Data governance and the new frontiers of resistance

The 21st century corporation is using algorithmic-based intelligence to accumulate data on a massive scale. Social movements need to grasp this change quickly.

By Anita Gurumurthy and Nandini Chami

Source: ROAR

Four centuries after the East India Company set the trend for corporate resource extraction, most of the world is now in the grip of unbridled corporate power. But corporate power is on the cusp of achieving “quantum supremacy” and social movements in the digital age need to understand this in order to shift gears in their struggles. The quantum shift here comes from “network-data” power; the ingredients that make up capitalism’s digital age recipe.

Contemporary capitalism is characterized by the accumulation of data-as-capital. Big Tech, as digital companies are collectively known, use the “platform” business model. This model provides a framework for interactions in the marketplace by connecting its many “nodes” — consumers, advertisers, service providers, producers, suppliers and even objects — that comprise the platform ecosystem, constantly harvesting their data and using algorithms to optimize interactions among them as a means to maximize profit.

The platform model emerged as a business proposition in the early 2000s when internet companies offering digital communication services began extracting user data from networked social interactions to generate valuable information for targeted advertising. It is estimated that by 2025, over 30 percent of global economic activity will be mediated by platform companies, an indication of the growing “platformization” of the real economy. In every economic sector, from agriculture to predictive manufacturing, retail commerce and even paid care work, the platform model is now an essential infrastructural layer.

Control over data-based intelligence gives platform owners a unique vantage point — the power to shape the nature of interactions among member nodes. Practices such as Amazon’s segmenting and hyper-targeting of consumers through price manipulation, Uber’s panoptic disciplining of its partner drivers, and TripAdvisor’s popularity ranking algorithm of listed properties, restaurants and hotels are all examples of how such platforms mediate economic transactions. The accumulation of data that feeds algorithmic optimization enables more intensified data extraction, in a self-propelling cycle that culminates in the platform’s totalizing control of entire economic ecosystems.

Amazon for instance, is no longer an online book store, and was perhaps never intended to be. With intimate knowledge about how the market works, Amazon is a market leader in anticipatory logistics and business analytics, providing both fulfillment and on-demand cloud-based computing services to third parties. Not only has it displaced traditional container-freight stations in port cities, it has begun to look increasingly like a shipping company. The dynamics of an intelligence economy have led to large swathes of economic activity being controlled by a handful of platform monopolies.

Studies suggest that in a matter of a couple of decades, platform monopolies have overtaken oil, automobile and financial corporations in market capitalization. Today, platform-based business models account for seven of the world’s top eight companies ranked by market capitalization. The pan-global platform corporation, with its DNA of data-based intelligence, has replaced the trans-national industrial corporation as the Leviathan of our times.

Enter the intelligent corporation

As the dominant form of economic organization in the capitalist world order, the corporation has always wielded power, not just in the market but also in political and socio-cultural realms. The rise of the “intelligent corporation” defined by the political economy of data capital has produced qualitative shifts in the exercise of corporate power, including the following.

From dominating the market to becoming the market

Like its predecessor, the intelligent corporation also aims at complete market domination. In platform-based capitalism, local business models based on intimate contextual knowledge are completely displaced by the data-based intermediation of marketplace and social transactions. It is by eliminating these disparate pockets of capital accumulation that platform owners maximize their profits.

The intelligent corporation also goes a step further, moving beyond “dominating the market” to “becoming the market.” Integrating across business lines, these companies both operate a platform and promote their own goods and services on it. This places them in direct competition with the businesses that use their infrastructure, and creates a conflict of interest. For example, Amazon uses its product marketplace data to consolidate its private labels, launching high-demand products at prices that undercut third-party sellers.

In this new strategy for acquiring market power, long-term market monopolization is privileged over the ability to break-even in the short run. The ecosystem that a platform seeks to capture has room only for one winner with the wherewithal to forgo immediate profits and invest in business integration — through aggressive acquisition — and systematic data-layer development. Other competitors are destined to fall by the wayside.

From cheap labor to freedom from labor

In the capitalist economy, the key contradiction is between capital and labor. Capital is in a perennial quest for freedom from labor through labor-substituting technological advances and territories to shift production to reduce labor costs. In the intelligence economy, capital seems to have come very close to realizing its primordial pursuit.

Using 360° surveillance, the intelligent corporation creates a self-optimizing ecosystem, manipulating each node, expanding its captive network, accumulating data capital and entrenching its dominance. It is able to achieve a global operational footprint with few assets and a minuscule employee base. Think Uber. Uber drivers are not considered to be employees in most places where the company runs its business. With a god’s eye view of the city and its roads, the customers and the driver, Uber takes over city transport, often without owning a single taxi. Passing off the liability to the driver, who must take a high-interest loan to acquire a vehicle to become Uber’s coveted “partner,” the corporation extracts from the driver more than just labor time.

In traditional labor-intensive manufacturing and services sectors, data capital is slowly but surely affecting far-reaching transformation. Projections show that automation based on artificial intelligence (AI) will eventually displace labor. It is estimated that over 40 percent of the global workforce will lose their jobs in AI-led disruption of manufacturing over the next 15–25 years. A limited number of high-paying jobs may open up for individuals with advanced skills in the development of data and AI technologies. But most of the labor force will end up in low-paid, personalized service work.

For countries in the Global South, the challenge will be especially pernicious. As rising wages erode the comparative advantage of labor in these economies, the shift to AI technology is likely to trigger a re-shoring trend whereby factories are relocated to richer countries that offer more sophisticated infrastructural support for deployment of AI systems. According to the World Bank, over two-thirds of the workforce in developing countries are likely to lose jobs. It is not clear how these changes will shift gender-based segmentation and gender hierarchies in labor markets. However, going by current trends, women seem to be the first to lose their jobs in this transition, with a reversal of both pay and status gains.

Planetary-scale time-space enclosure

Capturing previously non-commodified time and place has always been a central strategy of capitalist expansion. In the intelligence economy, we are witnessing a new phase of such “primitive accumulation” – through “data dispossession.” The expropriation of data from everyday social exchanges through the platform business model is comparable to the expropriation of natural resources for capitalist production in a previous age. The pervasive data extraction by platform companies has transformed data-mined social interaction into a factor of production, just as invaluable a resource as land for the creation of goods and services. The centralization of wealth and power today, derives from an unprecedented quality and scale of dispossession.

The dynamic of data dispossession is self-propelling. It is now well understood that platforms aggressively pursue a strategy of locking-in users, offering instant gratification in exchange for data and making it costly for them to leave a platform. The Chinese “super-platforms” WeChat and Meituan-Dianping combine news, entertainment, restaurant reviews, food delivery and ride-hailing, along with cross-cutting applications such as payment systems and digital wallets, demonstrating a “stickiness” that is almost addictive.

When participation in the platform on the platform owner’s terms becomes de facto the only choice for economic actors, data extractivism is normalized. Similar to the predatory practices of historical colonialism, the platform tactics of the intelligent corporation function as a neo-colonial project. The difference is that this time around, rather than European companies, the US and Chinese platform companies are in the driving seat.

A profoundly unsustainable exploitation of the natural world accompanies the rapid inroads of the intelligent corporation. Take the case of the vast ecological footprint of the online food-delivery sector. According to a 2018 study published in the science journal Resources, Conservation and Recycling, door-to-door fast-food delivery in China accounted for a nearly eightfold jump in packaging waste between 2015 and 2017, from 0.2 to 1.5 million tonnes. This has coincided with the exponential growth of the sector in the country, where the number of customers using food-delivery platforms has gone up from zero in 2009 to 406 million by the end of 2018! The intelligence economy is a veritable resource guzzler whose network data devices are expected to be consuming about one-fifth of global electricity by 2030 just to keep going.

The loss of self-determination for individuals and communities in these new intelligence-based modes of production reflects an asymmetry in power that was previously impossible. This is the route through which the brand-new corporation colonizes bodies and nature, takes control of production and social reproduction, and intensifies accumulation on a global scale.

The “deep corporate” and the death of the social contract

It is no secret that in the digital era, the deep state has had a makeover. Edward Snowden’s revelations and witness testimonies from China’s Uighur-dominated Xinjiang have exposed the dark workings of the contemporary military–industrial complex, the unholy nexus between Big Tech and the state. Trade justice activists have constantly pointed to the “hidden hand” of Silicon Valley and Chinese corporations using their governments to bat for their interests, reducing policy decisions to executive fiats for entrenching their power.

But what is only recently coming to light is the rise of the “deep corporate” — the extension of the Kraken-like tentacles of intelligent corporations into the heart of public life. The subsuming of social life by platform capitalism has distorted the political space thanks to the echo chambers of the automated public sphere. The contagion of mispropaganda and informational warfare in political campaigning has become impossible to contain in a public sphere determined by algorithmic filters. In this scenario, deliberative democracy itself is under the threat of extinction.

The social credit system being developed by China in partnership with eight tech companies takes the “corporatization” of governance to a whole new level. Access to benefits and citizens’ guaranteed rights are now predicated on behavioral scoring on the basis of online purchase history, financial transactions and social media connections on the partnering platforms. With the archetypal “good consumer” becoming the deserving citizen, citizenship is thus dislocated from political claims. The “deep corporate” acquires the formal authority to mediate the social contract.

Living with the intelligent corporation

We are living through a phase in capitalism that is marked by extreme market concentration, unprecedented inequality in wealth and the declining share of labor in global income; a state of affairs that has led even the IMF to express caution. It is no coincidence that this period of intensified economic injustice has coincided with the rise of platform capitalism and its real-world vehicle, the intelligent corporation.

What does living with the intelligent corporation mean?

What is new about this phase of capitalism that has spawned the intelligence economy is a deeply qualitative shift. Datafication and data capital transform the way capitalist “accumulation by dispossession” happens. “Intelligencification” makes plausible a planetary-scale colonization and commodification of everyday life by the new corporation in ways previously impossible. Both nature and caring bodies are trapped in a planetary enclosure insofar as everything and everybody can be turned into data.

It also feeds off and emboldens the financialization apparatus that runs the neoliberal economy. Through the perverse confluence of data and finance, the intelligent corporation universalizes and naturalizes its authority, destroying the marketplace of things and ideas.

Through data extractivism, the intelligent corporation ravages sociality, taking the ideological project of neoliberalism all the way to the expropriation of the political. This is a deep take-over, an “ontological encroachment” of human subjectivity.

Where does all this leave us?

As UNCTAD has highlighted, the pace of concentration of market power is extremely worrying. Consider this: Amazon’s profits-to-sales ratio increased from 10 percent in 2005 to 23 percent in 2015, while that of Alibaba increased in just four years from 10 percent in 2011 to 32 percent in 2015.

Policymakers across the world are struggling to reform their legacy laws to rein in the intelligent corporation. Even the domestic governments of powerful US and Chinese platform corporations are struggling to contain their excesses. The US Federal Trade Commission (FTC) is currently investigating Amazon and Facebook for abuse of market dominance while the US Justice Department is probing Google. The state of California is facing massive resistance from Uber and Lyft to its new regulation for labor rights of “gig” workers, with the two companies currently leading a $60 billion ballot initiative to extricate themselves from employer’s liability. In November 2019, the state administration for market regulation in China had to hold a meeting with Alibaba and other online retail platforms about their strong-arming of third-party vendors, in violation of existing regulations to curb anti-competitive conduct.

The loopholes of pre-digital taxation laws based on a physical presence in a given country have been effectively exploited by platform companies to escape tax liability, through profit shifting to low-tax jurisdictions. Similarly, when faced with liability for unfair market practices in overseas markets, it is very easy for platform companies to shift liability to their parent company outside the jurisdiction. For instance, Uber in South Africa resorted to the defense that its partner drivers were employees of the parent company headquartered in the Netherlands and not the South African subsidiary, in order to evade its liabilities under existing labor laws. The lack of binding international regulations governing cross-border data flows has also aided rampant data extractivism,

More recently, in the wake of malpractice lawsuits brought against Big Tech by their own employees; exposes about founding CEOs who have enjoyed a godly status; and public disenchantment with multiple revelations of clandestine data mining and algorithmic gaming, the early sheen seems to be wearing off. Google’s parent company Alphabet can no longer use its “Do the right thing” motto without irony. Facebook has been forced to switch to the “too big to fail” defense from the “protector and defender of the freedoms of the global community” line. Alibaba may not be able to proclaim its commitment to the development of small and medium enterprises in Africa for much longer. The façade has crumbled. And this rupture in the discursive hegemony of the intelligent corporation in which we are currently situated is the right moment to mount a collective challenge.

So, resist we must, so that the wealth of data and of networks can be appropriated and used to create a just and humane society. This means taking the intelligent corporation by the horns, and forging a movement that is able to grapple with the ethical–political boundaries of digital intelligence.

Taming the Leviathan and reclaiming the planet

Given the enormous economic and political clout of the modern corporation in the age of data, unshackling people and the planet from corporate power is an urgent task. Struggles against the extreme unfairness of the global trade and intellectual property regime by transnational social movements have shown the necessary connection between the agenda for development justice and the dismantling of corporate power.

Building alliances among movements has become a vital strategy in halting TNCs’ inexorable plunder. The trade justice movement against corporate globalization, the environment movement’s quest for sustainable development, feminist struggles to reclaim the body and the sphere of social reproduction from capital and workers’ struggle against the intensified squeeze on labor and the dismantling of social protection in neoliberal globalization are inspiring examples in this regard. Transnational civil society has painstakingly built alliances and solidarities across these movements to expose corporate excess, bringing pressure on the UN for a global binding treaty on TNCs’ human rights obligations in the face of near-insurmountable odds.

In the digital age, as corporate power assumes indomitable proportions — with tech CEOs carving out data dominions that they rule over — current frameworks of power analysis and action may not go very far. A concerted and coherent strategy is urgently needed in order to enable a more equitable distribution of the gains of data-based intelligence. The Digital Justice Manifesto released in November 2019 by the Just Net Coalition — through a process of strategic and sustained dialogue between digital rights, trade justice, feminist, environmental, labor and human rights groups and activists — outlines such a roadmap. As the Manifesto underlines, we need immediate action along three broad fronts to reclaim digital power from the intelligent corporation:

(a) Wrestling back ownership of our personal and collective data and intelligence by instituting an economic rights framework for data resources.

(b) Governing critical platform infrastructures as public utilities.

(c) Enforcing a local-to-global governance model for digital and data infrastructure that supports local economies and democratic self-determination of collectivities, preventing the enclosure of entire market and social ecosystems by a centralized intelligence. In other words, the governance of tech infrastructure must enable the flourishing of disparate local economies and make room for multiple platform models to function — co-operatives, social enterprises, public etc. — challenging the totalizing impetus of global intelligence capitalism.

Neoliberal globalization and financialization have led to profoundly unequal societies. The impunity of the TNC has been central to this dynamic. Social movements have placed several creative proposals to counter this: mandating charter renewal every five years overturning the principle of corporations’ perpetual legal existence; taxing stock trade on the basis of the holding period to contain excessive financial speculation; placing a cap on the individual assets of founders/CEOs and so on.

“Intelligencification” demands a new frontier for resistance. The power of the intelligent corporation must be contained through tactics small and big in political and cultural realms. A new wisdom about the governance of data must be explored for a truly emancipatory future for all.

Censorship Is the Way that Any Dictatorship — and NO Democracy — Functions

By Eric Zuesse

Source: Strategic Culture Foundation

No democracy can survive censorship. If there is censorship, then each individual cannot make his/her own decisions (voting decisions or otherwise) on the basis of truth but only on the basis of whatever passes through the censor’s filter, which is always whatever supports the censoring regime and implants it evermore deeply into the public’s mind — regardless of its actual truthfulness.

The public does have a mind, as a collective constituting the majority of the residents in the given land, which majority rules any democratic government. If the government doesn’t really represent the majority, it’s no democracy, at all, but instead represents other individuals, the real rulers, who might be hidden. Consequently, if a democracy exists but a censor somehow becomes allowed, and emerges into existence in a given land, then democracy will inevitably be snuffed-out there, and dictatorship will inevitably be the result — merely because censorship has been applied there, which blocks some essential truths (truths that the rulers don’t want the public to know) from reaching the public.

Nothing is as toxic to democracy as is censorship. Censorship prevents democracy.

If a dictatorship already exists in a given land, then it does so by means of censorship, because only by that means will the public be willing to pay taxes to the regime and to go to war for it and to kill and die for it. Without censorship, none of that could happen, except in an authentic democracy. An authentic democracy has no censorship.

This is why democracy is so rare. Almost every dictatorship calls itself a ‘democracy’. But a government which calls itself “democratic” isn’t necessarily democratic, but more likely it has simply fooled its public to think that it is one (such as the United States has by now been scientifically proven to be — an actual dictatorship).

Anyone who endorses censorship is a totalitarian, a supporter of totalitarianism, even without recognizing the fact. If the person fails to recognize the fact that censorship is applied only in a totalitarian regime, then that person has bought into the most basic belief of totalitarianism: the idea that censorship can be justified in some circumstances. Dictatorships always pump that lie, so as to be able to continue to exist as a dictatorship. There is no circumstance which ever can justify censorship, unless one believes that dictatorship is, or can be, good instead of bad.

If you think that some censorship is good, then you have bought into the fundamental belief that is promulgated in any dictatorship. It’s a lie, but it fools the majority of people, in a dictatorship.

No writing, nor any other statement, should ever be censored, no matter how vile it is. Indeed, if it is vile, then it needs to be exposed, not hidden; because, if it is hidden, then it will fester until it grows in the dark and finally becomes sprung upon a public who have never been inoculated against it by truth, and therefore the false belief becomes actually seriously dangerous and likely to spread like wildfire, because it had been censored before it became public. The most deadly infections are those that grow in the dark and then become released upon a population who have no pre-existing protection against it.

Every religion, and every evil regime, seeks to censor-out whatever contradicts its propaganda, and is therefore intrinsically hostile toward democracy, but the danger is always being presented not by the writers and speakers of the propaganda, but by its publishers (regardless of media: print, broadcast, or online) — they are the source of all censorship. They are the censors. The people who select what to publish, and what not to publish, are the censors. The regime’s media are what perpetrate censorship, routinely, because those media are actually essential arms of the dictatorship, even if they are not directly owned by the government but instead by the clique who actually possess control over the government because they possess control over the mainstream (and much of the non-mainstream) media and thus the public’s mind in a ‘democracy’ in order to make it the dictatorship that it actually is.

Much has been written about how this censorship has been perpetrated in the post-WW-II (post-26-July-1945) USA., such as here, and here, and here, and here. (All of that has been censored-out from the major media — they don’t report that they represent the regime instead of the public.) As a consequence of that censorship against truth, history is being revised to be ‘history’ so as to portray a false ‘reality’ to people today. And there are numerous other examples of this, by the U.S. regime, each instance, of which lying, is affirmed as being truth by the regime’s agents, but is actually nothing more than vicious lies that are spread by the regime and its agents. What goes on behind the scenes is hidden from the American public, not really in order to protect them, but purely in order to deceive them. The deception of the American people, and of the residents in all of the U.S. Government’s foreign vassal-states (or ‘allies’) in Europe and elsewhere, is extreme, in all fields of international relations. Whereas Julian Assange was the world’s strongest enemy against censorship, he has been almost ten years now under some form or another of imprisonment, including solitary confinement and torture, all without ever having been convicted of anything, and all because he is an enemy against censorship instead of a flak for censorship. And Twitter and other ‘social media’ are hiding from the public — censoring — the sheer outrageousness of it all.

The solution to the problem of lies is not censorship, it is banning censorship. On 7 June 2019, the need for this seemed even clearer to me after Russia’s RT headlined on that date “Glenn Greenwald rips liberals who ‘beg for censorship’”, and that brilliant lawyer and investigative journalist presented powerfully the case against any censorship at all. As one can see from the accompanying video interview there of him, Greenwald was like a force of nature, in that video, or (to use a different metaphor) a huge dose of mental draino for clogged minds.

This also means that issues of libel and slander are only to be addressed in the civil courts, and not, at all, in the government’s prosecutions, the criminal courts.

All censorship needs to be banned. The question therefore becomes: How can this be done? That’s a question I have never seen discussed, perhaps because it is being censored. It’s a very serious question. Any ‘political science’ which exists that has no extensive literature about this question is fake. Perhaps draino for clogged minds is needed especially for scholars.

Things are worse than we know, because censorship exists. Maybe censorship is pervasive.

So: I shall venture a solution to this problem: By law, all media which discuss national and/or international affairs will fire all editors and producers of “news,” but not the employees who have only managerial, presentational, and/or stylistic assignments, and replace these people (all personnel who select what to present and what not to present) by a randomized algorithm being applied to each topic, so that, if, for example, something is entered into a search-box, then the order or presentation of the findings will be listed either (at the user’s selection) from earliest-posted to latest-posted, or latest-posted to earliest-posted, but not by anything that is chosen or determined by the search-engine itself. (In other words: no search-engine will be allowed to censor.) On print or broadcast media, every news-piece will be controlled in real time by its audience so as to determine what the questions are and then to bring into the presentation randomly selected scientifically qualified experts regarding each such question. For example: on the question of climate-change, the experts would be individuals who have terminal graduate-level degrees in each of the related climatology sub-specialties, such as those listed at Wikipedia, but also in essential related fields such as economics (an important climatological sub-specialty that’s not listed there). If, indeed, over 90% of climatologists agree that man-made global warming is a reality, then the result of this method of selecting the “experts” who will be presented is that that viewpoint will be represented by over 90% of the experts — and this outcome would not be controlled by the given ‘news’-medium, nor affected by its advertisers. In other words: only the subject-matter and academic qualifications — no governmental positions or background — would qualify individuals as being “experts” on the given topic. If a terminal degree isn’t a qualification for expertise on a topic, then what is? Aren’t government officials supposed to be relying on them? And if, for example, the topic is Syria, then shouldn’t all individuals who have terminal degrees on Syria be the “experts” who are invited, on a randomized basis, to comment to the public about Syria-related issues? If that were the case, then perhaps many Americans would know that the U.S. and NATO “began operations in April- May 2011 to organize and expand the dissident base in Syria,” “organizing defectors in Syria,” and “smuggle U.S. weapons into Syria, participate in U.S. psychological and information warfare inside Syria” to produce regime-change there, and that Syria had never posed any threat to U.S. national security. And Barack Obama was hoping for such opportunities to overthrow Syria’s Government even when he became President in 2009. If the American public didn’t know those things at the time, then perhaps America’s censorship was total — which would indicate how absolutely crucial a randomization of the public’s information-sources is, so as to replace the power that the existing mainstrean ‘news’-media have over the public’s mind, in America, and in its vassal-nations (which don’t yet include Syria). If the public do not have unprejudiced — which means entirely uncensored — information presented routinely to them, then democracy isn’t even possible.

Anyway: that is one proposed way of replacing censorship, and overcoming dictatorship. How many politicians are proposing such changes? Why aren’t any? Are all of them afraid of the dictators? Is there no basis for hope, at all?

Freedom Rider: The Internet Does Washington’s Dirty Work

By Margaret Kimberly

Source: Black Agenda Report

As long as the internet is in private hands it should be seen as a “frenemy” — a useful resource that can also be wielded as a weapon.

“Black people are routinely sent to “facebook jail” if their words anger racist white people.”

In its early days the internet seemed to be an undisputed good, a means of communication open to all. It was hoped that these new platforms would level the playing field and give smaller outlets like Black Agenda Report access to a worldwide audience. The internet has done that but it is also a weapon that is used against the left in this country and against nations and movements declared enemies by this government.

In the rush of enthusiasm one important fact was forgotten. The internet is in the hands of private corporations. They decide who gets service, where they get it and at what speed. The growth of social media only exacerbated the problems of corporate control.

This columnist uses Facebook and Twitter and other platforms by necessity. They are sources of information and important means of communication. But they are controlled by powerful corporate entities who work hand in hand with the government. Ultimately they decide who can be seen and who cannot.

“Private corporations decide who gets service, where they get it and at what speed.”

When the U.S. government speaks, Facebook and Twitter listen and then do as they are told. When foreign governments are declared adversaries their representatives and advocates are censored. In the past year, the Syrian government and the Venezuelan government have been temporarily blocked on Twitter. Sites such as Telesur have been repeatedly removed from Facebook. Numerous Palestinian advocacy sites have been removed from Facebook at the behest of the Israeli government.

Facebook decides if “community standards” have been violated and restrict anyone who violates their opaque rules. Black people are routinely sent to “facebook jail” if their words anger racist white people.

But the loss of access is not the biggest problem. When the United States government killed Iranian general Qassem Soleimani they also wanted to kill off his memory. Facebook posts which spoke of him in any favorable light were removed. Facebook isn’t alone in joining the governmental directive. The Iranian English language service, Presstv, was removed from Youtube, which is owned by Google. Years of reporting and interviews, including some given by this columnist, disappeared into the black hole of cyberspace. When the U.S. began ratcheting up its maximum pressure, the corporate sector went right along and Presstv was sent down the memory hole.

“Presstv was removed from Youtube, which is owned by Google.”

Censorship has gotten worse because of liberals, not conservatives, and they have used the Russiagate fraud to accelerate the deplatforming process. Immediately after the 2016 election we were told that the Russian government was responsible for Trump’s victory and that censorship was the only thing standing between us and living under the control of Vladimir Putin.

The infamous Proporornot  list declared that Black Agenda Report and other sites were under Russian influence. Ever since that list was published in late 2016 many left sites lost visibility on Google and other search engines.

Now Trump administration sanctions are impacting our ability to communicate in a variety of ways. Not only were references to Soleimani removed, but the use of the word “Iran” can result in censorship and the inability to complete financial transactions. The Grayzone project  reported that Paypal restricted donations from anyone who mentioned the word Iran.

It must be repeated that Trump has plenty of help from Democrats and liberals in this regard. Pleas for Facebook “fact checking” will result in more censorship of black people and of anyone who happens to voice opinions that run counter to the imperialist narrative.

“The use of the word “Iran” can result in censorship.”

Already Russia is being blamed for election interference, yet Russia is not the target. The left is the target and Democrats are leading the charge. Their goal is to narrow discourse and to make war propaganda acceptable. It is an irony and a contradiction that while Trump is falsely accused of being under Russian influence, his policy goals are furthered with help from liberals. U.S. imperialism is a thoroughly bipartisan project.

This collusion between the wings of the duopoly must be kept in mind during the farcical impeachment. The Democrats could have added the war crime of the Soleimani assassination to their articles of impeachment. But they are complicit in this regard and will mention nothing of substance. Instead they have only one flimsy charge that is a cynical get out the vote effort and a source of anti-Russian propaganda.

As long as the internet is in private hands it should be seen as a “frenemy,” a useful resource that can also be wielded as a weapon. These platforms cannot be trusted unless or until they are publicly regulated. In the meantime, our reliance on them comes at a price.

How Government and Media Are Prepping America for a Failed 2020 Election

FILE – In this May 6, 2019, file photo Microsoft CEO Satya Nadella delivers the keynote address at Build, the company’s annual conference for software developers in Seattle. Microsoft says it has detected more than 740 infiltration attempts by nation-state actors in the past year targeting U.S.-based political parties, campaigns and other democracy-focused organizations including think tanks and other non-profits. (AP Photo/Elaine Thompson, File)

Russia, China and Iran are already being blamed for using tech to undermine the 2020 election. Yet, the very technologies they are allegedly using were created by a web of companies with deep ties to Israeli intelligence.

By Whitney Webb

Source: Mint Press News

As World War II drew to a close in Europe, British philosopher Bertrand Russell wrote that “neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of a great fear.”

Though numerous examples in the post-World War II era have proven Russell’s point, perhaps one of the best examples was the U.S. public’s willingness to swallow lie after lie about Saddam Hussein’s Iraq due to the climate of fear that followed the September 11 attacks. Those lies, propagated by dubious intelligence, government officials and a compliant media, resulted in catastrophes – large and small, both abroad and at home.

Today, an analogous narrative is being crafted by many of the same players – both in media and government – yet it has avoided scrutiny, even from independent media.

Over the past several months and with a renewed zeal in just the last few weeks, anonymous intelligence officials, dubious “experts” and establishment media outlets have crafted a narrative about the coming “chaos” of the 2020 election, months before it takes place. Per that narrative, certain state actors will use specific technologies to target the “American mind” in order to undermine the coming presidential election. The narrative holds that those efforts will be so successful that the U.S. will never recover as a democracy.

Though these anonymous government sources and their stenographers have already named the countries who will be responsible and the technologies they will use, they also admit that no evidence yet exists to back up these claims, meaning they are — at best — pure speculation.

Headlines such as “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” “Basically Every US National Security Leader Is Warning About Foreign Interference In The 2020 Election,” and “U.S. intel agencies: Russia and China plotting to interfere in 2020 election” have become increasingly common, despite no available evidence, as have warnings that the American public is defenseless against the old scourge of “fake news” and the new scourge of “deep fakes.” Some media reports have gone so far to say that actual foreign meddling isn’t even necessary as merely the fear of foreign meddling could be enough to upend the American political system beyond repair.

Historically, the goal of such fear-inducing narratives has been the trading of civil liberties for increased security, or rather, the appearance of increased security. Yet, when the need for security is felt due to a fear that is based on government-driven speculation and not on evidence, the goal of that narrative is not about protecting the public from a real, tangible threat but instead about the consolidation of power by the very groups responsible for crafting it — in this case, the intelligence community and other key players in the national security state.

However, what is particularly odd about this narrative surrounding imminent “chaos” and meddling in the upcoming 2020 election is the fact that, not only have the instruments of said meddling been named and described in detail, but their use in the election was recently simulated by a company with deep ties to both U.S. and Israeli intelligence. That simulation, organized and run by the Israeli-American company Cybereason, ended with scores of Americans dead, the cancellation of the 2020 election, the imposition of martial law and a spike in fear among the American populace.

Many of the technologies used to create that chaotic and horrific scenario in the Cybereason simulation are the very same technologies that U.S. federal officials and corporate media outlets have promoted as the core of the very toolkit that they claim will be used to undermine the coming election, such as deep fakes and hacks of critical infrastructure, consumer devices and even vehicles.

While the narrative in place has already laid the blame at the feet of U.S. rival states China, Russia and Iran, these very technologies are instead dominated by companies that are tied to the very same intelligence agencies as Cybereason, specifically Israeli military intelligence.

With intelligence agencies in the U.S. and Israel not only crafting the narrative about 2020 foreign meddling, but also dominating these technologies and simulating their use to upend the coming election, it becomes crucial to consider the motivations behind this narrative and if these intelligence agencies have ulterior motives in promoting and simulating such outcomes that would effectively end American democracy and hand almost total power to the national security state.

 

Media, intelligence foreshadow tech-powered doom for 2020

Even though the 2020 U.S. election is still months away, a plethora of media reports over the past six months (and even before then) have been raising concern after concern about how the U.S. election is still so vulnerable to foreign meddling that such meddling is essentially an inevitability.

Part of the reason for the recent pick-up in fear mongering appears to have been the release of a joint statement issued by key members of the Trump administration last November. That statement, authored by Attorney General Bill Barr, Defense Secretary Mark Esper, acting DHS Secretary Kevin McAleenan, acting Director of National Intelligence Joseph Maguire, FBI Director Christopher Wray, NSA Director Gen. Paul Nakasone, and Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs, claimed that foreign interference in 2020 was imminent despite admitting that there is no evidence of interference having taken place:

Our adversaries want to undermine our democratic institutions, influence public sentiment and affect government policies. Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions. Adversaries may try to accomplish their goals through a variety of means, including social media campaigns, directing disinformation operations or conducting disruptive or destructive cyber-attacks on state and local infrastructure.

While at this time we have no evidence of a compromise or disruption to election infrastructure that would enable adversaries to prevent voting, change vote counts or disrupt the ability to tally votes, we continue to vigilantly monitor any threats to U.S. elections (emphasis added).”

Despite the key caveat of there being no evidence at the time the statement was issued, media reports used the statement to claim that foreign interference in 2020 was imminent, such as in these reports from BuzzFeed, ABC News, and Newsweek.

In addition to the reports that have cast the involvement of state actors — namely Russia, Iran and China — as assured despite no evidence, other reports have made the claim that this allegedly imminent interference will inevitably be successful, largely due to claims that the tactics used will rely heavily on technology that the U.S. can’t hope to successfully counter. CSO Online, an online news outlets that provides news, analysis and research on security and risk management, recently warned that “fixing America’s voting and election infrastructure problems is a long-term proposition, one that won’t be fixed in time for the election in November” while the New York Times warned of imminent chaos and that “stealthier” malevolent foreign actors had already created the foundation for “an ugly campaign season marred by hacking and disinformation.” Wired claimed last year that U.S. election security “is still hurting at every level.”

In another example, Rolling Stone published an article earlier this month with the headline “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” which claims that “the reality is that: “We’ve made progress since the last election — but we’re much less secure than we should be.” The article goes on to say that claim that the goal isn’t necessarily to hack voting machines or change results, but “to merely create the impression of an attack as a way to undermine our faith in the electoral process.”

It continues:

The target is the minds of the American people,” says Joshua Geltzer, a former counterterrorism director on the National Security Council. “In some ways, we’re less vulnerable than we were in 2016. In other ways, it’s more.” Nearly every expert agrees on this: The worst-case scenario, the one we need to prepare for, is a situation that causes Americans to question the bedrock of our democracy — free and fair elections.”

Well before this type of rhetoric made its way into the U.S. media, Israeli intelligence-linked tech firm Cybereason claiming in a release on its website that “messing with a voter’s mind” would have a bigger impact than changing vote totals, even before the 2016 election. That release, published by Cybereason prior to the last presidential election, was authored by the company’s CEO, Lior Div, who used to lead offensive hacking operations against nation-states for Israeli military intelligence.

Notably, of all of these media reports, there is a clear consensus that one of the main tactics that will soon be used to meddle in the coming U.S. election will be the use of so-called “deep fakes.” Deriving its name from a combination of “deep learning” and “fake,” deep fakes involve video and audio that has been manipulated using artificial intelligence (AI) to create media that appears to be authentic, but is not. Concern about its use in the upcoming election has spurred not only a wealth of media reports on the matter but has prompted both the U.S. military and Congress to take action to limit its potential misuse.

One thing that stands out about the media narrative regarding election meddling and deep fakes is that several news organizations have published articles that state that deep fakes will be used to undermine the 2020 election, as opposed to stating that they could be used or that they are a phenomenon worthy of attention (though some reports have taken this more measured approach).

The reason for this level of confidence may owe to statements made by prominent U.S. intelligence officials last year, including those made by Dan Coats, the former Director of National Intelligence (DNI), who claimed in the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community that deep fakes and other hi-tech forms of fake media would be used to disrupt the 2020 election. Coats specifically stated:

Adversaries and strategic competitors probably will attempt to use deep fakes or similar machine-learning technologies to create convincing—but false—image, audio, and video files to augment influence campaigns directed against the United States and our allies and partners.”

Since Coats made the warning, numerous media reports have promoted the concern with little scrutiny, representing just one of the numerous times in U.S. history where narratives first authored by U.S. intelligence are subsequently promoted heavily by U.S. media, even when the claim made by intelligence officials is speculative, as it is in this case. Indeed, the narratives being promoted with respect to the 2020 election involve many of the same intelligence agencies (American and Israeli) and media outlets who promoted claims that were later proven false about “weapons of mass destruction” in Iraq prior to the 2003 invasion, among other pertinent examples.

Notably, deep fakes figured prominently and was the tool most used by malevolent hackers in Cybereason’s 2020 election simulation, which saw both video and audio-only deep fakes used to spread misinformation on national and local TV channels in order to impersonate police officers and election officials and to create fake bomb threats by posing as the terror group Daesh (ISIS). Cybereason also happens to be a partner of the organization funding the most well-known creator and producer of deep fakes in the world, an organization that — much like Cybereason itself — is openly tied to Israeli intelligence.

Aside from deep fakes, other technologies weaponized in Cybereason’s election simulation have also been the subject of several media reports, such as the hacking of Internet of Things (IoT) devices and appliances and even the hacking of vehicles that have some form of internet connectivity.  In the Cybereason simulation, IoT hacks were used to cut power to polling stations and disseminate disinformation while vehicles were hacked to conduct terror attacks against civilians waiting in line to vote, killing several and injuring hundreds.

Most media reports have claimed that these technologies will be part of the coming “explosion” in cyber warfare in 2020 and do not specifically link them to imminent election meddling. Others, however, have made the link to the election explicit.

 

Naming the culprits in advance

In addition to the apparent consensus on how foreign meddling will occur during the 2020 election, there is also agreement regarding which countries will be responsible. Again, this is largely based on statements made by U.S. national security officials. For instance, the joint statement issued last November by the DOJ, DOD, DHS, DNI, FBI, NSA, and CISA regarding 2020 election security, states that “Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions” before adding “at this time we have no evidence.”

Similarly, the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community, written by then-Director of National Intelligence Dan Coats, names these same three countries in relation to imminent 2020 election interference and states that their interference in the 2020 election is “almost certain.” The assessment adds the following about each nation:

  • Russia: “Russia’s social media efforts will continue to focus on aggravating social and racial tensions, undermining trust in authorities, and criticizing perceived anti-Russia politicians.”
  • China: “China will continue to use legal, political, and economic levers—such as the lure of Chinese markets—to shape the information environment. It is also capable of using cyber attacks against systems in the United States to censor or suppress viewpoints it deems politically sensitive.”
  • Iran: “Iran, which has used social media campaigns to target audiences in both the United States and allied nations with messages aligned with Iranian interests, will continue to use online influence operations to try to advance its interests.”

Coats’ assessment was enough to spawn numerous stories on the imminent threat that these three nations pose to the 2020 election, with headlines such as “U.S. intel agencies: Russia and China plotting to interfere in 2020 election.”

The vast majority of warnings regarding future election interference have come from U.S. intelligence officials with a dubious record of trustworthiness and a history of using the media to spread propaganda and disinformation, most famously through Operation Mockingbird. Most — if not all — of the recent and numerous articles on imminent interference rely heavily on claims made by the two aforementioned government documents, documents crafted by U.S. intelligence agencies for public consumption, as well as claims made by anonymous U.S. officials.

A recent New York Times article, for example, titled “Chaos Is the Point’: Russian Hackers and Trolls Grow Stealthier in 2020,” is based almost entirely on “interviews with dozens of officials and experts,” though the only government official named in the article is Shelby Pierson, the intelligence community’s election threats executive. The most quoted experts named in the article are Ben Nimmo, formerly of the hawkish, NATO-funded Atlantic Council and now with Graphika, and Laura Rosenberger, director of the neoconservative-created Alliance for Securing Democracy. The article nonetheless cites “American officials” and “current and former officials” several times to make claims about imminent election interference that paint a bleak picture of the current election season.

A recent article from The Hill relies on the acting head of DHS, Chad Wolf, as its only source, citing Wolf’s claim that “we fully expect Russia to attempt to interfere in the 2020 elections to sow public discord and undermine our democratic institutions” amid other warnings that Wolf gave about Chinese and Iranian cyber threats to U.S. elections. Other articles, including one titled “Russia, China plan to adjust their tactics to hack, influence 2020 elections” cite only Shelby Pierson of the U.S. intelligence community as its source for that headline’s claim. Another titled “Russia isn’t the only threat to 2020 elections, says U.S. intel” cites only anonymous U.S. intelligence officials, as the headline suggests.

Though Russia and China have consistently been named as the most likely election meddlers, reports have also been drumming up the likelihood that Iran will emerge as 2020’s foreign meddler of choice, especially in the months prior to and weeks after the killing of Iranian General Qassem Soleimani by the Trump administration. A recent “informal poll” conducted by the Washington Post asked hawkish think tank fellows, employees at companies like Raytheon and current and former federal officials if Iran would likely retaliate against the U.S. via cyberattack. The Post ran the results of the poll under the headline “Get ready for serious cyberattacks from Iran, experts say.”

Despite the media’s numerous warnings of imminent and “serious” cyber-retaliation from Iran, the only cyberattack attributed to the country after Soleimani’s death was the vandalism of the Federal Depository Library Program website, a rather benign act that was nevertheless blasted across headlines such as “US government website hacked with pro-Iranian messages, image of bloodied Trump.” The U.S. government is quoted in that article as saying that “At this time, there is no confirmation that this was the action of Iranian state-sponsored actors.”

Also notably absent from media reports is the fact that WikiLeaks revealed in 2017 that the CIA had stockpiled a library of “stolen” cyberattack techniques produced in other nations, including Russia and Iran. Those revelations, part of the Vault 7 release, revealed that the CIA’s UMBRAGE group was capable of “misdirect[ing] attribution [for cyberattacks actually done by the CIA] by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.” In other words, the CIA was more than capable of conducting “false flag” cyber attacks and blaming them on foreign actors.

Notably, one of the viruses being blamed on Iran for cyberattacks targeting the U.S. ahead of the 2020 election — called Shamoon — was “stolen” by the CIA’s UMBRAGE and cited in the WikiLeaks release.

 

Conflict of interest-ridden Microsoft “defends democracy”

Last year saw the tech behemoth Microsoft join the effort to blame foreign state actors, specifically Iran, for cyberattacks against the U.S. This helped to bolster assertions that had largely originated with a handful of U.S. intelligence officials and hawkish, neoconservative-aligned think tanks as media reports on Microsoft’s related claims treated the company as an independent private sector observer.

Yet, as MintPress investigations have revealed, Microsoft has clear conflicts of interest with respect to election interference. Its “Defending Democracy” program has spawned tools like “NewsGuard” and “ElectionGuard” that it claims will help protect U.S. democracy, but — upon closer examination — instead have the opposite effect.

Last January, MintPress exposed NewsGuard’s neoconservative backers and how special interest groups were backing the program in an effort to censor independent journalism under the guise of the fight against “fake news.” Subsequent investigations revealed the risk that Microsoft’s ElectionGuard poses to U.S. voting machines, which it claims to make more secure and how the platform was developed by companies closely tied to the Pentagon’s infamous research branch DARPA and Israeli military intelligence Unit 8200.

ElecionGuard software has since been adopted by numerous voting machine manufacturers and is slated to be used in some Democratic Primary votes. Notably, the push for the adoption of ElectionGuard software has been spearheaded by the recently created Cybersecurity and Infrastructure Security Agency (CISA), which is the federal agency tasked with overseeing election security and is headed by Christopher Krebs, a former high level Microsoft executive.

In recent months, Microsoft has also been at the center of claims that Iran attempted to hack U.S. presidential campaigns ahead of 2020 as well as claims that Iran plans to target the U.S. power grid and other critical infrastructure with cyberattacks.

Last October, Microsoft penned a blog post discussing a “threat group” it named Phosphorus that they “believe originates from Iran and is linked to the Iranian government.” The post went on to claim that Phosphorus attempted to target a U.S. presidential campaign, which later media reports claimed was President Trump’s re-election campaign. Microsoft concluded that the attempt was “not technically sophisticated” and ultimately unsuccessful, but felt compelled to disclose it and link it to Iran’s government.

Though it provided no evidence for the hack or its reasons for “believing” that the attack originated from Iran, media reports treated Microsoft’s declaration as proof that Iran had begun actively meddling in the 2020 election. Headlines such as “Iranian Hackers Target Trump Campaign as 2020 Threats Mount,” “Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says”, “Microsoft: Iran government-linked hacker targeted 2020 presidential campaign” and “Microsoft Says Iranians Tried To Hack U.S. Presidential Campaign,” were blasted across the front pages of American media. None of the reports scrutinized Microsoft’s claims or noted the clear conflict of interest Microsoft had in making such claims due to its efforts to see its own ElectionGuard Software adopted nationwide.

Media reports also left out the fact that Microsoft is a major government contractor for the U.S. intelligence community and the Pentagon. Notably, the Trump campaign, which Microsoft said was the target of this attack, was later identified as the only major presidential campaign using Microsoft’s “AccountGuard” software, part of its dubious “Defending Democracy” program that also spawned NewsGuard and ElectionGuard. AccountGuard claims to protect campaign-linked emails and data from hackers.

Microsoft surfaced not long after, again claiming that Iran was maliciously targeting the United States’ civilian infrastructure. This subsequent claim was first published by Wired and later covered by other outlets. Those reports cite a single person, Microsoft security researcher Ned Moran, who claimed that an Iran-backed hacking group called APT33 was targeting the U.S. “physical control systems used in electric utilities, manufacturing, and oil refineries.”

“They’re trying to deliver messages to their adversaries and trying to compel and change their adversaries’ behavior,” Moran told Wired. Moran also stated that “Microsoft hasn’t seen direct evidence of APT33 carrying out a disruptive cyberattack rather than mere espionage or reconnaissance, it’s seen incidents where the group has at least laid the groundwork for those attacks (emphasis added).”

 

Cybereason helps craft the narrative

While U.S. intelligence officials and media outlets alike have been largely responsible for setting the narrative that imminent meddling will be conducted by Russia, China and Iran, key components of that narrative, particularly with respect to China and Iran, have been laid by Cybereason, a company that recently ran 2020 doomsday election simulations and that has close ties to the intelligence communities of both the U.S. and Israel.

Shortly after the killing of Iranian General Qassem Soleimani earlier this month, an operation conducted in concert with Israeli intelligence, Cybereason warned that Iran could imminently retaliate with a cyber threat and quoted its own employees who explained what and how Iran would likely target in retaliation. Cybereason’s CSO Sam Curry, who actively participated in the firm’s 2020 doomsday election simulations, stated:

 This means that Iran’s “forceful revenge” response is likely to be less about the flash and all about the bang. If you have connected systems that are responsible for kinetic world effects, like ICS systems and critical infrastructure around water, energy or vital services, it’s time to pay attention. Iran and the US are engaged in Cyber brinksmanship, which means that the gloves are off as Iran picks it’s targets (emphasis added).”

Cybereason also quoted visiting fellow for the National Security Institute and former advisor to the U.S. Secret Service (which participated in Cyberaeson’s election simulations), Anne Marie Zettlemoyer, who claimed that Iran could soon target Wall Street and critical U.S. infrastructure like the power grid:

 An attack against the financial systems can be devastating economically and weaken the confidence and viability of markets. However, we cannot ignore the physical consequences and manifestations that can come from a cyberattack, particularly against critical infrastructure like energy and industry control systems.”

Cybereason’s claims regarding Iran’s interest in “critical infrastructure” systems likely originated with Microsoft, the claims were then parroted by the media in several reports, many of which quoted Cybereason’s Sam Curry. Curry is also a contributor to major news outlets like Forbes where he writes about Iran’s cyber warfare capabilities. 

Notably, in Cybereason’s recent allegations against Iran, it states that “it’s clear that Iran has been preparing for future geopolitical conflict by gaining access to critical infrastructure and other important operations in the United States.” It backs these claims by citing an article authored by Curry for Forbes. Following Soleimani’s death, numerous media reports, including in the UK’s The Independent and ABC News, have cited Curry as an “expert” source in claiming that Iran would retaliate with cyberattacks.

Microsoft’s claims about foreign hackers and meddling — the evidence for which have never been made public but has been parroted as fact nonetheless — are frequently supported by Cybereason.

Last August, Microsoft claimed to have foiled Russian attempts at hacking two Republican-affiliated think tanks and, despite providing no evidence, Cybereason’s then-senior director of intelligence services Ross Rustici was quoted as an expert in several media reports as saying that such behavior was to be expected from Russia. In one such report, Rustici stated:

We’re very good at fighting the last war, but the Russians are very good at evolving their game. I suspect if they’re going to do a psychological operation around the elections, the way they do it will be different than what they did in 2016. How effective the defenses we’ve built for what they did in 2016 will be for those attacks is yet to be seen.”

None of the media reports quoting Rustici mentioned Cybereason’s ties to Israeli intelligence, referring to tech firms only a “Boston-based cybersecurity company” and similar variants. Cybereason’s Intelligence Group is stuffed with former and active members of U.S. and Israeli intelligence services and has released several reports about nation-state hacking with a focus on Russia and China.

Cybereason has also been at the forefront of claims that China has been engaged in aggressive cyberattacks against multinational companies that have also seen widespread coverage in U.S. media, despite the untransparent nature of the evidence for Cybereason’s claims.

In a story that received major coverage from outlets such as Fox News, Reuters, CNBC and others, Cybereason unveiled what it called “Operation Soft Cell,” an operation that stole mass troves of data from several global telecommunications companies. In each story, Cybereason is the sole source of the claim and declined to provide the name or location of any of the affected companies. The firm also claimed to have determined that the attack was likely perpetrated by someone “backed by a nation state, and is affiliated with China.” It further claimed to have debriefed and coordinated responses with U.S. intelligence.

In an article for Reuters, Cybereason stated that “this time as opposed to in the past we are sure enough to say that the attack originated in China” while Cybereason separately told CyberScoop that it had “found hacking tools such as a modified web shell and a remote access trojan that are commonly associated with, but not unique to, Chinese hackers.” Despite the incongruity, media reports laid the blame squarely on China, as seen in headlines such as “Chinese spies have been sucking up call records at multinational telecoms, researchers say.”

Prior to uncovering Operation Soft Cell, Cybereason had warned on its blogs in the months and years prior that China would imminently target U.S. companies. The revelation of Operation Soft Cell — which originated exclusively with Cybereason — has been used to build the case that China is openly engaged in cyberwarfare against its rival states, like the United States, and targeting “democracy itself.”

 

Best Known Deep Fake Creator is Funded by Israeli Intelligence

While the media, and even Cybereason itself, have helped lay the foundation to blame specific state actors for 2020 election meddling well ahead of the fact, it is worth revisiting Cybereason’s “Operation Blackout” election simulation and the tactics used by the “bad actors” in that scenario.

That simulation, discussed in detail in the first installment of this series, saw the weaponization of specific technologies, namely deep fakes, hacks of Internet of Things (IoT) devices and hacks of vehicles, in order to target the 2020 U.S. election, resulting in the cancellation of the election and the imposition of martial law.

Given the current narrative regarding what state actors are likely to meddle in the 2020 election — namely Russia, China and Iran — and the tactics they will allegedly use, it is important to explore the sources of the technologies weaponized per that narrative as well as in “Operation Blackout.”

Indeed, if there is any clear overlap between the creators of those technologies and the state actors being blamed in advance for their imminent use, it would certainly lend credibility to the claims promoted by U.S. intelligence, the media and companies like Microsoft and Cybereason.

Yet, upon closer examination, it becomes clear that the companies and state actors most involved in developing these technologies are the very ones claiming that Russia, China and Iran will use them to undermine the 2020 election.

Take for instance the use of deep fakes. Not only have numerous media reports focused on how deep fakes will be used to meddle in the 2020 elections, but Cybereason’s doomsday election simulation saw “bad actors” rely heavily on their use to spread disinformation and even make fake bomb threats. While much has been said of the coming election and deep fakes, remarkably few reports have bothered to look at the company best known for creating viral deep fakes.

Canny AI has garnered considerable media attention over the past few years for its persuasive deep fake videos that have frequently gone viral. In the last year alone, the tech firm’s viral deep fakes have included a controversial video of Mark Zuckerberg where the Facebook co-founder appears to be saying “Imagine this for a second: One man, with total control of billions of people’s stolen data, all their secrets, their lives, their futures,” as well as a video showing Richard Nixon giving a speech he never actually gave. More recently, Canny AI was behind the viral videos immediately prior to the 2019 U.K. general election that appeared to show Jeremy Corbyn and his rival Boris Johnson endorsing each other and another video that showed world leaders singing John Lennon’s “Imagine”:

Oddly, many of the media reports that discuss these viral videos fail to mention the role of Canny AI in creating these viral deep fakes and instead only mention the organization or artists with whom Canny AI partnered to create them. For instance, the Corbyn-Johnson videos were reported to have been produced by the group Future Advocacy and artist Bill Posters, but it was actually Canny AI that created those videos for that group. Similarly, the Nixon Speech deep fake was reported by several outlets as having been solely created by MIT’s Center for Advanced Virtuality. However, the Boston Globe noted that “the [MIT] team worked with Canny AI, an Israeli company that does Video Dialogue Replacement, and Respeecher, a Ukrainian startup specializing in speech-to-speech synthetic voice production” to create the video.

The Zuckerberg deep fake that Canny AI created led to lots of positive press for the company, with several media reports dubbing them as the company using “deep fakes for good” and that uses the controversial technology “responsibly.” The Zuckerberg deep fake has been cited as one of the main drivers behind Facebook’s new “deep fake” policy, which only bans some deep fake videos and has been criticized by U.S. lawmakers as insufficient. Notably, neither Facebook nor Facebook-owned Instagram ever took down Canny AI’s deep fake of Zuckerburg.

Given the concern over deep fakes in relation to the coming election and Canny AI standing out as the main producer of deep fakes that have gone viral over the past year, it is important to point out that Canny AI has ties to a state actor with a history of election meddling: the state of Israel.

Indeed, Canny AI is 100 percent funded by an Israeli start-up accelerator called Xcelerator, a joint venture between Tel Aviv University and Israeli intelligence agency Shin Bet (sometimes called Shabak). According to Start Up Nation Central, the Paul Singer-created organization that promotes Israeli technology start ups, Xcelerator-funded “start-ups participating in the program benefit from close mentoring from content and technology experts from the Shabak, experts from Tel Aviv University, and industry leaders. The connection to the Shabak also provides the entrepreneurs with ways to test the capabilities of their technologies and cooperation opportunities (emphasis added).”

In addition, Xcelerator is partnered not only with Israeli intelligence directly, but also with Cybereason, the very company that explored the use of deep fakes in the 2020 U.S. presidential election that saw the election cancelled and martial law declared as well as a company that itself has deep ties to Israeli intelligence. Other notable partners of Xcelerator include NEC Corp, which has intimate ties to top Cybereason investor Softbank; Check Point Technologies, which has ties to Israeli military intelligence Unit 8200; and the Israeli start-up accelerator Team8. In previous reports published by MintPress, Team8 was discussed in detail, particularly their recent hire of former director of the NSA and former head of U.S. Cyber Command Mike Rogers, and their close ties to Paul Singer’s Start Up Nation Central, which itself has deep ties to U.S. neoconservatives.

It is also worth noting that Xcelerator also backs an “anti-fake news” start-up called Cyabra, which has direct ties to Israel’s Mossad and offers its AI-driven “disinformation protection” to government agencies as well as politicians, particularly during election seasons. Two of Cyabra’s co-founders previously co-founded Psy-Group, which attempted to interfere in the 2016 U.S. election by weaponizing “fake news” and social media and later closed down its operations after U.S. government scrutiny into its activities began as part of the Mueller investigation.

Psy-Group also engaged in doxxing campaigns targeting Palesintian rights activists in the U.S. which were planned in conjunction with Ram Ben-Barak, the former deputy director of the Mossad who now advises Cyabra. Given that much of the concern ahead of the next election is related not only to deep fakes but also “fake news,” Cyabra’s rise and its clear ties to Mossad and the now defunct Psy-Group are important to note.

Furthermore, in examining the other technologies weaponized during Cybereason’s 2020 election simulation and cited in the aforementioned media narrative regarding 2020 meddling, a pattern similar to that of Canny AI emerges.

Indeed, the other technologies linked to these “bad actors” and foreign meddlers — namely hacking IoT devices and hacking vehicles — are also pioneered by companies with deep ties to Israeli military intelligence, specifically Unit 8200, and Israeli tech companies that have aggressively spied on U.S. government institutions in collusion with Israeli intelligence in the past, namely Comverse (now Verint) and Amdocs.

 

Hacking the Internet of Things

In Cybereason’s doomsday election simulation, another of the tactics used was the hacking of devices and appliances connected to the internet, often referred to as the Internet of Things (IoT) and which includes everything from smartphones to power grid infrastructure to city traffic lights.

While most reports on IoT hacks to date have focused on “lone wolf” or non-state-aligned actors, one company has stood out for its efforts to create a tool that would allow governments and intelligence agencies to hack these devices with ease. That company, called Toka, announced in 2018 that it planned to offer “a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain,” with “a special focus on [hacking] the so-called Internet of Things (IoT), covering tech like Amazon Echo, Nest connected home products, as well as connected fridges, thermostats and alarms.”

The Israel-based company, which raised $12.5 million within months of launching, has since been busy marketing its services to governments around the world, most recently France where it described its product portfolio as “empower[ing] governments, Intelligence, and law enforcement agencies to enhance Homeland Security with groundbreaking cyber-intelligence and operational capabilities” during an exposition in Paris last November.

Even though Toka openly markets the ability to hack private consumer devices to governments and law enforcement agencies around the world, the clear threat to privacy has gone ignored by media outlets as the company has garnered nearly no media attention since it launched nearly two years ago.

Yet, Toka is not only notable for what it offers but also for its founders and investors. Indeed, the co-founders of Toka have been described as an “all-star” team, largely because of the role of former Israeli Prime Minister and former head of Israeli military intelligence, Ehud Barak. Barak, in addition to co-founding the company, serves as its director and is also the chairman of the board of the controversial Israeli company Carbyne911, which markets software to emergency call centers in the United States. Interestingly, Cybereason’s 2020 doomsday election simulation also dealt with the hacking and weaponization of 911 call centers. Also of note is the fact that another of Carbyne911’s leadership team, former Unit 8200 commander Pinchas Buchris, is an adviser to Cybereason.

Toka’s top brass is a who’s who of former Israeli military and intelligence officials

In addition to Barak, Toka was co-founded by retired Brigadier General Yaron Rosen, former Chief of the IDF’s cyber staff, where he was “the lead architect of all [IDF] cyber activities” including those executed by Israeli military intelligence Unit 8200. Rosen, who now serves as Toka’s CEO, has stated that Toka’s technology will only be sold to countries allied with the U.S. and Israel, telling Forbes that “Russia, China and ‘other enemy countries’ would never be customers.”

Toka’s leadership and software architects are similarly tied into Israel’s national security state. Several — including the “architect” of its hacking software — previously worked for Israel’s Prime Minister’s Office and developed “offensive technologies” for Israel’s head of state and other top Toka employees and executives share numerous connections to Unit 8200, other divisions of Israeli military intelligence and Unit 8200-connected tech companies like Check Point Technologies.

Though Toka’s leadership team makes its ties to Israeli military intelligence abundantly clear, important connections also appear in examining Toka’s investors. One of the major investors in Toka is Dell technologies, one of the world’s largest technology companies that was founded by Michael Dell, a well-known pro-Israel partisan who has donated millions of dollars to the Friends of the IDF and one of the top supporters of the so-called “anti-BDS” bills that prevent publicly employed individuals or public institutions from supporting non-violent boycotts of Israel, even on humanitarian grounds. It goes without saying that a major technology company investing in a company that markets the hacking of that very technology (computers, IoT, smartphones, etc.) should be a red flag.

With a major foot in the door through its connections to Dell, whose products are used by the private and public sectors around the world, other investors in Toka again reveal its ties to Israel’s military intelligence and the same controversial Israeli tech companies that have aggressively spied on the U.S. government in the past — Amdocs and Comverse. For instance, Entrèe Capital, a venture capital fund that is one of Toka’s main investors, is managed by Aviad Eyal and Ran Achituv. The latter, who manages Entrée’s investment in Toka and sits on Toka’s board of directors, is the founder of the IDF’s satellite-based signals intelligence unit and also a former senior Vice President at both Amdocs and Comverse Infosys (Verint).

Another notable investor in Toka is the venture capital firm Andreesen Horowitz, which is advised by former Secretary of the Treasury Larry Summers, a close friend of the infamous pedophile Jeffery Epstein, whose own ties to Israeli military intelligence have been discussed in several MintPress reports. Epstein was also a close friend of Ehud Barak, co-founder and director of Toka, and invested at least $1 million in another company with close ties to Barak, Carbyne911. The remaining investors in Toka are Launch Capital, which is deeply tied to the Pritzker family — one of the wealthiest families in the U.S. with close ties to the Clintons and Obamas as well as the U.S.’ pro-Israel lobby, and Ray Rothrock, a venture capitalist who spent nearly three decades at VenRock, the Rockefeller family venture capital fund.

 

Unit 8200 – From Hacking Cars to Protecting Them?

Arguably the most disturbing aspect of Cybereason’s “Operation Blackout” election simulation was the hacking of vehicles that were then rammed into civilians waiting in line to vote at polling stations. In the simulation, this led to scores of dead Americans and hundreds of injuries.

As was the case with other technologies used to undermine the 2020 election in the simulation, this technology — the hacking of vehicles — is the bread and butter of an Israeli cybersecurity firm called Upstream Security that specializes in automobiles and boasts deep ties to the country’s military intelligence service.

Though vehicle hacking seemed out of left field when the 2020 election simulation took place last November, media reports about the imminent dangers of “car hacking” began to emerge just a month after the exercise took place, most of which cited a December 2019 report created by Upstream. Some of those reports have warned that car hacking could be used to undermine the coming U.S. election.

One report titled “Car Hacking Hits the Streets,” cites only Upstream’s report to claim that “In 2020, the connected-car market will reach a tipping point, with the majority of vehicles already connected to the Internet when sold in the United States, representing a large base of potential targets for attacks.” Another report, titled “New study shows just how bad vehicle hacking has gotten,” uses Upstream’s report (i.e. study) to claim that hacks of regular vehicles have exploded since 2016 and that most of the cars on U.S. roads today are vulnerable to hackers and that over 80 percent of those hacks occur remotely.

Neither report noted Upstream’s ties to Israeli military intelligence. Equally notable is the fact that both reports that covered the Upstream-written study say that only manufacturers can address the problem by partnering with a company like Upstream.

Lucky for Upstream, they have already partnered with a slew of auto manufacturers, including Hyundai, Volvo, Renault and even U.S. auto insurance giants like Nationwide, who now number among Upstream’s most important investors. The company’s original investors are Charles River Ventures, one of Cybereason’s first investors, and Israeli venture capital firm Glilot Capital.

Glilot Capital’s interest in Upstream is telling given the firm’s deep ties to Israel’s Unit 8200. Glilot was founded by two former Israeli military intelligence officers and has “a heavy focus on the cyber sector and the entrepreneurs who emerge from the elite Unit 8200,” according to the Jerusalem Post. Even the name of the firm is an homage to Unit 8200, as the unit’s main base is located in Glilot, near Herzliya.

“It’s as if Americans called a VC Fort Meade Capital [the US Army base in Maryland where the National Security Agency and the United States Cyber Command are headquartered], some VC names are meant to be symbolic, as in our case. Glilot is the home of several of the best intelligence and technology units in the IDF, it’s where we came from and it is where we find our best entrepreneurs,” Glilot Capital co-founder Arik Kleinstein told the Jerusalem Post in 2016.

Upstream is certainly the type of company that Glilot Capital is used to investing in. It was founded by two Israelis who both served in the IDF, with one of them serving in an elite intelligence unit. Upstream’s co-founders, Yoav Levy and Yonathan Appel, met while working at Check Point Technologies, the Unit 8200 alumni-founded company with deep ties to Israel’s military intelligence and military-industrial complex as well as the IoT hacking company Toka. Notably, Upstream recently partnered with the Japanese company Fujitsu, a longtime partner with Softbank — Cybereason’s main investor.

Softbank has also invested heavily in another Unit 8200-founded vehicle security start-up called Argus Cyber Security, a firm known for its numerous demonstrations showing how easy it is to hack vehicles. Argus is also backed by Nadav Zafrir, the former Unit 8200 commander who now runs Team8. Argus’ CEO Ofer Ben-Noon, a former captain in Unit 8200, told Forbes in 2014 that “Everything will be hacked in every single [car] brand. It will take time, it might be weeks, months, or a couple of years, but eventually it will happen.”

Since then, Unit 8200 alumni from Argus, Upstream and other Israeli automobile cybersecurity firms have shown media outlets around the world how much easier hacking vehicles has become in the years since Ben-Noon first made the claim. One such report from VICE includes a vehicle hacking demonstration, courtesy of a Unit 8200 alumni, and notes that “most cars today are susceptible to hacker attacks.”

Of course, Unit 8200 isn’t the only intelligence agency known to be experts at hacking vehicles. Indeed, in 2017, WikiLeaks revealed that the CIA was capable of hacking vehicles and exploring their use in committing “undetectable assassinations.”

 

“Bring down nations to their knees”

At the Tel Aviv Cybertech Conference in 2017, Israeli Prime Minister Benjamin Netanyahu stated the following:

Today warfare has changed dramatically…With a click of a button, you can bring down nations to their knees very rapidly if you so desire and if you’re willing to take the risks, because every system can be hacked. Our hospitals, our airplanes, our cars, our banks. The most important word here is our data banks, they can be hacked.”

Media reports and even members of the Israeli public and private sector have openly acknowledged that Israel’s intelligence apparatus — from Unit 8200 to the Mossad — remains directly linked to many of the private technology companies founded by its former members, especially in the field of cybersecurity. Though reports on the matter often praise this merging of Israel’s public and private spheres, they rarely acknowledge the documented corruption within Unit 8200, the unit’s dark past in recruiting felons and even pedophiles to join its ranks, or the danger posed by having companies directly linked to foreign intelligence being given access to the U.S. government’s most classified and sensitive systems and data.

The last omission is particularly troubling given that Israeli intelligence has not only been caught aggressively using private tech companies to spy on U.S. federal agencies and networks, but also intercepting the private communications of at least two U.S. presidents and using a notorious pedophile to sexually blackmail American politicians.

As was mentioned in the first installment of this series, Cybereason’s CEO Lior Div offers a clear example of this worrisome bridge between Israel’s public and private sector, as Div has openly stated that he views his work at Cybereason as a “continuation” of his service to Israeli military intelligence, where he led offensive cyberattacks against other nations.

Given Div’s past statements and his company’s clear ties to both Israeli and U.S. intelligence, Cybereason’s simulation of the 2020 U.S. election — which involved terrorist attacks and led to the election’s cancellation and the imposition of martial law — is highly concerning. This is particularly so considering that Cybereason’s investors have direct ties to individuals who would benefit from the election’s cancellation and also considering the clear narrative that has emerged in recent months regarding how the coming election will inevitably fall victim to tech-driven “chaos” in coming months.

The clear overlap between Cybereason’s simulation and the intelligence-driven media narrative is clear cause for concern, especially considering that the technologies that they highlight as ultimately upending the election are dominated by the very same intelligence agencies simulating and crafting that narrative.

The keyword that has been used to describe the end result of both Cybereason’s simulation and the prevailing media narrative regarding the 2020 election is “chaos,” chaos so imminent, widespread and unruly that it will shake American democracy to its core.

What has been left unsaid, however, is that a government’s solution to “chaos” is always the imposition of “order.” This means that — whatever “chaos” ultimately ensues prior to or on election day — will result in a government response that will do much more to crush freedom and undermine democracy than any act of foreign meddling has, be it real or imagined.

A Metaphysical Malaise?

By Kingsley L. Dennis

Source: Waking Times

‘The real tragedy of our time lies not so much in the unprecedented external events themselves as in the unprecedented ethical destitution and spiritual infirmity which they glaringly reveal.’

Paul Brunton

There is little doubt that we are living in an age of extreme contradictions where opposing trends appear to exist side by side. It is a time when individuals take greater care of their bodies and are obsessed by diet and health fads, while obesity is an epidemic. We live amidst a paradoxical combination of playfulness and fear, of fun and anxiety, of euphoria and unease. It has been said that ‘When a materialistic civilization becomes outwardly impressive but remains inwardly impoverished, when political relations become an elaborate façade for hiding the spiritually empty rooms behind them, menacing problems are sure to appear on every side.’This quote adequately describes our current situation and yet the author, Paul Brunton, published this in 1952.  However, it remains as starkly correct in its analysis for today as it was for his own time.

The current situation is that ‘menacing problems’ are indeed appearing on every side: political corruption and ineptitude; economic manipulations; national aggression and politically-motivated warfare; refugee crises; human torture and suffering; capitalist greed; corporate corruption; aggravated social unrest; religious and moral intolerance; increased displays of psychopathic behaviour (private individuals and authority figures); blatant propaganda; environmental degradation; ecological ignorance; spiritual destitution, and the rest.

The result is that many people have become ‘spiritually numbed’ by what they see occurring in the world, and feel that only a similar harsh, physical response can be effective. The words ‘mystical’ and ‘spiritual’ remain vague and ethereal. People have always depended on language to bring guidance and nourishment. Yet in this mental environment, words are but skeletal traces of the real flesh. The crisis of our times has clarified little and succeeds in confusing almost everything for the rest of us. There is nowhere to turn in public for finding the truth – seemingly little to believe in for the present and too much uncertainty for the future. The result of this is that many people have doubts that they don’t know how to deal with, and these are building up within their minds like a pathological infection.

An Absence of Meaning

In these current times there is a sense, a feeling, of something lacking or missing within many people’s lives. Unfortunately, this need has been met by the consumerist marketplace. There is a great deal of compensation for this lack through ‘quick fix’ guruism; that is, costly paid retreats, so-called spiritual counselling, and ‘life coaching’ mentorship. Yet these are like fast-food remedies for a deeper hunger. The real struggle today is rather between the material perspective on life and that of the inner, developmental state. Many of the events occurring in the world are manifestations of issues existing within ourselves. The anger and negativity we see so much of in the world is a projection from the collective interior state of humanity. We can manifest both the dream or the nightmare, and we share in its waking state. Being physically mature is not enough; we also need to be emotionally, intellectually, and inwardly mature.

Our cultures and societies are in disequilibrium because they seek to be governed by artificial laws that ignore the timeless wisdom that corresponds to human development. It is a dominant mentality that promotes a short-sighted, myopic worldview that is largely concerned only with physical gains and material power. It is a mentality that promotes fear, defence and attack – rather than a welcoming, embracing vision.

Our societies do not consider human purpose and the deeper meaning of human existence. They drive us to live by working; to enjoy through distractions; and to eventually die with debt and taxes. The world is governed not by fairness or equity, but by a lopsided arrangement of elite power. Conferences of peace are based on compromise and not compassion. Trade is based on strength rather than collaboration. Power and politics are at war with the world and do so beyond the reach of accountability. There is a resurgence of the illegitimate, surging through black markets, offshores, and dark networks. Dark pathways will always emerge and grow in the places where the light is flickering without focus or intent.

Today’s so-called modern cultures are increasingly fragmented, or like liquid streams, that can no longer be accurately identified or navigated by the old signs, symbols, and meanings. Modern life has, to some degree, started to dissolve in order to re-assemble. This may indeed be a part of the needed cathartic process that humanity has to pass through before circumstances will improve. A feature of the current times is that new ways of thinking and behaviour have not yet fully materialized into the present order of things. That which now constitutes ‘daily life’ is void of the questions of metaphysical meaning. Any notion of the developmental, or the metaphysical, is deemed outside of daily life, and people are continually programmed against such deeper truths. In other words, we should not let anything that is ‘other’ – otherworldly or transcendental – replace the responsibility of our social daily grind.

Human societies often make political declarations to promote what they decide to be ‘social happiness.’ Yet political institutions have no genuine models for this, for the dominant political mindset is overruled by a form of psychosis. Social ‘happiness’ is whatever fits into the particular dominant belief system of the age. And as can be seen, this dominant belief, or narrative, has been hijacked by a collective psychosis that I have termed the wounded mind. It appears that as a collective society we have no lasting image of happiness. As a consequence, personal lives are in danger of becoming now less about actual experience and more about the data trails left behind. We have entered another struggle – another social fray – where the battle is between the transparency of our private, inner lives and our public identity.

Identity & Self

These days people are being encouraged to expose their inner demons onto the public stage, especially online. The human shadow is wanting to come out and be revealed. According to Jung, the psychological ‘shadow’ is the underdeveloped and undesirable aspects of ourselves that we try to keep hidden away. And yet there are times when we are unable to hold it at bay, or unconsciously wish for it to manifest. Humanity possesses a tremendous imagination for doing good as well as evil, and this can be a finer line than is realized. As the aphorism states, the road to hell is paved with good intentions. Each person needs to exercise the capacity to detect and acknowledge those unconscious desires, feelings, and thoughts that exist within. American psychologist Rollo May once wrote – ‘Our age is one of transition, in which the normal channels for utilizing the daemonic are denied; and such ages tend to be times when the daemonic is expressed in its most destructive form’2

In short, we need to be extremely mindful in these times about what’s inside of us. Our minds – our thinking and consciousness – is a target and has been for a long time. In the last century this has become more evident, more public. We have become increasingly stuck in modern times within our stories around psychological need and a ‘loss of self.’ Perhaps what is needed is to acknowledge that some people are suffering from what is termed as ‘soul loss.’

People who experience ‘soul loss’ frequently have the feeling of being fragmented, not whole or completely ‘in’ themselves. They feel as if an essential part of them is missing. They may clinically be diagnosed as ‘dissociated.’ Depression is another symptom of soul loss. Soul loss can be associated with the traumas of modern life – fear, terror (warfare), incest or rape, domestic abuse. These are all the external stresses that modern life creates. Counselor and educator John Bradshaw uses the term toxic shame which he sees as a form of alienation from the self, causing it to be ‘otherated.’ In response, people may turn to external sources to fill this internal void.

Carl Jung also made a reference to soul loss in his psychological work. According to psychotherapist Robert Francis Johnson,

‘This loss of soul Jung speaks of is manifested in our culture by the crises we are all facing (increased drug use, violence, moral and emotional numbness) and our attempt to solve moral and spiritual questions by electing wounded leaders who promise economic answers.’3

It is interesting that Johnson refers to ‘wounded leaders’ here who seek our compliance through the language of greed (‘economic answers’). Similarly, prominent Jungian analyst Marie von Franz writes that

‘Soul loss can be observed today as a psychological phenomenon in the everyday lives of the human beings around us. Loss of soul appears in the form of a sudden onset of apathy and listlessness; the joy has gone out of life, initiative is crippled, one feels empty, everything seems pointless.’4

Is this not a description of what faces many people today? Apathy, listlessness, a feeling of a pointless, joyless life? There is clearly a toxic social problem, and we are clearly in need of a metaphysical response.

Where is the Metaphysical?

Any society or civilization that does not recognize the human as a developmental being will fall short in its accomplishments. We simply cannot allow ourselves to fall short – not in the long run, at least. Yet recognition of the human as a developmental being will not come from the world first; and definitely not from social-cultural-political institutions. It will first only come from the individual. And it is from here that genuine change must be nurtured. Now is a crucial time for managing our psychological, emotional, and physical states. We may be uncertain about the future, yet we have the technologies to radically transform our age into something unprecedented. We have both external technologies as well as what may be called ‘technologies of the soul.’ What we are, we transmit to others. We are compelled not only to be mindful, but crucially to be both sensible and soul-ful.

On a practical level, the number of people around the world who have been awoken by the current crises to seek greater inner development is not in the majority. It can be said that at present there exists a metaphysical malaise. Those people who aspire for inner self-development are still all too few. However, a majority was never needed. There is enough.

Humanity is now engaged in a profound moment along its species path. Whether it is recognized or not, we are each living and participating in a reality that exists upon profound metaphysical principles. That’s the bottom line. We can choose to participate in this metaphysical reality, consciously and willingly, or to drift through our lives unbeknown to the forces that impel us. Right now, it is about recognizing this choice, and whether to act upon it. It will not be easy, for all the obstacles that the psychosis-ridden governing systems will throw at us. And yet it must be a force of unwavering inner commitment and genuine self-trust. Each person must choose their freedom from within. The real site of freedom can only be within the inner self – and it is to this we must place our trust.

Pro-Israel Buttigieg backer Seth Klarman is top funder of group behind Iowa’s disastrous voting app

Behind the app that delayed Iowa’s voting results is a dark money operation funded by anti-Sanders billionaires. Its top donor, Seth Klarman, is a Buttigieg backer who has dumped money into pro-settler Israel lobby groups.

By Max Blumenthal

Source: The Grayzone

At the time of publication, twelve hours after voting in the Democratic Party’s Iowa caucuses ended, the results have not been announced. The delay in reporting is the result of a failed app developed by a company appropriately named Shadow Inc.

This firm was staffed by Hillary Clinton and Barack Obama campaign veterans and created by a Democratic dark money nonprofit backed by hedge fund billionaires including Seth Klarman. A prolific funder of pro-settler Israel lobby organizations, Klarman has also contributed directly to Pete Buttigieg’s campaign.

The delay in the vote reporting denied a victory speech to Sen. Bernie Sanders, the presumptive winner of the opening contest in the Democratic presidential primary. Though not one exit poll indicated that Buttigieg would have won, the South Bend, Indiana mayor took to Twitter to confidently proclaim himself the victor.

The bizarre scenario was made possible by a mysterious voting app whose origins had been kept secret by Democratic National Committee officials. For hours, it was unclear who created the failed technology, or how it wound up in the hands of Iowa party officials.

Though a dark money Democratic operation turned out to be the source of the disastrous app, suspicion initially centered on former Hillary Clinton campaign manager Robby Mook and his Russiagate-related elections integrity initiative.

Leveraging Russia hysteria into lucrative election opportunities

While Iowa Democratic Party Chairman Troy Price refused to say who was behind the failed app, he told NPR that he “worked with the national party’s cybersecurity team and Harvard University’s Defending Digital Democracy project…” Price did not offer details on his collaboration with the Harvard group, however.

The New York Times reported that this same outfit had teamed up with Iowa Democrats to run a “drill of worst-case scenarios” and possible foreign threats, but was also vague on details.

Robby Mook, the former campaign manager for Hillary Clinton’s failed 2016 presidential campaign, was the co-founder of Defending Digital Democracy. His initiative arose out of the national freakout over Russian meddling that he and his former boss helped stir when they blamed their loss on Russian interference. Mook’s new outfit pledged to “protect from hackers and propaganda attacks.” 

He founded the organization with help from Matt Rhoades, a former campaign manager for Republican Mitt Romney whose public relations company was sued by a Silicon Valley investor after it branded him “an agent of the Russian government” and “a friend of Russian President, Vladimir Putin.” Rhoades’ firm had been contracted by a business rival to destroy the investor’s reputation.

As outrage grew over the delay in Iowa caucus results, Mook publicly denied any role in designing the notorious app.

Hours later, journalist Lee Fang reported that a previously unknown tech outfit called Shadow Inc. had contracted with the Iowa Democratic Party to create the failed technology. The firm was comprised of former staffers for Obama, Clinton and the tech industry, and had been paid for services by the Buttigieg campaign.

FEC filings show the Iowa Democratic party and Buttigieg campaign paid Shadow Inc.

An Israel lobby moneyman’s path to Mayor Pete’s wine cave

Shadow Inc. was launched by a major Democratic dark money nonprofit called Acronym, which also gave birth to a $7.7 million Super PAC known as Pacronym.

According to Sludge, Pacronym’s largest donor is Seth Klarman. A billionaire hedge funder, Klarman also happens to be a top donor to Buttigieg and Amy Klobuchar.

Though he has attracted some attention for his role in the campaign, Klarman’s prolific funding of the pro-settler Israel lobby and Islamophobic initiatives has gone almost entirely unmentioned.

Seth Klarman is the founder of the Boston-based Baupost Group hedge fund and a longtime donor to corporate Republican candidates. After Donald Trump called for forgiving Puerto Rico’s debt, Klarman – the owner of $911 million of the island’s bonds – flipped and began funding Trump’s opponents.

The billionaire’s crusade against Trump ultimately led him to Mayor Pete’s wine cave.

By the end of 2019, Klarman had donated $5600 to Buttigieg and pumped money into the campaigns of Amy Klobuchar, Cory Booker and Kamala Harris as well.

The billionaire’s support centrist candidates appears to be not only by his own financial interests, but  by his deep and abiding ideological commitment to Israel and its expansionist project.

As I reported for Mondoweiss, Klarman has been a top funder for major Israel lobby outfits, including those that support the expansion of illegal settlements and Islamophobic initiatives.

Klarman was the principal funder of The Israel Project, the recently disbanded Israeli government-linked propaganda organization that lobbied against the Iran nuclear deal and backed the Israeli settlement enterprise.

Klarman has heaped hundreds of thousands of dollars on the Middle East Media Research Institute (MEMRI) and the American Jewish Committee. And he funded The David Project, which was established to suppress Palestine solidarity organizing on campuses across the US and battled to block the establishment of a Muslim community center in Boston.

Through his support for the Friends of Ir David Inc, Klarman directly involved himself in the Israeli settlement enterprise, assisting the US-based tax exempt arm of the organization that oversaw a wave of Palestinian expulsions in the occupied East Jerusalem neighborhood of Silwan.

Other pro-Israel groups reaping the benefits of Klarman’s generosity include Birthright Israel, the AIPAC-founded Washington Institute for Near East Policy, and the Foundation for the Defense of Democracies (FDD), a neoconservative think tank that helped devise Trump’s “maximum pressure” campaign of economic warfare on Iran.

Klarman is the owner of the Times of Israel, an Israeli media outlet that once published a call for Palestinian genocide. (The op-ed was ultimately removed following public backlash).

In recent weeks, Buttigieg has sought to distinguish himself from Sanders on the issue of Israel-Palestine. During a testy exchange this January with a self-proclaimed Jewish supporter of Palestinian human rights, the South Bend mayor backtracked on a previous pledge to withhold military aid to Israel if it annexed parts of the West Bank.

Another recipient of Klarman’s funding, Amy Klobuchar, has taken a strongly pro-Israel line, vowing to support Trump’s relocation of the US embassy from Tel Aviv to Jerusalem.

Battling Bernie with hedge fund money and sexism claims

Like Klarman, Donald Sussman is a hedge funder who has channeled his fortune into Pacronym. He has given $1 million to the Super PAC and was also top donor to Clinton in 2016.

Sussman’s Paloma Partners operates through a series of offshore shell companies, and received tens of millions of dollars in the 2009 federal bailout of the banking industry.

His daughter, Democratic operative Emily Tisch Sussman, declared on MSNBC in September that “if you still support Sanders over Warren, it’s kind of showing your sexism.”

https://twitter.com/ibrahimpols/status/1177719744096559110

As Democratic elites like the Sussmans braced for a Bernie Sanders triumph in Iowa, a mysterious piece of technology spun out by a group they supported delayed the vote results, preventing Sanders from delivering a victory speech. And the politician many of them supported, Pete Buttigieg, exploited the moment to declare himself the winner. In such a strange scenario, the conspiracy theories write themselves.

Hovering in Cyberspace

By Edward Curtin

Source: Behind the Curtain

We live in a fabricated reality where the visible world became nearly meaningless once the screen world became people’s “window on the world.”  An electronic nothingness replaced reality as people gleefully embraced digital wraparound apparitions.  These days people still move about in the physical world but live in the electronic one.  The result is mass hallucination.

This is the fundamental seismic shift of our era. There is a lot of bitching and joking about it, but when all is said and done, it is accepted as inevitable. Digital devices are embraced as phantom lovers. Technological “advances” are accepted as human destiny.  We now inhabit a technological nightmare (that seems like a paradise to so many) in which technology and technique – the standardized means for realizing a predetermined end most efficiently – dominate the world. In such a world, not only does the end justify the means, but to consider such a moral issue is beside the point. We are speeding ahead to nowhere in the most “efficient” way possible.  No questioning allowed!  Unless you wish to ask your phone.

These days there is much political talk and commentary about fascism, tyranny, a police state, etc., while the totalitarianism of technocracy and technology continues apace.  It is not just the ecological (in the human/natural sense) impact of digital technology where one change generates many others in an endless spiral, but the fact that technical efficiency dominates all aspects of life and, as Jacques Ellul wrote long ago, “transforms everything it touches into a machine,” including humans.  For every problem caused by technology, there is always a technological “solution” that creates further technological problems ad infinitum.  The goal is always to find the most efficient (power) technique to apply as rapidly as possible to all human problems.

Writing nearly fifty years ago in Medical Nemesis, Ivan Illich, explained how in medical care the human touch was being replaced by this technical mindset.  He said,

In all countries, doctors work increasingly with two groups of addicts: those for whom they prescribe drugs, and those who suffer from their consequences. The richer the community, the larger the percentage of patients who belong to both…In such a society, people come to believe that in health care, as in all fields of endeavor, technology can be used to change the human condition according to almost any design.

We are of course living with the ongoing results of such medical technical efficiency.  The U.S.A. is a country where the majority of people are drugged in one way or another, legally or illegally, since the human problems of living are considered to have only technological solutions, whether those remedies are effective or anodyne.  The “accidents” and risks built into the technological fixes are never considered since the ideological grip of the religion of technology is all-encompassing and infallible.  We are caught in its web.

Marshall McLuhan, the media guru of the 1960s – whether he was applauding or bemoaning the fact – was right when he claimed that the medium is the message.

Cell phones, being the current omnipresent form of the electronification of life, are today’s message, a sign that one is always in touch with the void.  To be without this small machine is to be rendered an idiot in the ancient Greek sense of the word – a private person.  Translation: one who is out of it, detached, at least temporarily, from the screens that separate us from reality, from the incessant noise and pinging messages that destroy reflection and create reflex reactions.

But to be out of it is the only way to understand it.  And to understand it is terrifying, for it means one knows that the religion of technology has replaced nature as the source of what for eons has been considered sacred. It means one grasps how reality is now defined by technology. It means realizing that people are merging with the machines they are attached to by invisible manacles as they replace the human body with abstractions and interact with machines.  It means recognizing that the internet, despite its positive aspects and usage by dissenters intent on human liberation, is controlled by private corporation and government forces intent on using it as a weapon to control people. It means seeing the truth that most people have never considered the price to be paid for the speed and efficiency of a high-tech world.

But the price is very, very high.

One price, perhaps the most important, is the fragmentation of consciousness, which prevents people from grasping the present from within – which, as Frederic Jameson has noted, is so crucial and yet one of the mind’s most problematic tasks – because so many suffer from digital dementia as their attention hops from input to output in a never-ending flow of mediated, disembodied data.  As a result, a vicious circle has been created that prevents people from the crucial epistemological task of grasping the double-bind that is the ultimate propaganda.  Data is Dada by another name, and we are in Dada land, pissing, not into Marcel Duchamp’s ridiculous work of Dada “art,” a urinal, but into the wind.  And data piled on data equals a heap of data without knowledge or understanding.  There is no time or space for grasping context or to connect the dots. It is a pointillist painting in the form of inert facts that few can understand or even realize that they don’t.

I am typing these words on a Hermes 3000 manual typewriter, a beautiful piece of technology whose sound and movement creates a rhythmic sanctuary where my hands, head, and heart work in unison. It allows me to think slowly, to make mistakes that will necessitate retyping, to do second and third rereadings and revisions, to roll the paper out of the machine and sit quietly as I review it.  My eyes rest on the paper, not a blue-lit screen.

Technology as such is not the problem, for my typewriter is a very useful and endurable machine, a useful technology that has enhanced life. It does not break or need to be replaced every few years, as computers do. It does not contain coltan, tantalum, or other minerals mined in the Democratic Republic of Congo, Rwanda, and other places by poor people working under oppressive conditions created by international consumer greed that is devouring the world.  It does not allow anyone to spy on me as I type.  I am alone and unplugged, disconnected, off-line and out of line, a sine qua non for thinking, and thinking about deep matters.  The typewriter is mine, and mine alone, unlike the connected digital devices that have destroyed aloneness, for to be alone is to contemplate one’s fate and that of all humanity.  It is to confront essential things and not feel the loneliness induced and exacerbated by the illusion of always being in touch.

But while this typing machine allows me to write in peace, I am in no way suggesting that I have escaped the technological condition that we all find ourselves in.  There are little ways to step outside the closing circle, but even then, one is still in it.  I will eventually have to take my paper and type it into a computer document if I wish to publish it in the form you will be reading it.  There is no other way. The technocrats have decreed it so. We are all, as George Orwell once wrote in a different context and meaning, “inside the whale,” the whale in this case being a high-tech digital world controlled by technocrats, and we have only small ways to shield ourselves from it. Sitting in a quiet room, working on a typewriter, taking a walk in the woods without a cell phone, or not owning a cell phone, are but small individual acts that have no effect on the structural realty of what Neil Postman calls technopoly in his masterful book, Technopoly: The Surrender of Culture to Technology.  And even in the woods one may look up to admire a tree only to find that it is a cell phone tower.

Humans have always created and used technology, but for a very long time that technology was subject to cultural and religious rules that circumscribed limits to its use.  Today there are no limits, no rules to constrain it.  The prohibition to prohibit is our motto.  In our acceptance of technical efficiency, we have handed over our freedom and lost control of the means to ends we can’t fathom but unconsciously fear.  Where are we heading? many probably wonder, as they check the latest news ping, no doubt about something to fear, as a thousand pieces of “news” flash through their devices without pause, like wisps of fleeting dreams one vaguely remembers but cannot pin down or understand.  Incoherence is the result.  Speed is king.

Of course, this kaleidoscopic flood of data confuses people who desire some coherence and explanation.  This is provided by what Jacques Ellul, in Presence in the Modern World, calls “the explanatory myth.”  He writes,

This brings us to the other pole of our bizarre intellectual situation today: the explanatory myth.  In addition to its political and its mystical and spiritual function, the explanatory myth is the veritable spinal column of our whole intellectual system…Given that appearances produce confusion and coherence is needed, a new appearance unifies them all in the viewer’s mind and enables everything to be explained.  This appearance has a spiritual root and is accepted only by completely blind credulity.  It becomes the intellectual key for opening all secrets, interpreting every fact, and recognizing oneself in the whirl of phenomena…this myth [is] their one stable point of thought and consciousness…enables everyone to avoid the trouble of thinking for themselves, the worry of doubt, the questioning, the uncertainty of understanding, and the torture of a bad conscience.  What prodigious savings of time and means, which can be put usefully to work manufacturing some more missiles…[they] have a good conscience because they have an answer for everything; and whatever happens and whatever they do, they can rely on the explanation that myth provides.  This process places them within the most complete unreality possible.  They live in a permanent dream, but a realistic dream, constructed from the countless facts and theories that they believe in with all the power of ‘mass persons’ who cannot detach themselves from the mass without dying.

Today that myth is the religion of technology.

So if you have any questions you want answered, you can ask your phone.

Ask your phone why we are living with endless wars on the edge of using our most astounding technological invention: nuclear weapons.

Ask your computer why “nice” Americans will sit behind computer screens and send missiles to kill people half-way around the world whom they are told they are at war with.

Ask your smart device why so many have become little Eichmanns, carrying out their dutiful little tasks at Raytheon, Lockheed Martin, and all the other war manufacturers, or not caring what stocks they own.

Ask your phone what really happened to the Ukrainian International Airlines Flight 752 in Iran.  See if your phone will say anything about cyber warfare, electronic jamming, or why the plane’s transponder was turned off preventing a signal to be sent indicating it was a civilian aircraft.

Ask who is behind the push to deploy 5 G wireless technology.

Ask that smart phone who is providing the non-answers.

Ask and it won’t be given to you; seek and you will not find. The true answers to your questions will remain hidden.  This is the technological society, set up and controlled by the rulers.  It is a scam.

Google it!

God may respond.

New Cambridge Analytica Leaks Reveal Psychological Manipulation of Global Population

“We use the same techniques as Aristotle and Hitler. We appeal to people on an emotional level to get them to agree on a functional level.”

By Derrick Broze

Source: The Mind Unleashed

On New Year’s Day 2020, Twitter account @HindsightFiles began posting documents from data firm Cambridge Analytica (CA) which expose the extensive infrastructure used to manipulate voters on a global scale.

More than 100,000 documents are said to be released in the coming months, revealing Cambridge Analytica’s activity in a shocking 68 countries, including elections in Malaysia, Kenya, and Brazil. The Guardian reported that the documents come from Brittany Kaiser, a former employee of Cambridge Analytica who turned whistleblower and star of the documentary The Great Hack.

Kaiser told the Guardian:

“I’m very fearful about what is going to happen in the U.S. election later this year, and I think one of the few ways of protecting ourselves is to get as much information out there as possible.”

The latest CA whistleblower has said the dumps will contain previously unreleased emails, project plans, case studies, and negotiations. The HindsightFiles twitter account has posted data on the relationship between Cambridge Analytica and John Bolton, former National Security Adviser to the Trump administration. In 2013, the John Bolton Super PAC paid Cambridge Analytica $650,000 for voter data analysis and digital video ad targeting.

The documents provide more details on that relationship, including using psychographics to play on voters hopes and fears. Psychographics is a methodology which focuses on consumers psychological attributes. Research firms attempt to develop a psychographic profile on various segments of the population by studying personality, opinions, interests, attitudes, values, and behaviors.

Cambridge Analytica first made headlines following the 2016 Presidential election after it was revealed the company had gained access to 87 million Facebook profiles. Whistleblower Christopher Wylie exposed how he helped set up CA and obtain the data of millions of Americans. This is when the public began to understand the scope of Cambridge Analytica’s operations.

In 2015, the UK-based political consulting firm, worked on behalf of Ted Cruz’s campaign to help him win the 2016 Republican nomination. Cambridge Analytica was also involved in campaigns to promote Brexit, as well as promoting the 2016 Trump Presidential campaign. Donald Trump would eventually hire Steven Bannon as the chief strategist for his White House. Bannon previously served as CA’s vice president and was the executive chairman of Breitbart News.

It was through Bannon that whistleblower Christopher Wylie and CA CEO Alexander Nix came to know billionaire Robert Mercer. Bannon arranged for Mercer to invest five million dollars into the creation of Cambridge Analytica. Mercer wanted to work with the group to influence the U.S. elections. When the public became aware of the manipulation by CA, Bannon denied having any knowledge of the scheme. Wylie, however, said Cambridge Analytica was Bannon’s psychological warfare mindfuck.”

Cambridge Analyitca itself is a web of shadowy companies invested in behavioral researching and influencing mass behavior. Cambridge was born out of the Strategic Communications Laboratories (SCL), founded by Nigel Oakes and Alexander Nix. SCL claimed to have an expertise in Psychological Operations, and worked as part of military and political operations around the world. An article by the Register noted that SCL provided training to 15 (UK) Psychological Operations Group and had access to secret information.

The Great Hack documentary details how SCL started out as a military contractor called SCL Defense before shifting to using their data to influence elections. According to the New Yorker, SCL was born out of another organization created by Oakes, the Behavioral Dynamics Institute (BDI). Oakes told Marketing in a 1992 interview:

We use the same techniques as Aristotle and Hitler. We appeal to people on an emotional level to get them to agree on a functional level.”

Although Cambridge Analytica has officially shut down, company executives set up a new company in 2017 called Emerdata Limited.  It was also reported that SCL executives joined Emerdata, including Rebekah Mercer, daughter of billionaire Robert Mercer. The Mercer family have been consistent supporters of President Donald Trump.

The latest leaks from Cambridge Analytica seem poised to expose more lurid details of the inner workings of the disturbing relationship between big data and political operatives. Both the history of the company and its executives are a clear example of the growing trend of politicians seeking to use data gathered by social media companies to better understand and manipulate the minds of potential voters. Stay tuned to the Mind Unleashed for updates on this developing story.