitras and Jeremy Scahill.

And the National Endowment for Democracy (NED), the US Government-financed “private” NGO behind every Color Revolution CIA regime change from the Ukraine Color Revolutions to the Arab Spring? The NED was a CIA project created in the 1980’s during the Reagan Administration as part of privatizing US intelligence dirty operations, to do, as Allen Weinstein, who drafted the Congressional legislation to establish the NED, noted in a candid 1991 Washington Post interview, “A lot of what we do today was done covertly 25 years ago by the CIA.”

And if we dig even deeper we find, lo and behold, the name George Soros, convicted hedge fund insider trader, tax-exempt philanthropist and giga-billionaire who seems to fund not only Hillary Clinton and virtually every CIA and US State Department Color Revolution from Russia to China to Iran through his network of Open Society Foundations including the 1990’s Jeffrey Sachs Shock Therapy plunder of Russia and most of former Communist East Europe.

Another one of the media working with Zuckerberg’s Facebook censorship of Fake News is the Washington Post, today owned by Amazon billionaire founder Jeff Bezos. Bezos is a major media business partner of….The US Central Intelligence Agency, a fact he omitted to inform about after taking over ownership of the most important newspaper in Washington.

Bezos’ Washington Post recently published a bizarre list of 200 websites it claimed generated Fake News. It refused to identify who gave them the list. Veteran Washington investigative reporter, Wayne Madsen, exposed the source of the McCarthy-style taboo list of so-called Fake News. It was a “website called PropOrNot.com that has links to the CIA and George Soros.”

It’s not merely the Pizzagate revelations that have triggered such a massive attack on independent Internet websites. It seems that back in January 2014 at the Davos World Economic Forum control of information on the Internet was a top item of discussion. At the time, Madsen noted, “With the impending demise of World Wide Web ‘net neutrality,’ which has afforded equal access for website operators to the Internet, the one percent of billionaire investors are busy positioning themselves to take over total control of news reporting on the Internet.”

It’s not even the foxes who are guarding the Internet Henhouse. It’s the werewolves of CIA and US Government censorship. Whether the explosive Pizzagate Podesta revelations merely triggered a dramatic acceleration in the timetable for the CIA’s planned “Fake News” operation as the successor to their 1980’s “Conspiracy Theory” linguistic discrediting operation, it’s clear this is no unbiased, objective, transparent public service to protect the Internet public from harmful content.

And, besides, who are they to tell me or you what you are allowed to read, digest and form your independent ideas about? This is a 21st Century reincarnation of the Spanish Inquisition, one by the real fake newsmakers–Washington Post, AP, ABCNews, Snopes.com, FactCheck.org, the CIA and friends. I would say it’s an alarming development of cyber warfare, not by Russia, but by those CIA-run networks that are fomenting Fake News to demonize any and everyone who opposes Washington intelligence propaganda.

 

F. William Engdahl is strategic risk consultant and lecturer, he holds a degree in politics from Princeton University and is a best-selling author on oil and geopolitics, exclusively for the online magazine “New Eastern Outlook.” 

 

‘Then We Will Fight in the Shade’ – A Guide to Winning the Media Wars

screen-shot-2016-12-08-at-9-32-54-am-768x326

By Michael Krieger

Source: Liberty Blitzkrieg

Victorious warriors win first and then go to war, while defeated warriors go to war first and then seek to win.

– Sun Tzu, The Art of War

The ongoing battle between independent, alternative media and legacy corporate-government sponsored propaganda media is in full swing following Donald Trump’s victory in the 2016 election. While I’m no big fan of Trump, his win has so emotionally damaged the U.S. status quo they have begun to lash out in a hysterical and careless manner against those they feel prevented Her Highness, Hillary Clinton, from ascending to the throne.

The escalation of this fight, which I have referred to as “The Media Wars” since the summer, was easy to foresee. As I noted in the post, Questioning Hillary’s Health is No Conspiracy Theory:

As I look at the landscape in 2016 to-date, I observe emergent signs that alternative media is finally beginning to take over from the legacy mainstream media when it comes to impact and influence. The mainstream media (unlike with John McCain in 2008), had decided that Hillary Clinton’s health was not an issue and chose not to pursue it. Many in the alternative media world took a different position, and due to mainstream media’s failure to inform the American public for decades, the alternative media drove that issue to the top of the news cycle. That’s power.

This is an incredibly big deal, and the mainstream media intuitively knows what it means. It means a total loss of legitimately, prestige and power. All of which is well deserved of course.

So here’s the bottom line. 2016 represents the true beginning of what I would call the Media Wars. Alternative media is now capable of driving the news cycle. Mainstream media now has no choice but to fight back, and fight back it will. It will fight back dirty. This is going to get very ugly, but by the time the dust has settled, I think much of the mainstream media will be left as a shell of its former self.

2016 was the year when alternative, independent media went from being merely influential, to affecting the outcome of a Presidential election. As was widely reported, basically every single newspaper in the nation endorsed Hillary Clinton for President. The fact she lost anyway represented the greatest middle finger to the media (and the status quo generally) doled out by the American public in at least a generation.

While genuinely fake Macedonia-based news sites certainly garnered a lot of clicks (and revenue) by inventing ridiculous stories, anyone who really thinks this is what led to Hillary’s defeat is simply in denial. We all know that independent websites taking Hillary to task on her very real and very deplorable track record of being a compulsive liar is what was truly decisive. The mainstream media knows this, which is why they haven’t actually been focusing on censoring provably fake news sites, but rather have been promoting an agenda to lump any non-establishment perspectives within the umbrella of “fake news” in order to destroy their competition and regain an upper hand in the national narrative. If those of us who value independent media want to thwart this nefarious plan, we need to fully understand what these cretins are up to.

To that end, I want to turn your attention to one of the best articles I’ve read on the topic. Published at Counterpunch and titled, Manufacturing Normality, here are a few excerpts (definitely make sure to read the entire thing):

Sometime circa mid-November, in the wake of Hillary Clinton’s defeat (i.e., the beginning of the end of democracy), the self-appointed Guardians of Reality, better known as the corporate media, launched a worldwide marketing campaign against the evil and perfidious scourge of “fake news.” This campaign is now at a fever pitch. Media outlets throughout the empire are pumping out daily dire warnings of the imminent, existential threat to our freedom posed by the “fake news” menace. This isn’t the just the dissemination of disinformation, propaganda, and so on, that’s been going on for thousands of years … Truth itself is under attack. The very foundations of Reality are shaking.

Who’s behind this “fake news” menace? Well, Putin, naturally, but not just Putin. It appears to be the work of a vast conspiracy of virulent anti-establishment types, ultra-alt-rightists, ultra-leftists, libertarian retirees, armchair socialists, Sandernistas, Corbynistas, ontological terrorists, fascism normalizers, poorly educated anti-Globalism freaks, and just garden variety Clinton-haters.

As I suggested in these pages previously, what we are experiencing is the pathologization (or the “abnormalization”) of political dissent, i.e., the systematic stigmatization of any and all forms of non-compliance with neoliberal consensus reality. Political distinctions like “left” and “right” are disappearing, and are being replaced by imponderable distinctions like “normal” and “abnormal,” “true” and “false,” and “real” and “fake.” Such distinctions do not lend themselves to argument. They are proffered to us as axiomatic truths, empirical facts which no normal person would ever dream of contradicting.

In place of competing political philosophies, the neoliberal intelligentsia is substituting a simpler choice, “normality” or “abnormality.” The nature of the “abnormality” varies according to what is being stigmatized. Today it’s “Corbyn the anti-Semite,” tomorrow it’s “Sanders the racist crackpot,” or “Trump the Manchurian candidate,” or whatever. That the smears themselves are indiscriminate (and, in many instances, totally ridiculous) belies the effectiveness of the broader strategy, which is simply to abnormalize the target and whatever he or she represents. It makes no difference whether one is smeared as a racist, as Sanders was during the primaries, or as an anti-Semite, as Corbyn has been, or a fascist, as Trump has relentlessly been, or peddlers of Russian propaganda, as Truthout, CounterPunch, Naked Capitalism, and a number of other publications have been … the message is, they are somehow “not normal.”

Why is this any different from the shameless smear jobs the press has been doing on people since the invention of the press and shameless smear jobs? Well, hold on, because I’m about to tell you. Mostly it has to do with words, especially binary oppositions like “real” and “fake,” and “normal” and “abnormal,” which are, of course, essentially meaningless … their value being purely tactical. Which is to say they denote nothing. They are weapons deployed by a dominant group to enforce conformity to its consensus reality. This is how they’re being used at the moment.

The meaningless binary oppositions that the neoliberal intelligentsia and the corporate media are supplanting traditional opposing political philosophies with (i.e., normal/abnormal, real/fake), in addition to stigmatizing a diversity of sources of non-conforming information and ideas, are also restructuring our consensus reality as a conceptual territory in which anyone thinking, writing, or speaking outside the mainstream is deemed some kind of “deviant,” or “extremist,” or some other form of social pariah. Again, it doesn’t matter what kind, as “deviance” in itself is the point.

Actually, the opposite of deviance is the point. Because this is how “normality” is manufactured. And how consensus reality as a whole is manufactured … and how the manufacturing process is concealed.

The above hits the nails entirely on the head. It also explains why it took the Washington Post two weeks to even address the fact that it published a fake news article about “fake news.” Here’s how The Washington Post is “taking responsibility.”

screen-shot-2016-12-08-at-10-30-16-am

While absolutely pathetic, the editor’s note is equally telling in its sloppiness and arrogance. For instance, the article was a such a gross piece of journalistic malpractice, the only honest, professional move by the paper would be to fully retract the story and apologize; yet The Washington Post didn’t do that. Why?

The reason is because the paper and its editors knew exactly what they were doing with the publication and promotion of this nonsensical fake news hit-piece. Sure, they’re now a bit embarrassed because they were called out by pretty much everybody, but the intent all along was to tie independent media sites with absolutely no connection to Russia, to Russia, in a desperate attempt to recapture the public narrative via blacklists and tech company censorship.

As an aside, for specifics on how the status quo is attempting to use developers and social media companies to censor alternative opinion under the guise of fighting “fake news,” read this excellent article published at Naked Capitalism: Witch Hunt: “Fake News” Software Touted by CBS Smears Naked Capitalism, ShadowProof, TruthDig, Others; Creator Admits He Made Up Who Went on Hit List.

Now that we know what they are up to, how worried should we be? Although I’m extremely optimistic about the future of decentralized, independent media, and the proliferation of individual voices generally, it’s quite obvious legacy media gatekeepers will not go down without a fight. The good news is they are the ones who are on the defensive, not us. They are the ones who are battling on our terms, not the other way around. A great example of this can be seen in how the “fake news” meme has been turned around against the mainstream media to great effect. As I tweeted earlier today:

It is when you get desperate, scared and panicky that you make the biggest mistakes, and the legacy media is currently desperate, scared and panicky.  As Napoleon Bonaparte allegedly said:

“Never interrupt your enemy when he is making a mistake.”

Whether or not he actually said them, those words still ring true. We mustn’t get in the way of the legacy media’s inevitable self-destruction. Part of this means that we do not self-destruct in the process. We need to recognize that there’s a reason independent, alternative media is winning the battle of ideas in the first place. For all the warts, mistakes and bad actors, the emergence of the internet is indeed the historical equivalent of the invention of the printing press on steroids.

Only a clueless self-important elitist actually believes that the smartest, most informed people in America are the pundits on tv and the journalists employed by the mainstream media. With a handful of companies and a few oligarchs in charge, you’d have to be the most naive fool on earth to not understand that legacy media is driven by well defined narratives, and that these narratives are not in your best interest. The rest of us understand that the Internet has served as a much needed countervailing force, and has been an incredible blessing to human knowledge, connectivity and the marketplace of ideas. Just because some people can’t distinguish truth from fiction, doesn’t negate the incredible progress that decentralized information dissemination provides. It is only those who do not wish to engage in public debate on the issues themselves who want to censor stuff. The rest of us are more than happy to have an open discussion.

Many of us have spent years, if not decades, building up our online reputations and we should be careful not to squander all we have gained. There will be attempts at co-option, explicitly and otherwise. Be on guard. There will be hit-pieces and smear attempts. Stay cool and fight back from a position of strength and calm. However, I believe the greatest threat comes from the ever present danger of self-inflicted error. Part of the reason independent, alternative media has been so successful is legacy media has made it easy to look good by being so obviously captured, puerile and propagandistic. We must continue to be better than they are. As such, we must be more honest in our actions, less hypocritical in our analysis of events, and just more ethical overall. Given the competition, this shouldn’t be difficult.

Another way the status quo will fight back is by attacking our means of surviving financially, which means readers must be prepared to donate to your favorite sites more than ever before (you can support Liberty Blitzkrieg here). The other way will be to prevent our content from appearing on social media sites or search engines, or when it does appear, it will come with a warning. If this is the tactic they choose, it’ll be relatively easy to fight back.

Ten years ago it would’ve been hard to counter such a strategy, but not today. The cat is simply too far out of the bag. Too many of us reach too many people, and many of the people we reach are smart and influential. We have already sufficiently infiltrated and influenced the public discourse, so denying us a voice is no longer an option. If Facebook or Google start presenting Liberty Blitzkrieg, Zerohedge, or Naked Capitalism with warning labels, the intelligent amongst us with see right through this tactic and become disgusted.

So let me end this with a warning to Facebook, Google, and all the other tech behemoths. You start this fight at your own risk. Any disingenuous attempt to smear genuine, independent media websites via blacklists and censorship will ultimately harm you more than it harms us. In a misguided attempt to destroy us, you will destroy yourselves. Tread carefully and be on the right side of history.

To everyone else, stay strong. My writing would be irrelevant without you. It is not alternative media writers who will inflict the final blow against legacy media, it will be you, the readers. We are in this together and dependent on each other. Together we will win.

For related articles, see:

Obama Enters the Media Wars – Why His Recent Attack on Free Speech is So Dangerous and Radical

Hillary Clinton Enters the Media Wars

The Death of Mainstream Media

Liberty Blitzkrieg Included on Washington Post Highlighted Hit List of “Russian Propaganda” Websites

Additional Thoughts on “Fake News,” The Washington Post, and the Absence of Real Journalism

If you enjoyed this post, and want to contribute to genuine, independent media, consider visiting Liberty Blitzkrieg’s Support Page.

In Liberty,
Michael Krieger

The Democrats “Russia Hacking” Campaign is Political Suicide

images

By Mike Whitney

Source: CounterPunch

The Democratic Party is doing incalculable damage to itself by shapeshifting into the party of baseless conspiracy theories, groundless accusations, and sour grapes. Hillary Clinton was already the most distrusted presidential candidate in party history. Now she’s become the de facto flag-bearer for the nutso-clique of aspiring propagandists at the CIA, the New York Times and Bezo’s Military Digest. How is that going to improve the party’s prospects for the long term?

It won’t, because the vast majority of Americans do not want to align themselves with a party of buck-passing juveniles that have no vision for the future but want to devote all their energy to kooky witch-hunts that further prove they are unfit for high office.

The reason Hillary Clinton lost the election is because she is a polarizing, untrustworthy warmonger. Period. Putin had nothing to do with it.

And the same rule applies to the major media that has attached itself leech-like to this pathetic fairytale. Here’s a clip from the Times headline story connecting FSB-agent Trump with the evil Kremlin:

“American intelligence agencies have told the White House they have “high confidence” that the Russian government was behind the theft of emails and documents from the Democratic National Committee. …

The attack on the congressional committee’s system appears to have come from an entity known as “Fancy Bear,” which is connected to the G.R.U., the Russian military intelligence service, according to an official involved in the forensic investigation…

Clinton campaign officials have suggested that President Vladimir V. Putin of Russia could be trying to tilt the election to Mr. Trump, who has expressed admiration for the Russian leader.” (Computer Systems Used by Clinton Campaign Are Said to Be Hacked, Apparently by Russians, New York Times)

If there was a Pulitzer Prize for fearmongering innuendo or spurious accusations, the Times would win it hands-down. As it happens, readers have to delve much deeper into the article to find this shocking disclaimer:

“But the campaign officials acknowledge that they have no evidence. The Trump campaign has dismissed the accusations about Russia as a deliberate distraction…..”

“No evidence”???

They got nothing. NOTHING!

All they have is a few anonymous agents who refuse to identify themselves speculating on alleged hacking incidents that (they surmise) were the work of Vladimir P. Strangelove in his remote Soviet Cyber-war bunker. That’s not even enough material for a decent spy thriller.

But, of course, all this bunkum about “Fancy Bear” and  “Russian military intelligence” and the “high confidence” of (unnamed) US intelligence agents is enough to scare the hell out of many readers and leave them with the impression that the Kremlin is up to its old Cold War tricks again.  The Times editors are wise enough to know that it’s quite easy to tap into 40-years of anti-Soviet brainwashing and convince the gullible sheeple that Washington and Moscow are still mortal enemies. It would have been helpful if the Times had given the story a bit of context, that is, pointed out that the US has relentlessly expanded NATO eastward establishing military bases in all of the former Soviet satellite states, toppled the Moscow-friendly regime in Ukraine, and built nuclear weapons sites in east Europe just a few hundred miles from Moscow.

The Times writers might have also noted that this latest propaganda campaign against Russia could very well be the result of Moscow’s triumph over US-backed militants in Syria that are facing a decisive defeat due in large part to Russian involvement. In other words, the Times and the other US propaganda organs are functioning as they always do, whipping up public sentiment against the “evildoers” so Washington can drag the country into another imperial war of expansion. The whole “hacking” mantra fits perfectly with the Pentagon’s hybrid war strategy which manipulates information in order to shape public perceptions and gain support for another round of genocidal violence in some far-flung location. (Raqqa, perhaps?)

Do you think that bloodthirsty Hillary would be on-board with such a plan?

Of course she would. Hillary never met a war she didn’t like.

But let’s cut to the chase: Putin didn’t lose the election for Hillary. Obama did. People wanted change, and they didn’t get it, so they moved on to Door Number 2: Donald Trump. Take a look at these three short clips from a recent survey from PEW Research and you’ll get a feel for what really happened in the election:

“The Republican Party made deep inroads into America’s middle-class communities in 2016. Although many middle-class areas voted for Barack Obama in 2008, they overwhelmingly favored Donald Trump in 2016, a shift that was a key to his victory…..In 2016, Trump successfully defended all 27 middle-class areas won by Republicans in 2008. In a dramatic shift, however, Hillary Clinton lost in 18 of the 30 middle-class areas won by Democrats in 2008…

Overall, Democrats experienced widespread erosion in support from 2008 to 2016. Their share of the vote fell in 196 of the 221 metropolitan areas examined. The loss in support was sufficiently large to move 37 areas from the Democratic column to the Republican column…

Not coincidentally, Democrats also were more likely to have lost ground in manufacturing-dependent areas. Of the 56 communities with a relatively large share of manufacturing jobs, Trump picked up victories in 15 metro areas that had supported Obama in 2008 and held onto another 29, leaving only 12 communities in the Democrats’ column.” (GOP gained ground in middle-class communities in 2016, Pew Research)

Get it? The Dems lost ground everywhere because Obama didn’t deliver the goods. That’s reason number one. Second, Hillary didn’t address the issues that ordinary working people really care about. And what they care about is the economy. Money, security, jobs. Is that hard to understand?

People are afraid because things are getting worse not better. Their standards of living are slipping, they’re worried about their retirement, their jobs, their health care, and the pile of debt their kids have accumulated to go to college. They’ve lost confidence in the media, the congress, the courts and the president who promised change but never lifted a finger for working people his entire time in office.

That’s why Hillary lost, just look at the research.

The Democrats have no vision for the future, and without vision, the party will disintegrate which is precisely what’s happening. The Democratic Party is disintegrating before our very eyes. This latest “Russian hacking” diversion is just speeding along the process.

MIKE WHITNEY lives in Washington state. He is a contributor to Hopeless: Barack Obama and the Politics of Illusion (AK Press). Hopeless is also available in a Kindle edition. He can be reached at fergiewhitney@msn.com.