US – UK Intel Agencies Declare Cyber War on Independent Media

British and American state intelligence agencies are “weaponizing truth” to quash vaccine hesitancy as both nations prepare for mass inoculations, in a recently announced “cyber war” to be commanded by AI-powered arbiters of truth against information sources that challenge official narratives.

By Whitney Webb

Source: Unlimited Hangout

In just the past week, the national-security states of the United States and United Kingdom have discreetly let it be known that the cyber tools and online tactics previously designed for use in the post-9/11 “war on terror” are now being repurposed for use against information sources promoting “vaccine hesitancy” and information related to Covid-19 that runs counter to their state narratives. 

A new cyber offensive was launched on Monday by the UK’s signal intelligence agency, Government Communications Headquarters (GCHQ), which seeks to target websites that publish content deemed to be “propaganda” that raises concerns regarding state-sponsored Covid-19 vaccine development and the multi-national pharmaceutical corporations involved. 

Similar efforts are underway in the United States, with the US military recently funding a CIA-backed firm—stuffed with former counterterrorism officials who were behind the occupation of Iraq and the rise of the so-called Islamic State—to develop an AI algorithm aimed specifically at new websites promoting “suspected” disinformation related to the Covid-19 crisis and the US military–led Covid-19 vaccination effort known as Operation Warp Speed.

Both countries are preparing to silence independent journalists who raise legitimate concerns over pharmaceutical industry corruption or the extreme secrecy surrounding state-sponsored Covid-19 vaccination efforts, now that Pfizer’s vaccine candidate is slated to be approved by the US Food and Drug Administration (FDA) by month’s end. 

Pfizer’s history of being fined billions for illegal marketing and for bribing government officials to help them cover up an illegal drug trial that killed eleven children (among other crimes) has gone unmentioned by most mass media outlets, which instead have celebrated the apparently imminent approval of the company’s Covid-19 vaccine without questioning the company’s history or that the mRNA technology used in the vaccine has sped through normal safety trial protocols and has never been approved for human use. Also unmentioned is that the head of the FDA’s Center for Drug Evaluation and Research, Patrizia Cavazzoni, is the former Pfizer vice president for product safety who covered up the connection of one of its products to birth defects.

Essentially, the power of the state is being wielded like never before to police online speech and to deplatform news websites to protect the interests of powerful corporations like Pfizer and other scandal-ridden pharmaceutical giants as well as the interests of the US and UK national-security states, which themselves are intimately involved in the Covid-19 vaccination endeavor. 

UK Intelligence’s New Cyberwar Targeting “Anti-Vaccine Propaganda”

On Monday, the UK newspaper The Times reported that the UK’s GCHQ “has begun an offensive cyber-operation to disrupt anti-vaccine propaganda being spread by hostile states” and “is using a toolkit developed to tackle disinformation and recruitment material peddled by Islamic State” to do so. In addition, the UK government has ordered the British military’s 77th Brigade, which specializes in “information warfare,” to launch an online campaign to counter “deceptive narratives” about Covid-19 vaccine candidates.

The newly announced GCHQ “cyber war” will not only take down “anti-vaccine propaganda” but will also seek to “disrupt the operations of the cyberactors responsible for it, including encrypting their data so they cannot access it and blocking their communications with each other.”  The effort will also involve GCHQ reaching out to other countries in the “Five Eyes” alliance (US, Australia, New Zealand and Canada) to alert their partner agencies in those countries to target such “propaganda” sites hosted within their borders.

The Times stated that “the government regards tackling false information about inoculation as a rising priority as the prospect of a reliable vaccine against the coronavirus draws closer,” suggesting that efforts will continue to ramp up as a vaccine candidate gets closer to approval.

It seems that, from the perspective of the UK national-security state, those who question corruption in the pharmaceutical industry and its possible impact on the leading experimental Covid-19 vaccine candidates (all of which use experimental vaccine technologies that have never before been approved for human use) should be targeted with tools originally designed to combat terrorist propaganda. 

While The Times asserted that the effort would target content “that originated only from state adversaries” and would not target the sites of “ordinary citizens,” the newspaper suggested that the effort would rely on the US government for determining whether or not a site is part of a “foreign disinformation” operation. 

This is highly troubling given that the US recently seized the domains of many sites, including the American Herald Tribune, which it erroneously labeled as “Iranian propaganda,” despite its editor in chief, Anthony Hall, being based in Canada. The US government made this claim about the American Herald Tribune after the cybersecurity firm FireEye, a US government contractor, stated that it had “moderate confidence” that the site had been “founded in Iran.” 

In addition, the fact that GCHQ has alleged that most of the sites it plans to target are “linked to Moscow” gives further cause for concern given that the UK government was caught funding the Institute for Statecraft’s Integrity Initiative, which falsely labeled critics of the UK government’s actions as well as its narratives with respect to the Syria conflict as being related to “Russian disinformation” campaigns.

Given this precedent, it is certainly plausible that GCHQ could take the word of either an allied government, a government contractor, or perhaps even an allied media organization such as Bellingcat or the Atlantic Council’s DFRLab that a given site is “foreign propaganda” in order to launch a cyber offensive against it. Such concerns are only amplified when one of the main government sources for The Times article bluntly stated that “GCHQ has been told to take out antivaxers [sic] online and on social media. There are ways they have used to monitor and disrupt terrorist propaganda,” which suggests that the targets of GCHQ’s new cyber war will, in fact, be determined by the content itself rather than their suspected “foreign” origin. The “foreign” aspect instead appears to be a means of evading the prohibition in GCHQ’s operational mandate on targeting the speech or websites of ordinary citizens.

This larger pivot toward treating alleged “anti-vaxxers” as “national security threats” has been ongoing for much of this year, spearheaded in part by Imran Ahmed, the CEO of the UK-based Center for Countering Digital Hate, a member of the UK government’s Steering Committee on Countering Extremism Pilot Task Force, which is part of the UK government’s Commission for Countering Extremism. 

Ahmed told the UK newspaper The Independent in July that “I would go beyond calling anti-vaxxers conspiracy theorists to say they are an extremist group that pose a national security risk.” He then stated that “once someone has been exposed to one type of conspiracy it’s easy to lead them down a path where they embrace more radical world views that can lead to violent extremism,” thereby implying that “anti-vaxxers” might engage in acts of violent extremism. Among the websites cited by Ahmed’s organization as promoting such “extremism” that poses a “national security risk” were Children’s Health Defense, the National Vaccine Information Center, Informed Consent Action Network, and Mercola.com, among others.

Similarly, a think tank tied to US intelligence—whose GCHQ equivalent, the National Security Agency, will take part in the newly announced “cyber war”—argued in a research paper published just months before the onset of the Covid-19 crisis that “the US ‘anti-vaxxer’ movement would pose a threat to national security in the event of a ‘pandemic with a novel organism.’”

InfraGard, “a partnership between the Federal Bureau of Investigation (FBI) and members of the private sector,” warned in the paper published last June that “the US anti-vaccine movement would also be connected with ‘social media misinformation and propaganda campaigns’ orchestrated by the Russian government,” as cited by The Guardian. The InfraGard paper further claimed that prominent “anti-vaxxers” are aligned “with other conspiracy movements including the far right . . . and social media misinformation and propaganda campaigns by many foreign and domestic actors. Included among these actors is the Internet Research Agency, the Russian government–aligned organization.”

An article published just last month by the Washington Post argued that “vaccine hesitancy is mixing with coronavirus denial and merging with far-right American conspiracy theories, including Qanon,” which the FBI named a potential domestic terror threat last year. The article quoted Peter Hotez, dean of the School of Tropical Medicine at Baylor College of Medicine in Houston, as saying “The US anti-vaccination movement is globalizing and it’s going toward more-extremist tendencies.”

It is worth pointing out that many so-called “anti-vaxxers” are actually critics of the pharmaceutical industry and are not necessarily opposed to vaccines in and of themselves, making the labels “anti-vaxxer” and “anti-vaccine” misleading. Given that many pharmaceutical giants involved in making Covid-19 vaccines donate heavily to politiciansin both countries and have been involved in numerous safety scandals, using state intelligence agencies to wage cyber war against sites that investigate such concerns is not only troubling for the future of journalism but it suggests that the UK is taking a dangerous leap toward becoming a country that uses its state powers to treat the enemies of corporations as enemies of the state.

The CIA-Backed Firm “Weaponizing Truth” with AI

In early October, the US Air Force and US Special Operations Command announced that they had awarded a multimillion-dollar contract to the US-based “machine intelligence” company Primer. Per the press release, “Primer will develop the first-ever machine learning platform to automatically identify and assess suspected disinformation [emphasis added]. Primer will also enhance its natural language processing platform to automatically analyze tactical events to provide commanders with unprecedented insight as events unfold in near real-time.”

According to Primer, the company “builds software machines that read and write in English, Russian, and Chinese to automatically unearth trends and patterns across large volumes of data,” and their work “supports the mission of the intelligence community and broader DOD by automating reading and research tasks to enhance the speed and quality of decision-making.” In other words, Primer is developing an algorithm that would allow the national-security state to outsource many military and intelligence analyst positions to AI. In fact, the company openly admits this, stating that their current effort “will automate the work typically done by dozens of analysts in a security operations center to ingest all of the data relevant to an event as it happens and funnel it into a unified user interface.”

Primer’s ultimate goal is to use their AI to entirely automate the shaping of public perceptions and become the arbiter of “truth,” as defined by the state. Primer’s founder, Sean Gourley, who previously created AI programs for the military to track “insurgency” in post-invasion Iraq, asserted in an April blog post that “computational warfare and disinformation campaigns will, in 2020, become a more serious threat than physical war, and we will have to rethink the weapons we deploy to fight them.” 

In that same post, Gourley argued for the creation of a “Manhattan Project for truth” that would create a publicly available Wikipedia-style database built off of “knowledge bases [that] already exist inside many countries’ intelligence agencies for national security purposes.” Gourley then wrote that “this effort would be ultimately about building and enhancing our collective intelligence and establishing a baseline for what’s true or not” as established by intelligence agencies. He concludes his blog post by stating that “in 2020, we will begin to weaponize truth.”

Notably, on November 9, the same day that GCHQ announced its plans to target “anti-vaccine propaganda,” the US website NextGov reported that Primer’s Pentagon-funded effort had turned its attention specifically to “Covid-19 related disinformation.” According to Primer’s director of science, John Bohannon, “Primer will be integrating bot detection, synthetic text detection and unstructured textual claims analysis capabilities into our existing artificial intelligence platform currently in use with DOD. . . . This will create the first unified mission-ready platform to effectively counter Covid-19-related disinformation in near-real time.”

Bohannon, who previously worked as a mainstream journalist embedded with NATO forces in Afghanistan, also told NextGov that Primer’s new Covid-19–focused effort “automatically classifies documents into one of 10 categories to enable the detection of the impact of COVID” on areas such as “business, science and technology, employment, the global economy, and elections.” The final product is expected to be delivered to the Pentagon in the second quarter of next year.

Though a so-called private company, Primer is deeply linked to the national-security state it is designed to protect by “weaponizing truth.” Primer proudly promotes itself as having more than 15 percent of its staff hailing from the US intelligence community or military. The director of the company’s National Security Group is Brian Raymond, a former CIA intelligence officer who served as the Director for Iraq on the US National Security Council after leaving the agency. 

The company also recently added several prominent national-security officials to its board including:

  • Gen. Raymond Thomas (ret.), who led the command of all US and NATO Special Operations Forces in Afghanistan and is the former commander of both US Special Operations Command and Joint Special Operations Command (JSOC).
  • Lt. Gen. VeraLinn Jamieson (ret.), the former deputy chief of staff for Air Force Intelligence, Surveillance and Reconnaissance who led the Air Force’s intelligence and cyber forces. She also personally developed “strategic partnerships” between the Air Force and Microsoft, Amazon, Google, and IBM in order “to accelerate the Air Force’s digital transformation.”
  • Brett McGurk, one of the “chief architects” of the Iraq War “surge,” alongside the notorious Kagan family, as NSC Director for Iraq, and then as special assistant to the president and senior Director for Iraq and Afghanistan during the Bush administration. Under Obama and during part of the Trump administration, McGurk was the special presidential envoy for the Global Coalition to Defeat ISIS at the State Department, helping to manage the “dirty war” waged by the US, the UK, and other allies against Syria.

In addition to those recent board hires, Primer brought on Sue Gordon, the former principal deputy director of National Intelligence, as a strategic adviser. Gordon previously “drove partnerships within the US Intelligence Community and provided advice to the National Security Council in her role as deputy director of national intelligence” and had a twenty-seven-year career at the CIA. The deep links are unsurprising, given that Primer is financially backed by the CIA’s venture-capital arm In-Q-Tel and the venture-capital arm of billionaire Mike Bloomberg, Bloomberg Beta.

Operation Warp Speed’s Disinformation Blitzkrieg   

The rapid increase in interest by the US and UK national-security states toward Covid-19 “disinformation,” particularly as it relates to upcoming Covid-19 vaccination campaigns, is intimately related to the media-engagement strategy of the US government’s Operation Warp Speed. 

Officially a “public-private partnership,” Operation Warp Speed, which has the goal of vaccinating 300 million Americans by next January, is dominated by the US military and also involves several US intelligence agencies, including the National Security Agency (NSA) and the Department of Homeland Security (DHS), as well as intelligence-linked tech giants Google, Oracle, and Palantir. Several reports published in The Last American Vagabondby this author and journalist Derrick Broze have revealed the extreme secrecy of the operation, its numerous conflicts of interest, and its deep ties to Silicon Valley and Orwellian technocratic initiatives. 

Warp Speed’s official guidance discusses at length its phased plan for engaging the public and addressing issues of “vaccine hesitancy.” According to the Warp Speed document entitled “From the Factory to the Frontlines,” “strategic communications and public messaging are critical to ensure maximum acceptance of vaccines, requiring a saturation of messaging across the national media.” It also states that “working with established partners—especially those that are trusted sources for target audiences—is critical to advancing public understanding of, access to, and acceptance of eventual vaccines” and that “identifying the right messages to promote vaccine confidence, countering misinformation, and targeting outreach to vulnerable and at-risk populations will be necessary to achieve high coverage.”

The document also notes that Warp Speed will employ the CDC’s three-pronged strategic framework for its communications effort. The third pillar of that strategy is entitled “Stop Myths” and has as a main focus “establish[ing] partnerships to contain the spread of misinformation” as well as “work[ing] with local partners and trusted messengers to improve confidence in vaccines.”

Though that particular Warp Speed document is short on specifics, the CDC’s Covid-19 Vaccination Program Interim Playbook contains additional information. It states that Operation Warp Speed will “engage and use a wide range of partners, collaborations, and communication and news media channels to achieve communication goals, understanding that channel preferences and credible sources vary among audiences and people at higher risk for severe illness and critical populations, and channels vary in their capacity to achieve different communication objectives.” It states that it will focus its efforts in this regard on “traditional media channels” (print, radio, and TV) as well as “digital media” (internet, social media, and text messaging). 

The CDC document further reveals that the “public messaging” campaign to “promote vaccine uptake” and address “vaccine hesitancy” is divided into four phases and adds that the overall communication strategy of Warp Speed “should be timely and applicable for the current phase of the Covid-19 Vaccination program.” 

Those phases are:

  • Before a vaccine is available
  • The vaccine is available in limited supply for certain populations of early focus
  • The vaccine is increasingly available for other critical populations and the general public
  • The vaccine is widely available

Given that the Covid-19 vaccine candidate produced by Pfizer is expected to be approved by the end of November, it appears that the US national-security state, which is essentially running Operation Warp Speed, along with “trusted messengers” in mass media, is preparing to enter the second phase of its communications strategy, one in which news organizations and journalists who raise legitimate concerns about Warp Speed will be de-platformed to make way for the “required” saturation of pro-vaccine messaging across the English-speaking media landscape.

US – UK Intel Agencies Declare Cyber War on Independent Media

British and American state intelligence agencies are “weaponizing truth” to quash vaccine hesitancy as both nations prepare for mass inoculations, in a recently announced “cyber war” to be commanded by AI-powered arbiters of truth against information sources that challenge official narratives.

By Whitney Webb

Source: Unlimited Hangout

In just the past week, the national-security states of the United States and United Kingdom have discreetly let it be known that the cyber tools and online tactics previously designed for use in the post-9/11 “war on terror” are now being repurposed for use against information sources promoting “vaccine hesitancy” and information related to Covid-19 that runs counter to their state narratives.

A new cyber offensive was launched on Monday by the UK’s signal intelligence agency, Government Communications Headquarters (GCHQ), which seeks to target websites that publish content deemed to be “propaganda” that raises concerns regarding state-sponsored Covid-19 vaccine development and the multi-national pharmaceutical corporations involved.

Similar efforts are underway in the United States, with the US military recently funding a CIA-backed firm—stuffed with former counterterrorism officials who were behind the occupation of Iraq and the rise of the so-called Islamic State—to develop an AI algorithm aimed specifically at new websites promoting “suspected” disinformation related to the Covid-19 crisis and the US military–led Covid-19 vaccination effort known as Operation Warp Speed.

Both countries are preparing to silence independent journalists who raise legitimate concerns over pharmaceutical industry corruption or the extreme secrecy surrounding state-sponsored Covid-19 vaccination efforts, now that Pfizer’s vaccine candidate is slated to be approved by the US Food and Drug Administration (FDA) by month’s end.

Pfizer’s history of being fined billions for illegal marketing and for bribing government officials to help them cover up an illegal drug trial that killed eleven children (among other crimes) has gone unmentioned by most mass media outlets, which instead have celebrated the apparently imminent approval of the company’s Covid-19 vaccine without questioning the company’s history or that the mRNA technology used in the vaccine has sped through normal safety trial protocols and has never been approved for human use. Also unmentioned is that the head of the FDA’s Center for Drug Evaluation and Research, Patrizia Cavazzoni, is the former Pfizer vice president for product safety who covered up the connection of one of its products to birth defects.

Essentially, the power of the state is being wielded like never before to police online speech and to deplatform news websites to protect the interests of powerful corporations like Pfizer and other scandal-ridden pharmaceutical giants as well as the interests of the US and UK national-security states, which themselves are intimately involved in the Covid-19 vaccination endeavor.

UK Intelligence’s New Cyberwar Targeting “Anti-Vaccine Propaganda”

On Monday, the UK newspaper The Times reported that the UK’s GCHQ “has begun an offensive cyber-operation to disrupt anti-vaccine propaganda being spread by hostile states” and “is using a toolkit developed to tackle disinformation and recruitment material peddled by Islamic State” to do so. In addition, the UK government has ordered the British military’s 77th Brigade, which specializes in “information warfare,” to launch an online campaign to counter “deceptive narratives” about Covid-19 vaccine candidates.

The newly announced GCHQ “cyber war” will not only take down “anti-vaccine propaganda” but will also seek to “disrupt the operations of the cyberactors responsible for it, including encrypting their data so they cannot access it and blocking their communications with each other.”  The effort will also involve GCHQ reaching out to other countries in the “Five Eyes” alliance (US, Australia, New Zealand and Canada) to alert their partner agencies in those countries to target such “propaganda” sites hosted within their borders.

The Times stated that “the government regards tackling false information about inoculation as a rising priority as the prospect of a reliable vaccine against the coronavirus draws closer,” suggesting that efforts will continue to ramp up as a vaccine candidate gets closer to approval.

It seems that, from the perspective of the UK national-security state, those who question corruption in the pharmaceutical industry and its possible impact on the leading experimental Covid-19 vaccine candidates (all of which use experimental vaccine technologies that have never before been approved for human use) should be targeted with tools originally designed to combat terrorist propaganda.

While The Times asserted that the effort would target content “that originated only from state adversaries” and would not target the sites of “ordinary citizens,” the newspaper suggested that the effort would rely on the US government for determining whether or not a site is part of a “foreign disinformation” operation.

This is highly troubling given that the US recently seized the domains of many sites, including the American Herald Tribune, which it erroneously labeled as “Iranian propaganda,” despite its editor in chief, Anthony Hall, being based in Canada. The US government made this claim about the American Herald Tribune after the cybersecurity firm FireEye, a US government contractor, stated that it had “moderate confidence” that the site had been “founded in Iran.”

In addition, the fact that GCHQ has alleged that most of the sites it plans to target are “linked to Moscow” gives further cause for concern given that the UK government was caught funding the Institute for Statecraft’s Integrity Initiative, which falsely labeled critics of the UK government’s actions as well as its narratives with respect to the Syria conflict as being related to “Russian disinformation” campaigns.

Given this precedent, it is certainly plausible that GCHQ could take the word of either an allied government, a government contractor, or perhaps even an allied media organization such as Bellingcat or the Atlantic Council’s DFRLab that a given site is “foreign propaganda” in order to launch a cyber offensive against it. Such concerns are only amplified when one of the main government sources for The Times article bluntly stated that “GCHQ has been told to take out antivaxers [sic] online and on social media. There are ways they have used to monitor and disrupt terrorist propaganda,” which suggests that the targets of GCHQ’s new cyber war will, in fact, be determined by the content itself rather than their suspected “foreign” origin. The “foreign” aspect instead appears to be a means of evading the prohibition in GCHQ’s operational mandate on targeting the speech or websites of ordinary citizens.

This larger pivot toward treating alleged “anti-vaxxers” as “national security threats” has been ongoing for much of this year, spearheaded in part by Imran Ahmed, the CEO of the UK-based Center for Countering Digital Hate, a member of the UK government’s Steering Committee on Countering Extremism Pilot Task Force, which is part of the UK government’s Commission for Countering Extremism.

Ahmed told the UK newspaper The Independent in July that “I would go beyond calling anti-vaxxers conspiracy theorists to say they are an extremist group that pose a national security risk.” He then stated that “once someone has been exposed to one type of conspiracy it’s easy to lead them down a path where they embrace more radical world views that can lead to violent extremism,” thereby implying that “anti-vaxxers” might engage in acts of violent extremism. Among the websites cited by Ahmed’s organization as promoting such “extremism” that poses a “national security risk” were Children’s Health Defense, the National Vaccine Information Center, Informed Consent Action Network, and Mercola.com, among others.

Similarly, a think tank tied to US intelligence—whose GCHQ equivalent, the National Security Agency, will take part in the newly announced “cyber war”—argued in a research paper published just months before the onset of the Covid-19 crisis that “the US ‘anti-vaxxer’ movement would pose a threat to national security in the event of a ‘pandemic with a novel organism.’”

InfraGard, “a partnership between the Federal Bureau of Investigation (FBI) and members of the private sector,” warned in the paper published last June that “the US anti-vaccine movement would also be connected with ‘social media misinformation and propaganda campaigns’ orchestrated by the Russian government,” as cited by The Guardian. The InfraGard paper further claimed that prominent “anti-vaxxers” are aligned “with other conspiracy movements including the far right . . . and social media misinformation and propaganda campaigns by many foreign and domestic actors. Included among these actors is the Internet Research Agency, the Russian government–aligned organization.”

An article published just last month by the Washington Post argued that “vaccine hesitancy is mixing with coronavirus denial and merging with far-right American conspiracy theories, including Qanon,” which the FBI named a potential domestic terror threat last year. The article quoted Peter Hotez, dean of the School of Tropical Medicine at Baylor College of Medicine in Houston, as saying “The US anti-vaccination movement is globalizing and it’s going toward more-extremist tendencies.”

It is worth pointing out that many so-called “anti-vaxxers” are actually critics of the pharmaceutical industry and are not necessarily opposed to vaccines in and of themselves, making the labels “anti-vaxxer” and “anti-vaccine” misleading. Given that many pharmaceutical giants involved in making Covid-19 vaccines donate heavily to politiciansin both countries and have been involved in numerous safety scandals, using state intelligence agencies to wage cyber war against sites that investigate such concerns is not only troubling for the future of journalism but it suggests that the UK is taking a dangerous leap toward becoming a country that uses its state powers to treat the enemies of corporations as enemies of the state.

The CIA-Backed Firm “Weaponizing Truth” with AI

In early October, the US Air Force and US Special Operations Command announced that they had awarded a multimillion-dollar contract to the US-based “machine intelligence” company Primer. Per the press release, “Primer will develop the first-ever machine learning platform to automatically identify and assess suspected disinformation [emphasis added]. Primer will also enhance its natural language processing platform to automatically analyze tactical events to provide commanders with unprecedented insight as events unfold in near real-time.”

According to Primer, the company “builds software machines that read and write in English, Russian, and Chinese to automatically unearth trends and patterns across large volumes of data,” and their work “supports the mission of the intelligence community and broader DOD by automating reading and research tasks to enhance the speed and quality of decision-making.” In other words, Primer is developing an algorithm that would allow the national-security state to outsource many military and intelligence analyst positions to AI. In fact, the company openly admits this, stating that their current effort “will automate the work typically done by dozens of analysts in a security operations center to ingest all of the data relevant to an event as it happens and funnel it into a unified user interface.”

Primer’s ultimate goal is to use their AI to entirely automate the shaping of public perceptions and become the arbiter of “truth,” as defined by the state. Primer’s founder, Sean Gourley, who previously created AI programs for the military to track “insurgency” in post-invasion Iraq, asserted in an April blog post that “computational warfare and disinformation campaigns will, in 2020, become a more serious threat than physical war, and we will have to rethink the weapons we deploy to fight them.”

In that same post, Gourley argued for the creation of a “Manhattan Project for truth” that would create a publicly available Wikipedia-style database built off of “knowledge bases [that] already exist inside many countries’ intelligence agencies for national security purposes.” Gourley then wrote that “this effort would be ultimately about building and enhancing our collective intelligence and establishing a baseline for what’s true or not” as established by intelligence agencies. He concludes his blog post by stating that “in 2020, we will begin to weaponize truth.”

Notably, on November 9, the same day that GCHQ announced its plans to target “anti-vaccine propaganda,” the US website NextGov reported that Primer’s Pentagon-funded effort had turned its attention specifically to “Covid-19 related disinformation.” According to Primer’s director of science, John Bohannon, “Primer will be integrating bot detection, synthetic text detection and unstructured textual claims analysis capabilities into our existing artificial intelligence platform currently in use with DOD. . . . This will create the first unified mission-ready platform to effectively counter Covid-19-related disinformation in near-real time.”

Bohannon, who previously worked as a mainstream journalist embedded with NATO forces in Afghanistan, also told NextGov that Primer’s new Covid-19–focused effort “automatically classifies documents into one of 10 categories to enable the detection of the impact of COVID” on areas such as “business, science and technology, employment, the global economy, and elections.” The final product is expected to be delivered to the Pentagon in the second quarter of next year.

Though a so-called private company, Primer is deeply linked to the national-security state it is designed to protect by “weaponizing truth.” Primer proudly promotes itself as having more than 15 percent of its staff hailing from the US intelligence community or military. The director of the company’s National Security Group is Brian Raymond, a former CIA intelligence officer who served as the Director for Iraq on the US National Security Council after leaving the agency.

The company also recently added several prominent national-security officials to its board including:

  • Gen. Raymond Thomas (ret.), who led the command of all US and NATO Special Operations Forces in Afghanistan and is the former commander of both US Special Operations Command and Joint Special Operations Command (JSOC).
  • Lt. Gen. VeraLinn Jamieson (ret.), the former deputy chief of staff for Air Force Intelligence, Surveillance and Reconnaissance who led the Air Force’s intelligence and cyber forces. She also personally developed “strategic partnerships” between the Air Force and Microsoft, Amazon, Google, and IBM in order “to accelerate the Air Force’s digital transformation.”
  • Brett McGurk, one of the “chief architects” of the Iraq War “surge,” alongside the notorious Kagan family, as NSC Director for Iraq, and then as special assistant to the president and senior Director for Iraq and Afghanistan during the Bush administration. Under Obama and during part of the Trump administration, McGurk was the special presidential envoy for the Global Coalition to Defeat ISIS at the State Department, helping to manage the “dirty war” waged by the US, the UK, and other allies against Syria.

In addition to those recent board hires, Primer brought on Sue Gordon, the former principal deputy director of National Intelligence, as a strategic adviser. Gordon previously “drove partnerships within the US Intelligence Community and provided advice to the National Security Council in her role as deputy director of national intelligence” and had a twenty-seven-year career at the CIA. The deep links are unsurprising, given that Primer is financially backed by the CIA’s venture-capital arm In-Q-Tel and the venture-capital arm of billionaire Mike Bloomberg, Bloomberg Beta.

Operation Warp Speed’s Disinformation Blitzkrieg

The rapid increase in interest by the US and UK national-security states toward Covid-19 “disinformation,” particularly as it relates to upcoming Covid-19 vaccination campaigns, is intimately related to the media-engagement strategy of the US government’s Operation Warp Speed.

Officially a “public-private partnership,” Operation Warp Speed, which has the goal of vaccinating 300 million Americans by next January, is dominated by the US military and also involves several US intelligence agencies, including the National Security Agency (NSA) and the Department of Homeland Security (DHS), as well as intelligence-linked tech giants Google, Oracle, and Palantir. Several reports published in The Last American Vagabondby this author and journalist Derrick Broze have revealed the extreme secrecy of the operation, its numerous conflicts of interest, and its deep ties to Silicon Valley and Orwellian technocratic initiatives.

Warp Speed’s official guidance discusses at length its phased plan for engaging the public and addressing issues of “vaccine hesitancy.” According to the Warp Speed document entitled “From the Factory to the Frontlines,” “strategic communications and public messaging are critical to ensure maximum acceptance of vaccines, requiring a saturation of messaging across the national media.” It also states that “working with established partners—especially those that are trusted sources for target audiences—is critical to advancing public understanding of, access to, and acceptance of eventual vaccines” and that “identifying the right messages to promote vaccine confidence, countering misinformation, and targeting outreach to vulnerable and at-risk populations will be necessary to achieve high coverage.”

The document also notes that Warp Speed will employ the CDC’s three-pronged strategic framework for its communications effort. The third pillar of that strategy is entitled “Stop Myths” and has as a main focus “establish[ing] partnerships to contain the spread of misinformation” as well as “work[ing] with local partners and trusted messengers to improve confidence in vaccines.”

Though that particular Warp Speed document is short on specifics, the CDC’s Covid-19 Vaccination Program Interim Playbook contains additional information. It states that Operation Warp Speed will “engage and use a wide range of partners, collaborations, and communication and news media channels to achieve communication goals, understanding that channel preferences and credible sources vary among audiences and people at higher risk for severe illness and critical populations, and channels vary in their capacity to achieve different communication objectives.” It states that it will focus its efforts in this regard on “traditional media channels” (print, radio, and TV) as well as “digital media” (internet, social media, and text messaging).

The CDC document further reveals that the “public messaging” campaign to “promote vaccine uptake” and address “vaccine hesitancy” is divided into four phases and adds that the overall communication strategy of Warp Speed “should be timely and applicable for the current phase of the Covid-19 Vaccination program.”

Those phases are:

  • Before a vaccine is available
  • The vaccine is available in limited supply for certain populations of early focus
  • The vaccine is increasingly available for other critical populations and the general public
  • The vaccine is widely available

Given that the Covid-19 vaccine candidate produced by Pfizer is expected to be approved by the end of November, it appears that the US national-security state, which is essentially running Operation Warp Speed, along with “trusted messengers” in mass media, is preparing to enter the second phase of its communications strategy, one in which news organizations and journalists who raise legitimate concerns about Warp Speed will be de-platformed to make way for the “required” saturation of pro-vaccine messaging across the English-speaking media landscape.

Cyberwar: #RussiaGate Is US

By Rob Williams

Source: Project Censored

The following is a critical book review of Kathleen Hall Jamieson’s Cyberwar: How Russian Hackers and Trolls Helped Elect A President – What We Don’t, Can’t, And Do Know (Oxford: Oxford University Press, 2018).

“Russia hacked the 2016 US election!”

Since November 2016, the US “news” chatterati – pundits and poets, priests, prognosticators and politicians – have repeated this statement ad nauseum. The #RussiaGate story has become a commonly-accepted article of faith amongst the US neoliberal faithful – disgruntled Clintonistas, bereaved “Bernie Bros,” US news flaks, and anyone else who dislikes the current occupant of the White House. If the “Russia hacked the 2016 US election” meme warriors had a high-viz US standard bearer, it would probably be popular MSNBC performance artist Rachel “All Russia, All The Time” Maddow, who serves up the #RussiaGate sauce with reckless abandon to high TeeVee viewer ratings, earning somewhere between $30 and $40 K daily in salary. (LINK to RM mashup here).

And now, we have a scholarly book published by Oxford University Press with an epic title – Cyberwar: How Russian Hackers and Trolls Helped Elect A President – What We Don’t, Can’t, And Do Know – that purports to prove that Russia’s cyber-meddling helped sabotage the HRC campaign, swinging the 2016 US presidential election in favor of DJT.

To approach Cyberwar, first consider everything on the table re: the 2016 US presidential election.

Here‘s just a short list.

Witness the two most unpopular presidential candidates in US political history (one of whom confidently encouraged the other to run, convinced she could beat him); massive and well-documented bipartisan digital vote count manipulation (“electile dysfunction”) courtesy the 2002 “Help America Vote Act” (Orwell would be impressed); the grotesque (human) nature of Donald J Trump and Republicans’ comical attempts to first displace and then eventually come to terms with his 2016 candidacy; the complete corruption of the national Democratic Party leadership, which did everything it could to crown HRC the Dem standard bearer, from systematically undermining insurgent Vermont “progressive” Bernie Sanders’ presidential bid (read the 110 page report “Democracy Lost” for detailed descriptions of how the DNC manipulated 2016 Democratic primary outcomes in 11 swing states) to diverting DNC fundraising – millions of dollars collected from the pockets of ordinary Americans – away from so-called “down ballot” local office races and into HRC presidential campaign coffers during the heated months of 2016.

There’s so much more, but I’ll simply stop there.

Rather than looking in the 2016 mirror, however, US blames…Russians?

To be clear, I approached Cyberwar with an open mind. I am a big fan of the book’s author, distinguished US media scholar Kathleen Hall Jamieson (KHJ), longtime badass in the world of political communications scholarship, and current Elizabeth Ware Packard Professor at the Annenberg School for Communication at the University of Pennsylvania and the Director of the Annenberg Public Policy Center. Jamieson’s got street cred. However, after a close read and re-read of KHJ’s new book, including all the footnotes, Cyberwar left me unconvinced by its “more or less” central conclusion – “Russia trolled and hacked the 2016 US election, sorta!” In fact, I’d suggest that Cyberwar is a deeply problematic book, a fascinating scholarly study in “manufacturing consent” – the term Edward Herman and Noam Chomsky borrowed from Walter Lippman to title their 1988 book of the same name – describing how US elites “massage” US news channels like the New York Times, “filtering” into public view the “news” stories most beneficial to their strategic goals, while downplaying or censoring other worthy “news” stories of significance.

To fully understand my critique of Cyberwar, start with Jamieson’s credulous acceptance of “facts” provided by the US “intelligence community” (my new favorite Orwellian trope) re: the Russian government’s “interference” to advance her Cyberwar case. More on that in a moment. In the meantime, here is KHJ’s central Cyberwar claim, summarized in a single long sentence, slightly paraphrased for brevity, from her book’s conclusion: “In the run up to the 2016 US presidential election, Russian trolls and hackers carried out a strategically systematic and ultimately successful communications campaign to discredit Democratic presidential candidate Hillary Rodham Clinton and support Republican presidential candidate Donald J. Trump through sufficiently widespread messaging that focused on issues compatible with Trump’s strategic needs, addressing constituencies he had to mobilize and demobilize, by employing persuasive, visually evocative and well-targeted content that was amplified in swing states through sharing, liking, and commenting.” (p. 203).

It’s a mouthful, I know, and when you read it over a few times, removing both Clinton and Trump’s names, you quickly realize that this is what ANY strategic political campaign using digital tools –Cyberspace’s unique power and reach – would set out to do to try and win any election, anywhere. Russian president Vladimir Putin himself concedes that Russia wages “campaigns of political influence” wherever and whenever they can, just as the US and other powerful countries do and have done for decades, using as many communications tools as they can leverage.

So – how does Jamieson set out to prove Russian Cyberwar? She divides her book into four parts.

Part One of Jamieson’s book explores “who did it, why, and what research says about it might matter.” Here, KHJ flags the Internet Research Agency (IRA), a Russian troll farm, and introduces the reader to her previous ground-breaking work on communications effects research – how techniques like agenda-setting, framing, priming and “contagion creation” have worked over time to influence US voter decisions, and thus, perhaps, election outcomes. Big caveat here, that KHJ leaves unacknowledged. To wit – presumably, Russian “trolls” share the same primary goal as ALL trolls on the Internet, namely, maximizing audience engagement (and thus profit) through the creation and deployment of relevant content, with their chief “currency” being click-throughs, likes, shares, retweets, etc.

In Part Two of Cyberwar, Jamieson looks at what she calls “the prerequisites of [Russian] troll influence.” “Were the extent and virality of Russian social media content and the nature, coverage, and exposure of Russian-hacked Democratic materials,” she asks, “sufficient and sufficiently persuasive to plausibly affect the outcome of an election decided in three states by about 78,000 votes?” (p. 65). Hint – her final answer is a circumspectly strong “maybe.”

Part Three of Cyberwar finds KHJ considering “how the Russians affected the news and debate agendas in the last month of the presidential campaign.” Here, Jamieson looks at how “Russian hacked content” (her words) transformed the nature of US news coverage surrounding HRC in the month before the 2016 election, with a particular focus on the “drip drip drip” impact of “WikiLeak’d” emails illegally obtained from Democratic National Committee (DNC) servers, as well as FBI director James Comey’s role, during October 2016, in reopening the investigation into “newly-found” HRC emails, which KHJ argues helped shape public impressions around HRC for undecided US voters in the days just before the election.

Jamieson uses Cyberwar Part Four to provide a brief summary of “what we don’t, can’t, and do know about how Russian hackers and trolls helped elect Donald Trump.” “My case that the uses of Russian-hacked (emphasis added) Democratic materials influenced voters is built on scholars’ understandings of the effects of linguistic priming, media agenda setting, and framing the susceptibilities of late deciders, the dispositions of those who view both candidates unfavorably, the effects of imbalances in the amount of negative information available about alternative candidates, and scholarship on how debates affect voter attitudes,” Jamieson concludes. “It is scaffolded on evidence that the hacked content not only altered the media and debate agendas but also increased the negative press about Clinton. And it is bolstered by the possibility that Russian access and anticipated use of illegally gotten or fabricated Democratic content shaped a key decision by FBI director Comey.” (210)

To be fair, Cyberwar is an engaging read. Jamieson is a fine scholarly writer, and she has a field day digging into the aesthetics of individual Russian troll farm memes – complete with pictures. (The “Army Of Jesus” Facebook page, purportedly created by Russian trolls, features a boxing glove clad HRC sporting devil horns engaged in a fierce arm-wrestling match with Aryan Jesus himself. Hilarious.) KHJ also does a credible job tracing the evolution of the US news narrative around HRC in the weeks leading up to the 2016 election, showing how pivotal moments may have influenced voter perceptions about both HRC and DJT.

However! Individual Russian troll farm memes and evolving US “news” media coverage negatively impacting HRC do NOT a strategic Kremlin-led messaging campaign make.

Cyberwar continually flirts with a central question (which has become a story routinely told by US “news” media outlets)  – “Was Russian troll farming some sort of Kremlin-staged strategic cyber-op?” – without ever really answering it. The result is a book-length begging of this very important question, and here we come to the primary problem with Cyberwar– and it’s a whopper. Jamieson build her case for the Russian “tanking” of HRC’s candidacy on two central assumptions, both unproven.

Assumption #1: Jamieson implicitly asserts in Cyberwar that the Russians “hacked” into the Democratic National Committee (DNC) computer servers (as well as other hacks) and obtained digital copies of thousands of what became publicly damning emails from members of the DNC leadership team – Clinton campaign advisor John Podesta, HRC herself, and others – and then (by extension) tried to leverage the contents of these stolen documents for months in US social media spaces (and, by extension, influenced the shaping of US news narratives about HRC.) Interestingly, KHJ sneaks in “Russia hacked” and “Russian-stolen Democratic content” language into the last third of her book, without directly addressing this BIG rhetorical move or providing any proof that the Russians did so. Instead, she appears to implicitly draw on “evidence” for Russian hacking provided by the US “intelligence community” – former FBI director turned Trump special prosecutor Bob Mueller, former director of national intelligence James Clapper, and former National Security Agency director Michael Hayden chief among them. (Mueller, Clapper, Hayden – three US government officials who have all been less than honest with the American people, and I’m being generous.)

The counternarrative to the “Russia hacked into the DNC computers” story? Information was “leaked” from inside the DNC, not hacked from the outside. How might we know? Former NSA cryptographer Bill Binney, former CIA official Ray McGovern, and many other members of the 2003-founded Veteran Intelligence Professionals for Sanity (VIPS) argue that, based on their review of computer bit rate information, the stolen DNC content traveled at bandwidth rates too high to have been an external “hack,” but rather an internal “leak.” The reality? We’ll never know for sure, because the DNC refused to hand over their compromised computer servers to the FBI, instead contracting with Crowd Strike, a private US cybersecurity firm, to ascertain affirmative Russian hacking involvement (#Surprise!). For interested readers, NSA whistleblower Bill Binney discusses his “leak versus hack” conclusions on this recent episode of Brass Check TV between 1:27 – 1:37 here.

Assumption #2: In Cyberwar, Jamieson implies that WikiLeaks closely collaborated with the Russian government, or at the very least (it’s a bit hard to tell from her lack of analysis here), Putin used WikiLeaks as its public relations machine to destroy HRC’s reputation and elevate DJT as a presidential candidate. In other words, from his Ecuadorian embassy prison, Assange was in close cahoots with Putin, Cyberwar implies, or at the very least, Assange served as a “useful idiot” for the Kremlin. Here again, KHJ offers no proof, other than continually flagging the usual suspects, Russian troll farmers and hackers, as well as other sources such as the popular RT (formerly Russia Today) news channel for alleged disinformation shenanigans, such as broadcasting an exclusive in-depth interview between independent British journalist John Pilger and WikiLeaks’ co-founder Julian Assange on November 6, 2016, two days before the election.

Side note – this interview, entitled “Secret World of US Election,” is fascinating (see here).

RT/Russia Today now carries a variety of US news shows  hosted by US news journalists now unable to find access to the US airwaves, individuals like former MSNBC journalist Ed Schultz (now deceased), former US talk show host Larry King, and Pulitzer Prize winning former New York Times foreign correspondent Chris Hedges. Ironically, RT’s news content is often much more in-depth than any stories provided by the US corporate commercial TeeVee channels – watch any episode of Chris Hedges’ “On Contact,” for example, to hear perspectives on US politics you’ll rarely find on any other US news channel. On December 31, 2018, RT aired an episode of Larry King’s program talking with longtime Russia expert and War With Russia? author Stephen Cohen, and the show begins with King parroting the “Russia interfered in the US election” meme, a claim Cohen respectfully disputes before launching into a cogent and thoughtful analysis of the importance of a 21st century US-Russia “partnership” (not “friendship”) instead of more US/NATO aggression on Russia’s borders,  and how DJT’s overtures to Russia have been continually hamstrung by US political and media elites. Here’s a link for further listening. It bears repeating, and King and Cohen discuss this at some length, that Cohen’s point of view re: Russia is now considered “radical” in US policy-making circles, despite the Cold War between the US and Russia having been officially over for thirty years.

Back to WikiLeaks and the organization’s alleged conspiring with the Kremlin. Suffice to say, as the world’s first truly “stateless” news organization, WikiLeaks’ role as a powerful platform for publishing information provided by corporate and state insiders-turned-whistleblowers has been consistently credible and accurate, as well as proving a colossal PITA for US political and economic elites on all sides of the aisle. And yes, Assange and WikiLeaks have reserved special ire for the Clintons, and indeed, Assange admitted to actively working with the DJT campaign in the months leading up to the 2016 US presidential election. To implicitly blame the Russians for WikiLeaks’ behavior, however, as KHJ does in Cyberwar, is disingenuous at best.

Here’s a single example of this troublesome conflation based on faulty assumptions from page 149 pf KHJ’s Cyberwaranalysis: In early October 2016, Jamieson asserts, “a DHS-ODNI intelligence report confirmed that the Russians were behind the hacking of the DNC…and a first tranche of Russian-hacked Podesta emails was WikiLeak’d.” She then goes on to detail (rightly in my estimation) the damning impact of these documents on US news coverage of HRC’s campaign. But read her sentence above again to understand the broad leaps she is making, which go well beyond Russian troll farmers.

And here is the rub. At day’s end, Jamieson’s case for Russian Cyberwar squarely rests on these two assumptions, both unproven. The result? KHJ makes mountains out of molehills – amateurish Russian troll farming on Facebook and Twitter, and (maybe?) a “campaign of influence targeting HRC” is transmogrified, in her implicit final analysis AND by uncritical coverage of her Cyberwar book in the popular US news media, into Putin’s Russian government strategically penetrating to the very heart of the US electoral process, “gaming” the outcome against HRC and in favor of DJT. In this tense geopolitical moment, when corporate for-profit and “deep state” US “news” media mouthpieces supporting the Empire’s “full-spectrum dominance” of planet Earth on the Pentagon’s behalf are blindly thrashing about looking for someone (or some country) to blame, Cyberwar only adds fuel to the fires of the #RussiaGate hysteria.

Bigger picture? Even more troublesome for any American who still believes in the transformative power of free, open, and democratic discourse are the ways in which the two-year-old #RussiaGate tale is now being leveraged by US elites here in the “Homeland.” “Behavioral microtargeting,” a digital communications strategy pioneered in 2016 by UK-based Cambridge Analytica CEO Alexander Nix, Trump chief strategist Steve Bannon, and Facebook (unwittingly?) through “data breaches” of 50 million (with an M) Facebook user accounts, is now being used in state and local political races around the US as a viable political strategy. Social media censorship, meanwhile, is emerging as a strategic US synergistic state/corporate response to so-called “fake news” – witness neoliberal think tank Atlantic Council’s recent collaboration with Facebook to “purge” more than 800 “suspect” Facebook accounts, or Google’s “algorithmic censorship,” gaming its algorithm to marginalize US news outlets – TruthDig, Alternet, TruthOut, WWSA – critical of the US imperial status quo, or the complete purging of controversial independent analyst and so-called “conspiracy theorist” Alex Jones from pretty much ALL mainstream (read corporate) US digital platforms – all happened within the past year. And, as US comedienne Michelle Wolf pointed out at the annual Washington Press Club banquet last spring, MOUNDS of money are being made by US neoliberal “news” outlets – clicks, ratings, book sales – through this sort of Trump-bashing and fear-mongering, while pressing issues impacting the lives of ordinary Americans – “still no clean water in Flint, Michigan!” – are completely ignored. #RussiaGate, in sum, is now a rationale for demonizing, marginalizing, and censoring any US individual or organization that does not tow the #RussiaGate party line.

Despite the US news-induced hysteria surrounding the #RussiaGate tale, voices of reason persist. Most prominent include Rolling Stone investigative journalist Matt Taibbi, LA-based nightclub comedian Jimmy Dore (who regularly covers the excesses of the #RussiaGate story with his comedic colleagues on is popular YouTube channel “The Jimmy Dore Show”), and Nation reporter Aaron Maté, whose December 28, 2018 article calls BS on the #Russiagate nonsense. The complete title of Maté’s article? “New Studies Show Pundits Are Wrong About Russian Social-Media Involvement in US Politics – Far from being a sophisticated propaganda campaign, it was small, amateurish, and mostly unrelated to the 2016 election.” (read Maté’s piece here). Maté, who has covered the #RussiaGate story extensively since 2016, provides in-depth analysis of two new reports alleging Russian cyber meddling – one produced by the University of Oxford’s Computational Propaganda Research Project and the other by the US consulting corporation with deep ties to the national security state, New Knowledge. I encourage interested readers to take the time to read his story.

Maté’s conclusion, meanwhile, is worth quoting here at length:

Based on all of this data, we can draw this picture of Russian social-media activity: It was mostly unrelated to the 2016 election; microscopic in reach, engagement, and spending; and juvenile or absurd in its content. This leads to the inescapable conclusion, as the New Knowledge study acknowledges, that “the operation’s focus on elections was merely a small subset” of its activity. They qualify that “accurate” narrative by saying it “misses nuance and deserves more contextualization.” Alternatively, perhaps it deserves some minimal reflection that a juvenile social-media operation with such a small focus on elections is being widely portrayed as a seismic threat that may well have decided the 2016 contest.

Indeed.

Would that Kathleen Hall Jamieson was not a bit more “nuanced” in “contextualizing” her Cyberwar analysis.

What to do? The best answer is critical media literacy education – moving beyond partisan politics and moral panics to more thoughtfully engage these important political questions in open dialogue and debate.

Until we do so, we will continue to be enthralled by the #RussiaGate tale, with potentially deleterious geopolitical consequences. (Again, Cohen’s interview with Larry King is a good starting place).

To wit, in Pogo’s famous phrase – “we have met the enemy and he is US.”

The Pentagon’s New Wonder Weapons for World Dominion

Or Buck Rogers in the 21st Century

By Alfred McCoy

Source: The Unz Review

[This piece has been adapted and expanded from Alfred W. McCoy’s new book, In the Shadows of the American Century: The Rise and Decline of U.S. Global Power.]

Not quite a century ago, on January 7, 1929, newspaper readers across America were captivated by a brand-new comic strip, Buck Rogers in the 25th Century. It offered the country its first images of space-age death rays, atomic explosions, and inter-planetary travel.

“I was twenty years old,” World War I veteran Anthony “Buck” Rogers told readers in the very first strip, “surveying the lower levels of an abandoned mine near Pittsburgh… when suddenly… gas knocked me out. But I didn’t die. The peculiar gas… preserved me in suspended animation. Finally, another shifting of strata admitted fresh air and I revived.”

Staggering out of that mine, he finds himself in the 25th century surrounded by flying warriors shooting ray guns at each other. A Mongol spaceship overhead promptly spots him on its “television view plate” and fires its “disintegrator ray” at him. He’s saved from certain death by a flying woman warrior named Wilma who explains to him how this all came to be.

“Many years ago,” she says, “the Mongol Reds from the Gobi Desert conquered Asia from their great airships held aloft by gravity Repellor Rays. They destroyed Europe, then turned toward peace-loving America.” As their disintegrator beams boiled the oceans, annihilated the U.S. Navy, and demolished Washington, D.C. in just three hours, “government ceased to exist, and mobs, reduced to savagery, fought their way out of the cities to scatter and hide in the country. It was the death of a nation.” While the Mongols rebuilt 15 cities as centers of “super scientific magnificence” under their evil emperor, Americans led “hunted lives in the forests” until their “undying flame of freedom” led them to recapture “lost science” and “once more strike for freedom.”

After a year of such cartoons filled with the worst of early-twentieth-century Asian stereotypes, just as Wilma is clinging to the airship of the Mongol Viceroy as it speeds across the Pacific , a mysterious metallic orb appears high in the sky and fires death rays, sending the Mongol ship “hissing into the sea.” With her anti-gravity “inertron” belt, the intrepid Wilma dives safely into the waves only to have a giant metal arm shoot out from the mysterious orb and pull her on board to reveal — “Horrors! What strange beings!” — Martians!

With that strip, Buck Rogers in the 25th Century moved from Earth-bound combat against racialized Asians into space wars against monsters from other planets that, over the next 70 years, would take the strip into comic books, radio broadcasts, feature films, television serials, video games, and the country’s collective conscious. It would offer defining visions of space warfare for generations of Americans.

Back in the 21st Century

Now imagine us back in the 21st century. It’s 2030 and an American “triple canopy” of pervasive surveillance systems and armed drones already fills the heavens from the lower stratosphere to the exo-atmosphere. It can deliver its weaponry anywhere on the planet with staggering speed, knock out enemy satellite communications at a moment’s notice, or follow individuals biometrically for great distances. It’s a wonder of the modern age. Along with the country’s advanced cyberwar capacity, it’s also the most sophisticated military information system ever created and an insurance policy for global dominion deep into the twenty-first century.

That is, in fact, the future as the Pentagon imagines it and it’s actually under development, even though most Americans know little or nothing about it. They are still operating in another age, as was Mitt Romney during the 2012 presidential debates when he complained that “our Navy is smaller now than at any time since 1917.”

With words of withering mockery, President Obama shot back: “Well, Governor, we also have fewer horses and bayonets, because the nature of our military’s changed… the question is not a game of Battleship, where we’re counting ships. It’s what are our capabilities.” Obama then offered just a hint of what those capabilities might be: “We need to be thinking about cyber security. We need to be talking about space.”

Indeed, working in secrecy, the Obama administration was presiding over a revolution in defense planning, moving the nation far beyond bayonets and battleships to cyberwarfare and the future full-scale weaponization of space. From stratosphere to exosphere, the Pentagon is now producing an armada of fantastical new aerospace weapons worthy of Buck Rogers.

In 2009, building on advances in digital surveillance under the Bush administration, Obama launched the U.S. Cyber Command. Its headquarters were set up inside the National Security Agency (NSA) at Fort Meade, Maryland, and a cyberwar center staffed by 7,000 Air Force employees was established at Lackland Air Base in Texas. Two years later, the Pentagon moved beyond conventional combat on air, land, or sea to declare cyberspace both an offensive and defensive “operational domain.” In August, despite his wide-ranging attempt to purge the government of anything connected to Barack Obama’s “legacy,” President Trump implemented his predecessor’s long-delayed plan to separate that cyber command from the NSA in a bid to “strengthen our cyberspace operations.”

And what is all this technology being prepared for? In study after study, the intelligence community, the Pentagon, and related think tanks have been unanimous in identifying the main threat to future U.S. global hegemony as a rival power with an expanding economy, a strengthening military, and global ambitions: China, the home of those denizens of the Gobi Desert who would, in that old Buck Rogers fable, destroy Washington four centuries from now. Given that America’s economic preeminence is fading fast, breakthroughs in “information warfare” might indeed prove Washington’s best bet for extending its global hegemony further into this century — but don’t count on it, given the history of techno-weaponry in past wars.

Techno-Triumph in Vietnam

Ever since the Pentagon with its 17 miles of corridors was completed in 1943, that massive bureaucratic maze has presided over a creative fusion of science and industry that President Dwight Eisenhower would dub “the military-industrial complex” in his farewell address to the nation in 1961. “We can no longer risk emergency improvisation of national defense,” he told the American people. “We have been compelled to create a permanent armaments industry of vast proportions” sustained by a “technological revolution” that is “complex and costly.” As part of his own contribution to that complex, Eisenhower had overseen the creation of both the National Aeronautics and Space Administration, or NASA, and a “high-risk, high-gain” research unit called the Advanced Research Projects Agency, or ARPA, that later added the word “Defense” to its name and became DARPA.

For 70 years, this close alliance between the Pentagon and major defense contractors has produced an unbroken succession of “wonder weapons” that at least theoretically gave it a critical edge in all major military domains. Even when defeated or fought to a draw, as in Vietnam, Iraq, and Afghanistan, the Pentagon’s research matrix has demonstrated a recurring resilience that could turn disaster into further technological advance.

The Vietnam War, for example, was a thoroughgoing tactical failure, yet it would also prove a technological triumph for the military-industrial complex. Although most Americans remember only the Army’s soul-destroying ground combat in the villages of South Vietnam, the Air Force fought the biggest air war in military history there and, while it too failed dismally and destructively, it turned out to be a crucial testing ground for a revolution in robotic weaponry.

To stop truck convoys that the North Vietnamese were sending through southern Laos into South Vietnam, the Pentagon’s techno-wizards combined a network of sensors, computers, and aircraft in a coordinated electronic bombing campaign that, from 1968 to 1973, dropped more than a million tons of munitions — equal to the total tonnage for the whole Korean War — in that limited area. At a cost of $800 million a year, Operation Igloo White laced that narrow mountain corridor with 20,000 acoustic, seismic, and thermal sensors that sent signals to four EC-121 communications aircraft circling ceaselessly overhead.

At a U.S. air base just across the Mekong River in Thailand, Task Force Alpha deployed two powerful IBM 360/65 mainframe computers, equipped with history’s first visual display monitors, to translate all those sensor signals into “an illuminated line of light” and so launch jet fighters over the Ho Chi Minh Trail where computers discharged laser-guided bombs automatically. Bristling with antennae and filled with the latest computers, its massive concrete bunker seemed, at the time, a futuristic marvel to a visiting Pentagon official who spoke rapturously about “being swept up in the beauty and majesty of the Task Force Alpha temple.”

However, after more than 100,000 North Vietnamese troops with tanks, trucks, and artillery somehow moved through that sensor field undetected for a massive offensive in 1972, the Air Force had to admit that its $6 billion “electronic battlefield” was an unqualified failure. Yet that same bombing campaign would prove to be the first crude step toward a future electronic battlefield for unmanned robotic warfare.

In the pressure cooker of history’s largest air war, the Air Force also transformed an old weapon, the “Firebee” target drone, into a new technology that would rise to significance three decades later. By 1972, the Air Force could send an “SC/TV” drone, equipped with a camera in its nose, up to 2,400 miles across communist China or North Vietnam while controlling it via a low-resolution television image. The Air Force also made aviation history by test firing the first missile from one of those drones.

The air war in Vietnam was also an impetus for the development of the Pentagon’s global telecommunications satellite system, another important first. After the Initial Defense Satellite Communications System launched seven orbital satellites in 1966, ground terminals in Vietnam started transmitting high-resolution aerial surveillance photos to Washington — something NASA called a “revolutionary development.” Those images proved so useful that the Pentagon quickly launched an additional 21 satellites and soon had the first system that could communicate from anywhere on the globe. Today, according to an Air Force website, the third phase of that system provides secure command, control, and communications for “the Army’s ground mobile forces, the Air Force’s airborne terminals, Navy ships at sea, the White House Communications Agency, the State Department, and special users” like the CIA and NSA.

At great cost, the Vietnam War marked a watershed in Washington’s global information architecture. Turning defeat into innovation, the Air Force had developed the key components — satellite communications, remote sensing, computer-triggered bombing, and unmanned aircraft — that would merge 40 years later into a new system of robotic warfare.

The War on Terror

Facing another set of defeats in Afghanistan and Iraq, the twenty-first-century Pentagon again accelerated the development of new military technologies. After six years of failing counterinsurgency campaigns in both countries, the Pentagon discovered the power of biometric identification and electronic surveillance to help pacify sprawling urban areas. And when President Obama later conducted his troop “surge” in Afghanistan, that country became a frontier for testing and perfecting drone warfare.

Launched as an experimental aircraft in 1994, the Predator drone was deployed in the Balkans that very year for photo-reconnaissance. In 2000, it was adapted for real-time surveillance under the CIA’s Operation Afghan Eyes. It would be armed with the tank-killing Hellfire missile for the agency’s first lethal strike in Kandahar, Afghanistan, in October 2001. Seven years later, the Air Force introduced the larger MQ-9 “Reaper” drone with a flying range of 1,150 miles when fully loaded with Hellfire missiles and GBU-30 bombs, allowing it to strike targets almost anywhere in Europe, Africa, or Asia. To fulfill its expanding mission as Washington’s global assassin, the Air Force plans to have 346 Reapers in service by 2021, including 80 for the CIA.

Between 2004 and 2010, total flying time for all unmanned aerial vehicles rose sharply from just 71 hours to 250,000 hours. By 2011, there were already 7,000 drones in a growing U.S. armada of unmanned aircraft. So central had they become to its military power that the Pentagon was planning to spend $40 billion to expand their numbers by 35% over the following decade. To service all this growth, the Air Force was training 350 drone pilots, more than all its bomber and fighter pilots combined.

Miniature or monstrous, hand-held or runway-launched, drones were becoming so commonplace and so critical for so many military missions that they emerged from the war on terror as one of America’s wonder weapons for preserving its global power. Yet the striking innovations in drone warfare are, in the long run, likely to be overshadowed by stunning aerospace advances in the stratosphere and exosphere.

The Pentagon’s Triple Canopy

As in Vietnam, despite bitter reverses on the ground in Iraq and Afghanistan, Washington’s recent wars have been catalysts for the fusion of aerospace, cyberspace, and artificial intelligence into a new military regime of robotic warfare.

To effect this technological transformation, starting in 2009 the Pentagon planned to spend $55 billion annually to develop robotics for a data-dense interface of space, cyberspace, and terrestrial battle space. Through an annual allocation for new technologies reaching $18 billion in 2016, the Pentagon had, according to the New York Times, “put artificial intelligence at the center of its strategy to maintain the United States’ position as the world’s dominant military power,” exemplified by future drones that will be capable of identifying and eliminating enemy targets without recourse to human overseers. By 2025, the United States will likely deploy advanced aerospace and cyberwarfare to envelop the planet in a robotic matrix theoretically capable of blinding entire armies or atomizing an individual insurgent.

During 15 years of nearly limitless military budgets for the war on terror, DARPA has spent billions of dollars trying to develop new weapons systems worthy of Buck Rogers that usually die on the drawing board or end in spectacular crashes. Through this astronomically costly process of trial and error, Pentagon planners seem to have come to the slow realization that established systems, particularly drones and satellites, could in combination create an effective aerospace architecture.

Within a decade, the Pentagon apparently hopes to patrol the entire planet ceaselessly via a triple-canopy aerospace shield that would reach from sky to space and be secured by an armada of drones with lethal missiles and Argus-eyed sensors, monitored through an electronic matrix and controlled by robotic systems. It’s even possible to take you on a tour of the super-secret realm where future space wars will be fought, if the Pentagon’s dreams become reality, by exploring both DARPA websites and those of its various defense contractors.

Drones in the Lower Stratosphere

At the bottom tier of this emerging aerospace shield in the lower stratosphere (about 30,000 to 60,000 feet high), the Pentagon is working with defense contractors to develop high-altitude drones that will replace manned aircraft. To supersede the manned U-2 surveillance aircraft, for instance, the Pentagon has been preparing a projected armada of 99 Global Hawk drones at a mind-boggling cost of $223 million each, seven times the price of the current Reaper model. Its extended 116-foot wingspan (bigger than that of a Boeing 737) is geared to operating at 60,000 feet. Each Global Hawk is equipped with high-resolution cameras, advanced electronic sensors, and efficient engines for a continuous 32-hour flight, which means that it can potentially survey up to 40,000 square miles of the planet’s surface daily. With its enormous bandwidth needed to bounce a torrent of audio-visual data between satellites and ground stations, however, the Global Hawk, like other long-distance drones in America’s armada, may prove vulnerable to a hostile hack attack in some future conflict.

The sophistication, and limitations, of this developing aerospace technology were exposed in December 2011 when an advanced RQ-170 Sentinel drone suddenly landed in Iran, whose officials then released photos of its dart-shaped, 65-foot wingspan meant for flights up to 50,000 feet. Under a highly classified “black” contract, Lockheed Martin had built 20 of these espionage drones at a cost of about $200 million with radar-evading stealth and advanced optics that were meant to provide “surveillance support to forward-deployed combat forces.”

So what was this super-secret drone doing in hostile Iran? By simply jamming its GPS navigation system, whose signals are notoriously susceptible to hacking, Iranian engineers took control of the drone and landed it at a local base of theirs with the same elevation as its home field in neighboring Afghanistan. Although Washington first denied the capture, the event sent shock waves down the Pentagon’s endless corridors.

In the aftermath of this debacle, the Defense Department worked with one of its top contractors, Northrop Grumman, to accelerate development of its super-stealth RQ-180 drone with an enormous 130-foot wingspan, an extended range of 1,200 miles, and 24 hours of flying time. Its record cost, $300 million a plane, could be thought of as inaugurating a new era of lavishly expensive war-fighting drones.

Simultaneously, the Navy’s dart-shaped X-47B surveillance and strike drone has proven capable both of in-flight refueling and of carrying up to 4,000 pounds of bombs or missiles. Three years after it passed its most crucial test by a joy-stick landing on the deck of an aircraft carrier, the USS George H.W. Bush in July 2013, the Navy announced that this experimental drone would enter service sometime after 2020 as the “MQ-25 Stingray” aircraft.

Dominating the Upper Stratosphere

To dominate the higher altitudes of the upper stratosphere (about 70,000 to 160,000 feet), the Pentagon has pushed its contractors to the technological edge, spending billions of dollars on experimentation with fanciful, futuristic aircraft.

For more than 20 years, DARPA pursued the dream of a globe-girding armada of solar-powered drones that could fly ceaselessly at 90,000 feet and would serve as the equivalent of low-flying satellites, that is, as platforms for surveillance intercepts or signals transmission. With an arching 250-foot wingspan covered with ultra-light solar panels, the “Helios” drone achieved a world-record altitude of 98,000 feet in 2001 before breaking up in a spectacular crash two years later. Nonetheless, DARPA launched the ambitious “Vulture” project in 2008 to build solar-powered aircraft with hugewingspans of 300 to 500 feet capable of ceaseless flight at 90,000 feet for five years at a time. After DARPA abandoned the project as impractical in 2012, Google and Facebook took over the technology with the goal of building future platforms for their customers’ Internet connections.

Since 2003, both DARPA and the Air Force have struggled to shatter the barrier for suborbital speeds by developing the dart-shaped Falcon Hypersonic Cruise Vehicle. Flying at an altitude of 100,000 feet, it was expected to “deliver 12,000 pounds of payload at a distance of 9,000 nautical miles from the continental United States in less than two hours.” Although the first test launches in 2010 and 2011 crashed in midflight, they did briefly reach an amazing 13,000 miles per hour, 22 times the speed of sound.

As often happens, failure produced progress. In the wake of the Falcon’s crashes, DARPA has applied its hypersonics to develop a missile capable of penetrating China’s air-defenses at an altitude of 70,000 feet and a speed of Mach 5 (about 3,300 miles per hour).

Simultaneously, Lockheed’s secret “Skunk Works” experimental unit is using the hypersonic technology to develop the SR-72 unmanned surveillance aircraft as a successor to its SR-71 Blackbird, the world’s fastest manned aircraft. When operational by 2030, the SR-72 is supposed to fly at about 4,500 mph, double the speed of its manned predecessor, with an extreme stealth fuselage making it undetectable as it crosses any continent in an hour at 80,000 feet scooping up electronic intelligence.

Space Wars in the Exosphere

In the exosphere, 200 miles above Earth, the age of space warfare dawned in April 2010 when the Defense Department launched the robotic X-37B spacecraft, just 29 feet long, into orbit for a seven-month mission. By removing pilots and their costly life-support systems, the Air Force’s secretive Rapid Capabilities Office had created a miniaturized, militarized space drone with thrusters to elude missile attacks and a cargo bay for possible air-to-air missiles. By the time the second X-37B prototype landed in June 2012, its flawless 15-month flight had established the viability of “robotically controlled reusable spacecraft.”

In the exosphere where these space drones will someday roam, orbital satellites will be the prime targets in any future world war. The vulnerability of U.S. satellite systems became obvious in 2007 when China used a ground-to-air missile to shoot down one of its own satellites in orbit 500 miles above the Earth. A year later, the Pentagon accomplished the same feat, firing an SM-3 missile from a Navy cruiser to score a direct hit on a U.S. satellite 150 miles high.

Unsuccessful in developing an advanced F-6 satellite, despite spending over $200 million in an attempt to split the module into more resilient microwave-linked components, the Pentagon has opted instead to upgrade its more conventional single-module satellites, such as the Navy’s five interconnected Mobile User Objective Systems (MUOS) satellites. These were launched between 2013 and 2016 into geostationary orbits for communications with aircraft, ships, and motorized infantry.

Reflecting its role as a player in the preparation for future and futuristic wars, the Joint Functional Component Command for Space, established in 2006, operates the Space Surveillance Network. To prevent a high-altitude attack on America, this worldwide system of radar and telescopes in 29 remote locations like Ascension Island and Kwajalein Atoll makes about 400,000 observations daily, monitoring every object in the skies.

The Future of Wonder Weapons

By the mid-2020s, if the military’s dreams are realized, the Pentagon’s triple-canopy shield should be able to atomize a single “terrorist” with a missile strike or, with equal ease, blind an entire army by knocking out all of its ground communications, avionics, and naval navigation. It’s a system that, were it to work as imagined, just might allow the United States a diplomatic veto of global lethality, an equalizer for any further loss of international influence.

But as in Vietnam, where aerospace wonders could not prevent a searing defeat, history offers some harsh lessons when it comes to technology trumping insurgencies, no less the fusion of forces (diplomatic, economic, and military) whose sum is geopolitical power. After all, the Third Reich failed to win World War II even though it had amazingly advanced “wonder weapons,” including the devastating V-2 missile, the unstoppable Me-262 jet fighter, and the ship-killing Hs-293 guided missile.

Washington’s dogged reliance on and faith in military technology to maintain its hegemony will certainly guarantee endless combat operations with uncertain outcomes in the forever war against terrorists along the ragged edge of Asia and Africa and incessant future low-level aggression in space and cyberspace. Someday, it may even lead to armed conflict with rivals China and Russia.

Whether the Pentagon’s robotic weapon systems will offer the U.S. an extended lease on global hegemony or prove a fantasy plucked from the frames of a Buck Rogers comic book, only the future can tell. Whether, in that moment to come, America will play the role of the indomitable Buck Rogers or the Martians he eventually defeated is another question worth asking. One thing is likely, however: that future is coming far more quickly and possibly far more painfully than any of us might imagine.

Vault 7: CIA Hacking Tools Revealed

Source: WikiLeaks

Press Release

Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named “Vault 7” by WikiLeaks, it is the largest ever publication of confidential documents on the agency.

The first full part of the series, “Year Zero”, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.

Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its “own NSA” with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.

In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.

Julian Assange, WikiLeaks editor stated that “There is an extreme proliferation risk in the development of cyber ‘weapons’. Comparisons can be drawn between the uncontrolled proliferation of such ‘weapons’, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of “Year Zero” goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.”

Wikileaks has carefully reviewed the “Year Zero” disclosure and published substantive CIA documentation while avoiding the distribution of ‘armed’ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‘weapons’ should analyzed, disarmed and published.

Wikileaks has also decided to redact and anonymise some identifying information in “Year Zero” for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in “Vault 7” part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.

 

Analysis

CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

 

CIA malware targets Windows, OSx, Linux, routers

The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized “zero days”, air gap jumping viruses such as “Hammer Drill” which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( “Brutal Kangaroo”) and to keep its malware infestations going.

Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as “Assassin” and “Medusa”.

Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).

The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are described in the examples section below.

 

CIA ‘hoarded’ vulnerabilities (“zero days”)

In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or “zero days” to Apple, Google, Microsoft, and other US-based manufacturers.

Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.

“Year Zero” documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.

As an example, specific CIA malware revealed in “Year Zero” is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities (“zero days”) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.

The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.

 

‘Cyberwar’ programs are a serious proliferation risk

Cyber ‘weapons’ are not possible to keep under effective control.

While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‘weapons’, once developed, are very hard to retain.

Cyber ‘weapons’ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.

Securing such ‘weapons’ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‘weapons’ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global “vulnerability market” that will pay hundreds of thousands to millions of dollars for copies of such ‘weapons’. Similarly, contractors and companies who obtain such ‘weapons’ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‘hacking’ services.

Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.

A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.

Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.

Once a single cyber ‘weapon’ is ‘loose’ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.

 

U.S. Consulate in Frankfurt is a covert CIA hacker base

In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.

CIA hackers operating out of the Frankfurt consulate ( “Center for Cyber Intelligence Europe” or CCIE) are given diplomatic (“black”) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: “Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport”

Your Cover Story (for this trip)
Q: Why are you here?
A: Supporting technical consultations at the Consulate.

Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.

Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.

A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.

 

How the CIA dramatically increased proliferation risks

In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of “Vault 7” — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.

The CIA made these systems unclassified.

Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‘battlefield’ of cyber ‘war’.

To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‘arms’ manufactures and computer hackers can freely “pirate” these ‘weapons’ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.

Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.

Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted “malware injections” (commercial jargon) or “implant drops” (NSA jargon) are being called “fires” as if a weapon was being fired. However the analogy is questionable.

Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‘target’. CIA malware does not “explode on impact” but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.

A successful ‘attack’ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.

 

Evading forensics and anti-virus

A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.

“Tradecraft DO’s and DON’Ts” contains CIA rules on how its malware should be written to avoid fingerprints implicating the “CIA, US government, or its witting partner companies” in “forensic review”. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.

CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s “Recycle Bin”. While Comodo 6.x has a “Gaping Hole of DOOM”.

CIA hackers discussed what the NSA’s “Equation Group” hackers did wrong and how the CIA’s malware makers could avoid similar exposure.

Examples

The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by “Year Zero”) each with their own sub-projects, malware and hacker tools.

The majority of these projects relate to tools that are used for penetration, infestation (“implanting”), control, and exfiltration.

Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.

Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks’ “Year Zero”.

 

UMBRAGE

The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.

This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.

The CIA’s Remote Devices Branch‘s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

 

Fine Dining

Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically “exfiltrating” information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.

Among the list of possible targets of the collection are ‘Asset’, ‘Liason Asset’, ‘System Administrator’, ‘Foreign Information Operations’, ‘Foreign Intelligence Agencies’ and ‘Foreign Government Entities’. Notably absent is any reference to extremists or transnational criminals. The ‘Case Officer’ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‘menu’ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‘JQJIMPROVISE’ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.

 

Improvise (JQJIMPROVISE)

‘Improvise’ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‘Fine Dining’ questionairies.

HIVE

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.

The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‘Blot’ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‘Honeycomb’ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby project.

See the classified user and developer guides for HIVE.

Frequently Asked Questions

Why now?

WikiLeaks published as soon as its verification and analysis were ready.

In Febuary the Trump administration has issued an Executive Order calling for a “Cyberwar” review to be prepared within 30 days.

While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.

Redactions

Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.

  1. Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
  2. Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
  3. Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
  4. Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
  5. The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
  6. Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.

Organizational Chart

The organizational chart corresponds to the material published by WikiLeaks so far.

Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.

Wiki pages

“Year Zero” contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.

The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Is each part of “Vault 7” from a different source?

Details on the other parts will be available at the time of publication.

What is the total size of “Vault 7”?

The series is the largest intelligence publication in history.

How did WikiLeaks obtain each part of “Vault 7”?

Sources trust WikiLeaks to not reveal information that might help identify them.

Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?

No. That would be certainly counter-productive.

Has WikiLeaks already ‘mined’ all the best stories?

No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.

Won’t other journalists find all the best stories before me?

Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.

The Cyber-War on Wikileaks

By

Source: CounterPunch

When the ruling class is in panic, their first reaction is to hide the panic.

They react out of cynicism: when their masks are revealed, instead of running around naked, they usually point the finger at the mask they wear. These days the whole world could witness a postmodern version of the infamous quote “Let them eat cake”, attributed to Marie-Antoinette, queen of France during the French Revolution.

As a reaction to WikiLeaks publishing his emails, John Podesta, the man behind Hillary Clinton’s campaign, posted a photo of a dinner preparation, saying “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”.

A similar version of vulgar cynicism emerged earlier this month when Hillary Clinton reacted to the claim that she reportedly wanted to “drone” WikiLeaks founder Julian Assange (“Can’t we just drone this guy?”) when she was the US Secretary of State. Instead of denying her comments, Clinton said that she doesn’t recall any such joke, “It would have been a joke if it had been said, but I don’t recall that”.

One doesn’t have to read between the lines to understand that if Hillary Clinton had said that, she would have considered it a joke. But when emperors joke, it usually has dire consequences for those who are the objects of their “humor.”

Cyber-war Not with Russia…but WikiLeaks

During the last few months I have visited Julian Assange in the Ecuadorian Embassy in London several times and each time I came out of the Embassy, where he is spending his fifth year in political asylum under legitimate fear he might be extradited to the US, my thought was the following one: although he lives, without his family, in a postmodern version of solitary confinement (even prisoners are allowed to walk for up to one hour a day), although he has no access to fresh air or sunlight for more than 2000 days, although the UK government recently denied him safe passage to a hospital for an MRI scan, if his access to the internet would be cut off this would be the most severe attack on his physical and mental freedom.

The last time I saw him, which was only two weeks ago, he expressed the fear that, because he had already published leaks concerning US elections and with more to come, the US might find various ways to silence him, including pressuring Ecuador or even shutting down the internet.

What seemed a distant possibility only two weeks ago, soon became a self-fulfilling prophecy.

When the Obama administration recently announced that it is, as Biden said, planing an “unprecedented cyber covert action against Russia”, the first victim was not Putin, but precisely Julian Assange whose internet was cut off just a day after Biden’s self-contradictory proclamation.

No wonder Edward Snowden reacted immediately by saying that “nobody told Joe Biden what ‘covert operation’ means.

According to the U.S. Department of Defense’s Dictionary of Military and Associated Terms, a covert operation is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.”

It is no secret anymore that the Ecuadorian government has come under extreme pressure since Assange leaked the Democratic National Committee email database. We don’t know yet whether the US pressured Ecuador to shut down the internet, but it is clear that the present US government and the government to come is fighting a war with WikiLeaks which is all but “covert”. Is it really a coincidence that Julian Assange’s internet access was cut off shortly after publication of Clinton’s Goldman Sachs speeches?

If at the beginning we still had a “soft” version of postmodern McCarthyism, with Hillary calling everyone opposed to her campaign a Russian spy (not only Assange, but also Donald Trump and Jill Stein), then with Obama’s recent intervention it became more serious.

With Obama’s threat of a cyber-war, the “soft” McCarthyism didn’t only acquire geopolitical significance, but at the same time a new mask was revealed: Obama is obviously trying to cement the public debate and make the Russian threat “real”, or at least to use it as a weapon in order to help Clinton to get elected. Moreover, this new twist in something that has already become much more than only US elections (US elections are never only US elections!), shows not only how Obama is ready to strengthen Hillary’s campaign, but it also reveals that a cyber war is already in the making.

It is not a cyber war with Russia, but with WikiLeaks.

And it is not the first time.

What would Clausewitz say?

In 2010, when the Collateral Murder video was published, the Afghan and Iraq war logs were released, and we witnessed one of the most sinister attacks on freedom of speech in recent history. VISA, Mastercard, Diners, American Express and Paypal imposed a banking blockade on WikiLeaks, although WikiLeaks had not been charged with any crime at either state, federal or international level. So if the US government successfully convinced payment companies representing more than 97% of the global market to shut down an independent publisher, why wouldn’t they pressure Ecuador or any other state or company to cut off the internet?

The US is not only rhetorically trying to “get” Assange (it is worth to check out the Assassinate Assange video for evidence of the verbal masturbation of US officials), he poses a serious threat to the major elite factions in the US to remain in power. No wonder panic is rising in the US, which is now going even so far that a 16-year-old boy in Britain has been arrested on criminal charges related to the alleged hacking of email accounts used by CIA director John Brennan, which WikiLeaks published in October 2016.

What WikiLeaks obviously successfully challenged–and maybe one day (“history is written by the victors”, remember?) it will be learned in military strategy– is what the Prussian general and military theorist Carl von Clausewitz would call the “centre of gravity” (Schwerpunkt), which is the “central feature of the enemy’s power”.

Instead of speaking about the Russians, we should start speaking about the Schwerpunkt of the actual leaks, their real essence. Just take the following quotes by Hillary Clinton exposed by WikiLeaks, which reveal her true nature and the politics behind her campaign: “We are going to ring China with missile defence”, “I want to defend fracking” and climate change environmentalists “should get a life”, “you need both a public and a private position”, “my dream is a hemispheric common market, with open trade and open borders”.

What WikiLeaks has shown is not only that Hillary is a hawkish war-monger, first it was Libya (over 1,700 of the 33,000 Clinton emails published by WikiLeaks reference Libya), then it was Syria (at a Goldman Sachs conference she explicitly stated she would like to intervene in Syria), tomorrow it will be another war.

It is now clear – and this is the real “centre of gravity” where we should focus our attention – that the future Clinton cabinet may already been filled with Wall Street people like Obama’s was. No wonder WikiLeaks revelations create utter panic not only in the Democratic Party itself but also the Obama administration.

One question remains, isn’t WikiLeaks, by leaking all these dirty secrets, influencing the US elections? Yes, it certainly is, but the current criticism misses its point: isn’t the very point of organisations such as WikiLeaks to publish the material they have and to influence public opinion?

The question should finally be turned around: isn’t the US mainstream media the one influencing the US elections? And isn’t Obama, by announcing a cyber-war with Russia, influencing the elections?

WikiLeaks is not only influencing the US elections, but transforming the US elections – as they should have been from the very beginning – into a global debate with serious geopolitical consequences at stake. What WikiLeaks is doing is revealing this brutal fight for power, but, as the old saying goes, “when a wise man points at the Moon, the idiot looks at the finger”. Instead of looking at the finger pointing to Russia, we should take a look at the leaks themselves.

If democracy and transparency means anything today, we should say: let them leak!

 

Srećko Horvat is a philosopher and activist. He is co-author, with Slavoj Žižek, of What Does Europe Want? (Columbia University Press, 2014) and author of The Radicality of Love (Polity Press, 2015). Together with Yanis Varoufakis he co-created the movement DiEM 25. https://diem25.org/