Far from being a war against “white supremacy,” the Biden administration’s new “domestic terror” strategy clearly targets primarily those who oppose US government overreach and those who oppose capitalism and/or globalization.
In the latest sign that the US government’s War on Domestic Terror is growing in scope and scale, the White House on Tuesday revealed the nation’s first ever government-wide strategy for confronting domestic terrorism. While cloaked in language about stemming racially motivated violence, the strategy places those deemed “anti-government” or “anti-authority” on a par with racist extremists and charts out policies that could easily be abused to silence or even criminalize online criticism of the government.
Even more disturbing is the call to essentially fuse intelligence agencies, law enforcement, Silicon Valley, and “community” and “faith-based” organizations such as the Anti-Defamation League, as well as unspecified foreign governments, as partners in this “war,” which the strategy makes clear will rely heavily on a pre-crime orientation focused largely on what is said on social media and encrypted platforms. Though the strategy claims that the government will “shield free speech and civil liberties” in implementing this policy, its contents reveal that it is poised to gut both.
Indeed, while framed publicly as chiefly targeting “right-wing white supremacists,” the strategy itself makes it clear that the government does not plan to focus on the Right but instead will pursue “domestic terrorists” in “an ideologically neutral, threat-driven manner,” as the law “makes no distinction based on political view—left, right or center.” It also states that a key goal of this strategic framework is to ensure “that there is simply no governmental tolerance . . . of violence as an acceptable mode of seeking political or social change,” regardless of a perpetrator’s political affiliation.
Considering that the main cheerleaders for the War on Domestic Terror exist mainly in establishment left circles, such individuals should rethink their support for this new policy given that the above statements could easily come to encompass Black Lives Matter–related protests, such as those that transpired last summer, depending on which political party is in power.
Once the new infrastructure is in place, it will remain there and will be open to the same abuses perpetrated by both political parties in the US during the lengthy War on Terror following September 11, 2001. The history of this new “domestic terror” policy, including its origins in the Trump administration, makes this clear.
It’s Never Been Easier to Be a “Terrorist”
In introducing the strategy, the Biden administration cites “racially or ethnically motivated violent extremists” as a key reason for the new policy and a main justification for the War on Domestic Terror in general. This was most recently demonstrated Tuesday in Attorney General Merrick Garland’s statement announcing this new strategy. However, the document itself puts “anti-government” or “anti-authority” “extremists” in the same category as violent white supremacists in terms of being a threat to the homeland. The strategy’s characterization of such individuals is unsettling.
AG Merrick Garland: “In the FBI’s view, the top domestic violent extremist threat comes from racially or ethically motivated violent extremists specifically those who advocate for the superiority of the white race.” pic.twitter.com/4JtruuMSv2
For instance, those who “violently oppose” “all forms of capitalism” or “corporate globalization” are listed under this less-discussed category of “domestic terrorist.” This highlights how people on the left, many of whom have called for capitalism to be dismantled or replaced in the US in recent years, could easily be targeted in this new “war” that many self-proclaimed leftists are currently supporting. Similarly, “environmentally-motivated extremists,” a category in which groups such as Extinction Rebellion could easily fall, are also included.
In addition, the phrasing indicates that it could easily include as “terrorists” those who oppose the World Economic Forum’s vision for global “stakeholder capitalism,” as that form of “capitalism” involves corporations and their main “stakeholders” creating a new global economic and governance system. The WEF’s stakeholder capitalism thus involves both “capitalism” and “corporate globalization.”
The strategy also includes those who “take steps to violently resist government authority . . . based on perceived overreach.” This, of course, creates a dangerous situation in which the government could, purposely or otherwise, implement a policy that is an obvious overreach and/or blatantly unconstitutional and then label those who resist it “domestic terrorists” and deal with them as such—well before the overreach can be challenged in court.
Another telling addition to this group of potential “terrorists” is “any other individual or group who engages in violence—or incites imminent violence—in opposition to legislative, regulatory or other actions taken by the government.” Thus, if the government implements a policy that a large swath of the population finds abhorrent, such as launching a new, unpopular war abroad, those deemed to be “inciting” resistance to the action online could be considered domestic terrorists.
Such scenarios are not unrealistic, given the loose way in which the government and the media have defined things like “incitement” and even “violence” (e. g., “hate speech” is a form of violence) in the recent past. The situation is ripe for manipulation and abuse. To think the federal government (including the Biden administration and subsequent administrations) would not abuse such power reflects an ignorance of US political history, particularly when the main forces behind most terrorist incidents in the nation are actually US government institutions like the FBI (more FBI examples here, here, here, and here).
Furthermore, the original plans for the detention of American dissidents in the event of a national emergency, drawn up during the Reagan era as part of its “continuity of government” contingency, cited popular nonviolent opposition to US intervention in Latin America as a potential “emergency” that could trigger the activation of those plans. Many of those “continuity of government” protocols remain on the books today and can be triggered, depending on the whims of those in power. It is unlikely that this new domestic terror framework will be any different regarding nonviolent protest and demonstrations.
Yet another passage in this section of the strategy states that “domestic terrorists” can, “in some instances, connect and intersect with conspiracy theories and other forms of disinformation and misinformation.” It adds that the proliferation of such “dangerous” information “on Internet-based communications platforms such as social media, file-upload sites and end-to-end encrypted platforms, all of these elements can combine and amplify threats to public safety.”
Thus, the presence of “conspiracy theories” and information deemed by the government to be “misinformation” online is itself framed as threatening public safety, a claim made more than once in this policy document. Given that a major “pillar” of the strategy involves eliminating online material that promotes “domestic terrorist” ideologies, it seems inevitable that such efforts will also “connect and intersect” with the censorship of “conspiracy theories” and narratives that the establishment finds inconvenient or threatening for any reason.
Pillars of Tyranny
The strategy notes in several places that this new domestic-terror policy will involve a variety of public-private partnerships in order to “build a community to address domestic terrorism that extends not only across the Federal Government but also to critical partners.” It adds, “That includes state, local, tribal and territorial governments, as well as foreign allies and partners, civil society, the technology sector, academic, and more.”
The mention of foreign allies and partners is important as it suggests a multinational approach to what is supposedly a US “domestic” issue and is yet another step toward a transnational security-state apparatus. A similar multinational approach was used to devastating effect during the CIA-developed Operation Condor, which was used to target and “disappear” domestic dissidents in South America in the 1970s and 1980s. The foreign allies mentioned in the Biden administration’s strategy are left unspecified, but it seems likely that such allies would include the rest of the Five Eyes alliance (the UK, Australia, Canada, New Zealand) and Israel, all of which already have well-established information-sharing agreements with the US for signals intelligence.
The new domestic-terror strategy has four main “pillars,” which can be summarized as (1) understanding and sharing domestic terrorism-related information, including with foreign governments and private tech companies; (2) preventing domestic terrorism recruitment and mobilization to violence; (3) disrupting and deterring domestic terrorism activity; and (4) confronting long-term contributors to domestic terrorism.
The first pillar involves the mass accumulation of data through new information-sharing partnerships and the deepening of existing ones. Much of this information sharing will involve increased data mining and analysis of statements made openly on the internet, particularly on social media, something already done by US intelligence contractors such as Palantir. While the gathering of such information has been ongoing for years, this policy allows even more to be shared and legally used to make cases against individuals deemed to have made threats or expressed “dangerous” opinions online.
Included in the first pillar is the need to increase engagement with financial institutions concerning the financing of “domestic terrorists.” US banks, such as Bank of America, have already gone quite far in this regard, leading to accusations that it has begun acting like an intelligence agency. Such claims were made after it was revealed that the BofA had passed to the government the private banking information of over two hundred people that the bank deemed as pointing to involvement in the events of January 6, 2021. It seems likely, given this passage in the strategy, that such behavior by banks will soon become the norm, rather than an outlier, in the United States.
The second pillar is ostensibly focused on preventing the online recruitment of domestic terrorists and online content that leads to the “mobilization of violence.” The strategy notes that this pillar “means reducing both supply and demand of recruitment materials by limiting widespread availability online and bolstering resilience to it by those who nonetheless encounter it.“ The strategy states that such government efforts in the past have a “mixed record,” but it goes on to claim that trampling on civil liberties will be avoided because the government is “consulting extensively” with unspecified “stakeholders” nationwide.
Regarding recruitment, the strategy states that “these activities are increasingly happening on Internet-based communications platforms, including social media, online gaming platforms, file-upload sites and end-to-end encrypted platforms, even as those products and services frequently offer other important benefits.” It adds that “the widespread availability of domestic terrorist recruitment material online is a national security threat whose front lines are overwhelmingly private-sector online platforms.”
The US government plans to provide “information to assist online platforms with their own initiatives to enforce their own terms of service that prohibits the use of their platforms for domestic terrorist activities” as well as to “facilitate more robust efforts outside the government to counter terrorists’ abuse of Internet-based communications platforms.”
Given the wider definition of “domestic terrorist” that now includes those who oppose capitalism and corporate globalization as well as those who resist government overreach, online content discussing these and other “anti-government” and “anti-authority” ideas could soon be treated in the same way as online Al Qaeda or ISIS propaganda. Efforts, however, are unlikely to remain focused on these topics. As Unlimited Hangout reported last November, both UK intelligence and the US national-security state were developing plans to treat critical reporting on the COVID-19 vaccines as “extremist” propaganda.
Another key part of this pillar is the need to “increase digital literacy” among the American public, while censoring “harmful content” disseminated by “terrorists” as well as by “hostile foreign powers seeking to undermine American democracy.” The latter is a clear reference to the claim that critical reporting of US government policy, particularly its military and intelligence activities abroad, was the product of “Russian disinformation,” a now discredited claim that was used to heavily censor independent media. This new government strategy appears to promise more of this sort of thing.
It also notes that “digital literacy” education for a domestic audience is being developed by the Department of Homeland Security (DHS). Such a policy would have previously violated US law until the Obama administration worked with Congress to repeal the Smith-Mundt Act, thus lifting the ban on the government directing propaganda at domestic audiences.
The third pillar of the strategy seeks to increase the number of federal prosecutors investigating and trying domestic-terror cases. Their numbers are likely to jump as the definition of “domestic terrorist” is expanded. It also seeks to explore whether “legislative reforms could meaningfully and materially increase our ability to protect Americans from acts of domestic terrorism while simultaneously guarding against potential abuse of overreach.” In contrast to past public statements on police reform by those in the Biden administration, the strategy calls to “empower” state and local law enforcement to tackle domestic terrorism, including with increased access to “intelligence” on citizens deemed dangerous or subversive for any number of reasons.
To that effect, the strategy states the following (p. 24):
“The Department of Justice, Federal Bureau of Investigation, and Department of Homeland Security, with support from the National Counterterrorism Center [part of the intelligence community], are incorporating an increased focus on domestic terrorism into current intelligence products and leveraging current mechanisms of information and intelligence sharing to improve the sharing of domestic terrorism-related content and indicators with non-Federal partners. These agencies are also improving the usability of their existing information-sharing platforms, including through the development of mobile applications designed to provide a broader reach to non-Federal law enforcement partners, while simultaneously refining that support based on partner feedback.”
Such an intelligence tool could easily be, for example, Palantir, which is already used by the intelligence agencies, the DHS, and several US police departments for “predictive policing,” that is, pre-crime actions. Notably, Palantir has long included a “subversive” label for individuals included on government and law enforcement databases, a parallel with the controversial and highly secretive Main Core database of US dissidents.
DHS Secretary Alejandro Mayorkas made the “pre-crime” element of the new domestic terror strategy explicit on Tuesday when he said in a statement that DHS would continue “developing key partnerships with local stakeholders through the Center for Prevention Programs and Partnerships (CP3) to identify potential threats and prevent terrorism.” CP3, which replaced DHS’ Office for Targeted Violence and Terrorism Prevention this past May, officially “supports communities across the United States to prevent individuals from radicalizing to violence and intervene when individuals have already radicalized to violence.”
The fourth pillar of the strategy is by far the most opaque and cryptic, while also the most far-reaching. It aims to address the sources that cause “terrorists” to mobilize “towards violence.” This requires “tackling racism in America,” a lofty goal for an administration headed by the man who controversially eulogized Congress’ most ardent segregationist and who was a key architect of the 1994 crime bill. As well, it provides for “early intervention and appropriate care for those who pose a danger to themselves or others.”
In regard to the latter proposal, the Trump administration, in a bid to “stop mass shootings before they occur,” considered a proposal to create a “health DARPA” or “HARPA” that would monitor the online communications of everyday Americans for “neuropsychiatric” warning signs that someone might be “mobilizing towards violence.” While the Trump administration did not create HARPA or adopt this policy, the Biden administration has recently announced plans to do so.
Finally, the strategy indicates that this fourth pillar is part of a “broader priority”: “enhancing faith in government and addressing the extreme polarization, fueled by a crisis of disinformation and misinformation often channeled through social media platforms, which can tear Americans apart and lead some to violence.” In other words, fostering trust in government while simultaneously censoring “polarizing” voices who distrust or criticize the government is a key policy goal behind the Biden administration’s new domestic-terror strategy.
Calling Their Shots?
While this is a new strategy, its origins lie in the Trump administration. In October 2019, Trump’s attorney general William Barr formally announced in a memorandum that a new “national disruption and early engagement program” aimed at detecting those “mobilizing towards violence” before they commit any crime would launch in the coming months. That program, known as DEEP (Disruption and Early Engagement Program), is now active and has involved the Department of Justice, the FBI, and “private sector partners” since its creation.
Barr’s announcement of DEEP followed his unsettling “prediction” in July 2019 that “a major incident may occur at any time that will galvanize public opinion on these issues.” Not long after that speech, a spate of mass shootings occurred, including the El Paso Walmart shooting, which killed twenty-three and about which many questions remain unanswered regarding the FBI’s apparent foreknowledge of the event. After these events took place in 2019, Trump called for the creation of a government backdoor into encryption and the very pre-crime system that Barr announced shortly thereafter in October 2019. The Biden administration, in publishing this strategy, is merely finishing what Barr started.
Indeed, a “prediction” like Barr’s in 2019 was offered by the DHS’ Elizabeth Neumann during a Congressional hearing in late February 2020. That hearing was largely ignored by the media as it coincided with an international rise of concern regarding COVID-19. At the hearing, Neumann, who previously coordinated the development of the government’s post-9/11 terrorism information sharing strategies and policies and worked closely with the intelligence community, gave the following warning about an imminent “domestic terror” event in the United States:
“And every counterterrorism professional I speak to in the federal government and overseas feels like we are at the doorstep of another 9/11, maybe not something that catastrophic in terms of the visual or the numbers, but that we can see it building and we don’t quite know how to stop it.”
This “another 9/11” emerged on January 6, 2021, as the events of that day in the Capitol were quickly labeled as such by both the media and prominent politicians, while also inspiring calls from the White House and the Democrats for a “9/11-style commission” to investigate the incident. This event, of course, figures prominently in the justification for the new domestic-terror strategy, despite the considerable video and other evidence that shows that Capitol law enforcement, and potentially the FBI, were directly involved in facilitating the breach of the Capitol. In addition, when one considers that the QAnon movement, which had a clear role in the events of January 6, was itself likely a government-orchestratedpsyop, the government hand in creating this situation seems clear.
It goes without saying that the official reasons offered for these militaristic “domestic terror” policies, which the US has already implemented abroad—causing much more terror than it has prevented—does not justify the creation of a massive new national-security infrastructure that aims to criminalize and censor online speech. Yet the admission that this new strategy, as part of a broader effort to “enhance faith in government,” combines domestic propaganda campaigns with the censorship and pursuit of those who distrust government heralds the end of even the illusion of democracy in the United States.
Despite Joe Biden running on a platform of unity to bring Americans back together, before he was even sworn in, he reneged on this promise by alienating tens of millions of Trump supporters — essentially declaring them the enemy.
“Don’t dare call them protesters,” Biden said after the largely peaceful march on DC which ended with a few hundred goons out of tens of thousands of peaceful protesters raiding the capitol. “They were a riotous mob. Insurrectionists. Domestic terrorists. It’s that basic. It’s that simple.”
While some of the folks certainly thought they were part of some coup, the reality of the situation was nothing at all as serious as the media and establishment has reported since.
Just like Trump used Antifa violence to bolster the police state and add stricter penalties for protests, Biden is using the riot at the Capitol to do the same. We predicted this outcome in January, and now it is escalating even further.
In February, using the DHS National Terrorist Advisory System — or NTAS — the Department of Homeland Security issued a warning that anger “fueled by false narratives,” including unfounded claims about the 2020 presidential election, could lead some inside the country to launch attacks in the coming weeks.
This was the first time we could find that this warning was issued over a domestic terror threat. And, although that warning was issued in February, four months later, we’ve yet to see anything materialize. There have been no protests, no “attacks” on the Capitol, nothing. In spite of Americans largely returning to normal, the White House is doubling down.
This week, President Joe Biden’s administration announced their plans to create a means for family and friends to snitch on each other — to fight the non-existent threat of domestic terrorism.
In a teleconference on Monday, a senior administration official told reporters of a plan that sounds reminiscent of the Minority Report by attacking “pre-crime.”
“We will work to improve public awareness of federal resources to address concerning or threatening behavior before violence occurs,” the official said.
The official went on to explain how this would work, which involves family members and friends snitching on each other.
We will work to improve public awareness of federal resources to address concerning or threatening behavior before violence occurs. And on that, I would just note that one of the things we’re talking about is the need to do something in this space, like the “See something” — “If you see something, say something” concept that has been promulgated previously by DHS. This involves creating contexts in which those who are family members or friends or co-workers know that there are pathways and avenues to raise concerns and seek help for those who they have perceived to be radicalizing and potentially radicalizing towards violence.
Notice how they use the word “potentially” to imply that certain completely legal political speech has the ‘potential’ to incite violence. Then, as if big tech censorship and spying wasn’t enough, the official mentioned “increased information sharing” between tech platforms to help combat this potential for radicalization.
“Any particular tech company often knows its own platform very well,” the official noted. “But the government sees things — actually, threats of violence — across platforms. They see the relationship between online recruitment, radicalization, and violence in the physical world.”
Closing out the conference, the official encouraged Americans to come together with their government rulers to combat the non-existent threat in a line that sounded like it was uttered directly from Heinrich Himmler himself.
“We are investing many agencies of the government and resourcing them appropriately and asking our citizens to participate,” the official said. “Because, ultimately, this is really about homeland security being a responsibility of each citizen of our country to help us achieve.”
The state asking family members to snitch on each other is the exact same scheme out of every totalitarian regime throughout history. When you sever the trust between children and their parents or friends and family, you can easily mold the children and other state-dependent shills into obedient pawns of the regime who will have no problem outing their subversive family members and friends to authorities.
In Soviet Russia, there was a famous story used to inspire children to inform on their parents. It was the story of Pavel Trofimovich Morozov — a Soviet youth who was praised by the state run media as a martyr. According to the story, which has very little evidence of actually happening, Pavlik denounced his father to the authorities and was in turn killed by his family.
Regardless of whether or not the story was true, it became the subject of reading, songs, plays, a symphonic poem, a full-length opera and six biographies — all which pushed the idea that opposing the state was selfish and reactionary, and state was more important than family. The apotheotic cult had a huge impact on the moral norms of generations of children, who were encouraged to inform on their parents.
Those who fail to see history repeating itself are ensuring that it indeed will. Totalitarian regimes thrive off pitting citizens against each other, and this is ultimately the last step before complete despotism. Time to pay attention America.
We are moving fast down that slippery slope to an authoritarian society in which the only opinions, ideas and speech expressed are the ones permitted by the government and its corporate cohorts.
In the wake of the Jan. 6 riots at the Capitol, “domestic terrorism” has become the new poster child for expanding the government’s powers at the expense of civil liberties.
Of course, “domestic terrorist” is just the latest bull’s eye phrase, to be used interchangeably with “anti-government,” “extremist” and “terrorist,” to describe anyone who might fall somewhere on a very broad spectrum of viewpoints that could be considered “dangerous.”
Watch and see: we are all about to become enemies of the state.
If this is a test of Joe Biden’s worthiness to head up the American police state, he seems ready.
As part of his inaugural address, President Biden pledged to confront and defeat “a rise of political extremism, white supremacy, domestic terrorism.” Biden has also asked the Director of National Intelligence to work with the FBI and the Department of Homeland Security in carrying out a “comprehensive threat assessment” of domestic terrorism. And then to keep the parallels going, there is the proposed Domestic Terrorism Prevention Act of 2021, introduced after the Jan. 6 riots, which aims to equip the government with “the tools to identify, monitor and thwart” those who could become radicalized to violence.
Don’t blink or you’ll miss the sleight of hand.
This is the tricky part of the Deep State’s con game that keeps you focused on the shell game in front of you while your wallet is being picked clean by ruffians in your midst.
It follows the same pattern as every other convenient “crisis” used by the government as an excuse to expand its powers at the citizenry’s expense and at the expense of our freedoms.
As investigative journalist Glenn Greenwald warns:
“The last two weeks have ushered in a wave of new domestic police powers and rhetoric in the name of fighting ‘terrorism’ that are carbon copies of many of the worst excesses of the first War on Terror that began nearly twenty years ago. This New War on Terror—one that is domestic in name from the start and carries the explicit purpose of fighting ‘extremists’ and ‘domestic terrorists’ among American citizens on U.S. soil—presents the whole slew of historically familiar dangers when governments, exploiting media-generated fear and dangers, arm themselves with the power to control information, debate, opinion, activism and protests.”
Greenwald is referring to the USA Patriot Act, passed almost 20 years ago, which paved the way for the eradication of every vital safeguard against government overreach, corruption and abuse.
Free speech, the right to protest, the right to challenge government wrongdoing, due process, a presumption of innocence, the right to self-defense, accountability and transparency in government, privacy, press, sovereignty, assembly, bodily integrity, representative government: all of these and more have become casualties in the government’s war on the American people, a war that has grown more pronounced since Sept. 11, 2001.
Some members of Congress get it.
In a letter opposing expansion of national security powers, a handful congressional representatives urged their colleagues not to repeat the mistakes of the past:
“While many may find comfort in increased national security powers in the wake of this attack, we must emphasize that we have been here before and we have seen where that road leads. Our history is littered with examples of initiatives sold as being necessary to fight extremism that quickly devolve into tools used for the mass violation of the human and civil rights of the American people… To expand the government’s national security powers once again at the expense of the human and civil rights of the American people would only serve to further undermine our democracy, not protect it.”
Cue the Emergency State, the government’s Machiavellian version of crisis management that justifies all manner of government tyranny in the so-called name of national security.
So you see, the issue is not whether Donald Trump or Roger Stone or MyPillow CEO Mike Lindell deserve to be banned from Twitter, even if they’re believed to be spouting misinformation, hateful ideas, or fomenting discontent.
This unilateral power to muzzle free speech represents a far greater danger than any so-called right- or left-wing extremist might pose.
The ramifications are so far-reaching as to render almost every American an extremist in word, deed, thought or by association.
Yet where many go wrong is in assuming that you have to be doing something illegal or challenging the government’s authority in order to be flagged as a suspicious character, labeled an enemy of the state and locked up like a dangerous criminal.
Eventually, all you will really need to do is use certain trigger words, surf the internet, communicate using a cell phone, drive a car, stay at a hotel, purchase materials at a hardware store, take flying or boating lessons, appear suspicious, question government authority, or generally live in the United States.
The groundwork has already been laid.
The trap is set.
All that is needed is the right bait.
With the help of automated eyes and ears, a growing arsenal of high-tech software, hardware and techniques, government propaganda urging Americans to turn into spies and snitches, as well as social media and behavior sensing software, government agents have been busily spinning a sticky spider-web of threat assessments, behavioral sensing warnings, flagged “words,” and “suspicious” activity reports aimed at snaring potential enemies of the state.
It’s the American police state’s take on the dystopian terrors foreshadowed by George Orwell, Aldous Huxley and Phillip K. Dick all rolled up into one oppressive pre-crime and pre-thought crime package.
What’s more, the technocrats who run the surveillance state don’t even have to break a sweat while monitoring what you say, what you read, what you write, where you go, how much you spend, whom you support, and with whom you communicate. Computers by way of AI (artificial intelligence) now do the tedious work of trolling social media, the internet, text messages and phone calls for potentially anti-government remarks, all of which is carefully recorded, documented, and stored to be used against you someday at a time and place of the government’s choosing.
In other words, the burden of proof is reversed: you are guilty before you are given any chance to prove you are innocent.
Dig beneath the surface of this kind of surveillance/police state, however, and you will find that the real purpose of pre-crime is not safety but control.
Red flag gun laws merely push us that much closer towards a suspect society where everyone is potentially guilty of some crime or another and must be preemptively rendered harmless.
This is the same government that has a growing list—shared with fusion centers and law enforcement agencies—of ideologies, behaviors, affiliations and other characteristics that could flag someone as suspicious and result in their being labeled potential enemies of the state.
For instance, if you believe in and exercise your rights under the Constitution (namely, your right to speak freely, worship freely, associate with like-minded individuals who share your political views, criticize the government, own a weapon, demand a warrant before being questioned or searched, or any other activity viewed as potentially anti-government, racist, bigoted, anarchic or sovereign), you could be at the top of the government’s terrorism watch list.
In other words, if you dare to subscribe to any views that are contrary to the government’s, you may well be suspected of being a domestic terrorist and treated accordingly.
Again, where many Americans go wrong is in naively assuming that you have to be doing something illegal or harmful in order to be flagged and targeted for some form of intervention or detention.
In fact, U.S. police agencies have been working to identify and manage potential extremist “threats,” violent or otherwise, before they can become actual threats for some time now.
In much the same way that the USA Patriot Act was used as a front to advance the surveillance state, allowing the government to establish a far-reaching domestic spying program that turned every American citizen into a criminal suspect, the government’s anti-extremism program renders otherwise lawful, nonviolent activities as potentially extremist.
Be warned: once you get on such a government watch list—whether it’s a terrorist watch list, a mental health watch list, a dissident watch list, or a red flag gun watch list—there’s no clear-cut way to get off, whether or not you should actually be on there.
You will be tracked wherever you go.
You will be flagged as a potential threat and dealt with accordingly.
This is pre-crime on an ideological scale and it’s been a long time coming.
The government has been building its pre-crime, surveillance network in concert with fusion centers (of which there are 78 nationwide, with partners in the corporate sector and globally), data collection agencies, behavioral scientists, corporations, social media, and community organizers and by relying on cutting-edge technology for surveillance, facial recognition, predictive policing, biometrics, and behavioral epigenetics (in which life experiences alter one’s genetic makeup).
If you’re not scared yet, you should be.
Connect the dots.
Start with the powers amassed by the government under the USA Patriot Act, note the government’s ever-broadening definition of what it considers to be an “extremist,” then add in the government’s detention powers under NDAA, the National Security Agency’s far-reaching surveillance networks, and fusion centers that collect and share surveillance data between local, state and federal police agencies.
To that, add tens of thousands of armed, surveillance drones and balloons that are beginning to blanket American skies, facial recognition technology that will identify and track you wherever you go and whatever you do. And then to complete the picture, toss in the real-time crime centers being deployed in cities across the country, which will be attempting to “predict” crimes and identify so-called criminals before they happen based on widespread surveillance, complex mathematical algorithms and prognostication programs.
Hopefully you’re starting to understand how easy we’ve made it for the government to identify, label, target, defuse and detain anyone it views as a potential threat for a variety of reasons that run the gamut from mental illness to having a military background to challenging its authority to just being on the government’s list of persona non grata.
There’s always a price to pay for standing up to the powers-that-be.
British and American state intelligence agencies are “weaponizing truth” to quash vaccine hesitancy as both nations prepare for mass inoculations, in a recently announced “cyber war” to be commanded by AI-powered arbiters of truth against information sources that challenge official narratives.
In just the past week, the national-security states of the United States and United Kingdom have discreetly let it be known that the cyber tools and online tactics previously designed for use in the post-9/11 “war on terror” are now being repurposed for use against information sources promoting “vaccine hesitancy” and information related to Covid-19 that runs counter to their state narratives.
A new cyber offensive was launched on Monday by the UK’s signal intelligence agency, Government Communications Headquarters (GCHQ), which seeks to target websites that publish content deemed to be “propaganda” that raises concerns regarding state-sponsored Covid-19 vaccine development and the multi-national pharmaceutical corporations involved.
Similar efforts are underway in the United States, with the US military recently funding a CIA-backed firm—stuffed with former counterterrorism officials who were behind the occupation of Iraq and the rise of the so-called Islamic State—to develop an AI algorithm aimed specifically at new websites promoting “suspected” disinformation related to the Covid-19 crisis and the US military–led Covid-19 vaccination effort known as Operation Warp Speed.
Both countries are preparing to silence independent journalists who raise legitimate concerns over pharmaceutical industry corruption or the extreme secrecy surrounding state-sponsored Covid-19 vaccination efforts, now that Pfizer’s vaccine candidate is slated to be approved by the US Food and Drug Administration (FDA) by month’s end.
Essentially, the power of the state is being wielded like never before to police online speech and to deplatform news websites to protect the interests of powerful corporations like Pfizer and other scandal-ridden pharmaceutical giants as well as the interests of the US and UK national-security states, which themselves are intimately involved in the Covid-19 vaccination endeavor.
UK Intelligence’s New Cyberwar Targeting “Anti-Vaccine Propaganda”
On Monday, the UK newspaper The Times reported that the UK’s GCHQ “has begun an offensive cyber-operation to disrupt anti-vaccine propaganda being spread by hostile states” and “is using a toolkit developed to tackle disinformation and recruitment material peddled by Islamic State” to do so. In addition, the UK government has ordered the British military’s 77th Brigade, which specializes in “information warfare,” to launch an online campaign to counter “deceptive narratives” about Covid-19 vaccine candidates.
The newly announced GCHQ “cyber war” will not only take down “anti-vaccine propaganda” but will also seek to “disrupt the operations of the cyberactors responsible for it, including encrypting their data so they cannot access it and blocking their communications with each other.” The effort will also involve GCHQ reaching out to other countries in the “Five Eyes” alliance (US, Australia, New Zealand and Canada) to alert their partner agencies in those countries to target such “propaganda” sites hosted within their borders.
The Times stated that “the government regards tackling false information about inoculation as a rising priority as the prospect of a reliable vaccine against the coronavirus draws closer,” suggesting that efforts will continue to ramp up as a vaccine candidate gets closer to approval.
It seems that, from the perspective of the UK national-security state, those who question corruption in the pharmaceutical industry and its possible impact on the leading experimental Covid-19 vaccine candidates (all of which use experimental vaccine technologies that have never before been approved for human use) should be targeted with tools originally designed to combat terrorist propaganda.
While The Times asserted that the effort would target content “that originated only from state adversaries” and would not target the sites of “ordinary citizens,” the newspaper suggested that the effort would rely on the US government for determining whether or not a site is part of a “foreign disinformation” operation.
This is highly troubling given that the US recently seized the domains of many sites, including the American Herald Tribune, which it erroneously labeled as “Iranian propaganda,” despite its editor in chief, Anthony Hall, being based in Canada. The US government made this claim about the American Herald Tribune after the cybersecurity firm FireEye, a US government contractor, stated that it had “moderate confidence” that the site had been “founded in Iran.”
In addition, the fact that GCHQ has alleged that most of the sites it plans to target are “linked to Moscow” gives further cause for concern given that the UK government was caught funding the Institute for Statecraft’s Integrity Initiative, which falsely labeled critics of the UK government’s actions as well as its narratives with respect to the Syria conflict as being related to “Russian disinformation” campaigns.
Given this precedent, it is certainly plausible that GCHQ could take the word of either an allied government, a government contractor, or perhaps even an allied media organization such as Bellingcat or the Atlantic Council’s DFRLab that a given site is “foreign propaganda” in order to launch a cyber offensive against it. Such concerns are only amplified when one of the main government sources for The Times article bluntly stated that “GCHQ has been told to take out antivaxers [sic] online and on social media. There are ways they have used to monitor and disrupt terrorist propaganda,” which suggests that the targets of GCHQ’s new cyber war will, in fact, be determined by the content itself rather than their suspected “foreign” origin. The “foreign” aspect instead appears to be a means of evading the prohibition in GCHQ’s operational mandate on targeting the speech or websites of ordinary citizens.
This larger pivot toward treating alleged “anti-vaxxers” as “national security threats” has been ongoing for much of this year, spearheaded in part by Imran Ahmed, the CEO of the UK-based Center for Countering Digital Hate, a member of the UK government’s Steering Committee on Countering Extremism Pilot Task Force, which is part of the UK government’s Commission for Countering Extremism.
Ahmed told the UK newspaper The Independent in July that “I would go beyond calling anti-vaxxers conspiracy theorists to say they are an extremist group that pose a national security risk.” He then stated that “once someone has been exposed to one type of conspiracy it’s easy to lead them down a path where they embrace more radical world views that can lead to violent extremism,” thereby implying that “anti-vaxxers” might engage in acts of violent extremism. Among the websites cited by Ahmed’s organization as promoting such “extremism” that poses a “national security risk” were Children’s Health Defense, the National Vaccine Information Center, Informed Consent Action Network, and Mercola.com, among others.
Similarly, a think tank tied to US intelligence—whose GCHQ equivalent, the National Security Agency, will take part in the newly announced “cyber war”—argued in a research paper published just months before the onset of the Covid-19 crisis that “the US ‘anti-vaxxer’ movement would pose a threat to national security in the event of a ‘pandemic with a novel organism.’”
InfraGard, “a partnership between the Federal Bureau of Investigation (FBI) and members of the private sector,” warned in the paper published last June that “the US anti-vaccine movement would also be connected with ‘social media misinformation and propaganda campaigns’ orchestrated by the Russian government,” as cited by The Guardian. The InfraGard paper further claimed that prominent “anti-vaxxers” are aligned “with other conspiracy movements including the far right . . . and social media misinformation and propaganda campaigns by many foreign and domestic actors. Included among these actors is the Internet Research Agency, the Russian government–aligned organization.”
An article published just last month by the Washington Post argued that “vaccine hesitancy is mixing with coronavirus denial and merging with far-right American conspiracy theories, including Qanon,” which the FBI named a potential domestic terror threat last year. The article quoted Peter Hotez, dean of the School of Tropical Medicine at Baylor College of Medicine in Houston, as saying “The US anti-vaccination movement is globalizing and it’s going toward more-extremist tendencies.”
It is worth pointing out that many so-called “anti-vaxxers” are actually critics of the pharmaceutical industry and are not necessarily opposed to vaccines in and of themselves, making the labels “anti-vaxxer” and “anti-vaccine” misleading. Given that many pharmaceutical giants involved in making Covid-19 vaccines donate heavily to politiciansin both countries and have been involved in numerous safety scandals, using state intelligence agencies to wage cyber war against sites that investigate such concerns is not only troubling for the future of journalism but it suggests that the UK is taking a dangerous leap toward becoming a country that uses its state powers to treat the enemies of corporations as enemies of the state.
The CIA-Backed Firm “Weaponizing Truth” with AI
In early October, the US Air Force and US Special Operations Command announced that they had awarded a multimillion-dollar contract to the US-based “machine intelligence” company Primer. Per the press release, “Primer will develop the first-ever machine learning platform to automatically identify and assess suspected disinformation [emphasis added]. Primer will also enhance its natural language processing platform to automatically analyze tactical events to provide commanders with unprecedented insight as events unfold in near real-time.”
According to Primer, the company “builds software machines that read and write in English, Russian, and Chinese to automatically unearth trends and patterns across large volumes of data,” and their work “supports the mission of the intelligence community and broader DOD by automating reading and research tasks to enhance the speed and quality of decision-making.” In other words, Primer is developing an algorithm that would allow the national-security state to outsource many military and intelligence analyst positions to AI. In fact, the company openly admits this, stating that their current effort “will automate the work typically done by dozens of analysts in a security operations center to ingest all of the data relevant to an event as it happens and funnel it into a unified user interface.”
Primer’s ultimate goal is to use their AI to entirely automate the shaping of public perceptions and become the arbiter of “truth,” as defined by the state. Primer’s founder, Sean Gourley, who previously created AI programs for the military to track “insurgency” in post-invasion Iraq, asserted in an April blog post that “computational warfare and disinformation campaigns will, in 2020, become a more serious threat than physical war, and we will have to rethink the weapons we deploy to fight them.”
In that same post, Gourley argued for the creation of a “Manhattan Project for truth” that would create a publicly available Wikipedia-style database built off of “knowledge bases [that] already exist inside many countries’ intelligence agencies for national security purposes.” Gourley then wrote that “this effort would be ultimately about building and enhancing our collective intelligence and establishing a baseline for what’s true or not” as established by intelligence agencies. He concludes his blog post by stating that “in 2020, we will begin to weaponize truth.”
Notably, on November 9, the same day that GCHQ announced its plans to target “anti-vaccine propaganda,” the US website NextGov reported that Primer’s Pentagon-funded effort had turned its attention specifically to “Covid-19 related disinformation.” According to Primer’s director of science, John Bohannon, “Primer will be integrating bot detection, synthetic text detection and unstructured textual claims analysis capabilities into our existing artificial intelligence platform currently in use with DOD. . . . This will create the first unified mission-ready platform to effectively counter Covid-19-related disinformation in near-real time.”
Bohannon, who previously worked as a mainstream journalist embedded with NATO forces in Afghanistan, also told NextGov that Primer’s new Covid-19–focused effort “automatically classifies documents into one of 10 categories to enable the detection of the impact of COVID” on areas such as “business, science and technology, employment, the global economy, and elections.” The final product is expected to be delivered to the Pentagon in the second quarter of next year.
Though a so-called private company, Primer is deeply linked to the national-security state it is designed to protect by “weaponizing truth.” Primer proudly promotes itself as having more than 15 percent of its staff hailing from the US intelligence community or military. The director of the company’s National Security Group is Brian Raymond, a former CIA intelligence officer who served as the Director for Iraq on the US National Security Council after leaving the agency.
The company also recently added several prominent national-security officials to its board including:
Gen. Raymond Thomas (ret.), who led the command of all US and NATO Special Operations Forces in Afghanistan and is the former commander of both US Special Operations Command and Joint Special Operations Command (JSOC).
Lt. Gen. VeraLinn Jamieson (ret.), the former deputy chief of staff for Air Force Intelligence, Surveillance and Reconnaissance who led the Air Force’s intelligence and cyber forces. She also personally developed “strategic partnerships” between the Air Force and Microsoft, Amazon, Google, and IBM in order “to accelerate the Air Force’s digital transformation.”
Brett McGurk, one of the “chief architects” of the Iraq War “surge,” alongside the notorious Kagan family, as NSC Director for Iraq, and then as special assistant to the president and senior Director for Iraq and Afghanistan during the Bush administration. Under Obama and during part of the Trump administration, McGurk was the special presidential envoy for the Global Coalition to Defeat ISIS at the State Department, helping to manage the “dirty war” waged by the US, the UK, and other allies against Syria.
In addition to those recent board hires, Primer brought on Sue Gordon, the former principal deputy director of National Intelligence, as a strategic adviser. Gordon previously “drove partnerships within the US Intelligence Community and provided advice to the National Security Council in her role as deputy director of national intelligence” and had a twenty-seven-year career at the CIA. The deep links are unsurprising, given that Primer is financially backed by the CIA’s venture-capital arm In-Q-Tel and the venture-capital arm of billionaire Mike Bloomberg, Bloomberg Beta.
Operation Warp Speed’s Disinformation Blitzkrieg
The rapid increase in interest by the US and UK national-security states toward Covid-19 “disinformation,” particularly as it relates to upcoming Covid-19 vaccination campaigns, is intimately related to the media-engagement strategy of the US government’s Operation Warp Speed.
Officially a “public-private partnership,” Operation Warp Speed, which has the goal of vaccinating 300 million Americans by next January, is dominated by the US military and also involves several US intelligence agencies, including the National Security Agency (NSA) and the Department of Homeland Security (DHS), as well as intelligence-linked tech giants Google, Oracle, and Palantir. Several reports published in The Last American Vagabondby this author and journalist Derrick Broze have revealed the extreme secrecy of the operation, its numerous conflicts of interest, and its deep ties to Silicon Valley and Orwellian technocratic initiatives.
Warp Speed’s official guidance discusses at length its phased plan for engaging the public and addressing issues of “vaccine hesitancy.” According to the Warp Speed document entitled “From the Factory to the Frontlines,” “strategic communications and public messaging are critical to ensure maximum acceptance of vaccines, requiring a saturation of messaging across the national media.” It also states that “working with established partners—especially those that are trusted sources for target audiences—is critical to advancing public understanding of, access to, and acceptance of eventual vaccines” and that “identifying the right messages to promote vaccine confidence, countering misinformation, and targeting outreach to vulnerable and at-risk populations will be necessary to achieve high coverage.”
The document also notes that Warp Speed will employ the CDC’s three-pronged strategic framework for its communications effort. The third pillar of that strategy is entitled “Stop Myths” and has as a main focus “establish[ing] partnerships to contain the spread of misinformation” as well as “work[ing] with local partners and trusted messengers to improve confidence in vaccines.”
Though that particular Warp Speed document is short on specifics, the CDC’s Covid-19 Vaccination Program Interim Playbook contains additional information. It states that Operation Warp Speed will “engage and use a wide range of partners, collaborations, and communication and news media channels to achieve communication goals, understanding that channel preferences and credible sources vary among audiences and people at higher risk for severe illness and critical populations, and channels vary in their capacity to achieve different communication objectives.” It states that it will focus its efforts in this regard on “traditional media channels” (print, radio, and TV) as well as “digital media” (internet, social media, and text messaging).
The CDC document further reveals that the “public messaging” campaign to “promote vaccine uptake” and address “vaccine hesitancy” is divided into four phases and adds that the overall communication strategy of Warp Speed “should be timely and applicable for the current phase of the Covid-19 Vaccination program.”
Those phases are:
Before a vaccine is available
The vaccine is available in limited supply for certain populations of early focus
The vaccine is increasingly available for other critical populations and the general public
The vaccine is widely available
Given that the Covid-19 vaccine candidate produced by Pfizer is expected to be approved by the end of November, it appears that the US national-security state, which is essentially running Operation Warp Speed, along with “trusted messengers” in mass media, is preparing to enter the second phase of its communications strategy, one in which news organizations and journalists who raise legitimate concerns about Warp Speed will be de-platformed to make way for the “required” saturation of pro-vaccine messaging across the English-speaking media landscape.
I, on the other hand, am not overly worried: after all, the voting booths have already been hijacked by a political elite comprised of Republicans and Democrats who are determined to retain power at all costs.
The outcome is a foregone conclusion: the Deep State will win and “we the people” will lose.
The damage has already been done.
The Department of Homeland Security (DHS), which has been tasked with helping to “secure” the elections and protect the nation against cyberattacks, is not exactly an agency known for its adherence to freedom principles.
After all, this is the agency largely responsible for turning the American republic into a police state. Since its creation, the DHS has ushered in the domestic use of surveillance drones, expanded the reach of fusion centers, stockpiled an alarming amount of ammunition (including hollow point bullets), urged Americans to become snitches through a “see something, say something” campaign, overseen the fumbling antics of TSA agents everywhere, militarized the nation’s police, spied on activists and veterans, distributed license plate readers and cell phone trackers to law enforcement agencies, contracted to build detention camps, carried out military drills and lockdowns in American cities, conducted virtual strip searches of airline passengers, established Constitution-free border zones, funded city-wide surveillance cameras, and undermined the Fourth Amendment at every turn.
So, no, I’m not losing a night’s sleep over the thought that this election might by any more rigged than it already is.
And I’m not holding my breath in the hopes that the winner of this year’s popularity contest will save us from government surveillance, weaponized drones, militarized police, endless wars, SWAT team raids, asset forfeiture schemes, overcriminalization, profit-driven private prisons, graft and corruption, or any of the other evils that masquerade as official government business these days.
You see, after years of trying to wake Americans up to the reality that there is no political savior who will save us from the police state, I’ve come to realize that Americans want to engage in the reassurance ritual of voting.
They want to believe the fantasy that politics matter.
They want to be persuaded that there’s a difference between the Republicans and Democrats (there’s not).
Some will swear that Donald Trump has been an improvement on Barack Obama (he is not).
Others are convinced that Joe Biden’s values are different from Donald Trump’s (with both of them, money talks).
Most of all, voters want to buy into the fantasy that when they elect a president, they’re getting someone who truly represents the citizenry rather than the Deep State (in fact, in the oligarchy that is the American police state, an elite group of wealthy donors is calling the shots in cooperation with a political elite).
The sad truth is that it doesn’t matter who wins the White House, because they all work for the same boss: Corporate America. Understanding this, many corporations hedge their bets on who will win the White House by splitting their donations between Democratic and Republican candidates.
Politics is a game, a joke, a hustle, a con, a distraction, a spectacle, a sport, and for many devout Americans, a religion. It is a political illusion aimed at persuading the citizenry that we are free, that our vote counts, and that we actually have some control over the government when in fact, we are prisoners of a Corporate Elite.
In other words, it’s a sophisticated ruse aimed at keeping us divided and fighting over two parties whose priorities, more often than not, are exactly the same so that we don’t join forces and do what the Declaration of Independence suggests, which is to throw the whole lot out and start over.
It’s no secret that both parties support endless war, engage in out-of-control spending, ignore the citizenry’s basic rights, have no respect for the rule of law, are bought and paid for by Big Business, care most about their own power, and have a long record of expanding government and shrinking liberty. Most of all, both parties enjoy an intimate, incestuous history with each other and with the moneyed elite that rule this country.
Despite the jabs the candidates volley at each other for the benefit of the cameras, they’re a relatively chummy bunch away from the spotlight. Moreover, despite Congress’ so-called political gridlock, our elected officials seem to have no trouble finding common ground when it’s time to collectively kowtow to the megacorporations, lobbyists, defense contractors and other special interest groups to whom they have pledged their true allegiance.
So don’t be fooled by the smear campaigns and name-calling or drawn into their divide-and-conquer politics of hate. They’re just useful tactics that have been proven to engage voters and increase voter turnout while keeping the citizenry at each other’s throats.
It’s all a grand illusion.
It used to be that the cogs, wheels and gear shifts in the government machinery worked to keep the republic running smoothly. However, without our fully realizing it, the mechanism has changed. Its purpose is no longer to keep our republic running smoothly. To the contrary, this particular contraption’s purpose is to keep the Deep State in power. Its various parts are already a corrupt part of the whole.
Just consider how insidious, incestuous and beholden to the corporate elite the various “parts” of the mechanism have become.
Congress. Perhaps the most notorious offenders and most obvious culprits in the creation of the corporate-state, Congress has proven itself to be both inept and avaricious, oblivious champions of an authoritarian system that is systematically dismantling their constituents’ fundamental rights. Long before they’re elected, Congressmen are trained to dance to the tune of their wealthy benefactors, so much so that they spend two-thirds of their time in office raising money. As Reuters reports, “For many lawmakers, the daily routine in Washington involves fundraising as much as legislating. The culture of nonstop political campaigning shapes the rhythms of daily life in Congress, as well as the landscape around the Capitol. It also means that lawmakers often spend more time listening to the concerns of the wealthy than anyone else.”
The President. What Americans want in a president and what they need are two very different things. The making of a popular president is an exercise in branding, marketing and creating alternate realities for the consumer—a.k.a., the citizenry—that allows them to buy into a fantasy about life in America that is utterly divorced from our increasingly grim reality. Take President Trump, for instance, who got elected by promising to drain the swamp in Washington DC. Instead of putting an end to the corruption, however, Trump has paved the way for lobbyists, corporations, the military industrial complex, and the rest of the Deep State (also referred to as “The 7th Floor Group”) to feast on the carcass of the dying American republic. The lesson: to be a successful president, it doesn’t matter whether you keep your campaign promises, sell the American people to the highest bidder, or march in lockstep with the Corporate State as long as you keep telling people what they most want to hear.
The Supreme Court. The U.S. Supreme Court—once the last refuge of justice, the one governmental body really capable of rolling back the slowly emerging tyranny enveloping America—has instead become the champion of the American police state, absolving government and corporate officials of their crimes while relentlessly punishing the average American for exercising his or her rights. Like the rest of the government, the Court has routinely prioritized profit, security, and convenience over the basic rights of the citizenry. Indeed, law professor Erwin Chemerinsky makes a compelling case that the Supreme Court, whose “justices have overwhelmingly come from positions of privilege,” almost unerringly throughout its history sides with the wealthy, the privileged, and the powerful.
The Media. Of course, this triumvirate of total control would be completely ineffective without a propaganda machine provided by the world’s largest corporations. Besides shoveling drivel down our throats at every possible moment, the so-called news agencies which are supposed to act as bulwarks against government propaganda have instead become the mouthpieces of the state. The pundits which pollute our airwaves are at best court jesters and at worst propagandists for the false reality created by the American government. When you have internet and media giants such as Google, NBC Universal, News Corporation, Turner Broadcasting, Thomson Reuters, Comcast, Time Warner, Viacom, Public Radio International and The Washington Post Company donating to political candidates, you no longer have an independent media—what we used to refer to as the “fourth estate”—that can be trusted to hold the government accountable.
The American People. “We the people” now belong to a permanent underclass in America. It doesn’t matter what you call us—chattel, slaves, worker bees, it’s all the same—what matters is that we are expected to march in lockstep with and submit to the will of the state in all matters, public and private. Unfortunately, through our complicity in matters large and small, we have allowed an out-of-control corporate-state apparatus to take over every element of American society.
We’re playing against a stacked deck.
The game is rigged, and “we the people” keep getting dealt the same losing hand. The people dealing the cards—the politicians, the corporations, the judges, the prosecutors, the police, the bureaucrats, the military, the media, etc.—have only one prevailing concern, and that is to maintain their power and control over the citizenry, while milking us of our money and possessions.
It really doesn’t matter what you call them—Republicans, Democrats, the 1%, the elite, the controllers, the masterminds, the shadow government, the police state, the surveillance state, the military industrial complex—so long as you understand that while they are dealing the cards, the deck will always be stacked in their favor.
As I make clear in my book, Battlefield America: The War on the American People, our failure to remain informed about what is taking place in our government, to know and exercise our rights, to vocally protest, to demand accountability on the part of our government representatives, and at a minimum to care about the plight of our fellow Americans has been our downfall.
Now we find ourselves once again caught up in the spectacle of another presidential election, and once again the majority of Americans are acting as if this election will make a difference and bring about change. As if the new boss will be different from the old boss.
The politicians are put there to give you the idea that you have freedom of choice. You don’t. You have no choice. You have owners. They own you. They own everything. They own all the important land. They own and control the corporations. They’ve long since bought and paid for the Senate, the Congress, the state houses, the city halls. They got the judges in their back pockets and they own all the big media companies, so they control just about all of the news and information you get to hear. They got you by the balls. They spend billions of dollars every year lobbying. Lobbying to get what they want. Well, we know what they want. They want more for themselves and less for everybody else, but I’ll tell you what they don’t want. They don’t want a population of citizens capable of critical thinking. They don’t want well-informed, well-educated people capable of critical thinking. They’re not interested in that. That doesn’t help them. That’s against their interests. They want obedient workers. Obedient workers, people who are just smart enough to run the machines and do the paperwork…. It’s a big club and you ain’t in it. You and I are not in the big club. …The table is tilted, folks. The game is rigged and nobody seems to notice…. Nobody seems to care. That’s what the owners count on…. It’s called the American Dream, ’cause you have to be asleep to believe it.
FILE – In this May 6, 2019, file photo Microsoft CEO Satya Nadella delivers the keynote address at Build, the company’s annual conference for software developers in Seattle. Microsoft says it has detected more than 740 infiltration attempts by nation-state actors in the past year targeting U.S.-based political parties, campaigns and other democracy-focused organizations including think tanks and other non-profits. (AP Photo/Elaine Thompson, File)
Russia, China and Iran are already being blamed for using tech to undermine the 2020 election. Yet, the very technologies they are allegedly using were created by a web of companies with deep ties to Israeli intelligence.
As World War II drew to a close in Europe, British philosopher Bertrand Russell wrote that “neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of a great fear.”
Though numerous examples in the post-World War II era have proven Russell’s point, perhaps one of the best examples was the U.S. public’s willingness to swallow lie after lie about Saddam Hussein’s Iraq due to the climate of fear that followed the September 11 attacks. Those lies, propagated by dubious intelligence, government officials and a compliant media, resulted in catastrophes – large and small, both abroad and at home.
Today, an analogous narrative is being crafted by many of the same players – both in media and government – yet it has avoided scrutiny, even from independent media.
Over the past several months and with a renewed zeal in just the last few weeks, anonymous intelligence officials, dubious “experts” and establishment media outlets have crafted a narrative about the coming “chaos” of the 2020 election, months before it takes place. Per that narrative, certain state actors will use specific technologies to target the “American mind” in order to undermine the coming presidential election. The narrative holds that those efforts will be so successful that the U.S. will never recover as a democracy.
Though these anonymous government sources and their stenographers have already named the countries who will be responsible and the technologies they will use, they also admit that no evidence yet exists to back up these claims, meaning they are — at best — pure speculation.
Historically, the goal of such fear-inducing narratives has been the trading of civil liberties for increased security, or rather, the appearance of increased security. Yet, when the need for security is felt due to a fear that is based on government-driven speculation and not on evidence, the goal of that narrative is not about protecting the public from a real, tangible threat but instead about the consolidation of power by the very groups responsible for crafting it — in this case, the intelligence community and other key players in the national security state.
However, what is particularly odd about this narrative surrounding imminent “chaos” and meddling in the upcoming 2020 election is the fact that, not only have the instruments of said meddling been named and described in detail, but their use in the election was recently simulated by a company with deep ties to both U.S. and Israeli intelligence. That simulation, organized and run by the Israeli-American company Cybereason, ended with scores of Americans dead, the cancellation of the 2020 election, the imposition of martial law and a spike in fear among the American populace.
Many of the technologies used to create that chaotic and horrific scenario in the Cybereason simulation are the very same technologies that U.S. federal officials and corporate media outlets have promoted as the core of the very toolkit that they claim will be used to undermine the coming election, such as deep fakes and hacks of critical infrastructure, consumer devices and even vehicles.
While the narrative in place has already laid the blame at the feet of U.S. rival states China, Russia and Iran, these very technologies are instead dominated by companies that are tied to the very same intelligence agencies as Cybereason, specifically Israeli military intelligence.
With intelligence agencies in the U.S. and Israel not only crafting the narrative about 2020 foreign meddling, but also dominating these technologies and simulating their use to upend the coming election, it becomes crucial to consider the motivations behind this narrative and if these intelligence agencies have ulterior motives in promoting and simulating such outcomes that would effectively end American democracy and hand almost total power to the national security state.
Media, intelligence foreshadow tech-powered doom for 2020
Even though the 2020 U.S. election is still months away, a plethora of media reports over the past six months (and even before then) have been raising concern after concern about how the U.S. election is still so vulnerable to foreign meddling that such meddling is essentially an inevitability.
Part of the reason for the recent pick-up in fear mongering appears to have been the release of a joint statement issued by key members of the Trump administration last November. That statement, authored by Attorney General Bill Barr, Defense Secretary Mark Esper, acting DHS Secretary Kevin McAleenan, acting Director of National Intelligence Joseph Maguire, FBI Director Christopher Wray, NSA Director Gen. Paul Nakasone, and Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs, claimed that foreign interference in 2020 was imminent despite admitting that there is no evidence of interference having taken place:
Our adversaries want to undermine our democratic institutions, influence public sentiment and affect government policies. Russia, China, Iran, and other foreign malicious actorsall will seek to interfere in the voting process or influence voter perceptions. Adversaries may try to accomplish their goals through a variety of means, including social media campaigns, directing disinformation operations or conducting disruptive or destructive cyber-attacks on state and local infrastructure.
While at this time we have no evidence of a compromise or disruption to election infrastructure that would enable adversaries to prevent voting, change vote counts or disrupt the ability to tally votes, we continue to vigilantly monitor any threats to U.S. elections (emphasis added).”
Despite the key caveat of there being no evidence at the time the statement was issued, media reports used the statement to claim that foreign interference in 2020 was imminent, such as in these reports fromBuzzFeed, ABC News, and Newsweek.
In addition to the reports that have cast the involvement of state actors — namely Russia, Iran and China — as assured despite no evidence, other reports have made the claim that this allegedly imminent interference will inevitably be successful, largely due to claims that the tactics used will rely heavily on technology that the U.S. can’t hope to successfully counter. CSO Online, an online news outlets that provides news, analysis and research on security and risk management, recently warned that “fixing America’s voting and election infrastructure problems is a long-term proposition, one that won’t be fixed in time for the election in November” while the New York Times warned of imminent chaos and that “stealthier” malevolent foreign actors had already created the foundation for “an ugly campaign season marred by hacking and disinformation.” Wired claimed last year that U.S. election security “is still hurting at every level.”
In another example, Rolling Stone published an article earlier this month with the headline “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” which claims that “the reality is that: “We’ve made progress since the last election — but we’re much less secure than we should be.” The article goes on to say that claim that the goal isn’t necessarily to hack voting machines or change results, but “to merely create the impression of an attack as a way to undermine our faith in the electoral process.”
It continues:
The target is the minds of the American people,” says Joshua Geltzer, a former counterterrorism director on the National Security Council. “In some ways, we’re less vulnerable than we were in 2016. In other ways, it’s more.” Nearly every expert agrees on this: The worst-case scenario, the one we need to prepare for, is a situation that causes Americans to question the bedrock of our democracy — free and fair elections.”
Well before this type of rhetoric made its way into the U.S. media, Israeli intelligence-linked tech firm Cybereason claiming in a release on its website that “messing with a voter’s mind” would have a bigger impact than changing vote totals, even before the 2016 election. That release, published by Cybereason prior to the last presidential election, was authored by the company’s CEO, Lior Div, who used to lead offensive hacking operations against nation-states for Israeli military intelligence.
Notably, of all of these media reports, there is a clear consensus that one of the main tactics that will soon be used to meddle in the coming U.S. election will be the use of so-called “deep fakes.” Deriving its name from a combination of “deep learning” and “fake,” deep fakes involve video and audio that has been manipulated using artificial intelligence (AI) to create media that appears to be authentic, but is not. Concern about its use in the upcoming election has spurred not only a wealth of media reports on the matter but has prompted both the U.S. military and Congress to take action to limit its potential misuse.
One thing that stands out about the media narrative regarding election meddling and deep fakes is that several news organizations have published articles that state that deep fakes will be used to undermine the 2020 election, as opposed to stating that they could be used or that they are a phenomenon worthy of attention (though some reportshave taken this more measured approach).
The reason for this level of confidence may owe to statements made by prominent U.S. intelligence officials last year, including those made by Dan Coats, the former Director of National Intelligence (DNI), who claimed in the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community that deep fakes and other hi-tech forms of fake media would be used to disrupt the 2020 election. Coats specifically stated:
Adversaries and strategic competitors probably will attempt to use deep fakes or similar machine-learning technologies to create convincing—but false—image, audio, and video files to augment influence campaigns directed against the United States and our allies and partners.”
Since Coats made the warning, numerous media reports have promoted the concern with little scrutiny, representing just one of the numerous times in U.S. history where narratives first authored by U.S. intelligence are subsequently promoted heavily by U.S. media, even when the claim made by intelligence officials is speculative, as it is in this case. Indeed, the narratives being promoted with respect to the 2020 election involve many of the same intelligence agencies (American and Israeli) and media outlets who promoted claims that were later proven false about “weapons of mass destruction” in Iraq prior to the 2003 invasion, among other pertinent examples.
Notably, deep fakes figured prominently and was the tool most used by malevolent hackers in Cybereason’s 2020 election simulation, which saw both video and audio-only deep fakes used to spread misinformation on national and local TV channels in order to impersonate police officers and election officials and to create fake bomb threats by posing as the terror group Daesh (ISIS). Cybereason also happens to be a partner of the organization funding the most well-known creator and producer of deep fakes in the world, an organization that — much like Cybereason itself — is openly tied to Israeli intelligence.
Aside from deep fakes, other technologies weaponized in Cybereason’s election simulation have also been the subject of several media reports, such as the hacking of Internet of Things (IoT) devices and appliances and even the hacking of vehicles that have some form of internet connectivity. In the Cybereason simulation, IoT hacks were used to cut power to polling stations and disseminate disinformation while vehicles were hacked to conduct terror attacks against civilians waiting in line to vote, killing several and injuring hundreds.
Most media reports have claimed that these technologies will be part of the coming “explosion” in cyber warfare in 2020 and do not specifically link them to imminent election meddling. Others, however, have made the link to the election explicit.
Naming the culprits in advance
In addition to the apparent consensus on how foreign meddling will occur during the 2020 election, there is also agreement regarding which countries will be responsible. Again, this is largely based on statements made by U.S. national security officials. For instance, the joint statement issued last November by the DOJ, DOD, DHS, DNI, FBI, NSA, and CISA regarding 2020 election security, states that “Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions” before adding “at this time we have no evidence.”
Similarly, the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community, written by then-Director of National Intelligence Dan Coats, names these same three countries in relation to imminent 2020 election interference and states that their interference in the 2020 election is “almost certain.” The assessment adds the following about each nation:
Russia: “Russia’s social media efforts will continue to focus on aggravating social and racial tensions, undermining trust in authorities, and criticizing perceived anti-Russia politicians.”
China: “China will continue to use legal, political, and economic levers—such as the lure of Chinese markets—to shape the information environment. It is also capable of using cyber attacks against systems in the United States to censor or suppress viewpoints it deems politically sensitive.”
Iran: “Iran, which has used social media campaigns to target audiences in both the United States and allied nations with messages aligned with Iranian interests, will continue to use online influence operations to try to advance its interests.”
The vast majority of warnings regarding future election interference have come from U.S. intelligence officials with a dubious record of trustworthiness and a history of using the media to spread propaganda and disinformation, most famously through Operation Mockingbird. Most — if not all — of the recent and numerous articles on imminent interference rely heavily on claims made by the two aforementioned government documents, documents crafted by U.S. intelligence agencies for public consumption, as well as claims made by anonymous U.S. officials.
A recent New York Times article, for example, titled “Chaos Is the Point’: Russian Hackers and Trolls Grow Stealthier in 2020,” is based almost entirely on “interviews with dozens of officials and experts,” though the only government official named in the article is Shelby Pierson, the intelligence community’s election threats executive. The most quoted experts named in the article are Ben Nimmo, formerly of the hawkish, NATO-funded Atlantic Council and now with Graphika, and Laura Rosenberger, director of the neoconservative-created Alliance for Securing Democracy. The article nonetheless cites “American officials” and “current and former officials” several times to make claims about imminent election interference that paint a bleak picture of the current election season.
A recent article from The Hill relies on the acting head of DHS, Chad Wolf, as its only source, citing Wolf’s claim that “we fully expect Russia to attempt to interfere in the 2020 elections to sow public discord and undermine our democratic institutions” amid other warnings that Wolf gave about Chinese and Iranian cyber threats to U.S. elections. Other articles, including one titled “Russia, China plan to adjust their tactics to hack, influence 2020 elections” cite only Shelby Pierson of the U.S. intelligence community as its source for that headline’s claim. Another titled “Russia isn’t the only threat to 2020 elections, says U.S. intel” cites only anonymous U.S. intelligence officials, as the headline suggests.
Though Russia and China have consistently been named as the most likely election meddlers, reports have also been drumming up the likelihood that Iran will emerge as 2020’s foreign meddler of choice, especially in the months prior to and weeks after the killing of Iranian General Qassem Soleimani by the Trump administration. A recent “informal poll” conducted by the Washington Post asked hawkish think tank fellows, employees at companies like Raytheon and current and former federal officials if Iran would likely retaliate against the U.S. via cyberattack. The Post ran the results of the poll under the headline “Get ready for serious cyberattacks from Iran, experts say.”
Despite the media’s numerous warnings of imminent and “serious” cyber-retaliation from Iran, the only cyberattack attributed to the country after Soleimani’s death was the vandalism of the Federal Depository Library Program website, a rather benign act that was nevertheless blasted across headlines such as “US government website hacked with pro-Iranian messages, image of bloodied Trump.” The U.S. government is quoted in that article as saying that “At this time, there is no confirmation that this was the action of Iranian state-sponsored actors.”
Also notably absent from media reports is the fact that WikiLeaks revealed in 2017 that the CIA had stockpiled a library of “stolen” cyberattack techniques produced in other nations, including Russia and Iran. Those revelations, part of the Vault 7 release, revealed that the CIA’s UMBRAGE group was capable of “misdirect[ing] attribution [for cyberattacks actually done by the CIA] by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.” In other words, the CIA was more than capable of conducting “false flag” cyber attacks and blaming them on foreign actors.
Conflict of interest-ridden Microsoft “defends democracy”
Last year saw the tech behemoth Microsoft join the effort to blame foreign state actors, specifically Iran, for cyberattacks against the U.S. This helped to bolster assertions that had largely originated with a handful of U.S. intelligence officials and hawkish, neoconservative-aligned think tanks as media reports on Microsoft’s related claims treated the company as an independent private sector observer.
Yet, as MintPress investigations have revealed, Microsoft has clear conflicts of interest with respect to election interference. Its “Defending Democracy” program has spawned tools like “NewsGuard” and “ElectionGuard” that it claims will help protect U.S. democracy, but — upon closer examination — instead have the opposite effect.
Last January, MintPress exposed NewsGuard’s neoconservative backers and how special interest groups were backing the program in an effort to censor independent journalism under the guise of the fight against “fake news.” Subsequent investigations revealed the risk that Microsoft’s ElectionGuard poses to U.S. voting machines, which it claims to make more secure and how the platform was developed by companies closely tied to the Pentagon’s infamous research branch DARPA and Israeli military intelligence Unit 8200.
ElecionGuard software has since been adopted by numerous voting machine manufacturers and is slated to be used in some Democratic Primary votes. Notably, the push for the adoption of ElectionGuard software has been spearheaded by the recently created Cybersecurity and Infrastructure Security Agency (CISA), which is the federal agency tasked with overseeing election security and is headed by Christopher Krebs, a former high level Microsoft executive.
In recent months, Microsoft has also been at the center of claims that Iran attempted to hack U.S. presidential campaigns ahead of 2020 as well as claims that Iran plans to target the U.S. power grid and other critical infrastructure with cyberattacks.
Last October, Microsoft penned a blog post discussing a “threat group” it named Phosphorus that they “believe originates from Iran and is linked to the Iranian government.” The post went on to claim that Phosphorus attempted to target a U.S. presidential campaign, which later media reports claimed was President Trump’s re-election campaign. Microsoft concluded that the attempt was “not technically sophisticated” and ultimately unsuccessful, but felt compelled to disclose it and link it to Iran’s government.
Media reports also left out the fact that Microsoft is a major government contractor for the U.S. intelligence community and the Pentagon. Notably, the Trump campaign, which Microsoft said was the target of this attack, was later identified as the only major presidential campaign using Microsoft’s “AccountGuard” software, part of its dubious “Defending Democracy” program that also spawned NewsGuard and ElectionGuard. AccountGuard claims to protect campaign-linked emails and data from hackers.
Microsoft surfaced not long after, again claiming that Iran was maliciously targeting the United States’ civilian infrastructure. This subsequent claim was first published by Wired and later covered by other outlets. Those reports cite a single person, Microsoft security researcher Ned Moran, who claimed that an Iran-backed hacking group called APT33 was targeting the U.S. “physical control systems used in electric utilities, manufacturing, and oil refineries.”
“They’re trying to deliver messages to their adversaries and trying to compel and change their adversaries’ behavior,” Moran told Wired. Moran also stated that “Microsoft hasn’t seen direct evidence of APT33 carrying out a disruptive cyberattack rather than mere espionage or reconnaissance, it’s seen incidents where the group has at least laid the groundwork for those attacks (emphasis added).”
Cybereason helps craft the narrative
While U.S. intelligence officials and media outlets alike have been largely responsible for setting the narrative that imminent meddling will be conducted by Russia, China and Iran, key components of that narrative, particularly with respect to China and Iran, have been laid by Cybereason, a company that recently ran 2020 doomsday election simulations and that has close ties to the intelligence communities of both the U.S. and Israel.
We’re three days into 2020, and the world is already on high alert from last night’s airstrike in #Baghdad. Read our latest blog to learn more about their history of #cyber retaliation and what could be in store. https://t.co/GktqUa4iaf
Shortly after the killing of Iranian General Qassem Soleimani earlier this month, an operation conducted in concert with Israeli intelligence, Cybereason warned that Iran could imminently retaliate with a cyber threat and quoted its own employees who explained what and how Iran would likely target in retaliation. Cybereason’s CSO Sam Curry, who actively participated in the firm’s 2020 doomsday election simulations, stated:
This means that Iran’s “forceful revenge” response is likely to be less about the flash and all about the bang. If you have connected systems that are responsible for kinetic world effects, like ICS systems and critical infrastructure around water, energy or vital services, it’s time to pay attention. Iran and the US are engaged in Cyber brinksmanship, which means that the gloves are off as Iran picks it’s targets (emphasis added).”
Cybereason also quoted visiting fellow for the National Security Institute and former advisor to the U.S. Secret Service (which participated in Cyberaeson’s election simulations), Anne Marie Zettlemoyer, who claimed that Iran could soon target Wall Street and critical U.S. infrastructure like the power grid:
An attack against the financial systems can be devastating economically and weaken the confidence and viability of markets. However, we cannot ignore the physical consequences and manifestations that can come from a cyberattack, particularly against critical infrastructure like energy and industry control systems.”
Cybereason’s claims regarding Iran’s interest in “critical infrastructure” systems likely originated with Microsoft, the claims were then parroted by the media in several reports, many of which quoted Cybereason’s Sam Curry. Curry is also a contributor to major news outlets like Forbes where he writes about Iran’s cyber warfare capabilities.
The Iranian hacking group, APT33, has been targeting industrial control systems used by power grids, manufacturing and oil refineries. Read CSO, @samjcurry's take on the group's focus in @ForbesTech. https://t.co/gAl3abUvlg
Notably, in Cybereason’s recent allegations against Iran, it states that “it’s clear that Iran has been preparing for future geopolitical conflict by gaining access to critical infrastructure and other important operations in the United States.” It backs these claims by citing an article authored by Curry for Forbes. Following Soleimani’s death, numerous media reports, including in the UK’s The Independent and ABC News, have cited Curry as an “expert” source in claiming that Iran would retaliate with cyberattacks.
Microsoft’s claims about foreign hackers and meddling — the evidence for which have never been made public but has been parroted as fact nonetheless — are frequently supported by Cybereason.
Last August, Microsoft claimed to have foiled Russian attempts at hacking two Republican-affiliated think tanks and, despite providing no evidence, Cybereason’s then-senior director of intelligence services Ross Rustici was quoted as an expert in several media reports as saying that such behavior was to be expected from Russia. In one such report, Rustici stated:
We’re very good at fighting the last war, but the Russians are very good at evolving their game. I suspect if they’re going to do a psychological operation around the elections, the way they do it will be different than what they did in 2016. How effective the defenses we’ve built for what they did in 2016 will be for those attacks is yet to be seen.”
None of the media reports quoting Rustici mentioned Cybereason’s ties to Israeli intelligence, referring to tech firms only a “Boston-based cybersecurity company” and similar variants. Cybereason’s Intelligence Group is stuffed with former and active members of U.S. and Israeli intelligence services and has released several reports about nation-state hacking with a focus on Russia and China.
Cybereason has also been at the forefront of claims that China has been engaged in aggressive cyberattacks against multinational companies that have also seen widespread coverage in U.S. media, despite the untransparent nature of the evidence for Cybereason’s claims.
In a story that received major coverage from outlets such as Fox News, Reuters, CNBC and others, Cybereason unveiled what it called “Operation Soft Cell,” an operation that stole mass troves of data from several global telecommunications companies. In each story, Cybereason is the sole source of the claim and declined to provide the name or location of any of the affected companies. The firm also claimed to have determined that the attack was likely perpetrated by someone “backed by a nation state, and is affiliated with China.” It further claimed to have debriefed and coordinated responses with U.S. intelligence.
In an article for Reuters, Cybereason stated that “this time as opposed to in the past we are sure enough to say that the attack originated in China” while Cybereason separately told CyberScoop that it had “found hacking tools such as a modified web shell and a remote access trojan that are commonly associated with, but not unique to, Chinese hackers.” Despite the incongruity, media reports laid the blame squarely on China, as seen in headlines such as “Chinese spies have been sucking up call records at multinational telecoms, researchers say.”
Prior to uncovering Operation Soft Cell, Cybereason had warned on its blogs in the months and years prior that China would imminently targetU.S. companies. The revelation of Operation Soft Cell — which originated exclusively with Cybereason — has been used to build the case that China is openly engaged in cyberwarfare against its rival states, like the United States, and targeting “democracy itself.”
Best Known Deep Fake Creator is Funded by Israeli Intelligence
While the media, and even Cybereason itself, have helped lay the foundation to blame specific state actors for 2020 election meddling well ahead of the fact, it is worth revisiting Cybereason’s “Operation Blackout” election simulation and the tactics used by the “bad actors” in that scenario.
That simulation, discussed in detail in the first installment of this series, saw the weaponization of specific technologies, namely deep fakes, hacks of Internet of Things (IoT) devices and hacks of vehicles, in order to target the 2020 U.S. election, resulting in the cancellation of the election and the imposition of martial law.
Given the current narrative regarding what state actors are likely to meddle in the 2020 election — namely Russia, China and Iran — and the tactics they will allegedly use, it is important to explore the sources of the technologies weaponized per that narrative as well as in “Operation Blackout.”
Indeed, if there is any clear overlap between the creators of those technologies and the state actors being blamed in advance for their imminent use, it would certainly lend credibility to the claims promoted by U.S. intelligence, the media and companies like Microsoft and Cybereason.
Yet, upon closer examination, it becomes clear that the companies and state actors most involved in developing these technologies are the very ones claiming that Russia, China and Iran will use them to undermine the 2020 election.
Take for instance the use of deep fakes. Not only have numerous media reports focused on how deep fakeswill be used to meddle in the 2020 elections, but Cybereason’s doomsday election simulation saw “bad actors” rely heavily on their use to spread disinformation and even make fake bomb threats. While much has been said of the coming election and deep fakes, remarkably few reports have bothered to look at the company best known for creating viral deep fakes.
Canny AI has garnered considerable media attention over the past few years for its persuasive deep fake videos that have frequently gone viral. In the last year alone, the tech firm’s viral deep fakes have included a controversial video of Mark Zuckerberg where the Facebook co-founder appears to be saying “Imagine this for a second: One man, with total control of billions of people’s stolen data, all their secrets, their lives, their futures,” as well as a video showing Richard Nixon giving a speech he never actually gave. More recently, Canny AI was behind the viral videos immediately prior to the 2019 U.K. general election that appeared to show Jeremy Corbyn and his rival Boris Johnson endorsing each other and another video that showed world leaders singing John Lennon’s “Imagine”:
Oddly, many of the media reports that discuss these viral videos fail to mention the role of Canny AI in creating these viral deep fakes and instead only mention the organization or artists with whom Canny AI partnered to create them. For instance, the Corbyn-Johnson videos were reported to have been producedby the group Future Advocacy and artist Bill Posters, but it was actually Canny AI that created those videos for that group. Similarly, the Nixon Speech deep fake was reported by several outlets as having been solely created by MIT’s Center for Advanced Virtuality. However, the Boston Globe noted that “the [MIT] team worked with Canny AI, an Israeli company that does Video Dialogue Replacement, and Respeecher, a Ukrainian startup specializing in speech-to-speech synthetic voice production” to create the video.
The Zuckerberg deep fake that Canny AI created led to lots of positive press for the company, with several media reports dubbing them as the company using “deep fakes for good” and that uses the controversial technology “responsibly.” The Zuckerberg deep fake has been cited as one of the main drivers behind Facebook’s new “deep fake” policy, which only bans some deep fake videos and has been criticized by U.S. lawmakers as insufficient. Notably, neither Facebook nor Facebook-owned Instagram ever took down Canny AI’s deep fake of Zuckerburg.
Given the concern over deep fakes in relation to the coming election and Canny AI standing out as the main producer of deep fakes that have gone viral over the past year, it is important to point out that Canny AI has ties to a state actor with a history of election meddling: the state of Israel.
Indeed, Canny AI is 100 percent funded by an Israeli start-up accelerator called Xcelerator, a joint venture between Tel Aviv University and Israeli intelligence agency Shin Bet (sometimes called Shabak). According to Start Up Nation Central, the Paul Singer-created organization that promotes Israeli technology start ups, Xcelerator-funded “start-ups participating in the program benefit from close mentoring from content and technology experts from the Shabak, experts from Tel Aviv University, and industry leaders. The connection to the Shabak also provides the entrepreneurs with ways to test the capabilities of their technologies and cooperation opportunities (emphasis added).”
It is also worth noting that Xcelerator also backs an “anti-fake news” start-up called Cyabra, which has direct ties to Israel’s Mossad and offers its AI-driven “disinformation protection” to government agencies as well as politicians, particularly during election seasons. Two of Cyabra’s co-founders previously co-founded Psy-Group, which attempted to interfere in the 2016 U.S. election by weaponizing “fake news” and social media and later closed down its operations after U.S. government scrutiny into its activities began as part of the Mueller investigation.
Psy-Group also engaged in doxxing campaigns targeting Palesintian rights activists in the U.S. which were planned in conjunction with Ram Ben-Barak, the former deputy director of the Mossad who now advises Cyabra. Given that much of the concern ahead of the next election is related not only to deep fakes but also “fake news,” Cyabra’s rise and its clear ties to Mossad and the now defunct Psy-Group are important to note.
Furthermore, in examining the other technologies weaponized during Cybereason’s 2020 election simulation and cited in the aforementioned media narrative regarding 2020 meddling, a pattern similar to that of Canny AI emerges.
Indeed, the other technologies linked to these “bad actors” and foreign meddlers — namely hacking IoT devices and hacking vehicles — are also pioneered by companies with deep ties to Israeli military intelligence, specifically Unit 8200, and Israeli tech companies that have aggressively spied on U.S. government institutions in collusion with Israeli intelligence in the past, namely Comverse (now Verint) and Amdocs.
Hacking the Internet of Things
In Cybereason’s doomsday election simulation, another of the tactics used was the hacking of devices and appliances connected to the internet, often referred to as the Internet of Things (IoT) and which includes everything from smartphones to power grid infrastructure to city traffic lights.
While most reports on IoT hacks to date have focused on “lone wolf” or non-state-aligned actors, one company has stood out for its efforts to create a tool that would allow governments and intelligence agencies to hack these devices with ease. That company, called Toka, announced in 2018 that it planned to offer “a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain,” with “a special focus on [hacking] the so-called Internet of Things (IoT), covering tech like Amazon Echo, Nest connected home products, as well as connected fridges, thermostats and alarms.”
The Israel-based company, which raised $12.5 million within months of launching, has since been busy marketing its services to governments around the world, most recently France where it described its product portfolio as “empower[ing] governments, Intelligence, and law enforcement agencies to enhance Homeland Security with groundbreaking cyber-intelligence and operational capabilities” during an exposition in Paris last November.
Even though Toka openly markets the ability to hack private consumer devices to governments and law enforcement agencies around the world, the clear threat to privacy has gone ignored by media outlets as the company has garnered nearly no media attention since it launched nearly two years ago.
Yet, Toka is not only notable for what it offers but also for its founders and investors. Indeed, the co-founders of Toka have been described as an “all-star” team, largely because of the role of former Israeli Prime Minister and former head of Israeli military intelligence, Ehud Barak. Barak, in addition to co-founding the company, serves as its director and is also the chairman of the board of the controversial Israeli company Carbyne911, which markets software to emergency call centers in the United States. Interestingly, Cybereason’s 2020 doomsday election simulation also dealt with the hacking and weaponization of 911 call centers. Also of note is the fact that another of Carbyne911’s leadership team, former Unit 8200 commander Pinchas Buchris, is an adviser to Cybereason.
Toka’s top brass is a who’s who of former Israeli military and intelligence officials
In addition to Barak, Toka was co-founded by retired Brigadier General Yaron Rosen, former Chief of the IDF’s cyber staff, where he was “the lead architect of all [IDF] cyber activities” including those executed by Israeli military intelligence Unit 8200. Rosen, who now serves as Toka’s CEO, has stated that Toka’s technology will only be sold to countries allied with the U.S. and Israel, telling Forbes that “Russia, China and ‘other enemy countries’ would never be customers.”
Toka’s leadership and software architects are similarly tied into Israel’s national security state. Several — including the “architect” of its hacking software — previously worked for Israel’s Prime Minister’s Office and developed “offensive technologies” for Israel’s head of state and other top Toka employees and executives share numerous connections to Unit 8200, other divisions of Israeli military intelligence and Unit 8200-connected tech companies like Check Point Technologies.
Though Toka’s leadership team makes its ties to Israeli military intelligence abundantly clear, important connections also appear in examining Toka’s investors. One of the major investors in Toka is Dell technologies, one of the world’s largest technology companies that was founded by Michael Dell, a well-known pro-Israel partisan who has donated millions of dollars to the Friends of the IDF and one of the top supporters of the so-called “anti-BDS” bills that prevent publicly employed individuals or public institutions from supporting non-violent boycotts of Israel, even on humanitarian grounds. It goes without saying that a major technology company investing in a company that markets the hacking of that very technology (computers, IoT, smartphones, etc.) should be a red flag.
With a major foot in the door through its connections to Dell, whose products are used by the private and public sectors around the world, other investors in Toka again reveal its ties to Israel’s military intelligence and the same controversial Israeli tech companies that have aggressively spied on the U.S. government in the past — Amdocs and Comverse. For instance, Entrèe Capital, a venture capital fund that is one of Toka’s main investors, is managed by Aviad Eyal and Ran Achituv. The latter, who manages Entrée’s investment in Toka and sits on Toka’s board of directors, is the founder of the IDF’s satellite-based signals intelligence unit and also a former senior Vice President at both Amdocs and Comverse Infosys (Verint).
Another notable investor in Toka is the venture capital firm Andreesen Horowitz, which is advised by former Secretary of the Treasury Larry Summers, a close friend of the infamous pedophile Jeffery Epstein, whose own ties to Israeli military intelligence have been discussed in several MintPress reports. Epstein was also a close friend of Ehud Barak, co-founder and director of Toka, and invested at least $1 million in another company with close ties to Barak, Carbyne911. The remaining investors in Toka are Launch Capital, which is deeply tied to the Pritzker family — one of the wealthiest families in the U.S. with close ties to the Clintons and Obamas as well as the U.S.’ pro-Israel lobby, and Ray Rothrock, a venture capitalist who spent nearly three decades at VenRock, the Rockefeller family venture capital fund.
Unit 8200 – From Hacking Cars to Protecting Them?
Arguably the most disturbing aspect of Cybereason’s “Operation Blackout” election simulation was the hacking of vehicles that were then rammed into civilians waiting in line to vote at polling stations. In the simulation, this led to scores of dead Americans and hundreds of injuries.
As was the case with other technologies used to undermine the 2020 election in the simulation, this technology — the hacking of vehicles — is the bread and butter of an Israeli cybersecurity firm called Upstream Security that specializes in automobiles and boasts deep ties to the country’s military intelligence service.
Though vehicle hacking seemed out of left field when the 2020 election simulation took place last November, media reports about the imminent dangers of “car hacking” began to emerge just a month after the exercise took place, most of which cited a December 2019 report created by Upstream. Some of those reports have warned that car hacking could be used to undermine the coming U.S. election.
One report titled “Car Hacking Hits the Streets,” cites only Upstream’s report to claim that “In 2020, the connected-car market will reach a tipping point, with the majority of vehicles already connected to the Internet when sold in the United States, representing a large base of potential targets for attacks.” Another report, titled “New study shows just how bad vehicle hacking has gotten,” uses Upstream’s report (i.e. study) to claim that hacks of regular vehicles have exploded since 2016 and that most of the cars on U.S. roads today are vulnerable to hackers and that over 80 percent of those hacks occur remotely.
Neither report noted Upstream’s ties to Israeli military intelligence. Equally notable is the fact that both reports that covered the Upstream-written study say that only manufacturers can address the problem by partnering with a company like Upstream.
Lucky for Upstream, they have already partnered with a slew of auto manufacturers, including Hyundai, Volvo, Renault and even U.S. auto insurance giants like Nationwide, who now number among Upstream’s most important investors. The company’s original investors are Charles River Ventures, one of Cybereason’s first investors, and Israeli venture capital firm Glilot Capital.
Glilot Capital’s interest in Upstream is telling given the firm’s deep ties to Israel’s Unit 8200. Glilot was founded by two former Israeli military intelligence officers and has “a heavy focus on the cyber sector and the entrepreneurs who emerge from the elite Unit 8200,” according to the Jerusalem Post. Even the name of the firm is an homage to Unit 8200, as the unit’s main base is located in Glilot, near Herzliya.
“It’s as if Americans called a VC Fort Meade Capital [the US Army base in Maryland where the National Security Agency and the United States Cyber Command are headquartered], some VC names are meant to be symbolic, as in our case. Glilot is the home of several of the best intelligence and technology units in the IDF, it’s where we came from and it is where we find our best entrepreneurs,” Glilot Capital co-founder Arik Kleinstein told the Jerusalem Post in 2016.
Upstream is certainly the type of company that Glilot Capital is used to investing in. It was founded by two Israelis who both served in the IDF, with one of them serving in an elite intelligence unit. Upstream’s co-founders, Yoav Levy and Yonathan Appel, met while working at Check Point Technologies, the Unit 8200 alumni-founded company with deep ties to Israel’s military intelligence and military-industrial complex as well as the IoT hacking company Toka. Notably, Upstream recently partnered with the Japanese company Fujitsu, a longtime partnerwith Softbank — Cybereason’s main investor.
Softbank has also invested heavily in another Unit 8200-founded vehicle security start-up called Argus Cyber Security, a firm known for its numerous demonstrations showing how easy it is to hack vehicles. Argus is also backed by Nadav Zafrir, the former Unit 8200 commander who now runs Team8. Argus’ CEO Ofer Ben-Noon, a former captain in Unit 8200, told Forbes in 2014 that “Everything will be hacked in every single [car] brand. It will take time, it might be weeks, months, or a couple of years, but eventually it will happen.”
Since then, Unit 8200 alumni from Argus, Upstream and other Israeli automobile cybersecurity firms have shown media outlets around the world how much easier hacking vehicles has become in the years since Ben-Noon first made the claim. One such report from VICE includes a vehicle hacking demonstration, courtesy of a Unit 8200 alumni, and notes that “most cars today are susceptible to hacker attacks.”
Of course, Unit 8200 isn’t the only intelligence agency known to be experts at hacking vehicles. Indeed, in 2017, WikiLeaks revealed that the CIA was capable of hacking vehicles and exploring their use in committing “undetectable assassinations.”
“Bring down nations to their knees”
At the Tel Aviv Cybertech Conference in 2017, Israeli Prime Minister Benjamin Netanyahu stated the following:
Today warfare has changed dramatically…With a click of a button, you can bring down nations to their knees very rapidly if you so desire and if you’re willing to take the risks, because every system can be hacked. Our hospitals, our airplanes, our cars, our banks. The most important word here is our data banks, they can be hacked.”
Media reports and even members of the Israeli public and private sector have openly acknowledged that Israel’s intelligence apparatus — from Unit 8200 to the Mossad — remains directly linked to many of the private technology companies founded by its former members, especially in the field of cybersecurity. Though reports on the matter often praise this merging of Israel’s public and private spheres, they rarely acknowledge the documented corruption within Unit 8200, the unit’s dark past in recruiting felons and even pedophiles to join its ranks, or the danger posed by having companies directly linked to foreign intelligence being given access to the U.S. government’s most classified and sensitive systems and data.
As was mentioned in the first installment of this series, Cybereason’s CEO Lior Div offers a clear example of this worrisome bridge between Israel’s public and private sector, as Div has openly stated that he views his work at Cybereason as a “continuation” of his service to Israeli military intelligence, where he led offensive cyberattacks against other nations.
Given Div’s past statements and his company’s clear ties to both Israeli and U.S. intelligence, Cybereason’s simulation of the 2020 U.S. election — which involved terrorist attacks and led to the election’s cancellation and the imposition of martial law — is highly concerning. This is particularly so considering that Cybereason’s investors have direct ties to individuals who would benefit from the election’s cancellation and also considering the clear narrative that has emerged in recent months regarding how the coming election will inevitably fall victim to tech-driven “chaos” in coming months.
The clear overlap between Cybereason’s simulation and the intelligence-driven media narrative is clear cause for concern, especially considering that the technologies that they highlight as ultimately upending the election are dominated by the very same intelligence agencies simulating and crafting that narrative.
The keyword that has been used to describe the end result of both Cybereason’s simulation and the prevailing media narrative regarding the 2020 election is “chaos,” chaos so imminent, widespread and unruly that it will shake American democracy to its core.
What has been left unsaid, however, is that a government’s solution to “chaos” is always the imposition of “order.” This means that — whatever “chaos” ultimately ensues prior to or on election day — will result in a government response that will do much more to crush freedom and undermine democracy than any act of foreign meddling has, be it real or imagined.
The Trump administration sent instructions to federal agencies Monday proposing a $54 billion increase in spending for the Pentagon, the intelligence agencies and the Department of Homeland Security, to be offset by $54 billion in cuts for other agencies, mainly those involved in domestic social services and regulation of business.
Trump’s budget outline sets the stage for his first address to Congress on Tuesday. It provides further evidence that the Trump administration will be dedicated to radically rolling back social spending to finance a dramatic escalation of military operations, both in the neo-colonial wars in the Middle East and against the United States’ ‘great power’ rivals: China and Russia.
Federal departments are being told to file budget requests for the fiscal year that begins October 1, 2017 based on the numbers they were given by the Office of Management and Budget. Each agency will be responsible for working out the cuts required to meet proposed reductions, while the Pentagon, CIA and DHS will propose expanded operations with the additional funds they are to be awarded.
There were no details made public about the exact budget ceilings given to each federal department, but White House officials made it clear that foreign aid programs in the State Department and anti-pollution regulation through the Environmental Protection Agency (EPA) would suffer some of the largest cuts.
The total budget of the EPA is only $9 billion, so many other domestic programs are certain to be hard-hit, involving such departments as Education, Labor, Transportation, Agriculture (which includes food stamps), Housing and Urban Development and Health and Human Services.
The biggest federal social programs, Social Security, Medicare and Medicaid, are not affected by the budget order, which involves only funding for so-called discretionary programs, those financed through annual congressional appropriations. Entitlement programs, where benefits are paid out automatically to those who establish their eligibility, are covered by a separate budget process.
OMB Director Mick Mulvaney appeared at the White House press briefing Monday afternoon to explain the action taken by the Trump administration. He emphasized that setting what he called the “top-line budget number” for each department was only the start of a protracted process.
The OMB will use the figures from each department and agency to prepare a budget outline to be submitted to Congress on March 16. A full budget will not be ready until sometime in May, Mulvaney said. He also indicated that while spending on Social Security, Medicare and Medicaid were not addressed in the action taken Monday, “entitlement reform”—i.e., cuts in these critical programs—would be a subject of discussion with congressional leaders later in the budget process.
Press reports identified the three White House officials who have played the main roles in the initial budgeting: Mulvaney, who was confirmed on February 16 as budget director; National Economic Council Director Gary Cohn, the former president of Goldman Sachs, the huge investment bank; and Stephen K. Bannon, Trump’s chief strategist, the former chief executive of the fascistic Breitbart News site, who exercises increasingly broad sway over all White House policy decisions.
While no details have yet been released of what the $54 billion increase in military-police spending will pay for, the scale of the increase, in and of itself, shows the real character of the Trump administration. This is to be a government of war abroad and mass repression at home.
Trump himself touched on this theme in typically rambling and unfocused remarks to a meeting of the National Governors Association Monday. “We never win a war,” he said. “We never win. And we don’t fight to win. We don’t fight to win. So we either got to win, or don’t fight at all.”
He continued, telling the governors, “My first budget will be submitted to the Congress next month. This budget will be a public safety and national security budget, very much based on those two with plenty of other things, but very strong. And it will include a historic increase in defense spending to rebuild the depleted military of the United States of America at a time we most need it.”
Additional money for the Pentagon is likely to go to a dramatically increased tempo of operations in Iraq and Syria. Defense Secretary James Mattis delivered proposals to the White House Monday for an offensive against Islamic State in Iraq and Syria (ISIS), as required by an executive order issued by Trump last month. No details are available yet, but any acceleration of the bombing campaign, let alone the deployment of significant numbers of the US ground troops, would increase the cost of that war by many billions.
The $54 billion increase would also presumably include funds for the construction of Trump’s planned wall on the US-Mexico border, as well as a massive increase in spending on detention facilities for the hundreds of thousands of immigrants to be rounded up under the executive orders already issued by the White House.
The federal budget is operating under the constraints imposed by the 2011 Budget Control Act, the bipartisan legislation negotiated by the Obama White House, the Republican-controlled House of Representatives, and a Democratic-controlled Senate. This set up the so-called sequester process, under which all discretionary spending is subject to a budget freeze, for both domestic and military programs.
Each year, increased spending for programs under the sequester has been worked out on the basis of roughly equal increases for domestic and military programs. Last year, for fiscal year 2016, Congress approved $543 billion for domestic discretionary programs and $607 billion for the military. The Trump White House plan would thus represent a cut of about 10 percent for domestic programs, and an increase of nearly that amount for the military.
Any significant change in the sequester process would require support from congressional Democrats, particularly in the Senate, where the Republican party holds only a narrow 52-48 edge, and any major legislation would require a 60-vote majority to pass.
Several congressional Republican leaders criticized the White House plan as insufficiently skewed to the military. House Armed Services Committee Chairman Mac Thornberry of Texas issued a statement criticizing the “low budget number” and adding, “The administration will have to make clear which problems facing our military they are choosing not to fix.”
Senator John McCain of Arizona, chairman of the Senate Armed Services Committee, declared that the Trump plan is “a mere 3 percent above President Obama’s defense budget, which has left our military underfunded, undersized and unready.”
For all the statements by Trump and the Republicans bemoaning the supposedly “depleted” state of the US military, the United States spends more on its armed forces than the next 15 countries in the world combined. The military budget is only inadequate if the mission of the US military is assumed to be the conquest of the entire planet and the subduing of all armed resistance from any quarter—which is actually the perspective of the American ruling elite.
Much has been written about the approaching Police State in alternative media. Commentary ranges from various warnings, to shock and outrage, and fear over an impending martial law takeover in North America and Western Europe. It’s hitting us from so many different angles, and yet the mainstream conversation continues to be woefully inadequate in both characterising the situation and offering a remedy.
In order to really understand the modern Police State, we need to explore some very profound and difficult questions. Many people who consider themselves aware think Western society has already reached the tipping point and the deteriorating situation is simply inevitable. If you feel like Winston Smith right about now you aren’t alone.
Prior to the mid 1990s, one might have described the militarisation of public law enforcement something of a creeping paradigm, but one that was still a long way off. Society explored many aspects of the Police State, both the physical and Orwellian psychological scenario, through literature and film. American science fiction writer Philip K. Dick penned some significant works like The Minority Report, and cinematic hits like Paul Verhoeven’s Robocop and Terry Gilliam’s Brazil also explored what this dystopic, future vision of fascist technocracy might look like. As it turned out, and far from fantasy, countless devices, systems and themes depicted in so many of these supposedly ‘fictional’ classics have since made their way into our day to day lives. The dark dream became real.
Unfortunately, as humanity’s freshmen class of the early 21st century, we can no longer afford the intellectual distance enjoyed by previous generations between life today and that blurry, far-off spectre of something that might arrive sometime at some point in the future.
Any modern globalised Police State requires a social engineering framework in order to provide its shape and scope of law enforcement. The latest social engineering blueprint for global technocratic management was unveiled at this year’s 70th United Nations General Assembly in New York City. Their ‘new’ agenda (newer than the old one) entitled, Agenda 2030,1 hopes to “transform our world for the better by 2030.” Author Michael Snyder from the blog ‘End of The American Dream’ explains: “The entire planet is going to be committing to work toward 17 sustainable development goals and 169 specific sustainable development targets, and yet there has been almost a total media blackout about this…”2
Within its 17 ‘universal goals’, the actual Police State provision for Agenda 2030 can be found within Goal 11, which states how the new global government will, “Make cities and human settlements inclusive, safe, resilient and sustainable.” Translated in technocracy terms, this means more Big Brother tech, smart grid tracking and big data surveillance states.
The age of computerisation and database integration, along with advances in military and crowd control technology perfected overseas, have enabled a sharp advance toward the Police State. Trying to make sense of ‘it’ is a major challenge, to say the least. In its totality, the control system is both multifaceted and multilayered. It may have been possible to describe it, or even define it 20, 30, or 40 years ago, as Philip K. Dick and so many others did. Today, as society has already eclipsed the possible, we face a situation whereby the very thing we are trying to describe is woven through nearly every fabric of modern social, professional, family, religious and political life.
If you happen to live in one of the technocratic nations, you can’t opt out, nor can you fully repeal the advances already made by the control system. What other options are available?
Firstly, we have to try and understand, from an economic, cultural and political perspective at least, how this control system came to be.
What are its strongest areas? Can we reform those areas? Where is it still emerging? Cannot those areas be slowed down? What was the political climate that enabled it?
How to Build a Police State
When you observe a modern Police State, the first things you might notice will not necessarily be the batons, shield, helmets or MRAPs. Think Switzerland or Singapore. A modern Police State will be neat, clean and efficient. Retail zones will be shiny and feature all the top designer brands. Many of the people you see in public will be well-groomed, well-healed and beautiful, but often with only one political party and a strict public code.
Just like admirers of the modern Chinese State, Singapore’s proponents refer to the single party State as “a great argument for Authoritarianism.” Order and civility rule the day, so long as you don’t fall foul of the narrow perimeters set by the State.
What has been accomplished in Southeast Asia since 1965, and what is possible in previously ‘free’ countries like the US, UK and Australia, are two very different social and political evolutions. Still, the modern Police State is advancing globally and it’s being driven primarily by three factors: technology, for-profit industry, and an age-old obsession by the ruling class to manage the masses.
The first and easiest area to challenge is the physical realm of the control system. The most obvious of these are the gadgets and toys. They are easy to see. Look at your local police department and notice the difference between what officers looked like and what they wore in the 1970s, 1980s, 1990s and now in the 21st century. Notice the firearms and tasers, the ‘Bat-Belts’, and now the body cameras. Your average officer today looks like a cross between a soldier and an android. Dress them like robots and don’t be surprised when they act like machines (and it won’t be long until many of them are replaced by machines).
If you’ve ever attended a street protest or witnessed some civil unrest, then you’ll have noticed the high-tech body armour, the riot and ‘crowd suppression’ equipment.
My first intense experience where I felt the full force of the modern Police State was in 2009, at the G20 Protests in the City of London, England. It was early in the evening and approximately 4,000 demonstrators suddenly found themselves trapped at Bishopsgate. Several hundred police officers on foot and horseback had blocked all the entrances and egresses in and out of the main road. Even alleyways were manned by riot police. Then police began charging the crowds, and beating protesters with clubs. They alternated their ‘surge’ efforts, from different ends of the street, north to south, one brutal flurry after another. The worst part about it was there was no escape route away from the police. Many were beaten and trampled on that evening. It was as if police planners were playing a video game.
Finally, at around 9pm, after being forced to stand, surrounded by police in a ‘Kettle’ for nearly three hours, along with 500 other demonstrators and press, who spent most of that time pressed up against police shields and not knowing what would happen next – I realised this is an impersonal, disinterested and totally uncompromising machine. It does not care who you are, what your views and opinions are, or whether you were innocent or guilty. The lesson was simple: “next time, stay home.” The only detail this machine is concerned with is that you comply with orders, and if no orders are given, then the machine demands you stay where you are until the machine decides what to do with you. If you complain too much, or become emotional, or heaven forbid act out in any way, then the machine will move in to subdue and detain you. That is all there is to it.
Big Brother Reality
It’s well-known that Great Britain is home of the world’s largest and most sophisticated physical Police State, including tens of millions of closed circuit television (CCTV) cameras, covering every conceivable inch of habitable space, both indoors and outdoors. The CCTV phenomenon in Britain was fuelled by an obsession with cameras that became increasingly popular with both government and corporate technocrats in the 1980s and 1990s. The psychology behind the exponential proliferation in cameras was mainly a fairly crude bit of criminology which held that the cameras would somehow act as a deterrent to criminal behaviour, and thus subdue the feral population into a more docile state. Industry used this line too, as sales persons were deployed en masse with endless flip charts and statistical models that claimed CCTV cameras would prevent the UK’s spiralling social malaise.
The only problem is that more cameras don’t equal less crime. Canadian writer Cory Doctorow observed this reality back in 2011, explaining: “After all, that’s how we were sold on CCTV – not mere forensics after the fact, but deterrence. And although study after study has concluded that CCTVs don’t deter most crime (a famous San Francisco study showed that, at best, street crime shifted a few metres down the pavement when the CCTV went up), we’ve been told for years that we must all submit to being photographed all the time because it would keep the people around us from beating us, robbing us, burning our buildings and burglarising our homes.”3
The CCTV is only one single aspect of Big Brother. It turns out that the real value of the CCTV camera grid is not so much the monitoring of crime per se, as it is in mass applied behavioural psychology.
The Panopticon
The physical Police State could not exist without some philosophical underpinning. Before Orwell, there was Bentham…
In the mid 19th century Britain developed a new style of prison architecture known as the ‘Panopticon’ under the aegis of utilitarian philosopher Jeremy Bentham.4 The unique feature of this Panopticon concept was the transparent nature of each prisoner cell, visible to a central surveillance guard tower that could eye inmates at all times. The result of this psychological experiment, according to the pragmatic Benthamite philosophy, was to produce a regime of “self-policing” amongst the inmates, a kind of early behavioural conditioning. For technocrats and emerging utilitarian social managers of that era, this was seen as the most economic and efficient solution. Ultimately, this Benthamite concept is what underpinned phase one of the mass CCTV deployment throughout the UK. Sitting well above the security minions and the industry profiteers, elite scholars knew full well that CCTV cameras do not stop crime.
The real power of the Panopticon is in convincing the general population they are under constant surveillance. After that point, through a long-term process of nudging, diversions and scare tactics, the State gradually moulds the behaviour and thoughts of its subjects.
In order to keep citizens locked into this new conscious state of fear and trepidation, the State needs anenemy…
The Long War & ‘The Extremist’
One of the chief campaigns to nudge society towards a fully-functional Orwellian State is the War on Terror. Ever since September 11, 2001, the concept of an endless war against the ‘terrorists’ – a seemingly ubiquitous and constantly shape-shifting enemy – has been used to justify nearly every large new security expenditure and policy. Back in 2006, US President George W. Bush’s chief architect of the ‘long war’, Secretary of Defense Donald Rumsfeld, laid out the tea leaves for the next 100 years, stating: “It does not have to do with deployment of US military forces, necessarily. It has to do with the struggle that’s taking place within that faith between violent extremists – a small number of them, relatively – who are capable of going out and killing a great many people, as they’re doing, and the overwhelming majority of that religion that does not believe in violent extremism or terrorism.”5
In George Orwell’s classic novel 1984, Winston Smith also grappled with the State’s endless war. “Oceania was at war with Eurasia: therefore Oceania had always been at war with Eurasia.”
In Oceania, people eventually forgot what started the long war. The news was just one terrorist attack after another. They enemy was everywhere, but nowhere too. The population learned to acquiesce to the idea that war was the permanent state of affairs, and that questioning the provenance of this idea was futile.
“Winston could not definitely remember a time when his country had not been at war, but it was evident that there had been a fairly long interval of peace during his childhood, because one of his early memories was of an air raid, which appeared to take everyone by surprise. Perhaps it was the time when the atomic bomb had fallen on Colchester. He did not remember the raid itself.”
And so it was, in the early moments of the 21st century, Orwell’s dream suddenly became a waking reality. Social engineers are firm believers that if the Panopticon (married with the threat of an invisible enemy) can remain in place for a generation, then the State could fundamentally change a once free-thinking society into something noticeably different – a much more fearful and compliant populace.
The Social Media Panopticon
As terror scares and attacks become somewhat of a daily event in the West, identifying and quarantining the ‘extremist’ becomes a primary fetish of the Police State and its media arms. This is very much evident in how terrorists and ‘active shooters’ (dead or alive) are now profiled after the event. The mainstream media has integrated this into its work practice by crafting the post hoc guilty verdict of the accused, prior to a trial, with circumstantial or non sequitur accusations based on an individual’s “web history” that may have “radicalised” the suspect. In effect, the mainstream media’s function as an establishment propaganda arm results in trial by media – the bypassing of any trial by jury as the accused have already been implicitly or explicitly declared guilty by association or something as nebulous as “web history.”
Such incidents, as they are portrayed in the media for psychological conditioning purposes, are intended to cause the public mind to dismiss outdated notions of fair and due process and rule of law in favour of fiat corporate news and government “official” pronouncements. The net effect of this trend is that social media users, ie. the majority of the population, are adopting self-policing habits in their communications online. According to the principals of applied behavioural psychology, if you change the language people use, then eventually you change the way they think and act.
Like Bentham’s Panopticon, this new social media monitoring system works by utilising the digital web, which is arguably the most economic and efficient solution. The acceptance of self-policing and vague terms such as “radicalised” that are subject to the increasingly elastic definitions of the social engineering establishment.
This leads to one of the most profound questions one might ask in the wake of Edward Snowden’s NSA spying revelations: Knowing what we know now, are people more outspoken or are they more self-policing because of the Snowden leaks?
‘The Daily Shooter’
By extension, once the technocrat has regained some modicum of physical control, then the next domain to be conquered is the mind. In 1984, the technocracy was viewed through the eyes of the protagonist Winston Smith, who while remaining a physical prisoner of the Police State, could still retreat into his own mental state.
In our day, the expansion of the surveillance State and vast spying by the likes of the NSA and GCHQ are precisely intended to achieve this same effect, with the justification for such intrusions being an endless series of terror spectacles and lone wolf public shooting events. In the US, these mass shootings and terror scares are happening on an almost daily basis, hence, ‘The Daily Shooter’. Media coverage is both chaotic and relentless. As a result, the pubic are left stupefied and completely unable to challenge whatever narrative the government-media complex is selling at that time. The Police State marches forward.
A similar psychodrama also played out for 1984’s protagonist Winston Smith. As time progressed, however, maintaining some level of autonomy in one’s own thoughts became increasingly difficult for Winston. The final objective of the Police State, it seemed, was not only to fundamentally transform the way citizens act, but how they think too. The all-seeing and all-controlling “Big Brother” State was also the de facto social authority figure. The State’s law enforcement police force also became the “thought police.”
We see this same exact narrative playing out today as the State’s political figureheads continue in their mission to widen their definition of “extremism” along with other State-issued euphemisms used to describe citizens who should be regarded with suspicion.
Fall out of line and you might even be segregated or sent away to a special camp. Following the recent mass shooting in Chattanooga, Tennessee, retired US General and NATO Commander Wesley Clark proposed that any “disloyal Americans” should be sent to internment camps for the “duration of the conflict.”Notice the language: “for the duration of the conflict.” Indeed, it seems that Oceania is at war. He went even further, calling for the US government to identify people most likely to be “radicalised” so we can “cut this off at the beginning.”
“At the beginning?” Here, it seems Clark might be alluding to pre-crime, which will be powered by A.I…
Artificial Intelligence
Post-September 11, UK society was still hooked on their CCTV matrix, and with millions of cameras already in place and crime continuing to rise, security ‘experts’ and politicians simply doubled down on their previous wager, insisting that what the country really needed was more cameras. They believed that once a certain CCTV saturation was reached, by default they would somehow reached their twisted utopia.
It turned out that’s not humanly possible for security workers, most of whom are on a mere £7-10 (aud$14-20) per hour, to keep track, let alone analyse, a seemingly endless stream of footage. For the technocrat, the operative word here is ‘humanly’. Enter A.I…
Once again, advanced technology enters the narrative and supplies the solution to this previous insurmountable problem. The age of Artificial Intelligence, or A.I., is nearly upon us, and this next step in technological development is certain to radically change the entire concept of the Police State.
Laying down the framework an A.I. grid is not easy because the grid must be designed to cope with the application of A.I. As A.I.’s potential and practical applications have not yet been fully realised, designing the grid upon which it will be unleashed has been problematic up to this point. Sadly, society on the whole appears disinterested in questioning the social and unethical imperative currently driving the adoption of these new technologies.
At present, the big money is on the Smart Grid. Technocrats and their corporate partners are hoping to usher in their new surveillance grid under the auspices of ‘smart’ technologies. With A.I. in play, technocrats will be able to utilise the smart grid – which includes your mobile phone – to detect and track multiple targets over a wide area.6 Add facial recognition and data profiling to the mix and it’s a recipe for a full-on A.I. Smart Grid future. The ultimate hands-free, ‘surveillance selfie’ – compliments of Big Brother.
Just imagine, one day you’re simply walking down the street and pointing to something in the air. All of it is being captured on a 1.8 billion pixel video stream from the sky. They already know your identity and location with the phone in your pocket, and they already have your face logged and tracked.7
At this point we introduce Philip K. Dick’s concept of “pre-crime” whereby an A.I. system can predict an action you are likely to take.8 The system will then close the ‘Big Data’ loop by storing the video footage alongside your profile into a massive data ‘mash-up’. It will then compare with other potentially ‘suspicious’ activity in the area. Great Britain’s national police force, the Metropolitan Police, are already using a type of pre-crime software that British technocrats believe will somehow ‘revolutionalise’ modern policing in the 21st century.9
UK consumer advocate Pippa King explains how CCTV is already being phased out: “CCTV, closed circuit television, is not quite what is operating on our streets today. What we have now isIPTV, an internet protocol television network that can relay images to analytical software that uses algorithms to determine pre-crime area in real time.”
“Currently this AI looks at areas that may be targeted for crimes such as burglaries or joyriding,10 with the predicted hotspot information being sent direct to law enforcement smart phones in the field. This analytical software is being used in Glasgow, hailed as Britain’s first ‘smart city’,11 where the Israeli security firm NICE Systems are running the CCTV/IPTV network, analysing data from the 442 fixed HD surveillance cameras and 30 mobile units under a project called ‘Community Safety Glasgow’,12 whose primary objectives are described as ‘delivering Glasgow a more efficient traffic management system, identifying crime in the city and tracking individuals’.”13
This all can happen thanks to the US Defense Advanced Research Projects Agency’s (DARPA) latest creation – the ARGUS camera, Autonomous Real-Time Ground Ubiquitous Surveillance.14 According to its designers ARGUS, “melds together video from each of its 368 chips to create a 1.8 billion pixel video stream” all in real-time and archived. It’s just one of the many new toys used by the State to realise its Orwellian ambitions.
Who’s Paying For It All?
Aside from its ability to trample over the rights of law abiding citizens, the Police State has one other chief characteristic which may also be its Achilles heal: it’s bankrupting the State. Here’s how it works:
The gravy chain is endless, but only with the help of taxpayers’ money, along with a series of bribes and favours between politicians and corporates. If you have ‘friends’ in government administration, then you are more likely to cash in on any number of lucrative ‘domestic defense’ contracts.
Where you have constant crisis you also have constant business opportunity. In this dark paradigm, timing is everything. As US President Barack Obama’s sociopathic15 former chief of staff, now Mayor of Chicago, Rahm Emmanuel, once said:
“You never let a serious crisis go to waste. And what I mean by that it’s an opportunity to do things you think you could not do before.”
With that mantra in mind, in the wake of any shooting, terror scare, or crisis, industrial lobbyists and their elected political gophers will waste no time pushing for new federally-funded add-ons like training courses, workplace psychologists, regulators, specialist contractors, police cameras and other big-ticket items16 – anything to help “solve the crisis.” One such program in the US is known simply as the ‘1033’.
“The 1033 program has flooded our local police forces with military equipment, and has turned them from Peace Officers, to a domestic army.”
“Officers stopped looking like officers, and more like soldiers all kitted out with fully automatic weapons, armoured vehicles, body armour, grenades launchers, night vision, and even bayonets! Besides the cost of liberty, how much has this domestic army cost you the tax payer?”17
In the US, no single entity embodies the Police State gravy train more than the Department of Homeland Security (DHS), where federal grants are used to bribe local law enforcement and absorb them into a larger framework of institutional dependency.
At over $200 billion per year, the DHS is now America’s most expensive federal agency. As any sane local law enforcement chief will tell you, once you smoke from the federal crack pipe, you’re hooked for life. Remember that each federal Police State agenda item has a lucrative contract attached to it. With each move central government makes, a large amount of money is also made (by someone).
By cutting off public money that is driving the runaway federal Police State in Western countries, the people have a chance to mitigate and potentially reform the current agenda.
If we hope to preserve what is left of our hard fought democracy, then now is the time to put it to the test. The alternative is unthinkable.
About the Author
Patrick Henningsen is an independent investigative reporter, editor, and journalist. A native of Omaha, Nebraska and a graduate of Cal Poly San Luis Obispo in California, he is currently based in London, England and is the managing editor of 21st Century Wire – News for the Waking Generation (www.21stCenturyWire.com) which covers exposés on intelligence, geopolitics, foreign policy, the war on terror, technology and Wall Street. Patrick is a regular commentator on Russia Today.