Vault 7: CIA Hacking Tools Revealed

Source: WikiLeaks

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

 

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

Mainstream Media’s ‘Victimhood’

aa-corporate-media-very-good-poster

By Robert Parry

Source: Consortium News

It’s heartwarming that The New York Times and The Washington Post are troubled that President Trump is loosely throwing around accusations of “fake news.” It’s nice and that they now realize that truth does not reliably come from the mouth of every senior government official or from every official report.

The Times is even taking out full-page ads in its own pages to offer truisms about truth: “The truth is hard. The truth is hidden. The truth must be pursued. The truth is hard to hear. The truth is rarely simple. The truth isn’t so obvious. …”  On Sunday, those truth truisms ran opposite an alarmist column by Jim Rutenberg entitled, “Will the Real Democracy Lovers Please Stand Up?” Meanwhile, The Washington Post launched its own melodramatic slogan, “Democracy Dies in Darkness.”

Yet, it was only weeks ago when the Post and Times were eagerly promoting plans for silencing or blacklisting independent news sites that didn’t toe the line on what the U.S. government and its allies were claiming was true.

On Nov. 20, the Times published a lead editorial calling on Facebook and other technology giants to devise algorithms that could eliminate stories that the Times deemed to be “fake.” The Times and other mainstream news outlets – along with a few favored Internet sites – joined a special Google-sponsored task force, called the First Draft Coalition, to decide what is true and what is not. If the Times’ editorial recommendations were followed, the disfavored stories and the sites publishing them would no longer be accessible through popular search engines and platforms, essentially blocking the public’s access to them. [See Consortiumnews.com’s “What to Do About ‘Fake News.’”]

On Thanksgiving Day, the Post ran a front-page story citing an anonymous group, called PropOrNot, blacklisting 200 Web sites, including Consortiumnews.com and other important sources of independent journalism, because we supposedly promoted “Russian propaganda.”

Although PropOrNot and the Post didn’t bother to cite any actual examples or to ask the accused for comment, the point was clear: If you didn’t march in lockstep behind the Official Narrative on, say, the Ukraine crisis or the war in Syria, you were to be isolated, demonized and effectively silenced. In the article, the Post blurred the lines between “fake news” – stories that are simply made up – and what was deemed “propaganda,” in effect, information that didn’t jibe with what the U.S. State Department was saying.

Back then, in November, the big newspapers believed that the truth was easy, simple, obvious, requiring only access to some well-placed government official or a quick reading of the executive summary from some official report. Over the last quarter century or so, the Times, in particular, has made a fetish out of embracing pretty much whatever Officialdom declared to be true. After all, such well-dressed folks with those important-sounding titles couldn’t possibly be lying.

That gullibility went from the serious, such as rejecting overwhelming evidence that Ronald Reagan’s Nicaraguan Contra rebels were deeply involved in drug trafficking, to the silly, trusting the NFL’s absurd Deflategate allegations against Tom Brady. In those “old” days, which apparently ended a few weeks ago, the Times could have run full-page ads, saying “Truth is whatever those in authority say it is.”

In 2002, when the George W. Bush administration was vouching for a motley crew of Iraqi “defectors” describing Saddam Hussein’s hidden WMDs, Iraq’s purchase of some “aluminum tubes” must have been for building nuclear bombs. In 2003, when Secretary of State Colin Powell showed some artist drawings of “mobile chemical weapons labs,” they must really exist – and anyone who doubted Powell’s “slam-dunk” testimony deserved only contempt and ridicule.

When the Obama administration issued a “government assessment” blaming the Syrian military for the sarin gas attack outside Damascus on Aug. 21, 2013, there was no need to scrutinize its dubious assertions or ask for actual proof. To do so made you an “Assad apologist.”

When a bunch of U.S. allies under the effective control of Ukraine’s unsavory SBU intelligence service presented some videos with computer-generated graphics showing Russians supplying the Buk missile that shot down Malaysia Airlines Flight 17 over eastern Ukraine on July 17, 2014, there was no need to examine the holes in the evidence or note that the realistic-looking graphics were fictional and based on dubious assumptions. To do so made you a “Moscow stooge.”

In other words, when the U.S. government was gluing black hats on an “enemy” and white hats on a U.S. “ally,” the Times never seemed to object. Nor did pretty much anyone else in the mainstream media. No one seemed to note that both sides usually deserved gray hats. With very few exceptions – when the State Department or other U.S. agencies were making the charges – the Times and its cohorts simply stopped applying responsible journalistic skepticism.

Of course, there is a problem with “fake news,” i.e., stories that are consciously made up for the purpose of making money from lots of clicks. There are also fact-free conspiracy theories that operate without evidence or in defiance of it. No one hates such bogus stories more than I do — and they have long been a bane of serious journalism, dating back centuries, not just to the last election.

But what the Times, the Post and the rest of the mainstream media have typically ignored is that there are many situations in which the facts are not clear or when there are alternative explanations that could reasonably explain a set of facts. There are even times when the evidence goes firmly against what the U.S. government is claiming. At those moments, skepticism and courage are necessary to challenge false or dubious Official Narratives. You might even say, “The truth is rarely simple. The truth isn’t so obvious…”

A Tough Transition

During the transition from the Obama administration to the Trump team, the Times, the Post and other mainstream media outlets got caught in their own transition from trusting whatever the outgoing officials said to distrusting whatever the incoming officials said. In those final days, big media accepted what President Obama’s intelligence agencies asserted about Russia supposedly interfering in the U.S. election despite the lack of publicly available evidence that could be scrutinized and tested.

Even something as squirrelly as the attack on Trump’s National Security Adviser Michael Flynn – with Obama holdovers citing the never-prosecuted Logan Act from 1799 as the pretext for ginning up some kind of criminal-sounding case that scared Trump into firing Flynn – was treated as legitimate, without serious questions asked. Since Obama officials were doing the feeding, the no-skepticism rule applied to the eating. But whatever statements came from Trump, even his few lucid moments explaining why war with nuclear-armed Russia wasn’t such a great idea, were treated as dangerous nonsense.

When Trump scolded the mainstream press for engaging in “fake news” and then applied the phrase “enemy of the people,” the Times, the Post and the rest went into full victimization-mode. When a few news companies were excluded from a White House news briefing, they all rushed to the barricades to defend freedom of the press. Then, Trump went even further – he rejected his invitation to the White House Correspondents Dinner, the black-tie/evening-gown event where mainstream media stars compete to attract the hottest celebrity guests and hobnob with important government officials, a walking-talking conflict-of-interest-filled evening, an orgy of self-importance.

So, the Times, the Post and their mainstream-media friends now feel under attack. Whereas just weeks ago they were demanding that Google, Facebook and other powerful information platforms throttle those of us who showed professional skepticism toward dubious claims from the U.S. government, now the Times, the Post and the others are insisting that we all rally around them, to defend their journalistic freedom. In another full-page ad on Sunday, the Times wrote: “Truth. It’s more important now than ever.”

I would argue that truth is always important, but especially so when government officials are leading countries toward war, when lives are at stake, whether in Iraq or Syria or Ukraine or the many other global hotspots. At those moments in the recent past, the Times did not treat truth – in all its subtlety and nuance – as important at all.

I would argue, too, that the stakes are raised even higher when propagandists and ideologues are risking the prospect of nuclear war that could kill billions and effectively end human civilization. However, in that case, the American people have seen little truly professional journalism nor a real commitment to the truth. Instead, it’s been much more fun to demonize Russian President Vladimir Putin and paint black-and-white pictures of the evil Russians.

At such moments, those New York Times’ truisms about truth are forgotten: “The truth is rarely simple. The truth isn’t so obvious. …”

Investigative reporter Robert Parry broke many of the Iran-Contra stories for The Associated Press and Newsweek in the 1980s. You can buy his latest book, America’s Stolen Narrative, either in print here or as an e-book (from Amazon and barnesandnoble.com).

Russ Baker on the Media’s Deep State Conversion Moment

index

By Russ Baker

Source: Who.What.Why.

The term “Deep State” has recently become as popular with the media as the term “#resistance.” It certainly wasn’t always that way.

For years, a lonely few have set out to enlighten people on the notion that, when it comes to affairs of state, there is usually more to the story than we are told.

I started WhoWhatWhy because I realized that the publications I worked for had no interest, no understanding of, could not fathom, or were just plain scared to explore the possibility that We, the People, were not in control of our destiny.

You can read most media all day long and you’d never get a sense, except fleetingly, that eight people have as much wealth as half of the world’s population. A handful of people can put their selected candidate in the White House, and the masses remain blissfully unaware as the process unfolds.

A company with vast resources can make sure the so-called free market works a whole lot better for itself than it does for its smaller rivals — even if the other companies offer a better product or service — and corporate media remains silent.

The media typically does not make us wonder why there seem to be wars going on all the time, why Americans are able to live so well compared to most of the world, nor that even today, resource extraction is a very deadly one-way street. They rarely seem to stop and ponder why it is that no matter which of the two political parties is in office, public policy seems to always cater to the 1% and not … the public.

The media does cover politics plenty. But it does not very often cover deep politics — that is, the forces beneath the  surface, the powers behind the daily events, what’s been called the Deep State.

To those unfamiliar with it, this expression sounds creepy, even paranoid, with a hint of conspiracy theory — itself a catchall term designed to discredit any critical analysis that comes perilously close to something that may lead back to the Deep State. How could there be something other than politics or the state — deep politics and a deep state?

Well, ask yourself: Is that giant bank where you have your money actually run by the smiling masses you see in their ads? The ones who say “We’re here for you” but when you call, they all read from the same script and admit they’re powerless? One thing your bank doesn’t do, usually, is advertise the top people, the biggest shareholders, and how much power they wield, and how much money they make.

It takes something like a financial scandal for the CEO to suddenly appear in the limelight, like a mole rubbing its eyes, and you say, “Oh, so that’s the main guy.” You never knew.

The media overall hates these “deep” concepts because they are anathema to people trying to keep their jobs and move up in a hierarchical system owned and influenced by the most powerful, while still wearing the thrilling mantle of “troublemaker.”

Let’s be clear: the Deep State is not six people in hoods muttering incantations. It’s a shifting landscape of those at the top of the heap — not a monolith but a bloody battlefield, with factions breaking both bread and heads.

It includes financiers, industrialists, media titans, generals, spymasters, strategists, and experts in the black arts of mass influence. It even includes a super-verboten topic: how the “overworld” (the legit) do business, albeit usually at arm’s length, with the underworld.

Look at Trump’s track record on this; look at CIA’s well-documented cooperation with the mob and with global drug cartels. Also off-limits to the media: the role of highly profitable illegal activity in making great fortunes (prohibition, drug trade, money laundering) and the cooperation of elements of the state.

***

The deeper meaning and scope of the Deep State is now being misrepresented by those who still hope for handouts from the system — either they’re deliberately obscuring the real nature of the Deep State, or they’re really trying, without much success, to throw some light on a topic to which they’ve come late and have little incentive to dig into too deeply.

One example is the Los Angeles Times, which, despite some great journalism and bravery over the years, has retained a mysteriously close relationship with the CIA and similar entities, serving as their hatchet men against reporters who cut too near the bone of the truth. Look up Gary Webb — or read this “review” of a book on the Deep State by yours truly.  

Recently, one of its longtime Washington hands presumed to explain to the rest of us about the Deep State whose very existence he and his paper denied for so long.

The scariest new catchphrase of the Trump era — and we’re only one month in — is the “deep state,” a term borrowed from countries like Turkey and Egypt, where networks of military officers and intelligence operatives control much of the government.

Um, no. It isn’t just entrenched mid-level bureaucrats, soldiers and spies who make up the Deep State — it is also the extremely wealthy who ultimately manipulate and influence these pawns on the board of power.

The New York Times apparently got the same memo as its West Coast namesake:

A wave of leaks from government officials has hobbled the Trump administration, leading some to draw comparisons to countries like Egypt, Turkey and Pakistan, where shadowy networks within government bureaucracies, often referred to as “deep states,” undermine and coerce elected governments.

The point of all this is that if you limit a description of some poisonous Deep State to those actually employed in “bureaucracies,” you are actually playing into the hands of the most powerful Deep State players: the super-rich who benefit when government itself is discredited to the point that everything can be outsourced — to them. And that’s exactly what we have seen in case after case, with the privatization of intelligence, police work, prisons, schools, and so on. Let’s get rid of those nefarious Deep State education officials and save the day with billionaire Betsy DeVos!

No — the Deep State IS populated by people like Betsy DeVos and her husband and their coterie. They’re the ones who can buy the loyalty of modestly-paid government figures who expect to travel out the revolving door to dip into the abundant coffers of the Koch brothers et al.

To be clear, we probably don’t want to think of the Deep State as synonymous with the plutocracy — it’s not all about money. It is about an ideology of self-interest and a kind of fascist value system, and an ability to build deep links into institutions like the FBI, the Pentagon, the NSA, the CIA, local law enforcement, etc. Of course, elements within the Deep State, as is true throughout the world, can also be forces for good, resisting when things in the surface world “go too far.” That, in part, is what we are seeing in the resistance to Trump from surprising quarters.

It’s also something to keep in mind when we see the Washington Post leading the charge against Trump. The Post is, like Amazon, the property of Jeff Bezos — and the CIA is one of Amazon’s biggest customers (for its cloud computing services.) The CIA is none too happy with Trump — with very good reason, for once (well, there was also that battle with Cheney and the neocons), and so, yes, that too is all the Deep State at work.

And no, don’t look to The Post to fully explain it all. Why? Again, my personal experience — here’s the Post’s contracted-out hit piece on my Deep Politics book.

***

The Deep State has cajoled or intimidated almost the entirety of journalism, mainstream to Left to Right — to ignore its existence, and to defame those who dare investigate it, by lumping them with all manner of crazy under the all-purpose dysphemism “conspiracy theory.” Try googling related terms: conspiracy theorist, conspiracy nut, etc — you will find that the “top” news organizations have routinely beaten up on those who dared break ranks by slapping this deadly moniker on them. It’s the loud cousin of the whispering campaign, the sort that makes it hard to find work and scares off would-be allies.

I’ll note that back in the 1960s, the CIA got really nervous as interest in the assassination of President John F. Kennedy heated up, with reputable, brave people asking a lot of questions about the impossible ridiculous fantasy story the media sold us in the Warren Report. In an internal CIA memo, the agency prescribed all manner of tactics to discredit those who were sticking their noses where they oughtn’t, conferring on them the deadly “Conspiracy Theorist” label.

And, in the 1970s, Carl Bernstein, of Watergate sleuth fame, wrote a piece in Rolling Stone revealing the extent to which the security apparatus had penetrated America’s media itself. Shades of Romania and East Germany.

Even Bill Moyers, whom I greatly admire, and who has been complimentary of WhoWhatWhy’s work — brought on a conservative to explain what Deep State is all about. Given the history and the continuing resistance to the concept at the time that program aired in 2014, probably a smart move.

But the times they are a-changin’. Since Wikileaks’ revelations, since Edward Snowden, since … Trump, the shameless and spineless in journalism have spun on a dime and now the things some of us were attacked for are smack dab in the middle of the “conversation,” albeit with the system stingily withholding credit to those who were there first.

In any case, now that it’s all the vogue, I say to the establishment media: No. You do not get to define this term, you do not get to tell the rest of us if there is a Deep State, the nature of its influence, or whether we should or should not be concerned about it.

 

Related Videos:

WAPO Hires John Podesta as a Columnist, Flushing Last Remaining Credibility Down the Toilet

 john-podesta-2016-election-hillary-clinton-e1476298459966

By Lily Dane

Source: The Daily Sheeple

It’s almost like The Washington Post is trying to become as in-your-face corrupt and biased as possible and is determined to lose any shred of credibility it may have left.

Last Thursday, the paper announced that John Podesta, the scandal-plagued chairman of Hillary Clinton’s 2016 scandal-plagued presidential campaign, has joined their team:

Podesta, former chairman of the 2016 Hillary Clinton campaign, will provide commentary and analysis on the intersection of politics and policy, the Trump administration and the future of the Democratic Party.

“No one knows more about how Washington works, how the White House operates, and how policy ideas are translated into reality than John Podesta,” said Editorial Page Editor Fred Hiatt. “His long experience in Congress, inside two Democratic White Houses and on the front lines of numerous presidential campaigns, will offer readers vital insight into Washington and politics at the start of a new era.”

As of the time of this writing, there were only a few reader comments on the announcement on the news outlet’s website, but all expressed disapproval. Here is a sampling:

“I would just like to thank the Washington Post for dropping all pretense and proving they are now just as willing as Fox News to invite questionable sources to contribute.”

“A mistake. We want agents of change, not those who cling to the past. Podesta’s a proven failure and uninteresting.”

“Not a good choice. Time for new voices, come on, WaPo, you can do much better.”

“John Podesta, friend of Dennis Hastert the child molester. Many people complain the the Russians hacked the DNC, but Podesta gave them his gmail account on a silver platter. Podesta’s password was the word password, not very creative. Read his emails and you find some strange code words, lots of talk about pizza and hotdogs which has caused a buzz on the internet dubbed pizzagate. I am sure Podesta knows his way around DC, maybe the wrong parts of DC.”

“Yeah democracy among the libs is very dark. More dark is how Compost has made a deal with devil by hiring this Satanist. You will reap what you sow.”

If WAPO wanted to choose a more controversial figure to write for their outlet, it would be difficult. Podesta was the central figure of a massive email scandal in late 2016 when WikiLeaks published 58,375 emails from his private Gmail account. Many of the emails contained material regarding Clinton’s positions and campaign strategy, her collusion with the mainstream media, her cozy relationship with bankers, pay-to-play schemes, hints of Podesta’s possible involvement in a nefarious-sounding activity called “Spirit Cooking”, and of course, the infamous #Pizzagate scandal.

Earlier Democratic National Committee (DNC) email leaks exposed a plot to sabotage Bernie Sanders and documents on Hillary Clinton and the Clinton Foundation. Those leaks led to the resignation of at least four DNC officials, including former chair Debbie Wasserman Schultz. They also revealed that interim DNC chair Donna Brazile obtained questions to a Bernie Sanders vs. Hillary CNN/TV One town hall and fed them to Hillary’s campaign people in advance.

Like the DNC and Podesta, The Washington Post isn’t a stranger to scandal.

In the article LIST: Washington Post’s Josh Rogin Has a BIG Fake News Problem, John Nolte explains how Washington Post reporter Josh Rogin recently blew three major stories in grand fashion.

Last week, WAPO, owned by Jeff (Bilderberger, CIA Contractor, and owner of Amazon), stated it is their mission to “defend democracy,” and adopted a dramatic new slogan which it claims was not in any way inspired by President Trump: “Democracy Dies in Darkness”.

In January, the paper was forced to retract an unfounded story scaremongering that Russian hackers penetrated the US electric grid.

Late last year, WAPO cited a list of over 200 supposed Russian propaganda sites (The Daily Sheeple was included on the list) produced by the shadowy PropOrNot organization in a report titled, “Russian propaganda effort helped spread ‘fake news’ during election, experts say.” Melissa Dykes reported on this back in November:

Washington Post wrote a hit piece on all the sites included on ProporNot’s list, claiming the site is literally run by “experts” — without any due diligence or a shred of proof other than the site’s own claims.

Titled, “Russian propaganda effort helped spread ‘fake news’ during election, experts say,” the WAPO story not only upholds the claims of a random, anonymous, and relatively new website, but a website that is formally calling on the FBI to investigate us and other alt news sites on the list for espionage.

In early December, after facing unprecedented blowback for its ridiculous report, WAPO added a lengthy editor’s note to the top of the original article in which the editor not only distances the paper from the “experts” quoted in the original article whose “work” served as the basis for the entire article, but also admits the Post could not “vouch for the validity of PropOrNot’s finding regarding any individual media outlet.”

Podesta, his political party, and WAPO have something significant in common. All seem to be in denial about the huge mistakes they have made which greatly contributed to their loss of credibility. They will likely repeat those mistakes. Perhaps this new relationship is appropriate after all.

Oh, and a bit of friendly advice for WAPO: Be sure to give Podesta a very, very secure email account.

Twitter users had quite a bit to say about Podesta’s new job.

https://twitter.com/correctthemedia/status/834815653857095681

https://twitter.com/zachhaller/status/834855115521552384

https://twitter.com/55true4u/status/835662006879420417

https://twitter.com/HAGOODMANAUTHOR/status/835640562904506368

https://twitter.com/HAGOODMANAUTHOR/status/834927633972371456

The “White Helmets” Go To Hollywood

cseyujlwcaaq_tx-jpg_large

By Rick Sterling

Source: TruePublica

The netflix movie “The White Helmets” may win an Oscar in the “short documentary” category at the Academy Awards on Sunday February 26.  It will not be a surprise, despite the fact that the group is a fraud and the movie is a contrived infomercial.

The White Helmets are a “feel good” story like a Disney hero movie: 90% myth and fabrication. Most of what is claimed about the Syrian rescue group is untrue. They are not primarily Syrian; the group was initiated by British military contractor James LeMesurier and has been heavily funded (about $100 million) by the USA, UK and other governments. They are not volunteers; they are paid. This is confirmed in the Al Jazeera video which shows some White Helmet “volunteers’ talking about going on strike if they don’t get paid soon. Most of the heavy funding goes to the marketing which is run by “The Syria Campaign” based in New York. The manager is an Irish America woman Anna Nolan who has never been to Syria. As an example of its deception, “The Syria Campaign” website features video showing children dancing and playing soccer implying they are part of the opposition demand for a “free and peaceful” Syria . But the video images are taken from a 2010 BBC documentary about education in Syria under the Baath government.

When eastern Aleppo was finally freed from the armed militants, it was discovered that the White Helmets headquarters were alongside the headquarters of the Al Qaeda Syrian militant group. Civilians from east Aleppo reported that the White Helmets primarily responded when the militants were attacked. Soon after departing Aleppo in government supplied buses (!) the White Helmets showed up in the mountains above Damascus where they allied with terrorist groups in poisoning then shutting off the water source for five million people in Damascus.

The White Helmets’ claim to be neutral and independent is another lie. They only work in areas controlled by the rebel groups, primarily Nusra/ Al Qaeda.  Their leaders actively call for US and NATO intervention in Syria. Video shows White Helmet workers picking up the corpse of a civilian after execution and celebrating Nusra / Al Qaeda terrorist battle wins.

The movie is as fraudulent as the group it tries to heroize. The film-makers never set foot in Syria. Their video footage takes place in southern Turkey where they show White Helmet trainees in a hotel and talking on cell phones. Thrilling. There is some footage from inside Syria but it looks contrived.  The opening scene depicts a White Helmet “volunteer” going to work and beseeching his son not to give mommy a hard time. Real or scripted?

The message is simple: here are people we can support; they are under attack by the brutal “regime”…shouldn’t we “do something” to stop it??!

Khaled Khatib is said to be the person who filmed the footage from inside Syria. He has reportedly received a US visa and will attend the Oscars. This will likely garner special media attention. Ironically, some of those who have exploited the refugee issue for their own fund-raising campaigns, like Human Rights Watch, are groups which promote the war which created the refugee crisis.

Khatib has tweeted the first video he took showing the White Helmets. It looks remarkably unrealistic, with a girl who was totally buried being removed without injuries or wounds or even much dirt. Is it really possible to rescue people that quickly? In the real world, rescue workers are told to work slowly so as to not damage or exacerbate body injuries. The original video has the logo of Aleppo Media Center (AMC) which was created by the Syrian Expatriates Organization.  Their address on K Street in Washington DC suggests this is yet another Western funded media campaign driven by political objectives.

In the past few days, with perfect timing for the upcoming Oscars, there is yet another “miracle” rescue …. another girl totally buried but then removed and whisked away in record breaking time – perfect for social media.  Is it real or is it contrived?

This raises a question regarding the integrity of the Oscar Academy Awards. Are awards given for actual quality, authenticity, skill and passion?  Or are Oscar awards sometimes given under political and financial influence?  There is political motivation to promote the White Helmets as part of the effort to prevent the collapse of the Western/Israeli/regional campaign to overthrow the Syrian government.  These same governments have given boatloads of money to fuel the propaganda campaign. Last week Syria Solidarity Movement reached out to three marketing firms in the LA area to request help challenging the White Helmets nomination.  Two of the firms declined and the third said they were already being paid to promote the nomination!

The true source and purpose of the White Helmets was exposed almost two years ago. More recently Vanessa Beeley has documented the fact there is a REAL Syrian Civil Defence which was begun in the 1950’s and is a member of the International Civil Defense Organizations. This organization is opposite to the group created in Turkey in 2013. According to on-the-ground interviews in Aleppo, terrorists began by killing real Syrian rescue workers and stealing their equipment.  Since then the White Helmets have been supplied, by the West through Turkey, with brand new ambulances and related rescue equipment.

Max Blumenthal has written a two part detailed examination of the “shadowy PR firm” behind the “White Helmets”. And Jan Oberg has written an overview survey of the “pro” and “con” examinations in his work “Just How Gray are the White Helmets”.

Yet mainstream media, and some ‘alternative’ media, continue to uncritically promote the myth of the “White Helmets”. The promoters of the group absolutely deserve an award for marketing and advertising.  This is a field where truth and reality is irrelevant; it’s all about sales and manipulation. On that basis, the “White Helmets” has been an incredible success. The group was started as “Syria Civil Defense”  in Turkey in 2013.  It was re-branded as the “White Helmets” in 2014. It was heavily used in 2014 and 2015 by Nicholas Kristof, Avaaz and others to campaign for all out aggression against Syria.  In 2016 the group received the Rights Livelihood Award and was seriously considered for a Nobel Peace Prize.  These facts show how corrupt and politically and financially influenced the Rights Livelihood Award and Nobel Peace Prize can be.

The White Helmets movie is a tactic in the ongoing campaign of distortion and deception around Syria.  It’s a fraud, just like the fake kidnapping of NBC reporter Richard Engel. The Oscars will be a demonstration of the integrity of the Academy Awards.  The reporting on the story will be a test of the integrity and accuracy of media outlets. Ironically, the Israeli mainstream TV program I24 presented both sides and titled the segment “White Helmets: Heroes or Hoax?”.  In contrast, the highly popular and widely respected DemocracyNow has  only broadcast a puff piece promoting the “White Helmet” disinformation.  The coming days will reveal more about the ongoing information war against Syria.  Meanwhile on online petition continues to gather signatures to NOT give the Oscar to the White Helmets deception.

Goose-stepping Our Way Toward Pink Revolution

7158ef9ad95b21ae22abe271cdefd349

By CJ Hopkins

Source: CounterPunch

So the global capitalist ruling classes’ neutralization of the Trumpian uprising seems to be off to a pretty good start. It’s barely been a month since his inauguration, and the corporate media, liberal celebrities, and their millions of faithful fans and followers are already shrieking for his summary impeachment, or his removal by … well, whatever means necessary, including some sort of “deep state” coup. Words like “treason” are being bandied about, treason being grounds for impeachment (not to mention being punishable by death), which appears to be where we’re headed at this point.

In any event, the nation is now officially in a state of “crisis.” The editors of The New York Times are demanding congressional investigations to root out the Russian infiltrators who have assumed control of the executive branch. According to prize-winning economist Paul Krugman, “a foreign dictator intervened on behalf of a US presidential candidate” … “we are being governed by people who take their cues from Moscow,” or some such nonsense. The Washington Post, CNN, MSNBC, The Guardian, The New Yorker, Politico, Mother Jones, et al. (in other words virtually every organ of the Western neoliberal media) are robotically repeating this propaganda like the Project Mayhem cultists in Fight Club.

The fact that there is not one shred of actual evidence to support these claims makes absolutely no difference whatsoever. As I wrote about in these pages previously, such official propaganda is not designed to be credible; it is designed to bludgeon people into submission through sheer relentless repetition and fear of social ostracization … which, once again, is working perfectly. Like the “Iraq has WMDs” narrative before it, the “Putin Hacked the Election” narrative has now become official “reality,” an unchallengeable axiomatic “fact” that can be cited as background to pretend to bolster additional ridiculous propaganda.

This “Russia Hacked the Election” narrative, let’s remember, was generated by a series of stories that it turned out were either completely fabricated or based on “anonymous intelligence sources” that could provide no evidence “for reasons of security.” Who could forget The Washington Post‘s “Russian Propagandist Blacklist” story (which was based on the claims of some anonymous’ blog and a third rate neo-McCarthyite think tank), or their “Russians Hacked the Vermont Power Grid” story (which, it turned out later, was totally made up), or CNN’s “Golden Showers Dossier” story (which was the work of some ex-MI6 spook-for-hire the Never Trump folks had on their payroll), or Slate‘s “Trump’s Russian Server” story (a half-assed smear piece by Franklin Foer, who is now pretending to have been vindicated by the hysteria over the Flynn resignation), or (and this is my personal favorite) The Washington Post‘s “Clinton Poisoned by Putin” story? Who could possibly forget these examples of courageous journalists speaking truth to power?

Well, OK, a lot of people, apparently, because there’s been a new twist in the official narrative. It seems the capitalist ruling classes now need us to defend the corporate media from the tyrannical criticism of Donald Trump, or else, well, you know, end of democracy. Which millions of people are actually doing. Seriously, absurd as it obviously is, millions of Americans are now rushing to defend the most fearsome propaganda machine in the history of fearsome propaganda machines from one inarticulate, populist boogeyman who can’t maintain his train of thought for more than fifteen or twenty seconds.

All joking aside, the prevailing mindset of the ruling classes, and those aspiring thereto, is more frightening than at any time I can remember. “The Resistance” is exhibiting precisely the type of mindlessly fascistic, herd-like behavior it purports to be trying to save us from. Yes, the mood in Resistance quarters has turned quite openly authoritarian. William Kristol captured it succinctly: “Obviously strongly prefer normal democratic and constitutional politics. But if it comes to it, [I] prefer the deep state to the Trump state.” Neoliberal Rob Reiner put it this way: “The incompetent lying narcissistic fool is going down. Intelligence community will not let DT destroy democracy.” Subcommandante Micheal Moore went to the caps lock to drive the point home: “It doesn’t take a rocket scientist to figure out what was going on: TRUMP COLLUDING WITH THE RUSSIANS TO THROW THE ELECTION TO HIM,” and demanded that Trump be immediately detained and renditioned to a secure facility: “Let’s be VERY clear: Flynn DID NOT make that Russian call on his own. He was INSTRUCTED to do so. He was TOLD to reassure them. Arrest Trump.”

These a just a few of the more sickening examples. The point is, millions of American citizens (as well as citizens of other countries) are prepared to support a deep state coup to remove the elected president from office … and it doesn’t get much more fascistic than that.

Now I want to be clear about this “deep state” thing, as the mainstream media is already labeling anyone who uses the term a hopelessly paranoid conspiracy theorist. The deep state, of course, is not a conspiracy. It is simply the interdependent network of structures where actual power resides (i.e., the military-industrial complex, multinational corporations, Wall Street, the corporate media, and so on). Its purpose is to maintain the stability of the system regardless of which party controls the government. These are the folks, when a president takes office, who show up and brief him on what is and isn’t “possible” given economic and political “realities.” Despite what Alex Jones may tell you, it is not George Soros and roomful of Jews. It is a collection of military and intelligence officers, CEOs, corporate lobbyists, lawyers, bankers, politicians, power brokers, aides, advisers, and assorted other permanent members of the government and the corporate and financial classes. Just as presidents come and go, so do the individuals comprising the deep state, albeit on a longer rotation schedule. And, thus, it is not a monolithic entity. Like any other decentralized network, it contains contradictions, conflicts of interest. However, what remains a constant is the deep state’s commitment to preserving the system … which, in our case, that system is global Capitalism.

I’m going to repeat and italicize that to hopefully avoid any misunderstanding. The system the deep state primarily serves is not the United States of America, i.e., the country most Americans believe they live in; the system it serves is globalized Capitalism. The United States, the nation state itself, while obviously a crucial element of the system, is not the deep state’s primary concern. If it were, Americans would all have healthcare, affordable education, and a right to basic housing, like more or less every other developed nation.

And this is the essence of the present conflict. The Trump regime (whether they’re sincere or not) has capitalized on people’s discontent with globalized neoliberal Capitalism, which is doing away with outmoded concepts like the nation state and national sovereignty and restructuring the world into one big marketplace where “Chinese” investors own “American” companies that manufacture goods for “European” markets by paying “Thai” workers three dollars a day to enrich “American” hedge fund crooks whose “British” bankers stash their loot in numbered accounts in the Cayman Islands while “American” workers pay their taxes so that the “United States” can give billions of dollars to “Israelis” and assorted terrorist outfits that are destabilizing the Middle East to open up markets for the capitalist ruling classes, who have no allegiance to any country, and who couldn’t possibly care any less about the common people who have to live there. Trump supporters, rubes that they are, don’t quite follow the logic of all that, or see how it benefits them or their families.

But whatever … they’re all just fascists, right? And we’re in a state of crisis, aren’t we? This is not the time to sit around and analyze political and historical dynamics. No, this is a time for all loyal Americans to set aside their critical thinking and support democracy, the corporate media, and the NSA, and CIA, and the rest of the deep state (which doesn’t exist) as they take whatever measures are necessary to defend us from Putin’s diabolical plot to Nazify the United States and reenact the Holocaust for no discernible reason. The way things are going, it’s just a matter of time until they either impeach his puppet, Trump, or, you know, remove him by other means. I imagine, once we get to that point, Official State Satirist Stephen Colbert will cover the proceedings live on the “Late Show,” whipping his studio audience up into a frenzy of mindless patriotic merriment, as he did in the wake of the Flynn fiasco (accusing the ruling classes’ enemies of treason being the essence of satire, of course). After he’s convicted and dying in jail, triumphant Americans will pour out onto the lawn of Lafayette Square again, waving huge flags and hooting vuvuzelas, like they did when Obama killed Osama bin Laden. I hope you’ll forgive me if I don’t attend. Flying home may be a little complicated, as according to The Washington Post, I’m some kind of Russian propagandist now. And, also, I have this problem with authority, which I don’t imagine will go over very well with whatever provisional government is installed to oversee the Restoration of Normality, and Love, of course, throughout the nation.

The Acquisitive Self, Minus the Self

article-2386232-1B30C5F9000005DC-668_634x633

By Natasha Vargas-Cooper

Source: The Baffler

Los Angeles isn’t exactly the place that comes to mind when you think of decorous restraint in the display of wealth, even in the dregs of the Great Recession. Here in my hometown, possibly more than in any other outpost of faux-meritocratic privilege in our republic of getting and spending, untrammeled acquisition is understood as an expression of individual will—and more than that, a matter of taste.

Yet for all the studio money sloshing around our bright, stucco world, most of us have never encountered the miniscule stratum of humans that hovers above the rich: the pure, gilt-edged, entrenched, multigenerational wealthy. Movie star money is food stamps compared to oil money, hedge fund money, and even some of that dank old money that still floats around the haciendas of Pasadena. We might have stood kegside next to Kirsten Dunst once, but we don’t know the kinds of rich people that F. Scott Fitzgerald had in mind when he wrote that the rich “are different from you and me”: the Vanderbilts, Rothschilds, and Astors. Hell, our L.A. doesn’t even boast a new-money Midwestern poultry heiress.

We don’t see these types—let alone interact with them—because they’ve largely seceded from public view. This is the guilt-prone social formation that Paul Fussell dubbed the “top out-of-sight class,” because you typically can’t see their houses/compounds unless you have access to a helicopter. Prior to the mid-twentieth century, the top out-of-sight class had been very much in sight; Manhattan’s Fifth Avenue and Philadelphia’s Main Line mansions are still monuments to their Caligulan self-regard. But ever since the Great Depression, and its attendant booms in Social Realist art and Popular Front politics, they staged a quiet but striking mass retreat. So spooked out were the über-rich that they became almost discreet. “The situation now is very different from the one in the 1890s satirized by Thorstein Veblen in The Theory of the Leisure Class,” Fussell wrote in 1983. “In [Veblen’s] day the rich delighted to exhibit themselves conspicuously. . . . Now they hide.”

Thirty years later, this is still mostly true, but thanks to the exhibition-friendly canons of social media, the scions of excess are back and flaunting it, baby—and it’s an entirely underwhelming display. These aren’t the out-of-sight rich but their twentysomething children, flouting their parents’ wealth-whispers code of silence. With acres of unproductive time on their hands, bored rich kids are using their gold-plated iPhones to post images of their baubles of privilege, their chemical stimulants of preference, and their outlandish bar tabs on Instagram, the photo-sharing service of the moment. It’s a bit as though a Bret Easton Ellis novel has come blandly to life, without the benefit of any irony.

Predictably enough, a Tumblr photo-blog has stirred vacantly into being, to compile all these outpourings of opulence in one convenient place. Launched in 2012 by a founder who remains anonymous, Rich Kids of Instagram (RKOI for short) curates and tags photos posted on Instagram by the likes of Barron Hilton, Tiffany Trump, and other “funemployed” trust-funders. The Tumblr, which slaps a whimsical, intricately scrolled frame around each photo but adds little else, doesn’t come with a explanation or an editorial policy, other than that it purports to show you the lifestyles that the unseen rich had previously shared only with their similarly rich friends. “They have more money than you do and this is what they do,” goes the tagline.

Why should we look? The payoffs for the nonrich civilian viewer are oddly perfunctory. After all of the social mythologies we’ve lovingly constructed to envelop the delusions of the 1 percent, this is the lurid end-of-the-rainbow payoff they’ve decided to lord over the rest of us—a fistful of watches, car interiors, and European spa photos? The content of Rich Kids of Instagram is less the aftermath of an imperial Roman bacchanal than the shamefaced hangover of an especially inane and oversexed (though well-appointed!) frat party. Around about the dozenth selfie featuring a buff and/or emaciated scion nestled into a private jet with a bottle of Cristal and a $10,000 clip of cash (“Always make sure to tip your pilot and co-pilot 10k. #rulesofflyingprivate”), you can’t help but wonder, “Is that all there is?”

The Duller Image

Indeed, in strictly visual terms, the site is hard to distinguish from a luxe Sharper Image catalog—merchandised out, to be sure, but disappointingly clichéd. The rich boys of Instagram—the son of fashion mogul Roberto Cavalli, for example, and a weak-chinned fellow with the handle Lord_Steinberg—post pictures of their IWC Grande Complication Perpetual watches, multiple Lamborghinis, and six-figure bar tabs. Here, all the shiny expensive crap seems to cry out, is what I’ve done with my life in lieu of becoming an adult. The young rich ladies, such as Alexa Dell (of, you know, the Dell computers fortune), mainly document how all this pelf looks from the other side of the gender divide: they snap pics of themselves surrounded by tangerine Hermès shopping bags, eating sushi sprinkled with 24K gold flakes, and holding their American Express Centurion card minimum payment notifications (typically $40,000).

There’s not even much in the way of the makings of righteous socialist outrage. (Swazi Leaks this most definitely is not; that project, by contrast, pairs leaked photographs of Swaziland’s high-rolling absolute monarch with pictures of $1-a-day sub-subsistence conditions in the slums.) Yes, the rich kids seem determined to remind us that they have stuff the rest of us will never have. The captions they post with their photos are, at times, slyly aware of their part in inequality (cf. a picture of a private jet and a luxury car with the caption “The struggle is real”). But for all that, the kids don’t seem especially power-hungry so much as aimless and languid. Behind these faux-provocative posts lurks a desperate clamor for attention that almost verges on a cry for help—something that makes you feel a certain involuntary (and certainly undeserved) pity for these manically self-documented upper-crusters.

Nevertheless, the rich kids keep on multiplying their blandified self-inventories, and some among the rest of us, presumably, keep looking. In the beginning, few of the kids knew their Instagram feeds were being monitored by RKOI; the security detail for Alexa Dell, for one, wasn’t prepared to see some of her pictures, with recognizable details that could give away her whereabouts (usually closely guarded by her family), show up on the site. Her social media presence was quickly scrubbed. But now, many of the kids featured know they’re getting Tumblr’d, and some court the attention by submitting photos for consideration, tagged with #rkoi. Rich Kids of Instagram has earned its subjects thousands of followers for their individual feeds, and even momentarily catapulted some of the sort-of rich, perhaps splashing out on a once-a-year chartered yacht to Saint Tropez, into better company than they could ordinarily afford.

American media culture has done its part by spinning off these social-media maunderings into a full complement of incoherent dreck. Last winter, the E! cable network debuted #RichKids of Beverly Hills, a reality TV series loosely organized around the premise (if we can call it that) of the Tumblr account. (The show even features—wink, wink—an “Instagram-obsessed” cast member named Morgan Stewart, who delivers such walk-on anathemas to viewer interest as “I’ve taken so many selfies on my cell phone today it’s, like, embarrassing.” No, son, what’s embarrassing is that you’re saying this shit out loud, in front of a television camera.)

The PG-13 Class War

If an E! show wasn’t enough, this summer saw the release of a book-like object, also called The Rich Kids of Instagram, credited to the site’s anonymous founder together with a ghostwriter/collaborator named Maya Sloan. Like its “inspiration,” the book—billed for some reason as a novel—is unrelentingly dumb, though it does supply an important clue to the weird demographic marketing strategy behind the Rich Kids franchise. It’s clearly written for kids or, um, young adults, suggesting that the notion of “aspirational” reading and viewing—the grand media euphemism for the lifestyle-voyeurism genre—is ripe for retirement. Instead, this plotless, and nearly character-less, flight of fancy is something far more inert, and less interesting: an empty vessel of careless adolescent fantasy.

The book’s careful observance of PG-13 canons of teen rebellion is so pronounced as to be obtrusive. There’s little in the way of appalling or casual sex; the cussing and chronic drug use (nothing too hard, mind you: pills, weed, blow) is there mainly for box-checking shock value. In this, as well, the book is true to the real-life Tumblr; nowhere do you see anything truly threatening or transgressive, like Jordan Belfort snorting coke out of a hooker’s ass in Martin Scorsese’s The Wolf of Wall Street. No, all you encounter, in the book as on the Tumblr feed, is the sort of teen spliff smoking you’d find at an average Dave Matthews show—but in a jet, bro!!

In the same way that such scenes beg to be seen as transgressive, the Rich Kids oeuvre begs to be seen as a populist-baiting vindication of privilege for privilege’s sake: Take that, plebes! But there’s a telling sleight of hand here. The book’s main gimmick is identical to the Tumblr’s MO: the outrage is all imputed to you, the reader, in advance, by its ostensible targets or by the medium itself. This means, in turn, that the proceedings float serenely above any semblance of real-world criticism. So, not surprisingly, the book suffers from the same thing the actual rich kids of Instagram kids do, only at far more tedious length: a depressing lack of imagination. Here, for example, is one of the novel’s rich kids fuming about her maid while also clumsily name-checking her 1,200-thread-count sateen sheet set: “Woven in Italy. For what I paid, I could buy your illegal Guatemalan cousins. That is, if you weren’t from Jersey.”

There’s no pulse-pounding social tension or class resentment on offer here—unless you’re especially aroused by inarticulate dialogue. The novel doesn’t proceed in a mood of detached anthropological inquiry, the way that, say, Louis Auchincloss or John Marquand’s old-money fictions did. There’s no anger, no weight, no insight. All you have in the way of a rich-kid call-to-arms is the empty bravado of the anonymous site creator’s acknowledgements at the front of the book: “To all the RKOI kids, who are unapologetically themselves; in a world where so few people will live out loud, you guys have guts, and for that you deserve admiration.” (And yes, Rich Kid self-awareness once again stops well short of the obvious irony involved in an anonymous social media impresario’s celebration of the overclass’s bold capacity “to live out loud.”)

For “gutsy” exemplars of individual lifestyle, the kids are distressingly uniform in their motivation, behavior, and dramatic purpose. Far from emblazoning their excellent individuality upon our collective prole brainpan, the novel’s cast of characters merges into an interchangeable ensemble of predictable, privileged reflexes and half-copped attitude. Each member of this brat pack is outfitted with a suffocatingly oversignifying name and a ponderous chapter rendered in his or her voice. To save time, here’s a rundown of the main players in the book (think of it as the literary equivalent of a bar-tab selfie):

• Annalise Hoff, a high-strung media heiress who dotes on her Murdoch/Hearst mashup Daddy: “I know: Freud would have a field day with me. I don’t take the short bus, after all. I have a Bentley waiting.”

• Christian Rixen, a Denmark Royal and jewelry designer, who employs an oddly clinical diction suggesting that this is what Southern Californian rich assholes hear when Europeans speak to them: “The countess may have birthed me, but she was far from maternal.”

• Miller Crawford, a Mayflower legacy, rifle heir, and aspiring record producer—and what passes for a self-starting entrepreneur in these circles: “I made a promise long ago: I won’t be that guy. The kind who orders staff to do petty bullshit. Sure, there are emergencies. Scoring coke for an after-hours, buying last-minute condoms. As for the rest? I can get my own double latte, thanks.”

• Todd Evergreen, a Mark Zuckerberg stand-in with a suitably generic name—an upper-middle-class kid who became an overnight billionaire by captaining an overcapitalized software startup. We don’t hear from Evergreen, who is eventually driven into paranoia and Howard Hughes–like seclusion until the novel’s crashingly unpersuasive, life-affirming coda. “I liked their things,” Evergreen says of the rich kids, “don’t get me wrong. Not for the things themselves, but how excited they got about them. How their faces lit up when they talked about them. But I liked the people for other reasons. Better reasons.”

• Desdemona Goldberg, a bipolar singer/actress: “Wow, I think, that coke was awesomeness.

You don’t say. This novelization rounds out the Rich Kids trifecta: Tumblr, TV show, and book. The net effect is, fittingly enough, akin to that of another notorious plutocratic foray into cultural exhibitionism—a Damien Hirst installation. In both, we see our culture lords courting outrage in the most safely inert and vanity-fed forms of display. Both aim to provoke an aesthetic response that is little more than a fleeting revulsion, compounded by the inevitable gawking at the price tag attached to the finished product. And both make a huge deal of curating predators, whether it be champagne-squirting twentysomethings captured in photo-blog form (RKOI) or a really big shark lifelessly preserved in a bath of acid (Hirst).

Binge and Purge

For that matter, the Rich Kids franchise outdoes even Hirst, and achieves a further refinement of this recursive aesthetic of total consumption: it’s a monument to the acquisitive self minus the actual self. Sometimes the kids don’t even bother to take pictures of items they buy. Instead, they share photos of the shopping bags from whatever luxury store they just blew through. Other times, they display pictures of receipts, personal check stubs, or their names embossed on credit cards.

Capital is always on the verge of dematerializing our common world; as Marx and Engels famously warned back in the day, under the height of bourgeois domination, “all that is solid melts into the air.” Here, however, is a gloss on that crippling dynamic that the founders of socialism never could have anticipated: the children of capital are rendering their innermost selves—their critics-be-damned determination to live out loud—as a random agglomeration of nonsignifying digits. The beauty they transmit back, what they see, is nothing more than a place-holding string of credit limits where a human self, or at least a measure of use value, might once have been.

Still, there are evidently some young self-starters who are gleaning a different aspirational message from the whole enterprise. When frequent RKOI contributor Aleem Iqbal, a nineteen-year-old whose dad owns a luxury car leasing service in England, went on a recent binge of selfie-taking, some unintended consequences ensued. The younger Iqbal saturated his Instagram feed with shots of himself driving really expensive cars with the vanity plate “LORD.” On June 6 the teenager leased a $560,000 Lamborghini Aventador Roadster, and a few hours later someone set it on fire. A week after that, three more of his luxury cars, two Audi R8 Spyder supercars and a Bentley Flying Spur, were torched. This was not his understanding of the new social contract at all. Instead of a reality TV or book deal, all his self-infatuated Instagram entries had earned him was the smoldering hulks of four plute-mobiles. On his Facebook page, the aggrieved teen called the campaign of high-end vandalism “a vile act of jealously towards my business.”

Maybe so; it could be like George Orwell said, and there really are only two classes, the rich and the haters. On the other hand, a follower of some RKOI property might have thought it was high time to perform a salutary act of simple math: subtracting some small amount of indecent luxury from the torrent of inert and unproductive excess that we all, inexplicably, must endure. Vileness, after all, is in the eye of the beholder.

We’ve Been Sold a Lie – Time to Stop Watching the Show

platonic_cave

By Julian Rose

Source: Waking Times

‘The show must go on’ as they say in the theatre. And indeed, so it would appear. Only this particular show seems to have no beginning or end. The curtain never comes down; there isn’t even an interval in which to draw breath and stretch one’s legs.

It’s a 24/7 bonanza, and the cost of a seat is almost certain to put you out-of-pocket. In spite of which, the auditorium is full of expectant faces staring up at the unfolding scenes and drinking in the drama being staged for their consumption.

So few actors, so many spectators. Yet the actors hold the attention and the spectators soon forget that they are in a theatre and have paid for their seats.

We are all at this performance. Its setting is planet Earth. The actors strut around feigning importance, playing the role ascribed to them by the writer of the script and the director of ‘the show’. You know who they are – you see them everyday on TV screens and newspapers. A few are quite convincing, and like most actors they feign true sincerity and then pause for the applause.

The director remains largely invisible, but in the background he has fixed the agenda and set the scene. The script writer also remains largely incognito. However, his words on the page provide the narrative without which the actors would not be able to perform their predesignated roles.

The cast of todays crowd pulling drama have names like May, Merkel and Trump. The play in which they are currently performing is entitled ‘If I Ruled the World’, and there are many other roles for aspiring lesser performers and even for some retired leading-lights of yesteryear.

New scripts continuously emerge so as ‘to keep the show on the road’. A recent hit, for example, was ‘Brexit’, a play in four acts, featuring a strong line-up of music hall performers as well as some fine orators, one of whom cut his teeth in the great performing venues of Continental Europe.

But look, these marionettes of the political charade called ‘democracy’ can only be where they are, and do what they do, because we give them centre stage. We let ourselves become embroiled in their show and convince ourselves that it’s the only show in town. But it’s not, and in spite of being big and noisy, it’s actually a facade designed and orchestrated by the hidden hands who pull the strings that tweak the marionettes into action. Very occasionally a true leader emerges. An individual who stands out for their empathy with a struggling humanity.

But for decades now, it is ‘the show’ that has contrived to dominate. A show kept in place by stage managers who ensure all the rules, regulations and disciplines are operating as they should. But it is we the people who elect the cast of this play. A cast who promise to reflect and represent our needs on the national stage. To bring change where change is needed and to stand firm in the role that they are given.

So you see, we are complicit in the maintenance of ‘the rules of the game’ that keep the control system under which we suffer, alive and well.

Those who we elect mostly fall at the first hurdle – and all their promises go with them. ‘The system’ is in charge, after all, and our elected representatives quickly fall under the spell of its mechanics and become victims of its sinister agenda. An agenda played-out on the global stage with the help of powerful centralized banks, mega corporations and a heavily funded military. Yes, this is the show we have paid to bring to town.

But we have been sold a lie. We have bought into a chimera, a charade, and the biggest part of the problem is that we fail to recognize this fact. We actually believe it is a bona fide happening, without which we would all be thrown into chaos and despair.

So it is that we cling on to this outworn model of ‘democracy’, fearful of what might happen if it were dismantled and consigned it to history. Fearful maybe, of what might emerge in its place.

But that’s no good, and you know it. Because what stands in front of us is a choice; to remain a slave to a system which cannot survive without slaves – or to break free and give form to something altogether different.

Are you ready to take such a step?

So what might bringing about something altogether different actually involve? We must have a go at answering this, because it is the most critical question of this era, one we all face today – whether we realize it or not.

What we are talking about is taking back control of our destinies, not giving responsibility for them to someone else. Try to conceive what this might be like.. Well, for a start, out goes ‘the politician’ and with him/her the central control system called ‘parliament’. By the way, parliament did once represent the venue for an ideal in the making. An aspiration to give voice to those who never had a voice and to introduce collective justice where only the will of a monarch had previously prevailed.

But such a situation has long been redundant, because parliament was hijacked decades ago by the hidden hand of centralised control, and the politician became a stooge for the banking, military and corporate power cartels seemingly beyond his control. That is why this ‘corrupted beyond repair’ model has to go.

There’s a new lightness in the air at the sheer mention of such an action! What is mainstream media going to talk about without the mock democracy to fill its airwaves? Where will attention be turned once the charade of politics is removed from its pompous pedestal? What would we like to see fill the vacant place?

Think about it, because almost nobody is, and that is in large part the reason why it hasn’t yet happened.

It is at around this point that something valuable starts stirring within, and the seeds of a fresh vision put forth their first shoots. The low vibratory rate of energy to which we have adapted, shifts upward a gear. The fog starts to clear. We can see more clearly what we couldn’t see at all before we dared dispense with the old lie.

The new perception looks and feels something like this: we are here on this world having something called ‘a life’. It might last seven or eight decades, or more, or less; but as far as we know, it’s the only one we’ve got. How did we acquire this special gift? What are we going to do with it? Since it’s special and quite unique – isn’t it logical that we would want to do something special and unique with it?

Once we see we’ve been sold a lie, our next logical realization is to recognize that it’s a massive waste of this one life we have, to pretend we can ignore reality. It is then that the possibility of something altogether different entering the arena, makes its unexpected debut.

“My God” it says “I want to live!” “I want to confront this lie head-on and cease running away from it!” And that is a truly revolutionary happening; one which can – in an instant – change our entire outlook on life. For although it’s only a beginning, it’s a real beginning, one full of promise for what might follow.

Looking back at the crazed and confused scenes taking place on the world stage, shifting like tides between high melodrama and low bestiality, we can now see that it is no use trying to paper-over the cracks and pretend that we can go on living life ‘as usual’. The cracks are the dominant factor and what lies in between is so insubstantial as to be of no practical use.

Our only way forward is to invent a new future. Open a fresh page in the book of life. Not ignoring the past, but getting to grips with understanding it – and then bringing it with us on the great new journey upon which one has embarked. Let a new found passion lead the way. Let intuition be your guide. Let awareness be your tool box.

If you had identified yourself with any facet of the crumbling status quo, you will soon find yourself untethered, because there is nothing left able to hold a stake to which you can attach yourself.

There is nowhere left to turn except into your own inner resources. For it is from this region that the new vision emerges. That place where truth still resides, untrammelled by the ways of the world.

And then, on peering ever deeper within, one can begin to see the emerging presence of another world altogether. A world awaiting birth. Longing for birth. Waiting to be born. A world shimmering with expectation and excitement. A world lit-up by luminous energies.

Men and women alike give birth to this great entity. It does not require a womb or a phallus, although it’s composition embraces the essence of female and male, finally liberated to give full focus to the building of the new society which it is our imperative to create.

Now is the time to set aside all that would try to close the window on our true destinies.

Here is where we will find the footings, the solid ground, from which we can start building the World to Come. A place to carry us through the storm which cannot be by-passed. That is our true work from now on.

The mad actors who strut the world stage today do not realize that they are playing-out the final scene of an apocalyptic epic. A drama devised and directed by the architects of control. Criminals, whose full exposure is ever closer at hand.

We are moving into an auspicious time. A time in which mankind frees itself from the prison that has for so long-held it hostage. An event which will break the cords of fear-induced captivity and finally bring down the curtain on this devious age of deception.