The War On Consciousness

index

By Graham Hancock

Source: Body Mind Soul Spirit

We are told that the “War on Drugs” is being waged, on our behalf, by our governments and their armed bureaucracies and police forces, to save us from ourselves. “Potential for abuse and harm” are supposed to be the criteria by which the use of drugs is suppressed—the greater a drug’s potential for abuse and harm, the greater and more vigorous the degree of suppression, and the more draconian the penalties applied against its users.

In line with this scheme drugs are typically ranked into a hierarchy: Schedules I, II, and III in the US, Classes A, B, and C in the UK, and so on and so forth all around the world. Thus, to be arrested for possession of a Schedule I or Class A drug results in heavier penalties than possession of a Schedule III or Class C drug. Generally if a drug is deemed to have some currently accepted medical use it is likely to be placed in a lower schedule than if it has none, notwithstanding the fact that it may have potential for abuse or harm. In the absence of any recognized therapeutic effects, drugs that are highly addictive, such as heroin or crack cocaine, or drugs that are profoundly psychotropic, including hallucinogens such as LSD, psilocybin, or DMT, are almost universally placed in the highest schedules and their use attracts the heaviest penalties.

The notable exceptions to this system of ranking according to perceived “harms” are, of course, alcohol and tobacco, both highly addictive and harmful drugs—far more so than cannabis or psilocybin, for example—but yet socially accepted on the grounds of long customary use and thus not placed in any schedule at all.

The Failed War

When we look at the history of the “War on Drugs” over approximately the last 40 years, it must be asked whether the criminalization of the use of any of the prohibited substances has in any way been effective in terms of the stated goals that this “war” was supposedly mounted to achieve. Specifically, has there been a marked reduction in the use of illegal drugs over the past 40 years—as one would expect with billions of dollars of taxpayers’ money having been spent over such a long period on their suppression—and has there been a reduction in the harms that these drugs supposedly cause to the individual and to society?

It is unnecessary here to set down screeds of statistics, facts, and figures readily available from published sources to assert that in terms of its own stated objectives the “War on Drugs” has been an abject failure and a shameful and scandalous waste of public money. Indeed, it is well known, and not disputed, that the very societies that attempt most vigorously to suppress various drugs, and in which users are subject to the most stringent penalties, have seen a vast and continuous increase in the per capita consumption of these drugs. This is tacitly admitted by the vast armed bureaucracies set up to persecute drug users in our societies, which every year demand more and more public money to fund their suppressive activities; if the suppression were working, one would expect their budgets to go down, not up.

Inventory of Harm

Such matters are only the beginning of the long inventory of harm caused by the “War on Drugs.”

Western industrial societies, and all those cultures around the globe that increasingly seek to emulate them, teach us to venerate above all else the alert, problem-solving state of consciousness that is particularly appropriate to the conduct of science, business, war, and logical inquiry, and to such activities as driving cars, operating machinery, performing surgery, doing accounts, drawing up plans, accumulating wealth, etc., etc., etc. But there are many other states of consciousness that the amazing and mysterious human brain is capable of embracing, and it appears to be a natural human urge, as deep-rooted as our urges for food, sex, and nurturing relationships, to seek out and explore such “altered states of consciousness.” A surprisingly wide range of methods and techniques (from breathing exercises, to meditation, to fasting, to hypnosis, to rhythmic music, to extended periods of vigorous dancing, etc.) is available to help us to achieve this goal, but there is no doubt that the consumption of those plants and substances called “drugs” in our societies is amongst the most effective and efficient means available to mankind to explore these profoundly altered states of consciousness.

The result is that people naturally seek out drugs and the temporary alterations in consciousness that they produce. Not all people in every society will do this, perhaps not even a majority, but certainly a very substantial minority—for example the 2 million Britons who are known to take illegal drugs each month3 or those 20 million people in the US who have been arrested for marijuana possession since 1965. And these of course are only the tip of the iceberg of the much larger population of American marijuana users, running into many more tens of millions, who have, by luck or care, not yet fallen foul of the law and are thus not reflected in the arrest statistics.

Needless to say, it is of course exactly the same urge to alter consciousness that also impels even larger numbers of people to use legal (and often extremely harmful) drugs such as alcohol and tobacco—which, though they may not alter consciousness as dramatically as, say, LSD, are nevertheless undoubtedly used and sought out for the limited alterations of consciousness that they do produce.

For the hundreds of millions of people around the world whose need to experience altered states is not and cannot be satisfied by drunken oblivion or the stimulant effects of tobacco, it is therefore completely natural to turn to “drugs”—and, since the “War on Drugs” means that there is no legal source of supply of these substances, the inevitable result is that those who wish to use them must resort to illegal sources of supply.

Herein lies great and enduring harm. For it is obvious, and we may all see the effects everywhere, that the criminalization of drug use has empowered and enriched a vast and truly horrible global criminal underworld by guaranteeing that it is the only source of supply of these drugs. We have, in effect, delivered our youth—the sector within our societies that most strongly feels the need to experience altered states of consciousness— into the hands of the very worst mobsters and sleazeballs on the planet. To buy drugs our sons and daughters have no choice but to approach and associate with violent and greedy criminals. And because the proceeds from illegal drug sales are so enormous, we are all caught up in the inevitable consequences of turf wars and murders amongst the gangs and cartels competing in this blackest of black markets.

Instead the powers that be continue to pursue the same harsh and cruel policies that they have been wedded to from the outset, ever seeking to strengthen and reinforce them rather than to replace them with something better. Indeed the only “change” that the large, armed bureaucracies that enforce these policies has ever sought since the “War on Drugs” began has, year on year, been to demand even more money, even more arms, and even more draconian legislative powers to break into homes, to confiscate property, and to deprive otherwise law-abiding citizens of liberty and wreck their lives. In the process we have seen our once free and upstanding societies— which used to respect individual choice and freedom of conscience above all else—slide remorselessly down the slippery slope that leads to the police state. And all this is being done in our name, with our money, by our own governments, to “save us from ourselves”!

Freedom of Consciousness

What is Western civilization all about? What are its greatest achievements and highest aspirations?

It’s my guess that most people’s replies to these questions would touch—before all the other splendid achievements of science, literature, technology, and the economy—on the nurture and growth of freedom.

Individual freedom.

Including, but not limited to freedom from the unruly power of monarchs, freedom from the unwarranted intrusions of the state and its agents into our personal lives, freedom from the tyranny of the Church and its Inquisition, freedom from hunger and want, freedom from slavery and servitude, freedom of conscience, freedom of religion, freedom of thought and speech, freedom of assembly, freedom to elect our own leaders, freedom to be homosexual—and so on and so forth.

The list of freedoms we enjoy today that were not enjoyed by our ancestors is indeed a long and impressive one. It is therefore exceedingly strange that Western civilization in the twenty- first century enjoys no real freedom of consciousness.

There can be no more intimate and elemental part of the individual than his or her own consciousness. At the deepest level, our consciousness is what we are—to the extent that if we are not sovereign over our own consciousness then we cannot in any meaningful sense be sovereign over anything else either. So it has to be highly significant that, far from encouraging freedom of consciousness, our societies in fact violently deny our right to sovereignty in this intensely personal area, and have effectively outlawed all states of consciousness other than those on a very narrowly defined and officially approved list. The “War on Drugs” has thus unexpectedly succeeded in engineering a stark reversal of the true direction of Western history by empowering faceless bureaucratic authorities to send armed agents to break into our homes, arrest us, throw us into prison, and deprive us of our income and reputation simply because we wish to explore the sometimes radical, though always temporary, alterations in our own consciousness that drugs facilitate.

The reason the anti-marijuana campaigns have failed is that millions of users know from their own direct, long-term experience that marijuana does not do them any great harm and (with reference to the most recent anti-marijuana propaganda) most definitely does not drive them mad.

Other than being against arbitrary rules that the state has imposed on us, personal drug use by adults is not a “crime” in any true moral or ethical sense and usually takes place in the privacy of our own homes, where it cannot possibly do any harm to others. For some it is a simple lifestyle choice. For others, particularly where the hallucinogens such as LSD, psilocybin, and DMT are concerned, it is a means to make contact with alternate realms and parallel dimensions, and perhaps even with the divine. For some, drugs are an aid to creativity and focussed mental effort. For others they are a means to tune out for a while from everyday cares and worries. But in all cases it seems probable that the drive to alter consciousness, from which all drug use stems, has deep genetic roots.

Other adult lifestyle choices with deep genetic roots also used to be violently persecuted by our societies.

A notable example is homosexuality, once punishable by death or long periods of imprisonment, which is now entirely legal between consenting adults—and fully recognized as being none of the state’s business—in all Western cultures. (Although approximately thirteen US states have “anti-sodomy” laws outlawing homosexuality, these statutes have rarely been enforced in recent years, and in 2003 the US Supreme Court invalidated those laws.) The legalization of homosexuality lifted a huge burden of human misery, secretiveness, paranoia, and genuine fear from our societies, and at the same time not a single one of the homophobic lobby’s fire-and-brimstone predictions about the end of Western civilization came true.

Likewise, it was not so long ago that natural seers, mediums, and healers who felt the calling to become “witches” were burned at the stake for “crimes” that we now look back on as harmless eccentricities at worst.

At the deepest level, our consciousness is what we are—to the extent that if we are not sovereign over our own consciousness then we cannot in any meaningful sense be sovereign over anything else either.

Perhaps it will be the same with drugs? Perhaps in a century or two, if we have not destroyed human civilization by then, our descendants will look back with disgust on the barbaric laws of our time that punished a minority so harshly (with imprisonment, financial ruin, and worse) for responsibly, quietly, and in the privacy of their own homes seeking alterations in their own consciousness through the use of drugs. Perhaps we will even end up looking back on the persecution of drug users with the same sense of shame and horror that we now view the persecution of gays and lesbians, the burning of “witches,” and the imposition of slavery on others.

Meanwhile it’s no accident that the “War on Drugs” has been accompanied by an unprecedented expansion of governmental power into the previously inviolable inner sanctum of individual consciousness. On the contrary, it seems to me that the state’s urge to power has all along been the real reason for this “war”—not an honest desire on the part of the authorities to rescue society and the individual from the harms caused by drugs, but the thin of a wedge intended to legitimize increasing bureaucratic control and intervention in almost every other area of our lives as well.

This is the way freedom is hijacked—not all at once, out in the open, but stealthily, little by little, behind closed doors, and with our own agreement. How will we be able to resist when so many of us have already willingly handed over the keys to our own consciousness to the state and accepted without protest that it is OK to be told what we may and may not do, what we may and may not explore, even what we may and may not experience, with this most precious, sapient, unique, and individual part of ourselves?

If we are willing to accept that then we can be persuaded to accept anything.

Lessons from George Orwell’s ‘1984’

1984

By Ethan Indigo Smith

Source: Waking Times

“Political language is designed to make lies sound truthful and murder respectable, and to give an appearance of solidity to pure wind.” — George Orwell

Some fictional literature is so profound as to be relevant for decades. George Orwell’s timeless 1984 is one such literary work. One of the most influential books of our time, its message resonates today as much as it did when it was first published over 65 years ago — as shown by its recent surge to the #1 spot on Amazon’s bestseller list.

So what can 1984 teach us about the modern day?

At its core, 1984 is a post-WWII interpretation of the relationship between individuals and institutions. It changed the course of social history by spawning new language relating to the structure and mechanisms of our society, expanding the scope of human language and thought, and therefore, humanity’s understanding of itself. And that legacy seems perfectly fitting, for in the story of 1984, the world is controlled by so many restrictions that even the expressiveness of the official language, “Newspeak”, is deliberately narrowed by the ruling institutions in a way that limits the ability of individuals to express “thoughtcrime” — that which is deemed illegal by the “Inner Party”, the State.

As a work of fiction, 1984 provides a stark view of a burgeoning culture of totalitarianism. As a work of symbolism, however, it stands as a reflection of modern fact in The U.S.A. and the world today. Within its narrative, the five freedoms of the First Amendment of the United States Constitution were infringed and removed; in particular, the freedom of speech was so restricted that there was only one source of news operated by the official governing body and an entire branch of government was dedicated to steadily eliminating language deemed detrimental to the State.

Orwell created new phrases like “Newspeak” (the official, limited language) and its antonym “Oldspeak”, “Goodthink” (thoughts that are approved by the Party) and its antonym “Crimethink”, and “Doublethink” (the normalized act of simultaneously accepting two contradictory beliefs). The new language allowed his narrative to portray and expose age-old structures of thought and language manipulation – structures that have exponentially escalated in the modern day.

In 1984 all opposition is controlled and absorbed into the background. ‘Big Brother’ is the human image that represents The Inner Party (and the Party line) via the Telescreen providing an ‘official’ narrative while appropriating and misrepresenting the notion of brotherhood and unity into a ‘brand name’ — one that actually instills a psychology of collectivism, not brotherhood, just as the controllers in our own world instill nationalism and war-mindedness in the name of “freedom” and “liberty”. Indeed, the Telescreen is the primary means through which norms were forced on the society and false imagery and narratives embedded in its collective consciousness. Totally transfixed on the Party line, as told by the Telescreen, the fictional society of 1984 has lost the ability to think such that it will believe two plus two is five, as the saying goes, as long as it is presented as such on the Telescreen. They have been captive to this set up their entire lives, and, with language and thought restricted and outlawed, they are blind to their own captivity, unable to discern for themselves. Thus, lies are made to be “truths” using logic so distorted that it not only convinces the masses that two plus two equal five, but that war is peace, freedom is slavery, and ignorance is strength.

In reality, individual ignorance is strength to institutions. Such distortions of language and thought (and, incidentally, history) are the perfect means by which to disempower and co-opt an entire society — means that are not limited to the works of fiction. Orwell knew that ideas do not exist separately from language. Language, in both spoken and written forms, is essential to our ability to form and communicate thoughts and ideas. That is why today the United States government, the shadow powerbrokers that control it, and the mainstream media that support it (the entirety of which is owned by only 6 corporations) continue their war on “fake news” — i.e. ideas that are skeptical of government pronouncements, and information that proves them to be false — taking aim not just at independent journalism but independent thought itself. While government surveillance of its own people continues to increase, government secrecy is at an all-time high, the sharing of ideas that challenge the status quo is becoming more heavily censored, releasing information on institutional and State activity is now punishable by law, and whistleblowers from inside the State are systematically destroyed. If that wasn’t Orwellian enough, Donald Trump’s advisors have begun coining phrases like “alternative facts”, and we have even seen the creation of an Orwellian “Ministry of Truth”, an “international fact-checking network” charged with deciding what is “truth” and what is “fake news”.

If the events of 1984 continue to hold true, and the ruling Party of today gets its way, words and ideas will soon become not only censored, but illegal and eliminated altogether, controlled by increasingly totalitarian governments steering our society down a dystopian path of censorship, blind belief, and misinformation — all in the name of the State. However, as our minds are freed, one at a time, we are ultimately finding that our society is heavily embedded with such norms and structures that perpetuate false imagery, preserving the status quo of the State from the ‘threat’ of individual thinking — hence the modern war on “fake news”. We are beginning, as a society, to question such falsehood, and exercise our inherent freedom to expose it.

“Freedom is the freedom to say that two plus two make four. If that is granted, all else follows”. ~ George Orwell

The Last Man in Europe

The original working title to 1984 was ‘The Last Man in Europe.’ This descriptive and evocative title idea provides a clear glimpse into George Orwell’s intent, and encapsulates a main point of 1984, a title perhaps too revealing to be anything but a working title. Certainly, that is the way many of us feel when we first become aware of lies and partial-truths that are presented as reality by those in control of our society today, and accepted in totality by seemingly everyone else – it is as if we are the last lone person. Indeed, the road of the freethinker can be a lonely one, and the story’s protagonist, patriot Winston Smith, is made to believe he is the last person who questions, who looks, listens and speaks.

In a totalitarian society — be it Orwell’s fictional world or the increasingly authoritarian political regimes of today — the official narratives portrayed by the “official” media portray that a society is in consensus with the State, and that those engaged in Thoughtcrime (whether or not it is legally a crime) are isolated social outcasts and lunatics, and demeaned as “rebels” and “conspiracy theorists” (despite the existence of actual conspiracy, against which the truly conscious mind must inevitably rebel.) Yet in reality, Crimethink is what differentiates we freethinkers from those who are lost in the spell of societal illusion and, therefore, pose a threat to the status quo of the State. But this is part of the trap of Goodthink — it creates the illusion of consensus, and therefore, engenders isolation in those who do not concede.

As a master of his craft, nothing Orwell wrote was off the cuff. Now it is not overtly spoken in the book, but there are four types of people in the fictional realm of 1984. There are three described classes and a suggested fourth, only later is it implied that the Brotherhood, anti-establishment rebels — has been eliminated from the narrative jut as those in power sought to eliminate them from the society.

The Secret to 1984 is ‘4’

1984 is in part an expose on the four basic types of people in a society, the four types of institutions and the four types of institutional lies that enable them.

Characterized by how they respond to information, modern societies are made up of four archetypes of people — idiots, zealots, elitists and patriots. Idiots refuse information, zealots blindly refute information, elitists misuse information, and patriots seek and distribute information. Despite dramatic alterations in the world’s geopolitical landscape, and some fluctuation of individuals from one group/role to another over time, the dynamic between these groups has historically remained the same, and are inevitably intertwined: Idiots avoid all new pertinent information in order to maintain their perspective, never questioning the status quo. Zealots ask certain questions of certain information, ignoring unaligned information in order to maintain their perspective, supporting the status quo at all costs. Elitists question information in order to manipulate and reap gains off those who don’t know, benefiting from the status quo. Patriots question information to educate themselves and share it with others, in order that we might enhance our lives and progress beyond the status quo.

It is no wonder, then, that the patriot has been all but deleted from today’s socio-political landscape, with those acting as true patriots being demonized by the State, and the meaning of the word “patriot” distorted and confused (by the likes of George W. Bush Jr.) to mean an unquestioning, flag-waving, with-us-or-against-us brand of nationalistic idiocy. (Check out my article, The First Amendment – The REAL Patriot Act for a deeper discussion of this.) Using a practice so well-defined by Orwell that it is known today as Orwellian speak, institutions transfer and confuse words and ideas by mixing up themselves, their policies and their products with patriotic ideas and words. They take the meaning of words and archetypes, and flip them on their heads: War is peace, freedom is slavery, ignorance is strength, and true patriotism (such as that shown by government whistleblowers) is traitorous.

In reality, the true patriots, the rebels who see through the lies of institutions and act accordingly, are removed from public consciousness in exactly the same way. In “Orwellian” fashion, the fourth deleted class of people in 1984, the Brotherhood, who are working to bring down the fascist Inner Party, are deleted through the admission of language. The other three types, which are specifically mentioned in the-book-within-the-book, the fictional The Theory and Practice of Oligarchical Collectivism, are the High, the Middle and the Low castes. Similarly, the other three types of people depicted in the society of Oceania are the Inner Party, the Outer Party and the Proles. The social classes interact very little.

The Inner Party and Outer Party make up 2% of the population, and are the institutionalized controllers of Oceania. They are akin to modern politicians and the financial elite, working with and against one another, and clamoring to gain and maintain power. They have privileges the other castes do not, including being able to (temporarily) turn off the propaganda-spewing Telescreens.

However, there is a pecking order within the Party. The Outer Party are given state administrative jobs and are composed of the more educated members of society. They are responsible for the direct implementation of the Party’s policies but have no say in decision making. They are the “artificial middle class” and as such, have strict rules applied to them. They are allowed “no vices other than cigarettes and Victory Gin”, are spied on via their Telescreens, and are encouraged to spy on each other, and to report suspicious activities to Big Brother.

The lower class of workers that perform the majority of menial tasks and labors are known as the Proles. They live in the poorest of conditions, are not educated, and instead are kept entertained with alcohol, gambling, sports, fiction and pornography (called “prolefeed”) — the 1984 equivalent of “bread and circus”.

According to the Inner Party and the Telescreen it controls, those who might challenge the system – the important fourth type of person – simply do not exist. The Brotherhood, the organization of patriots, are portrayed by the controlling ‘Inner Party’ as only a rumor, and the notion of their existence is belittled by the Inner Party, via the Telescreen. In Oceania, if the Telescreen is t be believed, there are no patriots, nor is such action allowed — and any who think that way are isolated by the divide-and-conquer tactic used by empires past and present. Thus, like so many in our failing society, Smith believes himself to be ‘The Last Man in Europe’…

“During times of universal deceit, telling the truth becomes a revolutionary act.” – George Orwell

And yet, as the character of Winston Smith accurately observes in his diary, “If there is any hope, it lies with the Proles” — just as our hope for today lies with the so-called “99%”. The “proles” in our society must begin to look beyond the bread and circus, beyond the prolefeed, and become a true brotherhood, and sisterhood, by questioning information, educating themselves, and sharing what they learn with others in order that we might overcome institutional oppression and finally create the ‘golden age’ that is our combined potential.

God and Gold is Within

“We shall meet in the place where there is no darkness.” — George Orwell, 1984

Nothing Orwell wrote was by accident. The name of the character who leads the Brotherhood rebellion is named Emmanuel Goldstein, a name that translates roughly to mean God (Emmanuel) and gold are within (Goldstein). The use of this character name by Orwell asserts a developed, even transmuted human being, who has transcended the imposed limitations of the system he is opposed to, and grown from dull to refined, disempowered to empowered. It also reveals Orwell’s knowledge of how such patriotism and rebellion can become revolution.

The word “prole” is short for prolétariat, a French word derived from the Latin proletarius, meaning “a man whose only wealth is his offspring, or whose sole service to the state is as father”. A word evoking pure institutionalized collectivism, it suggests that the individual has no value other than the labor and progeny he provides to the State. (If you’re only value to the state is as a breeder and consumer, well what kind of world does, sorry, would that result in??) Now compare that definition to the name Emmanuel Goldstein, Golden Godliness is Within. In complete contrast, it is a statement of inner development, of individual enlightenment and empowerment — which, as Orwell knew, are the only forces that can successfully lead a rebellion against the institutional oppression of both fiction and reality.

So, you see, the secret to 1984 is ‘4’. Its most powerful message is in its omissions: in the omission of information, which is the only way the Party/State can maintain authoritarian control, and in the deliberately-omitted fourth human archetype, the righteous rebel, the marginalized voice of descent who is led to believe he is the “last man in Europe”. But in fact, the last man in Europe is you and I. We are everywhere. And, as we open our minds and our mouths, and embrace the gold within, we re-tell the lost narrative of the Brotherhood, and turn our Proles into our Brothers.

Cycle of Insurgency: How the US military is expected to put down an insurrection

Suspect Death

By Justin King

Source: The Fifth Column

One of the overriding questions when discussing an insurgency within the United States has always been the debate over how the military would respond. Those who hope for the military to break ranks and join the resistance will be disappointed. Those who would believe the military will employ surgical strikes to remove dissidents through technology will be surprised. The American people don’t have to guess how the US military would respond any longer. Two respected academics chose to war game a scenario using the United States Operating Concept (2010) as a guide.

The first thing to understand about an insurrection is that it isn’t terrorism. The terms are often used interchangeably by the media, but there is a significant difference.

As pointed out throughout this series, insurgencies that matured through the cycle of insurgency win. Always. There is a reason for this. Insurgencies, though typically weaker militarily, have great advantages over their adversaries. One of the greatest small unit commanders and unconventional warfare experts in modern times, Richard Marcinko, described three things needed to win in combat: speed, surprise, and violence of action. When transferred to the strategic and operational levels, the insurgency possesses these attributes. The greatest advantages of the insurgency are:

Mobility: The refusal to stay in a static location negates technologically advanced weapons systems.
Initiative: The insurgency is able to choose the time and place of most of the battles they fight.
Surprise: Because the insurgents have the ability to choose the time and place of the fight, they can select moments when the opposition is weakest.
Camouflage: The insurgent does not wear a uniform. As the father of modern insurgency, Michael Collins, said: “Our uniform will be that of the man on the street and the peasant in the field.” This makes distinguishing between friend and foe difficult for the opposition.
Unpredictability: A force that is unpredictable on a battlefield is dangerous. Field commanders train to fight conventional wars, in which both sides attempt to take and hold territory, the insurgent seeks destabilization of the opposition’s government, not land. Tactics designed to defeat a conventional army are useless against an enemy that doesn’t seek to hold territory. The value of remaining unpredictable has created an adage in military circles: “Professional soldiers are predictable, but the world is full of amateurs.” The implied meaning is that the amateur is more dangerous.
Factional divides: In a conventional military setting, a force should function like a well-oiled machine and have clear command and control. Insurgencies typically operate with loose alliances between factions who follow a particular commander. Sometimes they work together, sometimes they don’t. Just when the opposition gains a feel for the tactics and strategy of an insurgent commander, a new one arises. This leads to unpredictable actions being taken by the various factions, which increases their overall effectiveness.
Civilian sympathies: Insurgencies typically maintain a great deal of support from the local populace, which means the opposition can’t move without information detailing those moves reaching the insurgents. In a conventional conflict, the lines of battle hinder civilians from collecting intelligence and passing it to the opposing force. It can be done, but it is difficult. Insurgencies have no front lines.

Insurgencies maintain several other key advantages, but they are more nuanced and are beyond the scope of this article.

The US Army has adopted a doctrine of “Full Spectrum Operations”. Loosely it means the combination of offensive, defensive, and either stability operations overseas or civil support operations on U.S. soil. It’s a concept developed for conventional wars, with little application in unconventional conflicts. To produce a desired outcome (a US military win), the scenario has to be carefully crafted. The academics who published Full Spectrum Operations in the Homeland: A “Vision” of the Future were able to accomplish that. The scenario they present is:

The Great Recession of the early twenty-first century lasts far longer than anyone anticipated.  After a change in control of the White House and Congress in 2012, the governing party cuts off all funding that had been dedicated to boosting the economy or toward relief.  The United States economy has flatlined, much like Japan’s in the 1990s, for the better part of a decade.  By 2016, the economy shows signs of reawakening, but the middle and lower-middle classes have yet to experience much in the way of job growth or pay raises.  Unemployment continues to hover perilously close to double digits, small businesses cannot meet bankers’ terms to borrow money, and taxes on the middle class remain relatively high.  A high-profile and vocal minority has directed the public’s fear and frustration at nonwhites and immigrants.  After almost ten years of race-baiting and immigrant-bashing by right-wing demagogues, nearly one in five Americans reports being vehemently opposed to immigration, legal or illegal, and even U.S.-born nonwhites have become occasional targets for mobs of angry whites.

In May 2016 an extremist militia motivated by the goals of the “tea party” movement takes over the government of Darlington, South Carolina, occupying City Hall, disbanding the city council, and placing the mayor under house arrest.  Activists remove the chief of police and either disarm local police and county sheriff departments or discourage them from interfering.  In truth, this is hardly necessary.  Many law enforcement officials already are sympathetic to the tea party’s agenda, know many of the people involved, and have made clear they will not challenge the takeover.  The militia members are organized and have a relatively well thought-out plan of action.

With Darlington under their control, militia members quickly move beyond the city limits to establish “check points” – in reality, something more like choke points — on major transportation lines.  Traffic on I-95, the East Coast’s main north-south artery; I-20; and commercial and passenger rail lines are stopped and searched, allegedly for “illegal aliens.”  Citizens who complain are immediately detained.  Activists also collect “tolls” from drivers, ostensibly to maintain public schools and various city and county programs, but evidence suggests the money is actually going toward quickly increasing stores of heavy weapons and ammunition.  They also take over the town web site and use social media sites to get their message out unrestricted.

The scenario continues with descriptions of the activities of politicians prior to the military being involved, but the actions of the “insurgent” already guarantee a US military victory. In the presented scenario, the insurgents surrender every single advantage they have. They attempt to hold territory, losing the advantages of mobility, surprise, initiative, and unpredictability. Because they are operating openly and in a defined area, they have lost the advantage of camouflage. The battle lines established by the insurgents themselves at the checkpoints negate the benefits of civilian sympathy. They have a unified command structure that reduces unpredictability.

In the scenario, DOD responds to this threat by establishing a “show of force” to demoralize the insurgents. They then mount offensive operations by surprise to take down the checkpoints. Towards the end of the campaign, the military seizes power and radio stations and so on. It then begins mopping up operations once the civilians of Darlington have fled.

When faced with the realities of a modern insurgency, this response is completely fictional. There can be no “show of force” to insurgents who don’t take and hold territory. Because the insurgency would operate in a loosely defined area, it would be the US military setting up checkpoints (as in Iraq) that would be ambushed, not the insurgents. Wise insurgents would use mobile communications to spread their message, not a static radio station. The power stations would have been destroyed to foster a belief in the civilian populace that the government can’t even keep the lights on, much less defeat the insurgency. The civilians that conveniently remove themselves from the battlefield in the scenario will be in the line of fire during an insurgency because there is no front line. There is nowhere to evacuate to.

The academics responsible for this scenario specifically created a simple set of conditions that allowed them to explore the logistical aspects of the doctrine on US soil, without considering the real world applications. The US counterinsurgency doctrine is fundamentally flawed. Even when practiced in a foreign country, away from the intense criticism of the US media and populace, it failed to pacify Iraq or Afghanistan. In the US, the doctrine is worthless.

In the joint publication on counterinsurgency doctrine used by all branches, even before the table of contents, it spells out the expected failure. On page iii it states:

“US counterinsurgency efforts should provide incentives to the host-nation government to undertake reforms that address the root causes of the insurgency.”

In a US-based insurgency, the United States is the “host-nation government”. While the above scenario makes for a fun read, current US doctrine is to meet the demands of domestic insurgents, while protecting as much of its credibility as possible.

The Future of Crime

mindinvaders

(Editor’s note: This essay was originally published in G-Spot 14 Winter 1994 and later included in the anthology book Mind Invaders: A Reader in Psychic Warfare, Cultural Sabotage and Semiotic Terrorism [Home, 1997]. Though intended as speculative satire, aspects of it now seem eerily prophetic.)

By Stewart Home

Source: Stewart Home Society

In the nineteen-sixties a group of French radicals called the Situationists suggested that ‘freedom is the crime that contains all other crimes’. Things have changed a lot since then, although those at the top of the social heap still believe that the vast mass of humanity are simply cattle to be fattened and slaughtered. It sounds like a cliche, but it’s now ten years since 1984 and the hardware for our total electronic control not only exists, it is also completely obsolete.

The industrial economy based around railways, electricity and the car is a historical curiosity. Until recently, the technological innovations revolutionising society were centred on the generation, storage, processing and transmission of information. Today, we are witnessing the rise of a new technological revolution, a bioeconomy dependent upon genetic engineering, nanotechnology and neurocomputers. Obviously, the level of scientific, technological and cultural development within any given society dictates the types of crime that may be committed within it. Among nomadic tribes, the chief crimes are rape and murder. With the establishment of agriculture and the development of a class system, theft became the major concern of those who controlled the fast expanding, and increasingly bureaucratic, legal system.

A lot of would-be trendy magazines and tv programmes like to pretend they’re covering the cutting edge of crime by running features on computer hacking. Basically, what these people present as the future of crime is hi-tech theft, with cybernauts ripping off money from bank accounts and credit card facilities. When you think about it, this scenario isn’t so different from some farmer of three thousand years ago stealing his neighbour’s cow. A theft, is a theft, is a theft, despite the fact that the methodology of larceny is transformed by technological developments.

What isn’t being reported by the mainstream media is the way in which biotechnology, based on genetic engineering, is being used to boost the profits of multinational corporations as it simultaneously destroys the health of ordinary people. At its most simple, this consists of drugs like Thalidomide being prescribed to pregnant women in Brazil, despite the fact that Thalidomide is banned in Europe because it causes children to be born without limbs. Biotechnology gets even sicker when it’s combined with pre-existing forms of mind control based on psychiatric and electro-shock treatments.

While RoboCop and Terminator were presented to the public as futuristic scenarios, they portray a situation that already exists. The technology required to remake a man or woman, either psychologically or physically, has existed for years. This is where the future of crime really lies, because the police and intelligence services require criminal activity to keep them in a job. While biotechnology is being used to transform the bulk of the population into obedient slaves, the psychological aspect of such mass brainwashing works much more effectively when a minority of individuals are programmed to act as violent psychopaths. The passive majority already accept that the constant surveillance of both public places and cyberspace is fully justified to protect them from those maniacs who threaten the smooth functioning of a well ordered society.

A huge body of publicly available literature exists on CIA experiments such as MK-Ultra, which used LSD as a means of turning ordinary men and women into mind controlled zombies. A number of MK-Ultra test subjects were programmed to slaughter their fellow citizens. Everyone from Luc Jouret and Charles Manson, to Jim Jones and Mark Chapman, the bloke who murdered former Beatle John Lennon, is a victim of coercive psychiatry which transformed them from a regular guy into a murder maniac. During LSD sessions, these future killers were subjected to ‘psychic driving’, a torture technique which consists of revelations extracted under psychoanalysis being played back over and over again, via a helmet the victim can’t remove. In the future, virtually every piece of mayhem to gain widespread publicity will be the involuntary act of some helpless sap whose murderous antics were pre-programmed in a government institution.

Alongside increasingly sophisticated mass murder programmes sponsored by the security services and multinational corporations, there will be resistance from those groups who have already been criminalised for wanting the freedom to party. The Criminal Justice Act, now in force, makes raves illegal and worse is to follow. Fortunately there are still plenty of people about who want to defend themselves from this crackdown. In England, the resistance will be led by the London Psychogeographical Association, who will use games of three-sided football to free people from the shackles of dualistic thinking. Already, the state is preparing to outlaw football played on triangular pitches, with three goals, where a tally of the goals conceded reveals who has won. The shifting allegiances this game brings into play teaches people to break out of the dualistic system of thought that tricks them into becoming victims of the mind control techniques employed by the ruling class.

When three-side football is banned, which will certainly happen in the next two or three years, the London Psychogeographical Association will organise games in abandoned multi-storey car parks and the basements of deserted office blocks. Some games will be played for a full ninety minutes, while others will be broken up by the cops. Anyone arrested will have been told in advance to claim that they are Luther Blissett, a name which has been appearing mysteriously on buildings all over Bologna, Italy, in recent weeks.  Some of those who are nicked during games of three-sided football will later reappear among their friends, and with great sadness they will be killed, to free them from the programming that’s destroyed their personality and will compulsively drive them to murder anyone who resists the state. This is the future of crime and it demonstrates that the Situationists were right. FREEDOM IS THE CRIME THAT CONTAINS ALL OTHER CRIMES.

Bureaucratic Insanity is Yours to Enjoy

1980

Reposted below is Dmitry Orlov’s review of the new publication from Club Orlov Press: “Bureaucratic Insanity: The American Bureaucrat’s Descent into Madness” by Sean J. Kerrigan.

By Dmitry Orlov

Source: ClubOrlov

In contemporary United States a child can be charged with battery for throwing a piece of candy at a schoolfriend. Students can be placed in solitary confinement for cutting class. Adults aren’t much better off: in 2011 the Supreme Court decided in 2011 that anyone the police arrest, even for an offense as minor as an unpaid traffic ticket, can be strip-searched. These acts of official violence are just the tip of the iceberg in our society.

The number of rules and laws to which Americans, mostly unbeknownst to them, are subject, is hilariously excessive. But what makes this comedy unbearable is that these rules and laws are often enforced with an overabundance of self-righteous venom. Increasingly, contemporary American bureaucrats—be they police, teachers or government officials—are obsessed with following strict rules and mercilessly punishing all those who fail to comply (unless they are very rich or politically connected).

In so doing, these bureaucrats have become so liberated from the constraints of common sense that the situation has gone far beyond parody and is now a full-blown farce. Consider this recent news story involving a Virginia sixth-grader, the son of two schoolteachers and a member of the school’s program for gifted students. The boy was targeted by school officials after they found a leaf, probably a maple leaf, in his backpack. Someone suspected it to be marijuana. The leaf in question was not marijuana (as confirmed by repeated lab tests). End of story, wouldn’t you think?

Not at all! The 11-year-old was expelled and charged with marijuana possession in juvenile court. These charges were eventually dropped. He was then forced to enroll in an alternative school away from his friends, where he is subjected to twice-daily searches for drugs and periodic evaluation for substance abuse problems—all of this for possession of a maple leaf.

“It doesn’t matter if your son or daughter brings a real pot leaf to school, or if he brings something that looks like a pot leaf—okra, tomato, maple, buckeye, etc. If your kid calls it marijuana as a joke, or if another kid thinks it might be marijuana, that’s grounds for expulsion,” the Washington Post cheerfully reassures us.

A reasonable school official would recognize the difference between a technical violation caused by an oversight and a conscious attempt to smuggle drugs into the school. But school officials were intent on ignoring their own better sense, instead favoring harsh punishments.

In his new book, Bureaucratic Insanity: The American Bureaucrat’s Descent into Madness, Sean Kerrigan documents dozens of eyebrow-raising examples in which America’s rule-enforcers perversely revel in handing out absurd and unfair punishments for minor infractions. They demand total and complete submission, driven by a perverse compulsion to “put us in our place” and to “teach us a lesson.” They mercilessly punish even the most inconsequential transgressions in order to maximize our terror and humiliation.

When Sean first began following this story several years ago, he became mesmerized by this bizarre carnival of unreason. “Where is all this pent-up rage coming from?” he wondered, “and why is it being directed toward the weakest and most vulnerable members of society?” And then news stories like those mentioned above grew more and more common. Eventually, he started compiling a list of the most egregious abuses, trying to detect patterns, searching for some explanation for why your average garden-variety bureaucrat has morphed into a monster and has started to take sadistic pleasure in the suffering of innocent people.

Some people might argue that this kind of behavior is the result of political correctness gone amok. Others point to the irrational fear of terrorism and mass shootings. Yet others might think that it has to do with the bureaucrats’ fear of losing their jobs—merely for failing to comply with the exact letter of some rule. While there may be some truth to each of these explanations, they are far from adequate. Many of these bureaucratic abuses have nothing to do with political constraints on free speech, or with guns or terrorism, and in most cases the bureaucrats have the power to minimize harm, but instead they choose to maximize it.

In looking closer at each individual instance, it became clear that most of the offending bureaucrats weren’t even attempting to use their judgment but were mindlessly following written rules. Even in the most nurturing and humanistic professions—teachers and physicians—their practitioners have been robotized to such an extent that they now perform a very narrow range of actions. Thanks to all the progress in IT, their work is now quite detached from physical reality. Much of their work now consists of monotonously, mindlessly pounding at the computer keyboard. Consequently, a large portion of their waking lives has taken on an ethereal, pointless quality. Even teachers, who once had a relatively free reign in forming the minds of the next generation, are now forced to behave like machines, teaching to standardized tests and working a grueling average of 53 hours a week.

The psychological effects of this pressure have been profound. Minus the opportunities to make their own decisions and to see those positive effects of their efforts, their work has become personally meaningless, alienating, depersonalizing and psychologically damaging. As a result of this damage, American bureaucrats, although they may look like mild-mannered professionals, have become prone to sudden bouts of aggressive, sadistic behavior. They are unable to act out their repressed rage in any socially acceptable way other than by doling out punishments, fines, rejections, expulsions and other forms of objective, systemic violence.

The road to hell is paved with good intentions, and rest assured that this is all being done for our own good. The purpose of all of these rules and laws, from the perspective of the American system of governance, is to maximize control over everything that can be controlled and to micromanage every possible detail of our lives—in order to make them better! From student testing all the way to global trade, those in leadership positions are trying to centralize as much authority as possible in order to maximize efficiency, profit, American power… while minimizing our dignity, well-being and happiness. Oops!

In his book Bureaucratic Insanity, Sean traces the development of this trend from the early years of the industrial revolution to the modern day, from its initial appearance in factory life and in the military, to it later metastasizing to the office, and now taking over America’s schools. He argues persuasively, based on a careful and thorough review of literature in history, philosophy, psychology, anthropology and social criticism, that the average American bureaucrat is literally, clinically insane. The average American bureaucrat has a warped perception of reality and an intense, repressed self-hatred. Their only way to vent their rage is by punishing others using bureaucratic methods. They demand absolute conformity because it is their only way to give their meaningless lives some semblance of meaning. They suppress all thoughts that might lead them to discover the true nature of their condition, because that would cause them to spiral down into outright schizophrenia.

The book concludes with an assessment of what we can do to insulate ourselves from this seemingly unstoppable trend, and of how we can reinvigorate our lives by giving it real meaning.

 

The Illusion of Freedom: The Police State Is Alive and Well

By John W. Whitehead

Source: Battlefield America

“What happened here was the gradual habituation of the people, little by little, to being governed by surprise; to receiving decisions deliberated in secret; to believing that the situation was so complicated that the government had to act on information which the people could not understand, or so dangerous that, even if the people could understand it, it could not be released because of national security… This separation of government from people, this widening of the gap, took place so gradually and so insensibly, each step disguised (perhaps not even intentionally) as a temporary emergency measure or associated with true patriotic allegiance or with real social purposes. And all the crises and reforms (real reforms, too) so occupied the people that they did not see the slow motion underneath, of the whole process of government growing remoter and remoter.”—Historian Milton Mayer, They Thought They Were Free: The Germans, 1933-45

Brace yourself.

There is something being concocted in the dens of power, far beyond the public eye, and it doesn’t bode well for the future of this country.

Anytime you have an entire nation so mesmerized by the antics of the political ruling class that they are oblivious to all else, you’d better beware. Anytime you have a government that operates in the shadows, speaks in a language of force, and rules by fiat, you’d better beware. And anytime you have a government so far removed from its people as to ensure that they are never seen, heard or heeded by those elected to represent them, you’d better beware.

The world has been down this road before.

As historian Milton Mayer recounts in his seminal book on Hitler’s rise to power, They Thought They Were Free, “Most of us did not want to think about fundamental things and never had. There was no need to. Nazism gave us some dreadful, fundamental things to think about—we were decent people‑—and kept us so busy with continuous changes and ‘crises’ and so fascinated, yes, fascinated, by the machinations of the ‘national enemies’, without and within, that we had no time to think about these dreadful things that were growing, little by little, all around us.”

We are at our most vulnerable right now.

The gravest threat facing us as a nation is not extremism—delivered by way of sovereign citizens or radicalized Muslims—but despotism, exercised by a ruling class whose only allegiance is to power and money.

Nero fiddled while Rome burned.

America is burning, and all most Americans can do is switch the channel, tune out what they don’t want to hear, and tune into their own personal echo chambers.

We’re in a national state of denial.

Yet no amount of escapism can shield us from the harsh reality that the danger in our midst is posed by an entrenched government bureaucracy that has no regard for the Constitution, Congress, the courts or the citizenry.

If the team colors have changed from blue to red, that’s just cosmetic.

The playbook remains the same. The leopard has not changed its spots.

Scrape off the surface layers and you will find that the American police state is alive and well and continuing to wreak havoc on the rights of the American people.

“We the people” are no longer living the American Dream.

We’re living the American Lie.

Indeed, Americans have been lied to so sincerely, so incessantly, and for so long by politicians of all stripes—who lie compulsively and without any seeming remorse—that they’ve almost come to prefer the lies trotted out by those in government over less-palatable truths.

The American people have become compulsive believers.

As Nick Cohen writes for The Guardian, “Compulsive liars shouldn’t frighten you. They can harm no one, if no one listens to them. Compulsive believers, on the other hand: they should terrify you. Believers are the liars’ enablers. Their votes give the demagogue his power. Their trust turns the charlatan into the president. Their credulity ensures that the propaganda of half-calculating and half-mad fanatics has the power to change the world.”

While telling the truth “in a time of universal deceit is,” as George Orwell concluded, “a revolutionary act,” believing the truth—and being able to distinguish the truth from a lie—is also a revolutionary act.

Here’s a truth few Americans want to acknowledge: nothing has changed (at least, not for the better) since Barack Obama passed the reins of the police state to Donald Trump.

The police state is still winning. We the people are still losing.

In fact, the American police state has continued to advance at the same costly, intrusive, privacy-sapping, Constitution-defying, relentless pace under President Trump as it did under President Obama.

Police haven’t stopped disregarding the rights of citizens. Having been given the green light to probe, poke, pinch, taser, search, seize, strip, shoot and generally manhandle anyone they see fit in almost any circumstance, all with the general blessing of the courts, America’s law enforcement officials are no longer mere servants of the people entrusted with keeping the peace. Indeed, they continue to keep the masses corralled, under control, and treated like suspects and enemies rather than citizens.

SWAT teams haven’t stopped crashing through doors and terrorizing families. Nationwide, SWAT teams continue to be employed to address an astonishingly trivial array of criminal activities or mere community nuisances including angry dogs, domestic disputes, improper paperwork filed by an orchid farmer, and misdemeanor marijuana possession. With more than 80,000 SWAT team raids carried out every year on unsuspecting Americans for relatively routine police matters and federal agencies laying claim to their own law enforcement divisions, the incidence of botched raids and related casualties continue to rise.

The Pentagon and the Department of Homeland Security haven’t stopped militarizing and federalizing local police. Police forces continue to be transformed into heavily armed extensions of the military, complete with jackboots, helmets, shields, batons, pepper-spray, stun guns, assault rifles, body armor, miniature tanks and weaponized drones. In training police to look and act like the military and use the weapons and tactics of war against American citizens, the government continues to turn the United States into a battlefield.

Schools haven’t stopped treating young people like hard-core prisoners. School districts continue to team up with law enforcement to create a “schoolhouse to jailhouse track” by imposing a “double dose” of punishment for childish infractions: suspension or expulsion from school, accompanied by an arrest by the police and a trip to juvenile court. In this way, the paradigm of abject compliance to the state continues to be taught by example in the schools, through school lockdowns where police and drug-sniffing dogs enter the classroom, and zero tolerance policies that punish all offenses equally and result in young people being expelled for childish behavior.

For-profit private prisons haven’t stopped locking up Americans and immigrants alike at taxpayer expense. States continue to outsource prison management to private corporations out to make a profit at taxpayer expense. And how do you make a profit in the prison industry? Have the legislatures pass laws that impose harsh penalties for the slightest noncompliance in order keep the prison cells full and corporate investors happy.

Censorship hasn’t stopped. First Amendment activities continue to be pummeled, punched, kicked, choked, chained and generally gagged all across the country. The reasons for such censorship vary widely from political correctness, safety concerns and bullying to national security and hate crimes but the end result remained the same: the complete eradication of what Benjamin Franklin referred to as the “principal pillar of a free government.”

The courts haven’t stopped marching in lockstep with the police state. The courts continue to be dominated by technicians and statists who are deferential to authority, whether government or business. Indeed, the Supreme Court’s decisions in recent years have most often been characterized by an abject deference to government authority, military and corporate interests. They have run the gamut from suppressing free speech activities and justifying suspicionless strip searches to warrantless home invasions and conferring constitutional rights on corporations, while denying them to citizens.

Government bureaucrats haven’t stopped turning American citizens into criminals. The average American now unknowingly commits three felonies a day, thanks to an overabundance of vague laws that render otherwise innocent activity illegal, while reinforcing the power of the police state and its corporate allies.

The surveillance state hasn’t stopped spying on Americans’ communications, transactions or movements. On any given day, whether you’re walking through a store, driving your car, checking email, or talking to friends and family on the phone, you can be sure that some government agency, whether it’s your local police, a fusion center, the National Security Agency or one of the government’s many corporate partners, is still monitoring and tracking you.

The TSA hasn’t stopped groping or ogling travelers. Under the pretext of protecting the nation’s infrastructure (roads, mass transit systems, water and power supplies, telecommunications systems and so on) against criminal or terrorist attacks, TSA task forces (comprised of federal air marshals, surface transportation security inspectors, transportation security officers, behavior detection officers and explosive detection canine teams) continue to do random security sweeps of nexuses of transportation, including ports, railway and bus stations, airports, ferries and subways, as well as political conventions, baseball games and music concerts. Sweep tactics include the use of x-ray technology, pat-downs and drug-sniffing dogs, among other things.

Congress hasn’t stopped enacting draconian laws such as the USA Patriot Act and the NDAA. These laws—which completely circumvent the rule of law and the constitutional rights of American citizens, continue to re-orient our legal landscape in such a way as to ensure that martial law, rather than the rule of law, our U.S. Constitution, becomes the map by which we navigate life in the United States.

The Department of Homeland Security hasn’t stopped being a “wasteful, growing, fear-mongering beast.” Is the DHS capable of plotting and planning to turn the national guard into a federalized, immigration police force? No doubt about it. Remember, this is the agency that is notorious for militarizing the police and SWAT teams; spying on activists, dissidents and veterans; stockpiling ammunition; distributing license plate readers; contracting to build detention camps; tracking cell-phones with Stingray devices; carrying out military drills and lockdowns in American cities; using the TSA as an advance guard; conducting virtual strip searches with full-body scanners; carrying out soft target checkpoints; directing government workers to spy on Americans; conducting widespread spying networks using fusion centers; carrying out Constitution-free border control searches; funding city-wide surveillance cameras; and utilizing drones and other spybots.

The military industrial complex hasn’t stopped profiting from endless wars abroad. America’s expanding military empire continues to bleed the country dry at a rate of more than $15 billion a month (or $20 million an hour). The Pentagon spends more on war than all 50 states combined spend on health, education, welfare, and safety. Yet what most Americans fail to recognize is that these ongoing wars have little to do with keeping the country safe and everything to do with enriching the military industrial complex at taxpayer expense.

The Deep State’s shadow government hasn’t stopped calling the shots behind the scenes. Comprised of unelected government bureaucrats, corporations, contractors, paper-pushers, and button-pushers who are actually calling the shots behind the scenes, this government within a government continues to be the real reason “we the people” have no real control over our so-called representatives. It’s every facet of a government that is no longer friendly to freedom and is working overtime to trample the Constitution underfoot and render the citizenry powerless in the face of the government’s power grabs, corruption and abusive tactics.

And the American people haven’t stopped acting like gullible sheep. In fact, many Americans have been so carried away by their blind rank-and-file partisan devotion to their respective political gods that they have lost sight of the one thing that has remained constant in recent years: our freedoms are steadily declining.

Here’s the problem as I see it: “we the people” have become so trusting, so gullible, so easily distracted, so out-of-touch and so sure that our government will always do the right thing by us that we have ignored the warning signs all around us.

In so doing, we have failed to recognize such warning signs as potential red flags to use as opportunities to ask questions, demand answers, and hold our government officials accountable to respecting our rights and abiding by the rule of law.

Unfortunately, once a free people allows the government to make inroads into their freedoms, or uses those same freedoms as bargaining chips for security, it quickly becomes a slippery slope to outright tyranny. And it doesn’t really matter whether it’s a Democrat or a Republican at the helm, because the bureaucratic mindset on both sides of the aisle now seems to embody the same philosophy of authoritarian government.

As I make clear in my book Battlefield America: The War on the American People, this is what happens when you ignore the warning signs.

This is what happens when you fail to take alarm at the first experiment on your liberties.

This is what happens when you fail to challenge injustice and government overreach until the prison doors clang shut behind you.

In the American police state that now surrounds us, there are no longer such things as innocence, due process, or justice—at least, not in the way we once knew them. We are all potentially guilty, all potential criminals, all suspects waiting to be accused of a crime.

So you can try to persuade yourself that you are free, that you still live in a country that values freedom, and that it is not too late to make America great again, but to anyone who has been paying attention to America’s decline over the past 50 years, it will be just another lie.

The German people chose to ignore the truth and believe the lie.

They were not oblivious to the horrors taking place around them. As historian Robert Gellately points out, “[A]nyone in Nazi Germany who wanted to find out about the Gestapo, the concentration camps, and the campaigns of discrimination and persecutions need only read the newspapers.”

The warning signs were definitely there, blinking incessantly like large neon signs.

“Still,” Gellately writes, “the vast majority voted in favor of Nazism, and in spite of what they could read in the press and hear by word of mouth about the secret police, the concentration camps, official anti-Semitism, and so on. . . . [T]here is no getting away from the fact that at that moment, ‘the vast majority of the German people backed him.’”

Half a century later, the wife of a prominent German historian, neither of whom were members of the Nazi party, opined: “[O]n the whole, everyone felt well. . . . And there were certainly eighty percent who lived productively and positively throughout the time. . . . We also had good years. We had wonderful years.”

In other words, as long as their creature comforts remained undiminished, as long as their bank accounts remained flush, as long as they weren’t being discriminated against, persecuted, starved, beaten, shot, stripped, jailed and turned into slave labor, life was good.

This is how tyranny rises and freedom falls.

As Primo Levi, a Holocaust survivor observed, “Monsters exist, but they are too few in number to be truly dangerous. More dangerous are the common men, the functionaries ready to believe and to act without asking questions.”

Freedom demands responsibility.

Freedom demands that people stop sleep-walking through life, stop cocooning themselves in political fantasies, and stop distracting themselves with escapist entertainment.

Freedom demands that we stop thinking as Democrats and Republicans and start thinking like human beings, or at the very least, Americans.

Freedom demands that we not remain silent in the face of evil or wrongdoing but actively stand against injustice.

Freedom demands that we treat others as we would have them treat us. That is the law of reciprocity, also referred to as the Golden Rule, and it is found in nearly every world religion, including Judaism and Christianity.

In other words, if you don’t want to be locked up in a prison cell or a detention camp—if you don’t want to be discriminated against because of the color of your race, religion, politics or anything else that sets you apart from the rest—if you don’t want your loved ones shot at, strip searched, tasered, beaten and treated like slaves—if you don’t want to have to be constantly on guard against government eyes watching what you do, where you go and what you say—if you don’t want to be tortured, waterboarded or forced to perform degrading acts—if you don’t want your children to grow up in a world without freedom—then don’t allow these evils to be inflicted on anyone else, no matter how tempting the reason or how fervently you believe in your cause.

As German theologian and anti-Nazi dissident Dietrich Bonhoeffer observed, “We are not to simply bandage the wounds of victims beneath the wheels of injustice, we are to drive a spoke into the wheel itself.”

Let’s Give the CIA the Credit It Deserves

By Norman Solomon

Source: OpEdNews.com

For months now, our country has endured the tacit denigration of American ingenuity. Countless statements — from elected officials, activist groups, journalists and many others — have ignored our nation’s superb blend of dazzling high-tech capacities and statecraft mendacities.

Fortunately, this week the news about release of illuminating CIA documents by WikiLeaks has begun to give adequate credit where due. And not a moment too soon. For way too long, Russia has been credited with prodigious hacking and undermining of democracy in the United States.

Many Americans have overlooked the U.S. government’s fantastic hacking achievements. This is most unfair and disrespectful to the dedicated men and women of intelligence services like the CIA and NSA. Far from the limelight, they’ve been working diligently to undermine democracy not just overseas but also here at home.

Today, the massive new trove of CIA documents can help to put things in perspective. Maybe now people will grasp that our nation’s undermining of democracy is home-grown and self-actualized. It’s an insult to the ingenious capacities of the United States of America to think that we can’t do it ourselves.

Contrary to all the public relations work that U.S. intelligence agencies have generously done for them, the Russians don’t even rank as peripheral to the obstacles and prospects for American democracy. Rest assured, throughout the long history of the United States, we haven’t needed foreigners to get the job done.

In our current era, can Vladimir Putin take any credit for purging huge numbers of African Americans, Latinos and other minority citizens from the voter rolls? Of course not.

Did Putin create and maintain the barriers that prevented many low-income people from voting on November 8? Only in his dreams.

Can the Kremlin hold a candle to the corporate-owned cable TV channels that gave Donald Trump umpteen free hours of uninterrupted air time for speeches at his campaign rallies? Absolutely not.

Could any Russian operation claim more than a tiny sliver of impact compared to the handiwork of FBI Director James Comey as he boosted Donald Trump’s prospects with a pair of gratuitous announcements about a gratuitously re-opened probe of Hillary Clinton’s emails during the last days of the 2016 campaign? No way.

Is Putin anything but a miniscule lightweight in any efforts to manipulate the U.S. electorate compared to “dark money” American billionaires like the Koch brothers? Give us a break.

And how about the Fourth Amendment of the U.S. Constitution? The Kremlin can only marvel at the way that the CIA, the NSA and the bipartisan leadership in Washington have shredded the Fourth Amendment while claiming to uphold it.

To sum up: The CIA’s efforts to tout Russia add up to jaw-dropping false modesty! The humility of “deep state” leaders in Langley is truly awesome.

Let’s get a grip. Overwhelmingly, the achievements of thwarting democracy in America have been do-it-yourself operations. It’s about time that we give adequate credit to the forces perpetuating this country’s self-inflicted wounds to American democracy.

To loosely paraphrase the beloved comic-strip character Pogo, when the subject is grievous damage to democracy at home, “We have met the ingenuity and it is U.S.” But we’re having a terrible time recognizing ourselves.

Vault 7: CIA Hacking Tools Revealed

Source: WikiLeaks

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

 

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.