What We Don’t Elect Matters Most: Central Banking and the Permanent Government

By Charles Hugh Smith

Source: Of Two Minds

We’re Number One in wealth, income and power inequality, yea for the Fed and the Empire!

If we avert our eyes from the electoral battle on the blood-soaked sand of the Coliseum and look behind the screen, we find the powers that matter are not elected: our owned by a few big banks Federal Reserve, run by a handful of technocrats, and the immense National Security State, a.k.a. the Permanent Government. These entities operate the Empire which hosts the electoral games for the entertainment and distraction of the public.

The governance machinery controlled by elected representatives is tightly constrained in what it can and cannot do. It can’t do anything to stop the debasement of the nation’s currency, which is totally controlled by the Politburo of the Fed, nor can it do much to limit the Imperial Project, other than feel-good PR bits here and there.

The president wields vast powers but even the president is powerless to stop the debasement of the nation’s currency and the enrichment of bankers, financiers, corporations, etc., who fund the campaigns of the gladiators, oops I mean politicians.

If we set aside the term Deep State and simply call it the unelected machinery of governance (Permanent Government), we get a clear picture of its scope and power. Presidents, senators and representatives come and go, but the machinery of Empire grinds on, decade after decade.

A great many people and places in America don’t matter to the Fed or the Permanent Government, and so they’ve been abandoned to their fates. The darlings of the Fed and Empire are clustered in Silicon Valley and other urban hubs where the technological and financial machinery of global hegemony are fabricated and maintained.

Those far from these centers of banking, finance and Big Tech have little to no stake as owners of meaningful capital. All they have to sell is their labor, and that’s been losing purchasing power for decades as financialization and globalization have stripmined rural America and enriched the bankers, financiers and speculators who serve the Fed and unelected Permanent Government.

The Fed and the Permanent Government have been very, very good to the few at the expense of the many. Look at the chart below at America’s complete dominance when measured by the soaring wealth of its top 1% power elite: We’re Number One in wealth, income and power inequality, yea for the Fed and the Empire! And we don’t have to elect them–they elect themselves.

 

How big corporations are draining the life out of a sick America

If today’s companies were truly offering a fair return to the taxpayers who built their businesses, they’d be doing a lot more to ensure that all Americans have the means to support their families.

By Paul Buchheit

Source: Nation of Change

When Dr. Jonas Salk was asked about a patent on his polio vaccine in 1955, he said, “There is no patent. Could you patent the sun?” When Gilead Sciences recently developed an anti-Covid drug for about $12 per treatment, they set the price at $3,200.

As Republicans and business leaders decry the word ‘social’ as anti-American, they continue to promote the free-market “winner take all” philosophy that has caused over half of our nation to try to survive without adequate health care and life savings and job opportunities. Our richest corporations are much to blame. A review of the facts should make this clear.

They continue to cheat on taxes

After building their businesses on 70 years of taxpayer-funded research and development, six dominant tech companies (Apple, Amazon, Google, Microsoft, Facebook, and Netflix), which together are worth over $7 trillion, have avoided over a hundred billion dollars in taxes over the past decade.

The profits of some of the largest U.S. corporations are surging in this pandemic year of sickness and death. And the levels of fraud and deceit keep growing along with the profits. A shocking analysis by the Tax Justice Network concludes that “Multinational firms operating around the world are shifting over $1 trillion in profits every year to corporate tax havens.” A trillion dollars a year, lost to the people in need of jobs and food and housing.

They’ve rigged the system

Fifty years of lobbying against their own tax responsibilities has borne fruit for the big corporations. First of all, the corporate tax rate has dropped from about 35 percent to a low of 11 percent in 2019.

Secondly, the payroll tax has been used to make up the corporate shortfall. In the past fifty years the corporate percent of tax revenue from major sources has decreased from 23 percent to 7 percent. The payroll tax percent has increased from 24 percent to 39 percent. Corporations have drastically cut their taxes while putting more of the tax burden on workers.

It gets more insidious. In the past ten years Republicans have waged an anti-IRS campaign, slashing the budget of one of the most productive and cost-effective government agencies, and eliminating the positions of highly specialized employees who might have been expected to go after the largest corporations and the biggest cheaters.

And it gets personal. According to the IRS’ own Taxpayer Advocate, the average U.S. household pays $3,000 per year to make up for the delinquents and deadbeats.

Their greed reached new heights

With the 2017 corporate tax cuts came the lofty assurances that money would be freed up for new investment in jobs and R&D. So what happened? Hypocrisy happened. In the following year S&P 500 companies set a new record for buying back their stock to artificially boost stock prices for management and investors — a practice that was illegal until the Reagan years. While about a third of S&P companies are now curtailing stock buybacks in response to the pandemic, others have depleted so much of their funds that they have turned to the pandemic-inspired CARES Act for relief to “distressed industries.”

Start with the airlines. The Big Four spent $42.5 billion on buybacks between 2014 and 2019, and now they’re asking for $50 billion in bailout money. Delta CEO Ed Bastian had the audacity to say “the owners of a business deserve a return, too.” Boeing, which was actually borrowing money to buy back stock, is now asking for a $17 billion bailout from taxpayers.

Merck, whose 1950s slogan was “Medicine is for people, not for profits,” spent $10 billion on R&D in 2018 and $14 billion on share repurchases and dividends.

At Home Depot, according to the Roosevelt Institute and the National Employment Law Project, the money spent on buybacks could have boosted the average employee’s salary by $18,000 a year.

And fast food giants including KFC, Wendy’s, and Papa John’s, who, according to the New York Times, had spent great sums of money on buybacks, now need $145 billion of taxpayer funding to avoid mass layoffs.

They show disdain for the American worker

Stock buybacks are only part of the corporate trend to diminish the state of the worker. Automation is eliminating millions of jobs. The old argument that the loss of jobs to technology has always been followed by a new and better class of work becomes meaningless when the machines start doing our thinking for us. And when the changes are occurring at such a rapid pace. A McKinsey report states: “Those earlier workforce transformations took place over many decades, allowing older workers to retire and new entrants to the workforce to transition to the growing industries. But the speed of change today is potentially faster.” The speed of change is faster still because of the loss of jobs during the Covid pandemic.

Common arguments in favor of the tech companies are that (1) they’re making a lot of people rich, and (2) they’re providing all of us with remarkable products. Well, they’re making about 20% of Americans rich. And their products are a result of 70 years of taxpayer-funded research and development, much of it by government agencies. If today’s companies were truly offering a fair return to the taxpayers who built their businesses, they’d be doing a lot more to ensure that all Americans have the means to support their families.

Why Does It Feel Like We’re in “Life During Wartime”?

By Charles Hugh Smith

Source: Of Two Minds

The laughably hopeless hope is that by propping up the corpses, the populace will discern some faint flicker of life in the decaying carcasses and return to their free-spending ways.

Call it cultural synchronicity, but it increasingly feels like we’re living in the 1979 Talking Heads song Life During Wartime, which was anchored by the lyric “This Ain’t No Party, This Ain’t No Disco, This Ain’t No Foolin’ Around.” Indeed.

It also feels like Life During Wartime because the propaganda is so blatant and intense: we’re winning the war on Covid-19, and our wars on everything else, too, of course, as war is the favored metaphor and favored policy at the end of the Empire.

The ceaseless propaganda is that “a vaccine is right around the corner.” The inconvenient reality is that Corporate Insiders Pocket $1 Billion in Rush for Coronavirus VaccineWell-timed stock bets have generated big profits for senior executives and board members at companies developing vaccines and treatments.

In other words, wartime profiteering isn’t just allowed, it’s encouraged–yet another sign that we’re in the final decay/collapse phase of Imperial Pretensions.

It’s easy to mix up the propaganda and the counter-propaganda, because they’re both so extreme. There is no middle ground, only pre-packaged positions which dictate which “data” is cherry-picked to support the political partisanship that’s being defended.

Is Data Our New False Religion? (June 23, 2020)

In a world of thousands of unread papers published in hundreds of scientific journals no one even reads and a corrupt culture of “science for sale,” there’s a veritable orchard to cherry-pick.

“Robert Horton, editor in chief of The Lancet, one of the most respected professional peer reviewed publications in the world dealing with biomedical research had this to say in an editorial published by The Lancet in April of 2015:”

“The case against science is straightforward: much of the scientific literature, perhaps half, may simply be untrue. Afflicted by studies with small sample sizes, tiny effects, invalid exploratory analyses, and flagrant conflicts of interest, together with an obsession for pursuing fashionable trends of dubious importance, science has taken a turn towards darkness.”

source: What is medicine’s 5 sigma?

“And this, published in 2009, by Dr. Marcia Angell, former editor of The New England Journal of Medicine, another world leading publication in medical research:”

“It is simply no longer possible to believe much of the clinical research that is published, or to rely on the judgment of trusted physicians or authoritative medical guidelines. I take no pleasure in this conclusion, which I reached slowly and reluctantly over my two decades as an editor of The New England Journal of Medicine.”

Skeptical of medical science reports? (ncbi.nlm.nih.gov)

Metaphorically speaking, the civilian populace believes “we’re winning” until the bombs start dropping on their homes. For some reason, this doesn’t feel like “winning.”

The V-shaped recovery is the propaganda war the status quo must win, for this is the narrative battle for the hearts and minds of the populace. The fear here is that should the populace lose confidence in The V-shaped recovery, they might reduce their borrowing and spending and increase their saving, dooming an economy that depends entirely on marginal spending funded by debt to keep from imploding.

As the chart of the rising wedge model of breakdown below illustrates, when big-ticket costs ratchet higher like clockwork–rent, property taxes, childcare, higher education, debt, healthcare, etc.– while income stagnates for the bottom 90%, any drop in spending, no matter how modest, breaks the system because any reduction in spending reduces tax revenues, corporate profits and debt payments below the critical threshold.

This is why the Federal Reserve is so keen on bailing out bankrupt-in-all-but-name corporations and banks: The laughably hopeless hope is that by propping up the corpses, the populace will discern some faint flicker of life in the decaying carcasses and return to their free-spending ways.

This is also why “stimulus” is being scattered from helicopters: the hope is that by substituting borrowed trillions for earned trillions, people will substitute magical thinking for clear-eyed recognition that the era of “growth” has transitioned into the era of DeGrowth, a state of affairs that signals the demise of all the bloated, sclerotic institutions operated to benefit insiders and Corporate America’s cartels and monopolies: the most protected bastions of the era, colleges and hospitals, are going broke and closing.

As Marx noted, “everything solid melts into air” when it’s no longer financially viable. Helicopter “stimulus” just creates a temporary illusion of solidity.

And then there’s the immense profitability of Big Tech pushing propaganda, partisanship, anger and indignation: If you’re not terrified about Facebook, you haven’t been paying attention.

The foundations are collapsing, but by all means, please keep your eye on the decaying corpses: didn’t an eyelid flicker in that one? I could swear that one moved its foot…

This is “life in wartime,” where the battles are waged in narratives, confidence and magical thinking.

Forget the V, W or L Recovery: Focus on N-P-B (June 29, 2020)

The Fed’s Casino Is In Flames, But Please Continue Gambling (June 18, 2020)

Our Wile E. Coyote Economy: Nothing But Financial Engineering (June 12, 2020)

Unstoppable: The Greatest Depression and the Reverse Wealth Effect (June 10, 2020)

Technofascism: Digital Book Burning in a Totalitarian Age

By John W. Whitehead

Source: The Rutherford Institute

“Those who created this country chose freedom. With all of its dangers. And do you know the riskiest part of that choice they made? They actually believed that we could be trusted to make up our own minds in the whirl of differing ideas. That we could be trusted to remain free, even when there were very, very seductive voices—taking advantage of our freedom of speech—who were trying to turn this country into the kind of place where the government could tell you what you can and cannot do.”—Nat Hentoff

We are fast becoming a nation—nay, a world—of book burners.

While on paper, we are technically free to speak—at least according to the U.S. Constitution—in reality, however, we are only as free to speak as the government and its corporate partners such as Facebook, Google or YouTube may allow.

That’s not a whole lot of freedom. Especially if you’re inclined to voice opinions that may be construed as conspiratorial or dangerous.

Take David Icke, for example.

Icke, a popular commentator and author often labeled a conspiracy theorist by his detractors, recently had his Facebook page and YouTube channel (owned by Google) deleted for violating site policies by “spreading coronavirus disinformation.”

The Centre for Countering Digital Hate, which has been vocal about calling for Icke’s de-platforming, is also pushing for the removal of all other sites and individuals who promote Icke’s content in an effort to supposedly “save lives.”

Translation: the CCDH evidently believes the public is too dumb to think for itself and must be protected from dangerous ideas.

This is the goosestepping Nanny State trying to protect us from ourselves.

In the long run, this “safety” control (the censorship and shadowbanning of anyone who challenges a mainstream narrative) will be far worse than merely allowing people to think for themselves.

Journalist Matt Taibbi gets its: “The people who want to add a censorship regime to a health crisis are more dangerous and more stupid by leaps and bounds than a president who tells people to inject disinfectant.”

Don’t fall for the propaganda.

These internet censors are not acting in our best interests to protect us from dangerous, disinformation campaigns about COVID-19, a virus whose source and behavior continue to elude medical officials. They’re laying the groundwork now, with Icke as an easy target, to preempt any “dangerous” ideas that might challenge the power elite’s stranglehold over our lives.

This is how freedom dies.

It doesn’t matter what disinformation Icke may or may not have been spreading about COVID-19. That’s not the issue.

As commentator Caitlin Johnstone recognizes, the censorship of David Icke by these internet media giants has nothing to do with Icke: “What matters is that we’re seeing a consistent and accelerating pattern of powerful plutocratic institutions collaborating with the US-centralized empire to control what ideas people around the world are permitted to share with each other, and it’s a very unsafe trajectory.”

Welcome to the age of technofascism.

Technofascism, clothed in tyrannical self-righteousness, is powered by technological behemoths (both corporate and governmental) working in tandem. As journalist Chet Bowers explains, “Technofascism’s level of efficiency and totalitarian potential can easily lead to repressive systems that will not tolerate dissent.”

The internet, hailed as a super-information highway, is increasingly becoming the police state’s secret weapon. This “policing of the mind: is exactly the danger author Jim Keith warned about when he predicted that “information and communication sources are gradually being linked together into a single computerized network, providing an opportunity for unheralded control of hat will be broadcast, what will be said, and ultimately what will be thought.”

It’s a slippery slope from censoring so-called illegitimate ideas to silencing truth.

Eventually, as George Orwell predicted, telling the truth will become a revolutionary act.

We’re almost at that point now.

What you are witnessing is the modern-day equivalent of book burning which involves doing away with dangerous ideas—legitimate or not—and the people who espouse them.

Today, the forces of political correctness, working in conjunction with corporate and government agencies, have managed to replace actual book burning with intellectual book burning.

Free speech for me but not for thee” is how my good friend and free speech purist Nat Hentoff used to sum up this double standard.

This is about much more than free speech, however. This is about repression and control.

With every passing day, we’re being moved further down the road towards a totalitarian society characterized by government censorship, violence, corruption, hypocrisy and intolerance, all packaged for our supposed benefit in the Orwellian doublespeak of national security, tolerance and so-called “government speech.”

The reasons for such censorship vary widely from political correctness, safety concerns and bullying to national security and hate crimes but the end result remains the same: the complete eradication of what Benjamin Franklin referred to as the “principal pillar of a free government.”

The upshot of all of this editing, parsing, banning and silencing is the emergence of a new language, what George Orwell referred to as Newspeak, which places the power to control language in the hands of the totalitarian state.

Under such a system, language becomes a weapon to change the way people think by changing the words they use.

The end result is control.

In totalitarian regimes—a.k.a. police states—where conformity and compliance are enforced at the end of a loaded gun, the government dictates what words can and cannot be used.

In countries where the police state hides behind a benevolent mask and disguises itself as tolerance, the citizens censor themselves, policing their words and thoughts to conform to the dictates of the mass mind lest they find themselves ostracized or placed under surveillance.

Even when the motives behind this rigidly calibrated reorientation of societal language appear well-intentioned—discouraging racism, condemning violence, denouncing discrimination and hatred—inevitably, the end result is the same: intolerance, indoctrination and infantilism.

It’s political correctness disguised as tolerance, civility and love, but what it really amounts to is the chilling of free speech and the demonizing of viewpoints that run counter to the cultural elite.

The police state could not ask for a better citizenry than one that carries out its own censorship, spying and policing: this is how you turn a nation of free people into extensions of the omniscient, omnipotent, omnipresent police state, and in the process turn a citizenry against each other.

Tread cautiously: Orwell’s 1984, which depicts the ominous rise of ubiquitous technology, fascism and totalitarianism, has become an operation manual for the omnipresent, modern-day surveillance state.

1984 portrays a global society of total control in which people are not allowed to have thoughts that in any way disagree with the corporate state. There is no personal freedom, and advanced technology has become the driving force behind a surveillance-driven society. Snitches and cameras are everywhere. People are subject to the Thought Police, who deal with anyone guilty of thought crimes. The government, or “Party,” is headed by Big Brother who appears on posters everywhere with the words: “Big Brother is watching you.”

We have arrived, way ahead of schedule, into the dystopian future dreamed up by not only Orwell but also such fiction writers as Aldous Huxley, Margaret Atwood and Philip K. Dick.

Much like Orwell’s Big Brother in 1984, the government and its corporate spies now watch our every move. Much like Huxley’s A Brave New World, we are churning out a society of watchers who “have their liberties taken away from them, but … rather enjoy it, because they [are] distracted from any desire to rebel by propaganda or brainwashing.” Much like Atwood’s The Handmaid’s Tale, the populace is now taught to “know their place and their duties, to understand that they have no real rights but will be protected up to a point if they conform, and to think so poorly of themselves that they will accept their assigned fate and not rebel or run away.”

And in keeping with Philip K. Dick’s darkly prophetic vision of a dystopian police state—which became the basis for Steven Spielberg’s futuristic thriller Minority Report—we are now trapped in a world in which the government is all-seeing, all-knowing and all-powerful, and if you dare to step out of line, dark-clad police SWAT teams and pre-crime units will crack a few skulls to bring the populace under control.

What once seemed futuristic no longer occupies the realm of science fiction.

Incredibly, as the various nascent technologies employed and shared by the government and corporations alike—facial recognition, iris scanners, massive databases, behavior prediction software, and so on—are incorporated into a complex, interwoven cyber network aimed at tracking our movements, predicting our thoughts and controlling our behavior, the dystopian visions of past writers is fast becoming our reality.

In fact, our world is characterized by widespread surveillance, behavior prediction technologies, data mining, fusion centers, driverless cars, voice-controlled homes, facial recognition systems, cybugs and drones, and predictive policing (pre-crime) aimed at capturing would-be criminals before they can do any damage. Surveillance cameras are everywhere. Government agents listen in on our telephone calls and read our emails. And privacy and bodily integrity have been utterly eviscerated.

We are increasingly ruled by multi-corporations wedded to the police state.

What many fail to realize is that the government is not operating alone. It cannot.

The government requires an accomplice.

Thus, the increasingly complex security needs of the massive federal government, especially in the areas of defense, surveillance and data management, have been met within the corporate sector, which has shown itself to be a powerful ally that both depends on and feeds the growth of governmental overreach.

In fact, Big Tech wedded to Big Government has become Big Brother, and we are now ruled by the Corporate Elite whose tentacles have spread worldwide.

The government now has at its disposal technological arsenals so sophisticated and invasive as to render any constitutional protections null and void. Spearheaded by the NSA, which has shown itself to care little to nothing for constitutional limits or privacy, the “security/industrial complex”—a marriage of government, military and corporate interests aimed at keeping Americans under constant surveillance—has come to dominate the government and our lives.

Money, power, control.

There is no shortage of motives fueling the convergence of mega-corporations and government. But who is paying the price?

“We the people,” of course. Not just we Americans, but people the world over.

We have entered into a global state of tyranny.

Where we stand now is at the juncture of OldSpeak (where words have meanings, and ideas can be dangerous) and Newspeak (where only that which is “safe” and “accepted” by the majority is permitted). The power elite has made their intentions clear: they will pursue and prosecute any and all words, thoughts and expressions that challenge their authority.

This is the final link in the police state chain.

Americans have been conditioned to accept routine incursions on their privacy rights. In fact, the addiction to screen devices—especially cell phones—has created a hive effect where the populace not only watched but is controlled by AI bots. However, at one time, the idea of a total surveillance state tracking one’s every move would have been abhorrent to most Americans. That all changed with the 9/11 attacks. As professor Jeffrey Rosen observes, “Before Sept. 11, the idea that Americans would voluntarily agree to live their lives under the gaze of a network of biometric surveillance cameras, peering at them in government buildings, shopping malls, subways and stadiums, would have seemed unthinkable, a dystopian fantasy of a society that had surrendered privacy and anonymity.”

Having been reduced to a cowering citizenry—mute in the face of elected officials who refuse to represent us, helpless in the face of police brutality, powerless in the face of militarized tactics and technology that treat us like enemy combatants on a battlefield, and naked in the face of government surveillance that sees and hears all—we have nowhere left to go.

We have, so to speak, gone from being a nation where privacy is king to one where nothing is safe from the prying eyes of government.

In search of so-called terrorists and extremists hiding amongst us—the proverbial “needle in a haystack,” as one official termed it—the Corporate State has taken to monitoring all aspects of our lives, from cell phone calls and emails to Internet activity and credit card transactions. This data is being fed through fusion centers across the country, which work with the Department of Homeland Security to make threat assessments on every citizen, including school children.

Wherever you go and whatever you do, you are now being watched, especially if you leave behind an electronic footprint.

When you use your cell phone, you leave a record of when the call was placed, who you called, how long it lasted and even where you were at the time. When you use your ATM card, you leave a record of where and when you used the card. There is even a video camera at most locations equipped with facial recognition software. When you use a cell phone or drive a car enabled with GPS, you can be tracked by satellite. Such information is shared with government agents, including local police. And all of this once-private information about your consumer habits, your whereabouts and your activities is now being fed to the U.S. government.

The government has nearly inexhaustible resources when it comes to tracking our movements, from electronic wiretapping devices, traffic cameras and biometrics to radio-frequency identification cards, satellites and Internet surveillance.

Speech recognition technology now makes it possible for the government to carry out massive eavesdropping by way of sophisticated computer systems. Phone calls can be monitored, the audio converted to text files and stored in computer databases indefinitely. And if any “threatening” words are detected—no matter how inane or silly—the record can be flagged and assigned to a government agent for further investigation. Federal and state governments, again working with private corporations, monitor your Internet content. Users are profiled and tracked in order to identify, target and even prosecute them.

In such a climate, everyone is a suspect. And you’re guilty until you can prove yourself innocent.

Here’s what a lot of people fail to understand, however: it’s not just what you say or do that is being monitored, but how you think that is being tracked and targeted.

We’ve already seen this play out on the state and federal level with hate crime legislation that cracks down on so-called “hateful” thoughts and expression, encourages self-censoring and reduces free debate on various subject matter.

Say hello to the new Thought Police.

Total Internet surveillance by the Corporate State, as omnipresent as God, is used by the government to predict and, more importantly, control the populace, and it’s not as far-fetched as you might think. For example, the NSA has designed an artificial intelligence system that can anticipate your every move. In a nutshell, the NSA feeds vast amounts of the information it collects to a computer system known as Aquaint (the acronym stands for Advanced QUestion Answering for INTelligence), which the computer then uses to detect patterns and predict behavior.

No information is sacred or spared.

Everything from cell phone recordings and logs, to emails, to text messages, to personal information posted on social networking sites, to credit card statements, to library circulation records, to credit card histories, etc., is collected by the NSA and shared freely with its agents.

Thus, what we are witnessing, in the so-called name of security and efficiency, is the creation of a new class system comprised of the watched (average Americans such as you and me) and the watchers (government bureaucrats, technicians and private corporations).

Clearly, the age of privacy is at an end.

So where does that leave us?

We now find ourselves in the unenviable position of being monitored, managed and controlled by our technology, which answers not to us but to our government and corporate rulers. This is the fact-is-stranger-than-fiction lesson that is being pounded into us on a daily basis.

It won’t be long before we find ourselves looking back on the past with longing, back to an age where we could speak to whom we wanted, buy what we wanted, think what we wanted without those thoughts, words and activities being tracked, processed and stored by corporate giants such as Google, sold to government agencies such as the NSA and CIA, and used against us by militarized police with their army of futuristic technologies.

To be an individual today, to not conform, to have even a shred of privacy, and to live beyond the reach of the government’s roaming eyes and technological spies, one must not only be a rebel but rebel.

Even when you rebel and take your stand, there is rarely a happy ending awaiting you. You are rendered an outlaw.

So how do you survive this global surveillance state?

As I make clear in my book Battlefield America: The War on the American People, we’re running out of options.

We’ll soon have to choose between self-indulgence (the bread-and-circus distractions offered up by the news media, politicians, sports conglomerates, entertainment industry, etc.) and self-preservation in the form of renewed vigilance about threats to our freedoms and active engagement in self-governance.

Yet as Aldous Huxley acknowledged in Brave New World Revisited: “Only the vigilant can maintain their liberties, and only those who are constantly and intelligently on the spot can hope to govern themselves effectively by democratic procedures. A society, most of whose members spend a great part of their time, not on the spot, not here and now and in their calculable future, but somewhere else, in the irrelevant other worlds of sport and soap opera, of mythology and metaphysical fantasy, will find it hard to resist the encroachments of those would manipulate and control it.”

Which brings me back to this technofascist tyranny being meted out on David Icke and all those like him who dare to voice ideas that diverge from what the government and its corporate controllers deem to be acceptable.

The problem as I see it is that we’ve allowed ourselves to be persuaded that we need someone else to think and speak for us. And we’ve allowed ourselves to become so timid in the face of offensive words and ideas that we’ve bought into the idea that we need the government to shield us from that which is ugly or upsetting or mean.

The result is a society in which we’ve stopped debating among ourselves, stopped thinking for ourselves, and stopped believing that we can fix our own problems and resolve our own differences.

In short, we have reduced ourselves to a largely silent, passive, polarized populace incapable of working through our own problems and reliant on the government to protect us from our fears.

In this way, we have become our worst enemy.

You want to reclaim some of the ground we’re fast losing to the techno-tyrants?

Start by thinking for yourself. If that means reading the “dangerous” ideas being floated out there by the David Ickes of the world—or the John Whiteheads for that matter—and then deciding for yourself what is true, so be it.

As Orwell concluded, “Freedom is the right to say two plus two make four.”

Slouching towards dystopia: the rise of surveillance capitalism and the death of privacy

Our lives and behaviour have been turned into profit for the Big Tech giants – and we meekly click “Accept”. How did we sleepwalk into a world without privacy?

By John Naughton

Source: New Statesman

Suppose you walk into a shop and the guard at the entrance records your name. Cameras on the ceiling track your every step in the store, log which items you looked at and which ones you ignored. After a while you notice that an employee is following you around, recording on a clipboard how much time you spend in each aisle. And after you’ve chosen an item and bring it to the cashier, she won’t complete the transaction until you reveal your identity, even if you’re paying cash.

Another scenario: a stranger is standing at the garden gate outside your house. You don’t know him or why he’s there. He could be a plain-clothes police officer, but there’s no way of knowing. He’s there 24/7 and behaves like a real busybody. He stops everybody who visits you and checks their identity. This includes taking their mobile phone and copying all its data on to a device he carries. He does the same for family members as they come and go. When the postman arrives, this stranger insists on opening your mail, or at any rate on noting down the names and addresses of your correspondents. He logs when you get up, how long it takes you to get dressed, when you have meals, when you leave for work and arrive at the office, when you get home and when you go to bed, as well as what you read. He is able to record all of your phone calls, texts, emails and the phone numbers of those with whom you exchange WhatsApp messages. And when you ask him what he thinks he’s doing, he just stares at you. If pressed, he says that if you have nothing to hide then you have nothing to fear. If really pressed, he may say that everything he does is for the protection of everyone.

A third scenario: you’re walking down the street when you’re accosted by a cheery, friendly guy. He runs a free photo-framing service – you just let him copy the images on your smartphone and he will tidy them up, frame them beautifully and put them into a gallery so that your friends and family can always see and admire them. And all for nothing! All you have to do is to agree to a simple contract. It’s 40 pages but it’s just typical legal boilerplate – the stuff that turns lawyers on. You can have a copy if you want. You make a quick scan of the contract. It says that of course you own your photographs but that, in exchange for the wonderful free framing service, you grant the chap “a non-exclusive, transferable, sub-licensable, royalty-free and worldwide licence to host, use, distribute, modify, copy, publicly perform or display, translate and create derivative works” of your photos. Oh, and also he can change, suspend, or discontinue the framing service at any time without notice, and may amend any of the agreement’s terms at his sole discretion by posting the revised terms on his website. Your continued use of the framing service after the effective date of the revised agreement constitutes your acceptance of its terms. And because you’re in a hurry and you need some pictures framed by this afternoon for your daughter’s birthday party, you sign on the dotted line.

All of these scenarios are conceivable in what we call real life. It doesn’t take a nanosecond’s reflection to conclude that if you found yourself in one of them you would deem it preposterous and intolerable. And yet they are all simple, if laboured, articulations of everyday occurrences in cyberspace. They describe accommodations that in real life would be totally unacceptable, but which in our digital lives we tolerate meekly and often without reflection.

The question is: how did we get here?

***

It’s a long story, but with hindsight the outlines are becoming clear. Technology comes into it, of course – but plays a smaller part than you might think. It’s more a story about human nature, about how capitalism has mutated to exploit digital technology, about the liberal democratic state and the social contract, and about governments that have been asleep at the wheel for several decades.

To start with the tech: digital is different from earlier general-purpose technologies in a number of significant ways. It has zero marginal costs, which means that once you have made the investment to create something it costs almost nothing to replicate it a billion times. It is subject to very powerful network effects – which mean that if your product becomes sufficiently popular then it becomes, effectively, impregnable. The original design axioms of the internet – no central ownership or control, and indifference to what it was used for so long as users conformed to its technical protocols – created an environment for what became known as “permissionless innovation”. And because every networked device had to be identified and logged, it was also a giant surveillance machine.

Since we humans are social animals, and the internet is a communications network, it is not surprising we adopted it so quickly once services such as email and web browsers had made it accessible to non-techies. But because providing those services involved expense – on servers, bandwidth, tech support, etc – people had to pay for them. (It may seem incredible now, but once upon a time having an email account cost money.) Then newspaper and magazine publishers began putting content on to web servers that could be freely accessed, and in 1996 Hotmail was launched (symbolically, on 4 July, Independence Day) – meaning that anyone could have email for free.

Hotmail quickly became ubiquitous. It became clear that if a business wanted to gain those powerful network effects, it had to Get Big Fast; and the best way to do that was to offer services that were free to use. The only thing that remained was finding a business model that could finance services growing at exponential rates and provide a decent return for investors.

That problem was still unsolved when Google launched its search engine in 1998. Usage of it grew exponentially because it was manifestly better than its competitors. One reason for its superiority was that it monitored very closely what users searched for and used this information to improve the algorithm. So the more that people used the engine, the better it got. But when the dot-com bubble burst in 2000, Google was still burning rather than making money and its two biggest venture capital investors, John Doerr of Kleiner Perkins and Michael Moritz of Sequoia Capital, started to lean on its founders, Larry Page and Sergey Brin, to find a business model.

Under that pressure they came up with one in 2001. They realised that the data created by their users’ searches could be used as raw material for algorithms that made informed guesses about what users might be interested in – predictions that could be useful to advertisers. In this way what was thought of as mere “data exhaust” became valuable “behavioural surplus” – information given by users that could be sold. Between that epiphany and Google’s initial public offering in 2004, the company’s revenues increased by over 3,000 per cent.

Thus was born a new business model that the American scholar Shoshana Zuboff later christened “surveillance capitalism”, which she defined as: “a new economic order that claims human experience as the raw material for hidden commercial practices of extraction, prediction and sales”. Having originated at Google, it was then conveyed to Facebook in 2008 when a senior Google executive, Sheryl Sandberg, joined the social media giant. So Sandberg became, as Zuboff puts it, the “Typhoid Mary” who helped disseminate surveillance capitalism.

***

The dynamic interactions between human nature and this toxic business model lie at the heart of what has happened with social media. The key commodity is data derived from close surveillance of everything that users do when they use these companies’ services. Therefore, the overwhelming priority for the algorithms that curate users’ social media feeds is to maximise “user engagement” – the time spent on them – and it turns out that misinformation, trolling, lies, hate-speech, extremism and other triggers of outrage seem to achieve that goal better than more innocuous stuff. Another engagement maximiser is clickbait – headlines that intrigue but leave out a key piece of information. (“She lied all her life. Guess what happened the one time she told the truth!”) In that sense, social media and many smartphone apps are essentially fuelled by dopamine – the chemical that ferries information between neurons in our brains, and is released when we do things that give us pleasure and satisfaction.

The bottom line is this: while social media users are essential for surveillance capitalism, they are not its paying customers: that role is reserved for advertisers. So the relationship of platform to user is essentially manipulative: he or she has to be encouraged to produce as much behavioural surplus as possible.

A key indicator of this asymmetry is the End User Licence Agreement (EULA) that users are required to accept before they can access the service. Most of these “contracts” consist of three coats of prime legal verbiage that no normal human being can understand, and so nobody reads them. To illustrate the point, in June 2014 the security firm F-Secure set up a free WiFi hotspot in the centre of London’s financial district. Buried in the EULA for this “free” service was a “Herod clause”: in exchange for the WiFi, “the recipient agreed to assign their first born child to us for the duration of eternity”. Six people accepted the terms.  In another experiment, a software firm put an offer of an award of $1,000 at the very end of its terms of service, just to see how many would read that far. Four months and 3,000 downloads later, just one person had claimed the offered sum.

Despite this, our legal systems accept the fact that most internet users click  “Accept” as confirmation of informed consent, which it clearly is not. It’s really passive acceptance of impotence. Such asymmetric contracts would be laughed out of court in real life but are still apparently sacrosanct in cyberspace.

According to the security guru Bruce Schneier of Harvard, “Surveillance is the business model of the internet.” But it’s also a central concern of modern states. When Edward Snowden broke cover in the summer of 2013 with his revelations of the extensiveness and scale of the surveillance capabilities and activities of the US and some other Western countries, the first question that came to mind was: is this a scandal or a crisis? Scandals happen all the time in democracies; they generate a great deal of heat and controversy, but after a while the media caravan moves on and nothing happens. Crises, on the other hand, do lead to substantive reform.

Snowden revealed that the US and its allies had been engaged in mass surveillance under inadequate democratic oversight. His disclosures provoked apparent soul-searching and anger in many Western democracies, but the degree of public concern varied from country to country. It was high in Germany, perhaps because so many Germans have recent memories of Stasi surveillance. In contrast, public opinion in Britain seemed relatively relaxed: opinion surveys at the time suggested that about two-thirds of the British public had confidence in the security services and were thus unruffled by Snowden. Nevertheless, there were three major inquiries into the revelations in the UK, and, ultimately, a new act of parliament – the Investigatory Powers Act 2016. This overhauled and in some ways strengthened judicial oversight of surveillance activities by the security services; but it also gave those services significant new powers  – for example in “equipment interference”  (legal cover to hack into targeted devices such as smartphones, domestic networks and “smart” devices such as thermostats). So, in the end, the impact of the Snowden revelations was that manifestly inadequate oversight provisions were replaced by slightly less inadequate ones. It was a scandal, not a crisis. Western states are still in the surveillance business; and their populations still seem comfortable with this.

There’s currently some concern about facial recognition, a genuinely intrusive surveillance technology. Machine-learning technology has become reasonably good at recognising faces in public places, and many state agencies and private companies are already deploying it. It means that people are being identified and tracked without their knowledge or consent. Protests against facial recognition are well-intentioned, but, as Harvard’s Bruce Schneier points out, banning it is the wrong way to oppose modern surveillance.

This is because facial recognition is just one identification tool among many enabled by digital technology. “People can be identified at a distance by their heartbeat or by their gait, using a laser-based system,” says Schneier. “Cameras are so good that they can read fingerprints and iris patterns from metres away. And even without any of these technologies, we can always be identified because our smartphones broadcast unique numbers called MAC addresses. Other things identify us as well: our phone numbers, our credit card numbers, the licence plates on our cars. China, for example, uses multiple identification technologies to support its surveillance state.”

The important point is that surveillance and our passive acceptance of it lies at the heart of the dystopia we are busily constructing. It doesn’t matter which technology is used to identify people: what matters is that we can be identified, and then correlated and tracked across everything we do. Mass surveillance is increasingly the norm. In countries such as China, a surveillance infrastructure is being built by the government for social control. In Western countries, led by the US, it’s being built by corporations in order to influence our buying behaviour, and is then used incidentally by governments.

What’s happened in the West, largely unnoticed by the citizenry, is a sea-change in the social contract between individuals and the state. Whereas once the deal was that we accepted some limitations on our freedom in exchange for security, now the state requires us to surrender most of our privacy in order to protect us. The (implicit and explicit) argument is that if we have nothing to hide there is nothing to fear. And people seem to accept that ludicrous trope. We have been slouching towards dystopia.

***

The most eerie thing about the last two decades is the quiescence with which people have accepted – and adapted to – revolutionary changes in their information environment and lives. We have seen half-educated tech titans proclaim mottos such as “Move fast and break things” – as Mark Zuckerberg did in the early years of Facebook – and then refuse to acknowledge responsibility when one of the things they may have helped to break is democracy.  (This is the same democracy, incidentally, that enforces the laws that protect their intellectual property, helped fund the technology that has enabled their fortunes and gives them immunity for the destructive nonsense that is disseminated by their platforms.) And we allow them to get away with it.

What can explain such indolent passivity? One obvious reason is that we really (and understandably) value some of the services that the tech industry has provided. There have been various attempts to attach a monetary value to them, but any conversation with a family that’s spread over different countries or continents is enough to convince one that being able to Skype or FaceTime a faraway loved one is a real boon. Or just think of the way that Google has become a memory prosthesis for humanity – or how educational non-profit organisations such as the Khan Academy can disseminate learning for free online.

We would really miss these services if they were one day to disappear, and this may be one reason why many politicians tip-toe round tech companies’ monopoly power. That the services are free at the point of use has undermined anti-trust thinking for decades: how do you prosecute a  monopoly that is not price-gouging its users? (The answer, in the case of social media, is that users are not customers;  the monopoly may well be extorting its actual customers – advertisers – but nobody seems to have inquired too deeply into that until recently.)

Another possible explanation is what one might call imaginative failure – most people simply cannot imagine the nature of the surveillance society that we are constructing, or the implications it might have for them and their grandchildren. There are only two cures for this failure: one is an existential crisis that brings home to people the catastrophic damage that technology could wreak. Imagine, for example, a more deadly strain of the coronavirus that rapidly causes a pandemic – but governments struggle to control it because official edicts are drowned out by malicious disinformation on social media. Would that make people think again about the legal immunity that social media companies enjoy from prosecution for content that they host on their servers?

The other antidote to imaginative failure is artistic creativity. It’s no accident that two of the most influential books of the last century were novels – Orwell’s Nineteen Eighty-Four (1949) and Aldous Huxley’s Brave New World (1932). The first imagined a world in which humans were controlled by fear engendered by comprehensive surveillance; the second portrayed one in which citizens were undone by addiction to pleasure – the dopamine strategy, if you like. The irony of digital technology is that it has given us both of these nightmares at once.

Whatever the explanation, everywhere at the moment one notices a feeling of impotence – a kind of learned helplessness. This is seen most vividly in the way people shrug their shoulders and click “Accept” on grotesquely skewed and manipulative  EULAs. They face a binary choice: accept the terms or go away. Hence what has become known as the “privacy paradox” – whenever researchers and opinion pollsters ask internet users if they value their privacy, they invariably respond with a  resounding “yes”. And yet they continue to use the services that undermine that beloved privacy.

It hasn’t helped that internet users have watched their governments do nothing about tech power for two decades. Surveillance capitalism was enabled because its practitioners operated in a lawless environment. It appropriated people’s data as a free resource and asserted its right to do so, much as previous variations of capitalism appropriated natural resources without legal restrictions. And now the industry claims as one of its prime proprietary assets the huge troves of that appropriated data that it possesses.

It is also relevant that tech companies have been free to acquire start-ups that threatened to become competitors without much, if any, scrutiny from competition authorities. In any rational universe, Google would not be permitted to own YouTube, and Facebook would have to divest itself of WhatsApp and Instagram. It’s even possible – as the French journalist  Frédéric Filloux has recently argued – that  Facebook believes its corporate interests are best served by the re-election of Donald Trump, which is why it’s not going to fact-check any political ads. As far as I can see, this state of affairs has not aroused even a squawk in the US.

When Benjamin Franklin emerged on the final day of deliberation from the Constitutional Convention of 1787, a woman asked him, “Well Doctor, what have we got, a republic or a monarchy?” To which Franklin replied, “A republic… if you can keep it.” The equivalent reply for our tech-dominated society would be: we have a democracy, if we can keep it.

 

Data governance and the new frontiers of resistance

The 21st century corporation is using algorithmic-based intelligence to accumulate data on a massive scale. Social movements need to grasp this change quickly.

By Anita Gurumurthy and Nandini Chami

Source: ROAR

Four centuries after the East India Company set the trend for corporate resource extraction, most of the world is now in the grip of unbridled corporate power. But corporate power is on the cusp of achieving “quantum supremacy” and social movements in the digital age need to understand this in order to shift gears in their struggles. The quantum shift here comes from “network-data” power; the ingredients that make up capitalism’s digital age recipe.

Contemporary capitalism is characterized by the accumulation of data-as-capital. Big Tech, as digital companies are collectively known, use the “platform” business model. This model provides a framework for interactions in the marketplace by connecting its many “nodes” — consumers, advertisers, service providers, producers, suppliers and even objects — that comprise the platform ecosystem, constantly harvesting their data and using algorithms to optimize interactions among them as a means to maximize profit.

The platform model emerged as a business proposition in the early 2000s when internet companies offering digital communication services began extracting user data from networked social interactions to generate valuable information for targeted advertising. It is estimated that by 2025, over 30 percent of global economic activity will be mediated by platform companies, an indication of the growing “platformization” of the real economy. In every economic sector, from agriculture to predictive manufacturing, retail commerce and even paid care work, the platform model is now an essential infrastructural layer.

Control over data-based intelligence gives platform owners a unique vantage point — the power to shape the nature of interactions among member nodes. Practices such as Amazon’s segmenting and hyper-targeting of consumers through price manipulation, Uber’s panoptic disciplining of its partner drivers, and TripAdvisor’s popularity ranking algorithm of listed properties, restaurants and hotels are all examples of how such platforms mediate economic transactions. The accumulation of data that feeds algorithmic optimization enables more intensified data extraction, in a self-propelling cycle that culminates in the platform’s totalizing control of entire economic ecosystems.

Amazon for instance, is no longer an online book store, and was perhaps never intended to be. With intimate knowledge about how the market works, Amazon is a market leader in anticipatory logistics and business analytics, providing both fulfillment and on-demand cloud-based computing services to third parties. Not only has it displaced traditional container-freight stations in port cities, it has begun to look increasingly like a shipping company. The dynamics of an intelligence economy have led to large swathes of economic activity being controlled by a handful of platform monopolies.

Studies suggest that in a matter of a couple of decades, platform monopolies have overtaken oil, automobile and financial corporations in market capitalization. Today, platform-based business models account for seven of the world’s top eight companies ranked by market capitalization. The pan-global platform corporation, with its DNA of data-based intelligence, has replaced the trans-national industrial corporation as the Leviathan of our times.

Enter the intelligent corporation

As the dominant form of economic organization in the capitalist world order, the corporation has always wielded power, not just in the market but also in political and socio-cultural realms. The rise of the “intelligent corporation” defined by the political economy of data capital has produced qualitative shifts in the exercise of corporate power, including the following.

From dominating the market to becoming the market

Like its predecessor, the intelligent corporation also aims at complete market domination. In platform-based capitalism, local business models based on intimate contextual knowledge are completely displaced by the data-based intermediation of marketplace and social transactions. It is by eliminating these disparate pockets of capital accumulation that platform owners maximize their profits.

The intelligent corporation also goes a step further, moving beyond “dominating the market” to “becoming the market.” Integrating across business lines, these companies both operate a platform and promote their own goods and services on it. This places them in direct competition with the businesses that use their infrastructure, and creates a conflict of interest. For example, Amazon uses its product marketplace data to consolidate its private labels, launching high-demand products at prices that undercut third-party sellers.

In this new strategy for acquiring market power, long-term market monopolization is privileged over the ability to break-even in the short run. The ecosystem that a platform seeks to capture has room only for one winner with the wherewithal to forgo immediate profits and invest in business integration — through aggressive acquisition — and systematic data-layer development. Other competitors are destined to fall by the wayside.

From cheap labor to freedom from labor

In the capitalist economy, the key contradiction is between capital and labor. Capital is in a perennial quest for freedom from labor through labor-substituting technological advances and territories to shift production to reduce labor costs. In the intelligence economy, capital seems to have come very close to realizing its primordial pursuit.

Using 360° surveillance, the intelligent corporation creates a self-optimizing ecosystem, manipulating each node, expanding its captive network, accumulating data capital and entrenching its dominance. It is able to achieve a global operational footprint with few assets and a minuscule employee base. Think Uber. Uber drivers are not considered to be employees in most places where the company runs its business. With a god’s eye view of the city and its roads, the customers and the driver, Uber takes over city transport, often without owning a single taxi. Passing off the liability to the driver, who must take a high-interest loan to acquire a vehicle to become Uber’s coveted “partner,” the corporation extracts from the driver more than just labor time.

In traditional labor-intensive manufacturing and services sectors, data capital is slowly but surely affecting far-reaching transformation. Projections show that automation based on artificial intelligence (AI) will eventually displace labor. It is estimated that over 40 percent of the global workforce will lose their jobs in AI-led disruption of manufacturing over the next 15–25 years. A limited number of high-paying jobs may open up for individuals with advanced skills in the development of data and AI technologies. But most of the labor force will end up in low-paid, personalized service work.

For countries in the Global South, the challenge will be especially pernicious. As rising wages erode the comparative advantage of labor in these economies, the shift to AI technology is likely to trigger a re-shoring trend whereby factories are relocated to richer countries that offer more sophisticated infrastructural support for deployment of AI systems. According to the World Bank, over two-thirds of the workforce in developing countries are likely to lose jobs. It is not clear how these changes will shift gender-based segmentation and gender hierarchies in labor markets. However, going by current trends, women seem to be the first to lose their jobs in this transition, with a reversal of both pay and status gains.

Planetary-scale time-space enclosure

Capturing previously non-commodified time and place has always been a central strategy of capitalist expansion. In the intelligence economy, we are witnessing a new phase of such “primitive accumulation” – through “data dispossession.” The expropriation of data from everyday social exchanges through the platform business model is comparable to the expropriation of natural resources for capitalist production in a previous age. The pervasive data extraction by platform companies has transformed data-mined social interaction into a factor of production, just as invaluable a resource as land for the creation of goods and services. The centralization of wealth and power today, derives from an unprecedented quality and scale of dispossession.

The dynamic of data dispossession is self-propelling. It is now well understood that platforms aggressively pursue a strategy of locking-in users, offering instant gratification in exchange for data and making it costly for them to leave a platform. The Chinese “super-platforms” WeChat and Meituan-Dianping combine news, entertainment, restaurant reviews, food delivery and ride-hailing, along with cross-cutting applications such as payment systems and digital wallets, demonstrating a “stickiness” that is almost addictive.

When participation in the platform on the platform owner’s terms becomes de facto the only choice for economic actors, data extractivism is normalized. Similar to the predatory practices of historical colonialism, the platform tactics of the intelligent corporation function as a neo-colonial project. The difference is that this time around, rather than European companies, the US and Chinese platform companies are in the driving seat.

A profoundly unsustainable exploitation of the natural world accompanies the rapid inroads of the intelligent corporation. Take the case of the vast ecological footprint of the online food-delivery sector. According to a 2018 study published in the science journal Resources, Conservation and Recycling, door-to-door fast-food delivery in China accounted for a nearly eightfold jump in packaging waste between 2015 and 2017, from 0.2 to 1.5 million tonnes. This has coincided with the exponential growth of the sector in the country, where the number of customers using food-delivery platforms has gone up from zero in 2009 to 406 million by the end of 2018! The intelligence economy is a veritable resource guzzler whose network data devices are expected to be consuming about one-fifth of global electricity by 2030 just to keep going.

The loss of self-determination for individuals and communities in these new intelligence-based modes of production reflects an asymmetry in power that was previously impossible. This is the route through which the brand-new corporation colonizes bodies and nature, takes control of production and social reproduction, and intensifies accumulation on a global scale.

The “deep corporate” and the death of the social contract

It is no secret that in the digital era, the deep state has had a makeover. Edward Snowden’s revelations and witness testimonies from China’s Uighur-dominated Xinjiang have exposed the dark workings of the contemporary military–industrial complex, the unholy nexus between Big Tech and the state. Trade justice activists have constantly pointed to the “hidden hand” of Silicon Valley and Chinese corporations using their governments to bat for their interests, reducing policy decisions to executive fiats for entrenching their power.

But what is only recently coming to light is the rise of the “deep corporate” — the extension of the Kraken-like tentacles of intelligent corporations into the heart of public life. The subsuming of social life by platform capitalism has distorted the political space thanks to the echo chambers of the automated public sphere. The contagion of mispropaganda and informational warfare in political campaigning has become impossible to contain in a public sphere determined by algorithmic filters. In this scenario, deliberative democracy itself is under the threat of extinction.

The social credit system being developed by China in partnership with eight tech companies takes the “corporatization” of governance to a whole new level. Access to benefits and citizens’ guaranteed rights are now predicated on behavioral scoring on the basis of online purchase history, financial transactions and social media connections on the partnering platforms. With the archetypal “good consumer” becoming the deserving citizen, citizenship is thus dislocated from political claims. The “deep corporate” acquires the formal authority to mediate the social contract.

Living with the intelligent corporation

We are living through a phase in capitalism that is marked by extreme market concentration, unprecedented inequality in wealth and the declining share of labor in global income; a state of affairs that has led even the IMF to express caution. It is no coincidence that this period of intensified economic injustice has coincided with the rise of platform capitalism and its real-world vehicle, the intelligent corporation.

What does living with the intelligent corporation mean?

What is new about this phase of capitalism that has spawned the intelligence economy is a deeply qualitative shift. Datafication and data capital transform the way capitalist “accumulation by dispossession” happens. “Intelligencification” makes plausible a planetary-scale colonization and commodification of everyday life by the new corporation in ways previously impossible. Both nature and caring bodies are trapped in a planetary enclosure insofar as everything and everybody can be turned into data.

It also feeds off and emboldens the financialization apparatus that runs the neoliberal economy. Through the perverse confluence of data and finance, the intelligent corporation universalizes and naturalizes its authority, destroying the marketplace of things and ideas.

Through data extractivism, the intelligent corporation ravages sociality, taking the ideological project of neoliberalism all the way to the expropriation of the political. This is a deep take-over, an “ontological encroachment” of human subjectivity.

Where does all this leave us?

As UNCTAD has highlighted, the pace of concentration of market power is extremely worrying. Consider this: Amazon’s profits-to-sales ratio increased from 10 percent in 2005 to 23 percent in 2015, while that of Alibaba increased in just four years from 10 percent in 2011 to 32 percent in 2015.

Policymakers across the world are struggling to reform their legacy laws to rein in the intelligent corporation. Even the domestic governments of powerful US and Chinese platform corporations are struggling to contain their excesses. The US Federal Trade Commission (FTC) is currently investigating Amazon and Facebook for abuse of market dominance while the US Justice Department is probing Google. The state of California is facing massive resistance from Uber and Lyft to its new regulation for labor rights of “gig” workers, with the two companies currently leading a $60 billion ballot initiative to extricate themselves from employer’s liability. In November 2019, the state administration for market regulation in China had to hold a meeting with Alibaba and other online retail platforms about their strong-arming of third-party vendors, in violation of existing regulations to curb anti-competitive conduct.

The loopholes of pre-digital taxation laws based on a physical presence in a given country have been effectively exploited by platform companies to escape tax liability, through profit shifting to low-tax jurisdictions. Similarly, when faced with liability for unfair market practices in overseas markets, it is very easy for platform companies to shift liability to their parent company outside the jurisdiction. For instance, Uber in South Africa resorted to the defense that its partner drivers were employees of the parent company headquartered in the Netherlands and not the South African subsidiary, in order to evade its liabilities under existing labor laws. The lack of binding international regulations governing cross-border data flows has also aided rampant data extractivism,

More recently, in the wake of malpractice lawsuits brought against Big Tech by their own employees; exposes about founding CEOs who have enjoyed a godly status; and public disenchantment with multiple revelations of clandestine data mining and algorithmic gaming, the early sheen seems to be wearing off. Google’s parent company Alphabet can no longer use its “Do the right thing” motto without irony. Facebook has been forced to switch to the “too big to fail” defense from the “protector and defender of the freedoms of the global community” line. Alibaba may not be able to proclaim its commitment to the development of small and medium enterprises in Africa for much longer. The façade has crumbled. And this rupture in the discursive hegemony of the intelligent corporation in which we are currently situated is the right moment to mount a collective challenge.

So, resist we must, so that the wealth of data and of networks can be appropriated and used to create a just and humane society. This means taking the intelligent corporation by the horns, and forging a movement that is able to grapple with the ethical–political boundaries of digital intelligence.

Taming the Leviathan and reclaiming the planet

Given the enormous economic and political clout of the modern corporation in the age of data, unshackling people and the planet from corporate power is an urgent task. Struggles against the extreme unfairness of the global trade and intellectual property regime by transnational social movements have shown the necessary connection between the agenda for development justice and the dismantling of corporate power.

Building alliances among movements has become a vital strategy in halting TNCs’ inexorable plunder. The trade justice movement against corporate globalization, the environment movement’s quest for sustainable development, feminist struggles to reclaim the body and the sphere of social reproduction from capital and workers’ struggle against the intensified squeeze on labor and the dismantling of social protection in neoliberal globalization are inspiring examples in this regard. Transnational civil society has painstakingly built alliances and solidarities across these movements to expose corporate excess, bringing pressure on the UN for a global binding treaty on TNCs’ human rights obligations in the face of near-insurmountable odds.

In the digital age, as corporate power assumes indomitable proportions — with tech CEOs carving out data dominions that they rule over — current frameworks of power analysis and action may not go very far. A concerted and coherent strategy is urgently needed in order to enable a more equitable distribution of the gains of data-based intelligence. The Digital Justice Manifesto released in November 2019 by the Just Net Coalition — through a process of strategic and sustained dialogue between digital rights, trade justice, feminist, environmental, labor and human rights groups and activists — outlines such a roadmap. As the Manifesto underlines, we need immediate action along three broad fronts to reclaim digital power from the intelligent corporation:

(a) Wrestling back ownership of our personal and collective data and intelligence by instituting an economic rights framework for data resources.

(b) Governing critical platform infrastructures as public utilities.

(c) Enforcing a local-to-global governance model for digital and data infrastructure that supports local economies and democratic self-determination of collectivities, preventing the enclosure of entire market and social ecosystems by a centralized intelligence. In other words, the governance of tech infrastructure must enable the flourishing of disparate local economies and make room for multiple platform models to function — co-operatives, social enterprises, public etc. — challenging the totalizing impetus of global intelligence capitalism.

Neoliberal globalization and financialization have led to profoundly unequal societies. The impunity of the TNC has been central to this dynamic. Social movements have placed several creative proposals to counter this: mandating charter renewal every five years overturning the principle of corporations’ perpetual legal existence; taxing stock trade on the basis of the holding period to contain excessive financial speculation; placing a cap on the individual assets of founders/CEOs and so on.

“Intelligencification” demands a new frontier for resistance. The power of the intelligent corporation must be contained through tactics small and big in political and cultural realms. A new wisdom about the governance of data must be explored for a truly emancipatory future for all.

How Government and Media Are Prepping America for a Failed 2020 Election

FILE – In this May 6, 2019, file photo Microsoft CEO Satya Nadella delivers the keynote address at Build, the company’s annual conference for software developers in Seattle. Microsoft says it has detected more than 740 infiltration attempts by nation-state actors in the past year targeting U.S.-based political parties, campaigns and other democracy-focused organizations including think tanks and other non-profits. (AP Photo/Elaine Thompson, File)

Russia, China and Iran are already being blamed for using tech to undermine the 2020 election. Yet, the very technologies they are allegedly using were created by a web of companies with deep ties to Israeli intelligence.

By Whitney Webb

Source: Mint Press News

As World War II drew to a close in Europe, British philosopher Bertrand Russell wrote that “neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of a great fear.”

Though numerous examples in the post-World War II era have proven Russell’s point, perhaps one of the best examples was the U.S. public’s willingness to swallow lie after lie about Saddam Hussein’s Iraq due to the climate of fear that followed the September 11 attacks. Those lies, propagated by dubious intelligence, government officials and a compliant media, resulted in catastrophes – large and small, both abroad and at home.

Today, an analogous narrative is being crafted by many of the same players – both in media and government – yet it has avoided scrutiny, even from independent media.

Over the past several months and with a renewed zeal in just the last few weeks, anonymous intelligence officials, dubious “experts” and establishment media outlets have crafted a narrative about the coming “chaos” of the 2020 election, months before it takes place. Per that narrative, certain state actors will use specific technologies to target the “American mind” in order to undermine the coming presidential election. The narrative holds that those efforts will be so successful that the U.S. will never recover as a democracy.

Though these anonymous government sources and their stenographers have already named the countries who will be responsible and the technologies they will use, they also admit that no evidence yet exists to back up these claims, meaning they are — at best — pure speculation.

Headlines such as “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” “Basically Every US National Security Leader Is Warning About Foreign Interference In The 2020 Election,” and “U.S. intel agencies: Russia and China plotting to interfere in 2020 election” have become increasingly common, despite no available evidence, as have warnings that the American public is defenseless against the old scourge of “fake news” and the new scourge of “deep fakes.” Some media reports have gone so far to say that actual foreign meddling isn’t even necessary as merely the fear of foreign meddling could be enough to upend the American political system beyond repair.

Historically, the goal of such fear-inducing narratives has been the trading of civil liberties for increased security, or rather, the appearance of increased security. Yet, when the need for security is felt due to a fear that is based on government-driven speculation and not on evidence, the goal of that narrative is not about protecting the public from a real, tangible threat but instead about the consolidation of power by the very groups responsible for crafting it — in this case, the intelligence community and other key players in the national security state.

However, what is particularly odd about this narrative surrounding imminent “chaos” and meddling in the upcoming 2020 election is the fact that, not only have the instruments of said meddling been named and described in detail, but their use in the election was recently simulated by a company with deep ties to both U.S. and Israeli intelligence. That simulation, organized and run by the Israeli-American company Cybereason, ended with scores of Americans dead, the cancellation of the 2020 election, the imposition of martial law and a spike in fear among the American populace.

Many of the technologies used to create that chaotic and horrific scenario in the Cybereason simulation are the very same technologies that U.S. federal officials and corporate media outlets have promoted as the core of the very toolkit that they claim will be used to undermine the coming election, such as deep fakes and hacks of critical infrastructure, consumer devices and even vehicles.

While the narrative in place has already laid the blame at the feet of U.S. rival states China, Russia and Iran, these very technologies are instead dominated by companies that are tied to the very same intelligence agencies as Cybereason, specifically Israeli military intelligence.

With intelligence agencies in the U.S. and Israel not only crafting the narrative about 2020 foreign meddling, but also dominating these technologies and simulating their use to upend the coming election, it becomes crucial to consider the motivations behind this narrative and if these intelligence agencies have ulterior motives in promoting and simulating such outcomes that would effectively end American democracy and hand almost total power to the national security state.

 

Media, intelligence foreshadow tech-powered doom for 2020

Even though the 2020 U.S. election is still months away, a plethora of media reports over the past six months (and even before then) have been raising concern after concern about how the U.S. election is still so vulnerable to foreign meddling that such meddling is essentially an inevitability.

Part of the reason for the recent pick-up in fear mongering appears to have been the release of a joint statement issued by key members of the Trump administration last November. That statement, authored by Attorney General Bill Barr, Defense Secretary Mark Esper, acting DHS Secretary Kevin McAleenan, acting Director of National Intelligence Joseph Maguire, FBI Director Christopher Wray, NSA Director Gen. Paul Nakasone, and Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs, claimed that foreign interference in 2020 was imminent despite admitting that there is no evidence of interference having taken place:

Our adversaries want to undermine our democratic institutions, influence public sentiment and affect government policies. Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions. Adversaries may try to accomplish their goals through a variety of means, including social media campaigns, directing disinformation operations or conducting disruptive or destructive cyber-attacks on state and local infrastructure.

While at this time we have no evidence of a compromise or disruption to election infrastructure that would enable adversaries to prevent voting, change vote counts or disrupt the ability to tally votes, we continue to vigilantly monitor any threats to U.S. elections (emphasis added).”

Despite the key caveat of there being no evidence at the time the statement was issued, media reports used the statement to claim that foreign interference in 2020 was imminent, such as in these reports from BuzzFeed, ABC News, and Newsweek.

In addition to the reports that have cast the involvement of state actors — namely Russia, Iran and China — as assured despite no evidence, other reports have made the claim that this allegedly imminent interference will inevitably be successful, largely due to claims that the tactics used will rely heavily on technology that the U.S. can’t hope to successfully counter. CSO Online, an online news outlets that provides news, analysis and research on security and risk management, recently warned that “fixing America’s voting and election infrastructure problems is a long-term proposition, one that won’t be fixed in time for the election in November” while the New York Times warned of imminent chaos and that “stealthier” malevolent foreign actors had already created the foundation for “an ugly campaign season marred by hacking and disinformation.” Wired claimed last year that U.S. election security “is still hurting at every level.”

In another example, Rolling Stone published an article earlier this month with the headline “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” which claims that “the reality is that: “We’ve made progress since the last election — but we’re much less secure than we should be.” The article goes on to say that claim that the goal isn’t necessarily to hack voting machines or change results, but “to merely create the impression of an attack as a way to undermine our faith in the electoral process.”

It continues:

The target is the minds of the American people,” says Joshua Geltzer, a former counterterrorism director on the National Security Council. “In some ways, we’re less vulnerable than we were in 2016. In other ways, it’s more.” Nearly every expert agrees on this: The worst-case scenario, the one we need to prepare for, is a situation that causes Americans to question the bedrock of our democracy — free and fair elections.”

Well before this type of rhetoric made its way into the U.S. media, Israeli intelligence-linked tech firm Cybereason claiming in a release on its website that “messing with a voter’s mind” would have a bigger impact than changing vote totals, even before the 2016 election. That release, published by Cybereason prior to the last presidential election, was authored by the company’s CEO, Lior Div, who used to lead offensive hacking operations against nation-states for Israeli military intelligence.

Notably, of all of these media reports, there is a clear consensus that one of the main tactics that will soon be used to meddle in the coming U.S. election will be the use of so-called “deep fakes.” Deriving its name from a combination of “deep learning” and “fake,” deep fakes involve video and audio that has been manipulated using artificial intelligence (AI) to create media that appears to be authentic, but is not. Concern about its use in the upcoming election has spurred not only a wealth of media reports on the matter but has prompted both the U.S. military and Congress to take action to limit its potential misuse.

One thing that stands out about the media narrative regarding election meddling and deep fakes is that several news organizations have published articles that state that deep fakes will be used to undermine the 2020 election, as opposed to stating that they could be used or that they are a phenomenon worthy of attention (though some reports have taken this more measured approach).

The reason for this level of confidence may owe to statements made by prominent U.S. intelligence officials last year, including those made by Dan Coats, the former Director of National Intelligence (DNI), who claimed in the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community that deep fakes and other hi-tech forms of fake media would be used to disrupt the 2020 election. Coats specifically stated:

Adversaries and strategic competitors probably will attempt to use deep fakes or similar machine-learning technologies to create convincing—but false—image, audio, and video files to augment influence campaigns directed against the United States and our allies and partners.”

Since Coats made the warning, numerous media reports have promoted the concern with little scrutiny, representing just one of the numerous times in U.S. history where narratives first authored by U.S. intelligence are subsequently promoted heavily by U.S. media, even when the claim made by intelligence officials is speculative, as it is in this case. Indeed, the narratives being promoted with respect to the 2020 election involve many of the same intelligence agencies (American and Israeli) and media outlets who promoted claims that were later proven false about “weapons of mass destruction” in Iraq prior to the 2003 invasion, among other pertinent examples.

Notably, deep fakes figured prominently and was the tool most used by malevolent hackers in Cybereason’s 2020 election simulation, which saw both video and audio-only deep fakes used to spread misinformation on national and local TV channels in order to impersonate police officers and election officials and to create fake bomb threats by posing as the terror group Daesh (ISIS). Cybereason also happens to be a partner of the organization funding the most well-known creator and producer of deep fakes in the world, an organization that — much like Cybereason itself — is openly tied to Israeli intelligence.

Aside from deep fakes, other technologies weaponized in Cybereason’s election simulation have also been the subject of several media reports, such as the hacking of Internet of Things (IoT) devices and appliances and even the hacking of vehicles that have some form of internet connectivity.  In the Cybereason simulation, IoT hacks were used to cut power to polling stations and disseminate disinformation while vehicles were hacked to conduct terror attacks against civilians waiting in line to vote, killing several and injuring hundreds.

Most media reports have claimed that these technologies will be part of the coming “explosion” in cyber warfare in 2020 and do not specifically link them to imminent election meddling. Others, however, have made the link to the election explicit.

 

Naming the culprits in advance

In addition to the apparent consensus on how foreign meddling will occur during the 2020 election, there is also agreement regarding which countries will be responsible. Again, this is largely based on statements made by U.S. national security officials. For instance, the joint statement issued last November by the DOJ, DOD, DHS, DNI, FBI, NSA, and CISA regarding 2020 election security, states that “Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions” before adding “at this time we have no evidence.”

Similarly, the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community, written by then-Director of National Intelligence Dan Coats, names these same three countries in relation to imminent 2020 election interference and states that their interference in the 2020 election is “almost certain.” The assessment adds the following about each nation:

  • Russia: “Russia’s social media efforts will continue to focus on aggravating social and racial tensions, undermining trust in authorities, and criticizing perceived anti-Russia politicians.”
  • China: “China will continue to use legal, political, and economic levers—such as the lure of Chinese markets—to shape the information environment. It is also capable of using cyber attacks against systems in the United States to censor or suppress viewpoints it deems politically sensitive.”
  • Iran: “Iran, which has used social media campaigns to target audiences in both the United States and allied nations with messages aligned with Iranian interests, will continue to use online influence operations to try to advance its interests.”

Coats’ assessment was enough to spawn numerous stories on the imminent threat that these three nations pose to the 2020 election, with headlines such as “U.S. intel agencies: Russia and China plotting to interfere in 2020 election.”

The vast majority of warnings regarding future election interference have come from U.S. intelligence officials with a dubious record of trustworthiness and a history of using the media to spread propaganda and disinformation, most famously through Operation Mockingbird. Most — if not all — of the recent and numerous articles on imminent interference rely heavily on claims made by the two aforementioned government documents, documents crafted by U.S. intelligence agencies for public consumption, as well as claims made by anonymous U.S. officials.

A recent New York Times article, for example, titled “Chaos Is the Point’: Russian Hackers and Trolls Grow Stealthier in 2020,” is based almost entirely on “interviews with dozens of officials and experts,” though the only government official named in the article is Shelby Pierson, the intelligence community’s election threats executive. The most quoted experts named in the article are Ben Nimmo, formerly of the hawkish, NATO-funded Atlantic Council and now with Graphika, and Laura Rosenberger, director of the neoconservative-created Alliance for Securing Democracy. The article nonetheless cites “American officials” and “current and former officials” several times to make claims about imminent election interference that paint a bleak picture of the current election season.

A recent article from The Hill relies on the acting head of DHS, Chad Wolf, as its only source, citing Wolf’s claim that “we fully expect Russia to attempt to interfere in the 2020 elections to sow public discord and undermine our democratic institutions” amid other warnings that Wolf gave about Chinese and Iranian cyber threats to U.S. elections. Other articles, including one titled “Russia, China plan to adjust their tactics to hack, influence 2020 elections” cite only Shelby Pierson of the U.S. intelligence community as its source for that headline’s claim. Another titled “Russia isn’t the only threat to 2020 elections, says U.S. intel” cites only anonymous U.S. intelligence officials, as the headline suggests.

Though Russia and China have consistently been named as the most likely election meddlers, reports have also been drumming up the likelihood that Iran will emerge as 2020’s foreign meddler of choice, especially in the months prior to and weeks after the killing of Iranian General Qassem Soleimani by the Trump administration. A recent “informal poll” conducted by the Washington Post asked hawkish think tank fellows, employees at companies like Raytheon and current and former federal officials if Iran would likely retaliate against the U.S. via cyberattack. The Post ran the results of the poll under the headline “Get ready for serious cyberattacks from Iran, experts say.”

Despite the media’s numerous warnings of imminent and “serious” cyber-retaliation from Iran, the only cyberattack attributed to the country after Soleimani’s death was the vandalism of the Federal Depository Library Program website, a rather benign act that was nevertheless blasted across headlines such as “US government website hacked with pro-Iranian messages, image of bloodied Trump.” The U.S. government is quoted in that article as saying that “At this time, there is no confirmation that this was the action of Iranian state-sponsored actors.”

Also notably absent from media reports is the fact that WikiLeaks revealed in 2017 that the CIA had stockpiled a library of “stolen” cyberattack techniques produced in other nations, including Russia and Iran. Those revelations, part of the Vault 7 release, revealed that the CIA’s UMBRAGE group was capable of “misdirect[ing] attribution [for cyberattacks actually done by the CIA] by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.” In other words, the CIA was more than capable of conducting “false flag” cyber attacks and blaming them on foreign actors.

Notably, one of the viruses being blamed on Iran for cyberattacks targeting the U.S. ahead of the 2020 election — called Shamoon — was “stolen” by the CIA’s UMBRAGE and cited in the WikiLeaks release.

 

Conflict of interest-ridden Microsoft “defends democracy”

Last year saw the tech behemoth Microsoft join the effort to blame foreign state actors, specifically Iran, for cyberattacks against the U.S. This helped to bolster assertions that had largely originated with a handful of U.S. intelligence officials and hawkish, neoconservative-aligned think tanks as media reports on Microsoft’s related claims treated the company as an independent private sector observer.

Yet, as MintPress investigations have revealed, Microsoft has clear conflicts of interest with respect to election interference. Its “Defending Democracy” program has spawned tools like “NewsGuard” and “ElectionGuard” that it claims will help protect U.S. democracy, but — upon closer examination — instead have the opposite effect.

Last January, MintPress exposed NewsGuard’s neoconservative backers and how special interest groups were backing the program in an effort to censor independent journalism under the guise of the fight against “fake news.” Subsequent investigations revealed the risk that Microsoft’s ElectionGuard poses to U.S. voting machines, which it claims to make more secure and how the platform was developed by companies closely tied to the Pentagon’s infamous research branch DARPA and Israeli military intelligence Unit 8200.

ElecionGuard software has since been adopted by numerous voting machine manufacturers and is slated to be used in some Democratic Primary votes. Notably, the push for the adoption of ElectionGuard software has been spearheaded by the recently created Cybersecurity and Infrastructure Security Agency (CISA), which is the federal agency tasked with overseeing election security and is headed by Christopher Krebs, a former high level Microsoft executive.

In recent months, Microsoft has also been at the center of claims that Iran attempted to hack U.S. presidential campaigns ahead of 2020 as well as claims that Iran plans to target the U.S. power grid and other critical infrastructure with cyberattacks.

Last October, Microsoft penned a blog post discussing a “threat group” it named Phosphorus that they “believe originates from Iran and is linked to the Iranian government.” The post went on to claim that Phosphorus attempted to target a U.S. presidential campaign, which later media reports claimed was President Trump’s re-election campaign. Microsoft concluded that the attempt was “not technically sophisticated” and ultimately unsuccessful, but felt compelled to disclose it and link it to Iran’s government.

Though it provided no evidence for the hack or its reasons for “believing” that the attack originated from Iran, media reports treated Microsoft’s declaration as proof that Iran had begun actively meddling in the 2020 election. Headlines such as “Iranian Hackers Target Trump Campaign as 2020 Threats Mount,” “Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says”, “Microsoft: Iran government-linked hacker targeted 2020 presidential campaign” and “Microsoft Says Iranians Tried To Hack U.S. Presidential Campaign,” were blasted across the front pages of American media. None of the reports scrutinized Microsoft’s claims or noted the clear conflict of interest Microsoft had in making such claims due to its efforts to see its own ElectionGuard Software adopted nationwide.

Media reports also left out the fact that Microsoft is a major government contractor for the U.S. intelligence community and the Pentagon. Notably, the Trump campaign, which Microsoft said was the target of this attack, was later identified as the only major presidential campaign using Microsoft’s “AccountGuard” software, part of its dubious “Defending Democracy” program that also spawned NewsGuard and ElectionGuard. AccountGuard claims to protect campaign-linked emails and data from hackers.

Microsoft surfaced not long after, again claiming that Iran was maliciously targeting the United States’ civilian infrastructure. This subsequent claim was first published by Wired and later covered by other outlets. Those reports cite a single person, Microsoft security researcher Ned Moran, who claimed that an Iran-backed hacking group called APT33 was targeting the U.S. “physical control systems used in electric utilities, manufacturing, and oil refineries.”

“They’re trying to deliver messages to their adversaries and trying to compel and change their adversaries’ behavior,” Moran told Wired. Moran also stated that “Microsoft hasn’t seen direct evidence of APT33 carrying out a disruptive cyberattack rather than mere espionage or reconnaissance, it’s seen incidents where the group has at least laid the groundwork for those attacks (emphasis added).”

 

Cybereason helps craft the narrative

While U.S. intelligence officials and media outlets alike have been largely responsible for setting the narrative that imminent meddling will be conducted by Russia, China and Iran, key components of that narrative, particularly with respect to China and Iran, have been laid by Cybereason, a company that recently ran 2020 doomsday election simulations and that has close ties to the intelligence communities of both the U.S. and Israel.

Shortly after the killing of Iranian General Qassem Soleimani earlier this month, an operation conducted in concert with Israeli intelligence, Cybereason warned that Iran could imminently retaliate with a cyber threat and quoted its own employees who explained what and how Iran would likely target in retaliation. Cybereason’s CSO Sam Curry, who actively participated in the firm’s 2020 doomsday election simulations, stated:

 This means that Iran’s “forceful revenge” response is likely to be less about the flash and all about the bang. If you have connected systems that are responsible for kinetic world effects, like ICS systems and critical infrastructure around water, energy or vital services, it’s time to pay attention. Iran and the US are engaged in Cyber brinksmanship, which means that the gloves are off as Iran picks it’s targets (emphasis added).”

Cybereason also quoted visiting fellow for the National Security Institute and former advisor to the U.S. Secret Service (which participated in Cyberaeson’s election simulations), Anne Marie Zettlemoyer, who claimed that Iran could soon target Wall Street and critical U.S. infrastructure like the power grid:

 An attack against the financial systems can be devastating economically and weaken the confidence and viability of markets. However, we cannot ignore the physical consequences and manifestations that can come from a cyberattack, particularly against critical infrastructure like energy and industry control systems.”

Cybereason’s claims regarding Iran’s interest in “critical infrastructure” systems likely originated with Microsoft, the claims were then parroted by the media in several reports, many of which quoted Cybereason’s Sam Curry. Curry is also a contributor to major news outlets like Forbes where he writes about Iran’s cyber warfare capabilities. 

Notably, in Cybereason’s recent allegations against Iran, it states that “it’s clear that Iran has been preparing for future geopolitical conflict by gaining access to critical infrastructure and other important operations in the United States.” It backs these claims by citing an article authored by Curry for Forbes. Following Soleimani’s death, numerous media reports, including in the UK’s The Independent and ABC News, have cited Curry as an “expert” source in claiming that Iran would retaliate with cyberattacks.

Microsoft’s claims about foreign hackers and meddling — the evidence for which have never been made public but has been parroted as fact nonetheless — are frequently supported by Cybereason.

Last August, Microsoft claimed to have foiled Russian attempts at hacking two Republican-affiliated think tanks and, despite providing no evidence, Cybereason’s then-senior director of intelligence services Ross Rustici was quoted as an expert in several media reports as saying that such behavior was to be expected from Russia. In one such report, Rustici stated:

We’re very good at fighting the last war, but the Russians are very good at evolving their game. I suspect if they’re going to do a psychological operation around the elections, the way they do it will be different than what they did in 2016. How effective the defenses we’ve built for what they did in 2016 will be for those attacks is yet to be seen.”

None of the media reports quoting Rustici mentioned Cybereason’s ties to Israeli intelligence, referring to tech firms only a “Boston-based cybersecurity company” and similar variants. Cybereason’s Intelligence Group is stuffed with former and active members of U.S. and Israeli intelligence services and has released several reports about nation-state hacking with a focus on Russia and China.

Cybereason has also been at the forefront of claims that China has been engaged in aggressive cyberattacks against multinational companies that have also seen widespread coverage in U.S. media, despite the untransparent nature of the evidence for Cybereason’s claims.

In a story that received major coverage from outlets such as Fox News, Reuters, CNBC and others, Cybereason unveiled what it called “Operation Soft Cell,” an operation that stole mass troves of data from several global telecommunications companies. In each story, Cybereason is the sole source of the claim and declined to provide the name or location of any of the affected companies. The firm also claimed to have determined that the attack was likely perpetrated by someone “backed by a nation state, and is affiliated with China.” It further claimed to have debriefed and coordinated responses with U.S. intelligence.

In an article for Reuters, Cybereason stated that “this time as opposed to in the past we are sure enough to say that the attack originated in China” while Cybereason separately told CyberScoop that it had “found hacking tools such as a modified web shell and a remote access trojan that are commonly associated with, but not unique to, Chinese hackers.” Despite the incongruity, media reports laid the blame squarely on China, as seen in headlines such as “Chinese spies have been sucking up call records at multinational telecoms, researchers say.”

Prior to uncovering Operation Soft Cell, Cybereason had warned on its blogs in the months and years prior that China would imminently target U.S. companies. The revelation of Operation Soft Cell — which originated exclusively with Cybereason — has been used to build the case that China is openly engaged in cyberwarfare against its rival states, like the United States, and targeting “democracy itself.”

 

Best Known Deep Fake Creator is Funded by Israeli Intelligence

While the media, and even Cybereason itself, have helped lay the foundation to blame specific state actors for 2020 election meddling well ahead of the fact, it is worth revisiting Cybereason’s “Operation Blackout” election simulation and the tactics used by the “bad actors” in that scenario.

That simulation, discussed in detail in the first installment of this series, saw the weaponization of specific technologies, namely deep fakes, hacks of Internet of Things (IoT) devices and hacks of vehicles, in order to target the 2020 U.S. election, resulting in the cancellation of the election and the imposition of martial law.

Given the current narrative regarding what state actors are likely to meddle in the 2020 election — namely Russia, China and Iran — and the tactics they will allegedly use, it is important to explore the sources of the technologies weaponized per that narrative as well as in “Operation Blackout.”

Indeed, if there is any clear overlap between the creators of those technologies and the state actors being blamed in advance for their imminent use, it would certainly lend credibility to the claims promoted by U.S. intelligence, the media and companies like Microsoft and Cybereason.

Yet, upon closer examination, it becomes clear that the companies and state actors most involved in developing these technologies are the very ones claiming that Russia, China and Iran will use them to undermine the 2020 election.

Take for instance the use of deep fakes. Not only have numerous media reports focused on how deep fakes will be used to meddle in the 2020 elections, but Cybereason’s doomsday election simulation saw “bad actors” rely heavily on their use to spread disinformation and even make fake bomb threats. While much has been said of the coming election and deep fakes, remarkably few reports have bothered to look at the company best known for creating viral deep fakes.

Canny AI has garnered considerable media attention over the past few years for its persuasive deep fake videos that have frequently gone viral. In the last year alone, the tech firm’s viral deep fakes have included a controversial video of Mark Zuckerberg where the Facebook co-founder appears to be saying “Imagine this for a second: One man, with total control of billions of people’s stolen data, all their secrets, their lives, their futures,” as well as a video showing Richard Nixon giving a speech he never actually gave. More recently, Canny AI was behind the viral videos immediately prior to the 2019 U.K. general election that appeared to show Jeremy Corbyn and his rival Boris Johnson endorsing each other and another video that showed world leaders singing John Lennon’s “Imagine”:

Oddly, many of the media reports that discuss these viral videos fail to mention the role of Canny AI in creating these viral deep fakes and instead only mention the organization or artists with whom Canny AI partnered to create them. For instance, the Corbyn-Johnson videos were reported to have been produced by the group Future Advocacy and artist Bill Posters, but it was actually Canny AI that created those videos for that group. Similarly, the Nixon Speech deep fake was reported by several outlets as having been solely created by MIT’s Center for Advanced Virtuality. However, the Boston Globe noted that “the [MIT] team worked with Canny AI, an Israeli company that does Video Dialogue Replacement, and Respeecher, a Ukrainian startup specializing in speech-to-speech synthetic voice production” to create the video.

The Zuckerberg deep fake that Canny AI created led to lots of positive press for the company, with several media reports dubbing them as the company using “deep fakes for good” and that uses the controversial technology “responsibly.” The Zuckerberg deep fake has been cited as one of the main drivers behind Facebook’s new “deep fake” policy, which only bans some deep fake videos and has been criticized by U.S. lawmakers as insufficient. Notably, neither Facebook nor Facebook-owned Instagram ever took down Canny AI’s deep fake of Zuckerburg.

Given the concern over deep fakes in relation to the coming election and Canny AI standing out as the main producer of deep fakes that have gone viral over the past year, it is important to point out that Canny AI has ties to a state actor with a history of election meddling: the state of Israel.

Indeed, Canny AI is 100 percent funded by an Israeli start-up accelerator called Xcelerator, a joint venture between Tel Aviv University and Israeli intelligence agency Shin Bet (sometimes called Shabak). According to Start Up Nation Central, the Paul Singer-created organization that promotes Israeli technology start ups, Xcelerator-funded “start-ups participating in the program benefit from close mentoring from content and technology experts from the Shabak, experts from Tel Aviv University, and industry leaders. The connection to the Shabak also provides the entrepreneurs with ways to test the capabilities of their technologies and cooperation opportunities (emphasis added).”

In addition, Xcelerator is partnered not only with Israeli intelligence directly, but also with Cybereason, the very company that explored the use of deep fakes in the 2020 U.S. presidential election that saw the election cancelled and martial law declared as well as a company that itself has deep ties to Israeli intelligence. Other notable partners of Xcelerator include NEC Corp, which has intimate ties to top Cybereason investor Softbank; Check Point Technologies, which has ties to Israeli military intelligence Unit 8200; and the Israeli start-up accelerator Team8. In previous reports published by MintPress, Team8 was discussed in detail, particularly their recent hire of former director of the NSA and former head of U.S. Cyber Command Mike Rogers, and their close ties to Paul Singer’s Start Up Nation Central, which itself has deep ties to U.S. neoconservatives.

It is also worth noting that Xcelerator also backs an “anti-fake news” start-up called Cyabra, which has direct ties to Israel’s Mossad and offers its AI-driven “disinformation protection” to government agencies as well as politicians, particularly during election seasons. Two of Cyabra’s co-founders previously co-founded Psy-Group, which attempted to interfere in the 2016 U.S. election by weaponizing “fake news” and social media and later closed down its operations after U.S. government scrutiny into its activities began as part of the Mueller investigation.

Psy-Group also engaged in doxxing campaigns targeting Palesintian rights activists in the U.S. which were planned in conjunction with Ram Ben-Barak, the former deputy director of the Mossad who now advises Cyabra. Given that much of the concern ahead of the next election is related not only to deep fakes but also “fake news,” Cyabra’s rise and its clear ties to Mossad and the now defunct Psy-Group are important to note.

Furthermore, in examining the other technologies weaponized during Cybereason’s 2020 election simulation and cited in the aforementioned media narrative regarding 2020 meddling, a pattern similar to that of Canny AI emerges.

Indeed, the other technologies linked to these “bad actors” and foreign meddlers — namely hacking IoT devices and hacking vehicles — are also pioneered by companies with deep ties to Israeli military intelligence, specifically Unit 8200, and Israeli tech companies that have aggressively spied on U.S. government institutions in collusion with Israeli intelligence in the past, namely Comverse (now Verint) and Amdocs.

 

Hacking the Internet of Things

In Cybereason’s doomsday election simulation, another of the tactics used was the hacking of devices and appliances connected to the internet, often referred to as the Internet of Things (IoT) and which includes everything from smartphones to power grid infrastructure to city traffic lights.

While most reports on IoT hacks to date have focused on “lone wolf” or non-state-aligned actors, one company has stood out for its efforts to create a tool that would allow governments and intelligence agencies to hack these devices with ease. That company, called Toka, announced in 2018 that it planned to offer “a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain,” with “a special focus on [hacking] the so-called Internet of Things (IoT), covering tech like Amazon Echo, Nest connected home products, as well as connected fridges, thermostats and alarms.”

The Israel-based company, which raised $12.5 million within months of launching, has since been busy marketing its services to governments around the world, most recently France where it described its product portfolio as “empower[ing] governments, Intelligence, and law enforcement agencies to enhance Homeland Security with groundbreaking cyber-intelligence and operational capabilities” during an exposition in Paris last November.

Even though Toka openly markets the ability to hack private consumer devices to governments and law enforcement agencies around the world, the clear threat to privacy has gone ignored by media outlets as the company has garnered nearly no media attention since it launched nearly two years ago.

Yet, Toka is not only notable for what it offers but also for its founders and investors. Indeed, the co-founders of Toka have been described as an “all-star” team, largely because of the role of former Israeli Prime Minister and former head of Israeli military intelligence, Ehud Barak. Barak, in addition to co-founding the company, serves as its director and is also the chairman of the board of the controversial Israeli company Carbyne911, which markets software to emergency call centers in the United States. Interestingly, Cybereason’s 2020 doomsday election simulation also dealt with the hacking and weaponization of 911 call centers. Also of note is the fact that another of Carbyne911’s leadership team, former Unit 8200 commander Pinchas Buchris, is an adviser to Cybereason.

Toka’s top brass is a who’s who of former Israeli military and intelligence officials

In addition to Barak, Toka was co-founded by retired Brigadier General Yaron Rosen, former Chief of the IDF’s cyber staff, where he was “the lead architect of all [IDF] cyber activities” including those executed by Israeli military intelligence Unit 8200. Rosen, who now serves as Toka’s CEO, has stated that Toka’s technology will only be sold to countries allied with the U.S. and Israel, telling Forbes that “Russia, China and ‘other enemy countries’ would never be customers.”

Toka’s leadership and software architects are similarly tied into Israel’s national security state. Several — including the “architect” of its hacking software — previously worked for Israel’s Prime Minister’s Office and developed “offensive technologies” for Israel’s head of state and other top Toka employees and executives share numerous connections to Unit 8200, other divisions of Israeli military intelligence and Unit 8200-connected tech companies like Check Point Technologies.

Though Toka’s leadership team makes its ties to Israeli military intelligence abundantly clear, important connections also appear in examining Toka’s investors. One of the major investors in Toka is Dell technologies, one of the world’s largest technology companies that was founded by Michael Dell, a well-known pro-Israel partisan who has donated millions of dollars to the Friends of the IDF and one of the top supporters of the so-called “anti-BDS” bills that prevent publicly employed individuals or public institutions from supporting non-violent boycotts of Israel, even on humanitarian grounds. It goes without saying that a major technology company investing in a company that markets the hacking of that very technology (computers, IoT, smartphones, etc.) should be a red flag.

With a major foot in the door through its connections to Dell, whose products are used by the private and public sectors around the world, other investors in Toka again reveal its ties to Israel’s military intelligence and the same controversial Israeli tech companies that have aggressively spied on the U.S. government in the past — Amdocs and Comverse. For instance, Entrèe Capital, a venture capital fund that is one of Toka’s main investors, is managed by Aviad Eyal and Ran Achituv. The latter, who manages Entrée’s investment in Toka and sits on Toka’s board of directors, is the founder of the IDF’s satellite-based signals intelligence unit and also a former senior Vice President at both Amdocs and Comverse Infosys (Verint).

Another notable investor in Toka is the venture capital firm Andreesen Horowitz, which is advised by former Secretary of the Treasury Larry Summers, a close friend of the infamous pedophile Jeffery Epstein, whose own ties to Israeli military intelligence have been discussed in several MintPress reports. Epstein was also a close friend of Ehud Barak, co-founder and director of Toka, and invested at least $1 million in another company with close ties to Barak, Carbyne911. The remaining investors in Toka are Launch Capital, which is deeply tied to the Pritzker family — one of the wealthiest families in the U.S. with close ties to the Clintons and Obamas as well as the U.S.’ pro-Israel lobby, and Ray Rothrock, a venture capitalist who spent nearly three decades at VenRock, the Rockefeller family venture capital fund.

 

Unit 8200 – From Hacking Cars to Protecting Them?

Arguably the most disturbing aspect of Cybereason’s “Operation Blackout” election simulation was the hacking of vehicles that were then rammed into civilians waiting in line to vote at polling stations. In the simulation, this led to scores of dead Americans and hundreds of injuries.

As was the case with other technologies used to undermine the 2020 election in the simulation, this technology — the hacking of vehicles — is the bread and butter of an Israeli cybersecurity firm called Upstream Security that specializes in automobiles and boasts deep ties to the country’s military intelligence service.

Though vehicle hacking seemed out of left field when the 2020 election simulation took place last November, media reports about the imminent dangers of “car hacking” began to emerge just a month after the exercise took place, most of which cited a December 2019 report created by Upstream. Some of those reports have warned that car hacking could be used to undermine the coming U.S. election.

One report titled “Car Hacking Hits the Streets,” cites only Upstream’s report to claim that “In 2020, the connected-car market will reach a tipping point, with the majority of vehicles already connected to the Internet when sold in the United States, representing a large base of potential targets for attacks.” Another report, titled “New study shows just how bad vehicle hacking has gotten,” uses Upstream’s report (i.e. study) to claim that hacks of regular vehicles have exploded since 2016 and that most of the cars on U.S. roads today are vulnerable to hackers and that over 80 percent of those hacks occur remotely.

Neither report noted Upstream’s ties to Israeli military intelligence. Equally notable is the fact that both reports that covered the Upstream-written study say that only manufacturers can address the problem by partnering with a company like Upstream.

Lucky for Upstream, they have already partnered with a slew of auto manufacturers, including Hyundai, Volvo, Renault and even U.S. auto insurance giants like Nationwide, who now number among Upstream’s most important investors. The company’s original investors are Charles River Ventures, one of Cybereason’s first investors, and Israeli venture capital firm Glilot Capital.

Glilot Capital’s interest in Upstream is telling given the firm’s deep ties to Israel’s Unit 8200. Glilot was founded by two former Israeli military intelligence officers and has “a heavy focus on the cyber sector and the entrepreneurs who emerge from the elite Unit 8200,” according to the Jerusalem Post. Even the name of the firm is an homage to Unit 8200, as the unit’s main base is located in Glilot, near Herzliya.

“It’s as if Americans called a VC Fort Meade Capital [the US Army base in Maryland where the National Security Agency and the United States Cyber Command are headquartered], some VC names are meant to be symbolic, as in our case. Glilot is the home of several of the best intelligence and technology units in the IDF, it’s where we came from and it is where we find our best entrepreneurs,” Glilot Capital co-founder Arik Kleinstein told the Jerusalem Post in 2016.

Upstream is certainly the type of company that Glilot Capital is used to investing in. It was founded by two Israelis who both served in the IDF, with one of them serving in an elite intelligence unit. Upstream’s co-founders, Yoav Levy and Yonathan Appel, met while working at Check Point Technologies, the Unit 8200 alumni-founded company with deep ties to Israel’s military intelligence and military-industrial complex as well as the IoT hacking company Toka. Notably, Upstream recently partnered with the Japanese company Fujitsu, a longtime partner with Softbank — Cybereason’s main investor.

Softbank has also invested heavily in another Unit 8200-founded vehicle security start-up called Argus Cyber Security, a firm known for its numerous demonstrations showing how easy it is to hack vehicles. Argus is also backed by Nadav Zafrir, the former Unit 8200 commander who now runs Team8. Argus’ CEO Ofer Ben-Noon, a former captain in Unit 8200, told Forbes in 2014 that “Everything will be hacked in every single [car] brand. It will take time, it might be weeks, months, or a couple of years, but eventually it will happen.”

Since then, Unit 8200 alumni from Argus, Upstream and other Israeli automobile cybersecurity firms have shown media outlets around the world how much easier hacking vehicles has become in the years since Ben-Noon first made the claim. One such report from VICE includes a vehicle hacking demonstration, courtesy of a Unit 8200 alumni, and notes that “most cars today are susceptible to hacker attacks.”

Of course, Unit 8200 isn’t the only intelligence agency known to be experts at hacking vehicles. Indeed, in 2017, WikiLeaks revealed that the CIA was capable of hacking vehicles and exploring their use in committing “undetectable assassinations.”

 

“Bring down nations to their knees”

At the Tel Aviv Cybertech Conference in 2017, Israeli Prime Minister Benjamin Netanyahu stated the following:

Today warfare has changed dramatically…With a click of a button, you can bring down nations to their knees very rapidly if you so desire and if you’re willing to take the risks, because every system can be hacked. Our hospitals, our airplanes, our cars, our banks. The most important word here is our data banks, they can be hacked.”

Media reports and even members of the Israeli public and private sector have openly acknowledged that Israel’s intelligence apparatus — from Unit 8200 to the Mossad — remains directly linked to many of the private technology companies founded by its former members, especially in the field of cybersecurity. Though reports on the matter often praise this merging of Israel’s public and private spheres, they rarely acknowledge the documented corruption within Unit 8200, the unit’s dark past in recruiting felons and even pedophiles to join its ranks, or the danger posed by having companies directly linked to foreign intelligence being given access to the U.S. government’s most classified and sensitive systems and data.

The last omission is particularly troubling given that Israeli intelligence has not only been caught aggressively using private tech companies to spy on U.S. federal agencies and networks, but also intercepting the private communications of at least two U.S. presidents and using a notorious pedophile to sexually blackmail American politicians.

As was mentioned in the first installment of this series, Cybereason’s CEO Lior Div offers a clear example of this worrisome bridge between Israel’s public and private sector, as Div has openly stated that he views his work at Cybereason as a “continuation” of his service to Israeli military intelligence, where he led offensive cyberattacks against other nations.

Given Div’s past statements and his company’s clear ties to both Israeli and U.S. intelligence, Cybereason’s simulation of the 2020 U.S. election — which involved terrorist attacks and led to the election’s cancellation and the imposition of martial law — is highly concerning. This is particularly so considering that Cybereason’s investors have direct ties to individuals who would benefit from the election’s cancellation and also considering the clear narrative that has emerged in recent months regarding how the coming election will inevitably fall victim to tech-driven “chaos” in coming months.

The clear overlap between Cybereason’s simulation and the intelligence-driven media narrative is clear cause for concern, especially considering that the technologies that they highlight as ultimately upending the election are dominated by the very same intelligence agencies simulating and crafting that narrative.

The keyword that has been used to describe the end result of both Cybereason’s simulation and the prevailing media narrative regarding the 2020 election is “chaos,” chaos so imminent, widespread and unruly that it will shake American democracy to its core.

What has been left unsaid, however, is that a government’s solution to “chaos” is always the imposition of “order.” This means that — whatever “chaos” ultimately ensues prior to or on election day — will result in a government response that will do much more to crush freedom and undermine democracy than any act of foreign meddling has, be it real or imagined.

Pro-Israel Buttigieg backer Seth Klarman is top funder of group behind Iowa’s disastrous voting app

Behind the app that delayed Iowa’s voting results is a dark money operation funded by anti-Sanders billionaires. Its top donor, Seth Klarman, is a Buttigieg backer who has dumped money into pro-settler Israel lobby groups.

By Max Blumenthal

Source: The Grayzone

At the time of publication, twelve hours after voting in the Democratic Party’s Iowa caucuses ended, the results have not been announced. The delay in reporting is the result of a failed app developed by a company appropriately named Shadow Inc.

This firm was staffed by Hillary Clinton and Barack Obama campaign veterans and created by a Democratic dark money nonprofit backed by hedge fund billionaires including Seth Klarman. A prolific funder of pro-settler Israel lobby organizations, Klarman has also contributed directly to Pete Buttigieg’s campaign.

The delay in the vote reporting denied a victory speech to Sen. Bernie Sanders, the presumptive winner of the opening contest in the Democratic presidential primary. Though not one exit poll indicated that Buttigieg would have won, the South Bend, Indiana mayor took to Twitter to confidently proclaim himself the victor.

The bizarre scenario was made possible by a mysterious voting app whose origins had been kept secret by Democratic National Committee officials. For hours, it was unclear who created the failed technology, or how it wound up in the hands of Iowa party officials.

Though a dark money Democratic operation turned out to be the source of the disastrous app, suspicion initially centered on former Hillary Clinton campaign manager Robby Mook and his Russiagate-related elections integrity initiative.

Leveraging Russia hysteria into lucrative election opportunities

While Iowa Democratic Party Chairman Troy Price refused to say who was behind the failed app, he told NPR that he “worked with the national party’s cybersecurity team and Harvard University’s Defending Digital Democracy project…” Price did not offer details on his collaboration with the Harvard group, however.

The New York Times reported that this same outfit had teamed up with Iowa Democrats to run a “drill of worst-case scenarios” and possible foreign threats, but was also vague on details.

Robby Mook, the former campaign manager for Hillary Clinton’s failed 2016 presidential campaign, was the co-founder of Defending Digital Democracy. His initiative arose out of the national freakout over Russian meddling that he and his former boss helped stir when they blamed their loss on Russian interference. Mook’s new outfit pledged to “protect from hackers and propaganda attacks.” 

He founded the organization with help from Matt Rhoades, a former campaign manager for Republican Mitt Romney whose public relations company was sued by a Silicon Valley investor after it branded him “an agent of the Russian government” and “a friend of Russian President, Vladimir Putin.” Rhoades’ firm had been contracted by a business rival to destroy the investor’s reputation.

As outrage grew over the delay in Iowa caucus results, Mook publicly denied any role in designing the notorious app.

Hours later, journalist Lee Fang reported that a previously unknown tech outfit called Shadow Inc. had contracted with the Iowa Democratic Party to create the failed technology. The firm was comprised of former staffers for Obama, Clinton and the tech industry, and had been paid for services by the Buttigieg campaign.

FEC filings show the Iowa Democratic party and Buttigieg campaign paid Shadow Inc.

An Israel lobby moneyman’s path to Mayor Pete’s wine cave

Shadow Inc. was launched by a major Democratic dark money nonprofit called Acronym, which also gave birth to a $7.7 million Super PAC known as Pacronym.

According to Sludge, Pacronym’s largest donor is Seth Klarman. A billionaire hedge funder, Klarman also happens to be a top donor to Buttigieg and Amy Klobuchar.

Though he has attracted some attention for his role in the campaign, Klarman’s prolific funding of the pro-settler Israel lobby and Islamophobic initiatives has gone almost entirely unmentioned.

Seth Klarman is the founder of the Boston-based Baupost Group hedge fund and a longtime donor to corporate Republican candidates. After Donald Trump called for forgiving Puerto Rico’s debt, Klarman – the owner of $911 million of the island’s bonds – flipped and began funding Trump’s opponents.

The billionaire’s crusade against Trump ultimately led him to Mayor Pete’s wine cave.

By the end of 2019, Klarman had donated $5600 to Buttigieg and pumped money into the campaigns of Amy Klobuchar, Cory Booker and Kamala Harris as well.

The billionaire’s support centrist candidates appears to be not only by his own financial interests, but  by his deep and abiding ideological commitment to Israel and its expansionist project.

As I reported for Mondoweiss, Klarman has been a top funder for major Israel lobby outfits, including those that support the expansion of illegal settlements and Islamophobic initiatives.

Klarman was the principal funder of The Israel Project, the recently disbanded Israeli government-linked propaganda organization that lobbied against the Iran nuclear deal and backed the Israeli settlement enterprise.

Klarman has heaped hundreds of thousands of dollars on the Middle East Media Research Institute (MEMRI) and the American Jewish Committee. And he funded The David Project, which was established to suppress Palestine solidarity organizing on campuses across the US and battled to block the establishment of a Muslim community center in Boston.

Through his support for the Friends of Ir David Inc, Klarman directly involved himself in the Israeli settlement enterprise, assisting the US-based tax exempt arm of the organization that oversaw a wave of Palestinian expulsions in the occupied East Jerusalem neighborhood of Silwan.

Other pro-Israel groups reaping the benefits of Klarman’s generosity include Birthright Israel, the AIPAC-founded Washington Institute for Near East Policy, and the Foundation for the Defense of Democracies (FDD), a neoconservative think tank that helped devise Trump’s “maximum pressure” campaign of economic warfare on Iran.

Klarman is the owner of the Times of Israel, an Israeli media outlet that once published a call for Palestinian genocide. (The op-ed was ultimately removed following public backlash).

In recent weeks, Buttigieg has sought to distinguish himself from Sanders on the issue of Israel-Palestine. During a testy exchange this January with a self-proclaimed Jewish supporter of Palestinian human rights, the South Bend mayor backtracked on a previous pledge to withhold military aid to Israel if it annexed parts of the West Bank.

Another recipient of Klarman’s funding, Amy Klobuchar, has taken a strongly pro-Israel line, vowing to support Trump’s relocation of the US embassy from Tel Aviv to Jerusalem.

Battling Bernie with hedge fund money and sexism claims

Like Klarman, Donald Sussman is a hedge funder who has channeled his fortune into Pacronym. He has given $1 million to the Super PAC and was also top donor to Clinton in 2016.

Sussman’s Paloma Partners operates through a series of offshore shell companies, and received tens of millions of dollars in the 2009 federal bailout of the banking industry.

His daughter, Democratic operative Emily Tisch Sussman, declared on MSNBC in September that “if you still support Sanders over Warren, it’s kind of showing your sexism.”

https://twitter.com/ibrahimpols/status/1177719744096559110

As Democratic elites like the Sussmans braced for a Bernie Sanders triumph in Iowa, a mysterious piece of technology spun out by a group they supported delayed the vote results, preventing Sanders from delivering a victory speech. And the politician many of them supported, Pete Buttigieg, exploited the moment to declare himself the winner. In such a strange scenario, the conspiracy theories write themselves.